APPARATUS AND METHOD FOR SHARING A CACHED SECURITY PROFILE IN A DATABASE ENVIRONMENT
First Claim
1. An apparatus comprising a processor and memory for sharing a cached:
- security profile in a database environment, the apparatus further comprising;
a cache module configured to cache a security profile accessible to primary tasks and secondary tasks;
an identification module configured to distinguish between primary tasks authorized to refresh the security profile and secondary tasks; and
a refresh module configured to selectively refresh the security profile in response to a refresh request and expiration of the security profile such that an old version of the security profile is retained for use by secondary tasks until an execution window closes.
0 Assignments
0 Petitions
Accused Products
Abstract
An apparatus, system, and method are provided for sharing a cached security profile in a database environment. The apparatus, system, and method include a cache module for caching a security profile accessible to primary tasks and secondary tasks. An identification module is provided that distinguishes between primary tasks authorized to refresh the security profile and secondary tasks. A refresh module cooperates with the cache module and identification module to selectively refresh the security profile in response to a refresh request and expiration of the security profile such that an old version of the security profile is retained for use by secondary tasks until an execution window closes.
-
Citations
21 Claims
-
1. An apparatus comprising a processor and memory for sharing a cached:
- security profile in a database environment, the apparatus further comprising;
a cache module configured to cache a security profile accessible to primary tasks and secondary tasks;
an identification module configured to distinguish between primary tasks authorized to refresh the security profile and secondary tasks; and
a refresh module configured to selectively refresh the security profile in response to a refresh request and expiration of the security profile such that an old version of the security profile is retained for use by secondary tasks until an execution window closes. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
- security profile in a database environment, the apparatus further comprising;
-
9. A computer program product comprising a computer-useable medium having a computer readable program for sharing a cached security profile in a database environment, the computer program product further comprising:
-
a cache module configured to cache a security profile accessible to primary tasks and secondary tasks;
an identification module configured to distinguish between primary tasks and secondary tasks;
a refresh module configured to selectively refresh the security profile in response to a refresh request and expiration of the security profile such that an old version of the security profile is retained for use by secondary tasks until an execution window closes; and
a loader configured to load a new version of the security profile. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A method for making a computer-implemented process to enable sharing a cached security profile in a database environment, said method comprising:
-
encoding a first set of computer instructions onto a computer-readable medium, said first instructions configuring a cache module to cache a security profile accessible to primary tasks and secondary tasks;
encoding a second set of computer instructions onto a computer-readable medium, said second instructions configuring an identification module to distinguish between primary tasks authorized to refresh the security profile and secondary tasks; and
encoding a third set of computer instructions onto a computer-readable medium, said third instructions configuring a refresh module to selectively refresh the security profile in response to a refresh request and expiration of the security profile such that an old version of the security profile is retained for use by secondary tasks until an execution window closes.
-
- 17. The method of claim 17, further comprising encoding a fourth set of computer instructions onto a computer-readable medium, said fourth instructions configuring a deletion module to defer deletion of the old version of the security profile until the execution window closes and a subsequent primary task requests access to the cached security profile.
Specification