System, method and computer program product for rendering data of an on-demand database service safe
First Claim
Patent Images
1. A method, comprising:
- identifying data belonging to a tenant in a database of an on-demand database service, the data capable of being displayed to a user of the on-demand database service, the data including at least one code, the data being associated with a field of the database of the on-demand database service;
analyzing, utilizing a process of the on-demand database service, the at least one code of the data stored in the database of the on-demand database service to identify whether the at least one code poses a security risk;
rendering the data safe, at least in part, by removing the at least one code identified to pose the security risk, utilizing a hardware processor; and
storing the data and the data rendered safe to enable the data and the data rendered safe to be synchronized in response to an update request associated with one of the data and the data rendered safe.
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with embodiments, there are provided mechanisms and methods for rendering data of an on-demand database service safe. These mechanisms and methods for rendering on-demand database service data safe can enable embodiments to alleviate any security risk that would otherwise be posed by such data. The ability of embodiments to provide such additional safety may lead to improved security in the context of an on-demand database service.
-
Citations
18 Claims
-
1. A method, comprising:
-
identifying data belonging to a tenant in a database of an on-demand database service, the data capable of being displayed to a user of the on-demand database service, the data including at least one code, the data being associated with a field of the database of the on-demand database service; analyzing, utilizing a process of the on-demand database service, the at least one code of the data stored in the database of the on-demand database service to identify whether the at least one code poses a security risk; rendering the data safe, at least in part, by removing the at least one code identified to pose the security risk, utilizing a hardware processor; and storing the data and the data rendered safe to enable the data and the data rendered safe to be synchronized in response to an update request associated with one of the data and the data rendered safe. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A non-transitory machine-readable medium carrying one or more sequences of instructions which, when executed by one or more processors, cause the one or more processors to carry out the steps of:
-
identifying data belonging to a tenant in a database of an on-demand database service, the data capable of being displayed to a user of the on-demand database service, the data including at least one code, the data being associated with a field of the database of the on-demand database service; analyzing, utilizing a process of the on-demand database service, the at least one code of the data stored in the database of the on-demand database service to identify whether the at least one code poses a security risk; rendering the data safe, at least in part, by removing the at least one code identified to pose the security risk; and storing the data and the data rendered safe to enable the data and the data rendered safe to be synchronized in response to an update request associated with one of the data and the data rendered safe.
-
-
17. An apparatus, comprising:
a processor; and one or more stored sequences of instructions which, when executed by the processor, cause the processor to carry out the steps of; identifying data belonging to a tenant in a database of an on-demand database service, the data capable of being displayed to a user of the on-demand database service, the data including at least one code, the data being associated with a field of the database of the on-demand database service; analyzing, utilizing a process of the on-demand database service, the at least one code of the data stored in the database of the on-demand database service to identify whether the at least one code poses a security risk; rendering the data safe, at least in part, by removing the at least one code identified to pose the security risk; and storing the data and the data rendered safe to enable the data and the data rendered safe to be synchronized in response to an update request associated with one of the data and the data rendered safe.
-
18. A method, comprising:
-
identifying data belonging to a tenant in a database of an on-demand database service, the data capable of being displayed to a user of the on-demand database service, the data including at least one code, the data being associated with a field of the database of the on-demand database service; analyzing, utilizing a process of the on-demand database service, the at least one code of the data stored in the database of the on-demand database service to identify whether the at least one code poses a security risk; rendering the data safe by selecting, based at least in part upon whether the at least one code poses a security risk, one of the data and a copy of the data having the at least one code removed, utilizing a hardware processor; and storing the data rendered safe in the database of the on-demand database service.
-
Specification