Entitled data cache management
First Claim
Patent Images
1. An apparatus, comprising:
- one or more processors; and
memory storing executable instructions that, when executed by the one or more processors, cause the apparatus to;
receive entitled data from a data server, the entitled data having associated data permissions defining one or more permissions needed by a requesting user to access the entitled data;
store the entitled data and a cache signature corresponding to the entitled data;
receive a first data request for the entitled data from a first user;
hash the first data request, resulting in the cache signature;
retrieve user permissions corresponding to the first user;
determine that the user permissions corresponding to the first user intersect with the data permissions; and
transmit a first set of the entitled data as a response to the first data request for the entitled data.
10 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for managing an entitled data cache. A data server may generate and send entitled data to a data cache server. The data cache server, a server that may be located nearer to the user within a data provider'"'"'s computer network, may receive and cache the entitled data. A permission server may store user'"'"'s permissions and transmit the user'"'"'s permissions to the data server and the data cache server. Upon receiving a request for data, the data cache server may retrieve the requested data from the cache and send a subset of the cached data which matches the user'"'"'s permissions to the user, without the need to request the data from the data server.
-
Citations
23 Claims
-
1. An apparatus, comprising:
-
one or more processors; and memory storing executable instructions that, when executed by the one or more processors, cause the apparatus to; receive entitled data from a data server, the entitled data having associated data permissions defining one or more permissions needed by a requesting user to access the entitled data; store the entitled data and a cache signature corresponding to the entitled data; receive a first data request for the entitled data from a first user; hash the first data request, resulting in the cache signature; retrieve user permissions corresponding to the first user; determine that the user permissions corresponding to the first user intersect with the data permissions; and transmit a first set of the entitled data as a response to the first data request for the entitled data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, by a computing device, entitled data from a data server, the entitled data having associated data permissions defining one or more permissions needed by a requesting user to access the entitled data; store the entitled data and a cache signature corresponding to the entitled data; receiving a first data request for the entitled data from a first user; hashing the first data request, resulting in the cache signature; retrieving user permissions corresponding to the first user; determining that the user permissions corresponding to the first user intersect with the data permissions; and transmitting a first set of the entitled data as a response to the first data request for the entitled data. - View Dependent Claims (8, 9, 10, 14, 15, 16, 17, 18, 19)
-
-
11. A method comprising:
-
receiving, by a computing device, a first data request, the first data request corresponding to a first user having first user permissions; hashing the first data request, resulting in a cache signature; determining that first response data corresponding to the first data request and corresponding to the first user permissions is stored in a local data cache using the cache signature; sending the first user the first response data; receiving, by the computing device, a second data request corresponding to a second user having second user permissions, wherein the second data request requests the same data as the first data request, and wherein the second user permissions are different from the first user permissions; hashing the first data request, resulting in a cache signature; determining that second response data corresponding to the second user request and corresponding second user permissions is stored in the local data cache using the cache signature; and sending the second user the second response data, wherein the second response data is different from the first response data. - View Dependent Claims (12, 13)
-
-
20. One or more non-transitory computer-readable media storing executable instructions configured to, when executed, cause an apparatus to:
-
receive entitled data from a data server, the entitled data having associated data permissions defining one or more permissions needed by a requesting user to access the entitled data; store the entitled data and a cache signature corresponding to the entitled data; receive a first data request for the entitled data from a first user; hash the first data request, resulting in the cache signature; retrieve user permissions corresponding to the first user; determine that the user permissions corresponding to the first user intersect with the data permissions; and transmit a first set of the entitled data as a response to the first data request for the entitled data. - View Dependent Claims (21, 22, 23)
-
Specification