Entitled data cache management
First Claim
Patent Images
1. An apparatus, comprising:
- one or more processors; and
memory storing executable instructions that, when executed by the one or more processors, cause the apparatus to;
receive entitled data from a data server, wherein the entitled data has been assigned a plurality of data permissions that represent one or more permissions a requesting user must be assigned in order to access at least a portion of the entitled data;
store entitled data and cache signature corresponding to the entitled data;
receive a first data request for the entitled data from a first user;
identify the cache signature based on a hashing of the first data request;
retrieve user permissions corresponding to the first user;
identify a first user permission intersection between the user permissions corresponding to the first user and the data permissions;
retrieve, using the cache signature, a first set of the entitled data in accordance with the first user permissions intersection;
transmit the first set of the entitled data as a response to the first data request for the entitled data;
receive a second data request for the entitled data from a second user;
identify the cache signature based on a hashing of the second data request;
retrieve user permissions corresponding to the second user;
identify a second user permission intersection between the user permissions corresponding to the second user and the data permissions;
retrieve, using the cache signature, a second set of the entitled data in accordance with the second user permission intersection; and
transmit the second set of the entitled data as a response to the second data request for the entitled data.
10 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods are disclosed for managing an entitled data cache. A data server may generate and send entitled data to a data cache server. The data cache server, a server that may be located nearer to the user within a data provider'"'"'s computer network, may receive and cache the entitled data. A permission server may store user'"'"'s permissions and transmit the user'"'"'s permissions to the data server and the data cache server. Upon receiving a request for data, the data cache server may retrieve the requested data from the cache and send a subset of the cached data which matches the user'"'"'s permissions to the user, without the need to request the data from the data server.
-
Citations
20 Claims
-
1. An apparatus, comprising:
-
one or more processors; and memory storing executable instructions that, when executed by the one or more processors, cause the apparatus to; receive entitled data from a data server, wherein the entitled data has been assigned a plurality of data permissions that represent one or more permissions a requesting user must be assigned in order to access at least a portion of the entitled data; store entitled data and cache signature corresponding to the entitled data; receive a first data request for the entitled data from a first user; identify the cache signature based on a hashing of the first data request; retrieve user permissions corresponding to the first user; identify a first user permission intersection between the user permissions corresponding to the first user and the data permissions; retrieve, using the cache signature, a first set of the entitled data in accordance with the first user permissions intersection; transmit the first set of the entitled data as a response to the first data request for the entitled data; receive a second data request for the entitled data from a second user; identify the cache signature based on a hashing of the second data request; retrieve user permissions corresponding to the second user; identify a second user permission intersection between the user permissions corresponding to the second user and the data permissions; retrieve, using the cache signature, a second set of the entitled data in accordance with the second user permission intersection; and transmit the second set of the entitled data as a response to the second data request for the entitled data. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method comprising:
-
receiving, by a computing device, entitled data from a data server, wherein the entitled data has been assigned data permissions that represent one or more permissions a requesting user must be assigned in order to access at least a portion of the entitled data; store the entitled data and a cache signature corresponding to the entitled data; receiving a first data request for the entitled data from a first user; identifying the cache signature based on a hashing of the first data request; retrieving user permissions corresponding to the first user; identifying a first user permission intersection between the user permissions corresponding to the first user and the data permissions; retrieving, using the cache signature, a first set of the entitled data in accordance with the first user permission intersection; transmitting the first set of the entitled data as a response to the first data request for the entitled data; receiving a second data request for the entitled data from a second user; identifying the cache signature based on a hashing of the second data request; retrieving user permissions corresponding to the second user; identifying a second user permission intersection between the user permissions corresponding to the second user and the data permissions; retrieving, using the cache signature, a second set of the entitled data in accordance with the second user permission intersection; and transmitting the second set of the entitled data as a response to the second data request for the entitled data. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. One or more non-transitory computer-readable media storing executable instructions configured to, when executed, cause an apparatus to:
-
receive entitled data from a data server, wherein the entitled data has been assigned data permissions that represent one or more permissions a requesting user must be assigned in order to access at least a portion of the entitled data; store entitled data and a cache signature corresponding to the entitled data; receive a first data request for the entitled data from a first user; identify the cache signature based on a hashing of the first data request; receive user permissions corresponding to the first user; identify a first user permission intersection between the user permissions corresponding to the first user and the data permissions; retrieve, using the cache signature, a first set of the entitled data in accordance with the first user permission intersection; transmit the first set of the entitled data as a response to the first data request for the entitled data; receive a second data request for the entitled data from a second user; identify the cache signature based on a hashing of the second data request; retrieve user permissions corresponding to the second user; identify a second user permission intersection between the user permissions corresponding to the second user and the data permissions; retrieve, using the cache signature, a second set of the entitled data in accordance with the second user permission intersection; and transmit the second set of the entitled data as a response to the second data request for the entitled data. - View Dependent Claims (18)
-
-
19. A method, comprising:
-
receiving entitled data from a data server, wherein the entitled data has been assigned data permissions that represent one or more permissions a requesting user must be assigned in order to access at least a portion of the entitled data; storing the entitled data and cache signature that corresponds to the entitled data; receiving a plurality of requests for the entitled data; processing each of the plurality of requests by at least hashing each of the plurality of requests, wherein each processing results in the cache signature; and responding to each of the plurality of requests with a transmission of a different data set, resulting in the transmission of a plurality of data sets, wherein each of the plurality of data sets is different from other data sets in the plurality of data sets, and each data set being in accordance with an intersection of user permissions and the data permissions. - View Dependent Claims (20)
-
Specification