Trigger System For Databases Using Proxy
First Claim
1. A proxy module for monitoring modifications to a database, wherein the proxy module is external to the database, the proxy module comprising:
- a query processing module tomonitor traffic to and from the database, wherein the traffic includes queries to the database, andidentify a query corresponding to a request to modify the database; and
a trigger event module togenerate a trigger event based on the request, wherein the trigger event indicates a modification of the database associated with the request, andcause the trigger event to be communicated from the proxy module to at least one entity accessing the database.
1 Assignment
0 Petitions
Accused Products
Abstract
A proxy module for monitoring modifications to a database and external to the database includes a query processing module to monitor traffic to and from the database. The traffic includes queries to the database. The query processing module is further to identify a query corresponding to a request to modify the database. A trigger event module is to generate a trigger event based on the request. The trigger event indicates a modification of the database associated with the request. The trigger event module is further to cause the trigger event to be communicated from the proxy module to at least one entity accessing the database.
14 Citations
20 Claims
-
1. A proxy module for monitoring modifications to a database, wherein the proxy module is external to the database, the proxy module comprising:
-
a query processing module to monitor traffic to and from the database, wherein the traffic includes queries to the database, and identify a query corresponding to a request to modify the database; and a trigger event module to generate a trigger event based on the request, wherein the trigger event indicates a modification of the database associated with the request, and cause the trigger event to be communicated from the proxy module to at least one entity accessing the database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A method for monitoring modifications to a database, the method comprising:
-
monitoring, external to the database, traffic to and from the database, wherein the traffic includes queries to the database; identifying a query corresponding to a request to modify the database; generating a trigger event based on the request, wherein the trigger event indicates a modification of the database associated with the request; and causing the trigger event to be communicated to at least one entity accessing the database. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19)
-
-
20. A trigger proxy system for monitoring modifications to a remote database, the trigger proxy system comprising:
-
memory; a processor; and a proxy trigger application, stored in the memory and executable by the processor, configured to monitor traffic to and from the remote database, wherein the traffic includes queries to the remote database, identify a query corresponding to a request to modify the remote database, generate a trigger event based on the request, wherein the trigger event indicates a modification of the remote database associated with the request, and cause the trigger event to be communicated to at least one entity accessing the remote database.
-
Specification