Optimizing data cache when applying user-based security
First Claim
1. A secure caching method comprising:
- receiving a user request for data and a security context;
searching a cache for the requested data based on the user request and the received security context;
if the requested data is found in the cache, returning the cached data in response to the user request, andif the requested data is not found in the cache, obtaining the requested data from a data source, storing the obtained data in the cache and associating the obtained data with the security context, and returning the requested data in response to the user request,wherein the cached data is stored with a corresponding list that associates the cached data with the security context which comprises a profile of at least one authorized user, andwherein the corresponding list further comprises at least one dimension for the at least one authorized user, and an identifier for each cached member data.
2 Assignments
0 Petitions
Accused Products
Abstract
A secure caching system and caching method include receiving a user request for data, the request containing a security context, and searching a cache for the requested data based on the user request and the received security context. If the requested data is found in cache, returning the cached data in response to the user request. If the requested data is not found in cache, obtaining the requested data from a data source, storing the obtained data in the cache and associating the obtained data with the security context, and returning the requested data in response to the user request. The search for the requested data can include searching for a security list that has the security context as a key, the security list including an address in the cache of the requested data.
-
Citations
27 Claims
-
1. A secure caching method comprising:
-
receiving a user request for data and a security context; searching a cache for the requested data based on the user request and the received security context; if the requested data is found in the cache, returning the cached data in response to the user request, and if the requested data is not found in the cache, obtaining the requested data from a data source, storing the obtained data in the cache and associating the obtained data with the security context, and returning the requested data in response to the user request, wherein the cached data is stored with a corresponding list that associates the cached data with the security context which comprises a profile of at least one authorized user, and wherein the corresponding list further comprises at least one dimension for the at least one authorized user, and an identifier for each cached member data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A secure caching method in a system connected to a user and a data source, said data source having defined access rights based on a security context of users, the method comprising:
-
receiving a user request including a security context and a data identifier; checking in a list storage for the presence of a list identified by the security context and the data identifier; and if the list is not present, creating a list and storing the list in the list storage identified by the security context comprising a profile of at least one authorized user and the data identifier, retrieving data from the data source, and storing the retrieved data separately in a data storage, and populating the created list stored in the list storage with addresses of storage of the retrieved data stored in the data storage; and if the list is present, retrieving data from the data storage using the storage addresses in said list. - View Dependent Claims (12, 13, 14, 15)
-
-
16. A caching system comprising:
-
a processor executing software modules; and a memory storing the software module, wherein the software modules comprise; a receiver module which receives a user request for data and a security context; a search module which searches a cache for the requested data based on the user request and the received security context; and a management module which obtains the cached data in response to the user request if the requested data is found in the cache, wherein if the requested data is not found in the cache, the management module obtains the requested data from a data source, stores the obtained data in the cache and associates the obtained data with the security context, and returns the requested data in response to the user request, wherein the cached data is stored by the management module with a corresponding list that associates the cached data with the security context comprising a profile of at least one authorized user, and wherein the corresponding list further comprises at least one dimension for the at least one authorized user, and an identifier for each cached member data. - View Dependent Claims (17, 18, 19, 20, 21)
-
-
22. A non-transitory computer readable medium storing instructions for secure caching, the instructions comprising:
-
receiving a user request for data and a security context; searching a cache for the requested data based on the user request and the received security context; if the requested data is found in the cache, returning the cached data in response to the user request, and if the requested data is not found in the cache, obtaining the requested data from a data source, storing the obtained data in the cache and associating the obtained data with the security context, wherein the cached data is stored with a corresponding list that associates the cached data with the security context comprising a profile of at least one authorized user, and wherein the corresponding list further comprises at least one dimension for the at least one authorized user, and an identifier for each cached member data. - View Dependent Claims (23, 24, 25, 26, 27)
-
Specification