FACILITATING DYNAMIC END-TO-END INTEGRITY FOR DATA REPOSITORIES IN AN ON-DEMAND SERVICES ENVIRONMENT
First Claim
1. A database system-implemented method comprising:
- receiving, by and incorporating into a database system, a content file and metadata to be submitted to a data repository of the database system, wherein the content file includes content, and wherein the metadata includes identifying data associated with at least one of the content and a user associated with the content;
verifying, by the database system, the identifying data of the metadata, wherein the verification of the identifying data represents authentication of at least one of the user and the content; and
submitting, by the database system, the content file and the metadata to the data repository, upon authentication of at least one of the user and the content via successful verification of the identifying data.
2 Assignments
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for facilitating dynamic end-to-end integrity for data repositories in an on-demand services environment in an on-demand services environment in a multi-tenant environment according to one embodiment. In one embodiment and by way of example, a method includes receiving, by and incorporating into a database system, a content file and metadata to be submitted to a data repository of the database system. The content file may include content, where the metadata includes identifying data associated with at least one of the content and a user associated with the content. The method may further include verifying, by the database system, the identifying data of the metadata. The verification of the identifying data represents authentication of at least one of the user and the content. The method may further include submitting, by the database system, the content file and the metadata to the data repository, upon authentication of at least one of the user and the content via successful verification of the identifying data.
-
Citations
18 Claims
-
1. A database system-implemented method comprising:
-
receiving, by and incorporating into a database system, a content file and metadata to be submitted to a data repository of the database system, wherein the content file includes content, and wherein the metadata includes identifying data associated with at least one of the content and a user associated with the content; verifying, by the database system, the identifying data of the metadata, wherein the verification of the identifying data represents authentication of at least one of the user and the content; and submitting, by the database system, the content file and the metadata to the data repository, upon authentication of at least one of the user and the content via successful verification of the identifying data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An apparatus comprising:
-
deception/reception logic to receive a content file and metadata to be submitted to a data repository, wherein the content file includes content, and wherein the metadata includes identifying data associated with at least one of the content and a user associated with the content; verification engine to verify the identifying data of the metadata, wherein the verification of the identifying data represents authentication of at least one of the user and the content; and submission logic to submit the content file and the metadata to the data repository, upon authentication of at least one of the user and the content via successful verification of the identifying data. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A machine-readable medium comprising a plurality of instructions which, when executed by a processing device, cause the processing device to perform one or more operations comprising:
-
receiving a content file and metadata to be submitted to a data repository, wherein the content file includes content, and wherein the metadata includes identifying data associated with at least one of the content and a user associated with the content; verifying the identifying data of the metadata, wherein the verification of the identifying data represents authentication of at least one of the user and the content; and submitting the content file and the metadata to the data repository, upon authentication of at least one of the user and the content via successful verification of the identifying data. - View Dependent Claims (14, 15, 16, 17, 18)
-
Specification