The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Sep. 07, 2021

Filed:

Apr. 21, 2021
Applicant:

Snowflake Inc., Bozeman, MT (US);

Inventors:

Elliott Brossard, Kirkland, WA (US);

Derek Denny-Brown, Seattle, WA (US);

Isaac Kunen, Seattle, WA (US);

Soumitr Rajiv Pandey, Durham, NC (US);

Jacob Salassi, Fremont, CA (US);

Srinath Shankar, Belmont, CA (US);

Haowei Yu, Newark, CA (US);

Andong Zhan, San Mateo, CA (US);

Assignee:

Snowflake Inc., Bozeman, MT (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/53 (2013.01); G06F 21/78 (2013.01); H04L 29/06 (2006.01); G06F 21/62 (2013.01); G06F 16/22 (2019.01); G06F 21/54 (2013.01);
U.S. Cl.
CPC ...
G06F 21/53 (2013.01); G06F 16/221 (2019.01); G06F 21/54 (2013.01); G06F 21/6227 (2013.01); G06F 21/78 (2013.01); H04L 63/20 (2013.01);
Abstract

The subject technology receives, in a first computing process, a user defined function, the user defined function including code related to at least one operation to be performed. The subject technology sends a request based at least in part on the at least one operation to a second computing process to perform. The subject technology determines, by a security manager executing within the second computing process, whether performing the at least one operation is permitted, the security manager determines restrictions, based at least in part on a security policy, on operations executing within a sandbox environment provided by the second computing process. The subject technology performs, in the second computing process, the at least one operation, the security manager executing within the second computing process.


Find Patent Forward Citations

Loading…