US 12,277,237 B2
Managed metastorage
Matei Zaharia, Palo Alto, CA (US); David Lewis, Salt Lake City, UT (US); Cheng Lian, Alameda, CA (US); Yuchen Huo, San Bruno, CA (US); and Ali Ghodsi, Berkeley, CA (US)
Assigned to Databricks, Inc., San Francisco, CA (US)
Filed by Databricks, Inc., San Francisco, CA (US)
Filed on Oct. 29, 2021, as Appl. No. 17/514,982.
Claims priority of provisional application 63/190,591, filed on May 19, 2021.
Prior Publication US 2022/0374532 A1, Nov. 24, 2022
Int. Cl. G06F 21/62 (2013.01); G06F 3/06 (2006.01)
CPC G06F 21/62 (2013.01) [G06F 3/0604 (2013.01); G06F 3/0655 (2013.01); G06F 3/0673 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A system, comprising:
one or more processors; and
a memory, coupled with the one or more processors, the memory comprising stored instructions executable by the one or more processors, the instructions when executed causes the one or more processors to:
receive a data request from a user;
determine data corresponding to the data request;
determine whether the user has requisite permissions to access the data; and
in response to a determination that the user has requisite permissions to access the data:
determine, based on an identity of the user, a manner by which to provide access to the data, wherein the data comprises a filtered subset of stored data, wherein the determination of the manner by which to provide access to the data further comprises instructions to determine whether to provide the data via a secure cluster or to provide data by providing access to a location at which the data is stored, wherein the secure cluster is a set of connected nodes;
in response to a determination to provide data via a secure cluster, instantiating a secure cluster;
copying the filtered subset of stored data from the location at which the data is stored to the instantiated secure cluster, wherein the filtered subset of stored data copied to the instantiated secure cluster may only be accessible to the user; and
generate a token based at least in part on the user and the instantiated secure cluster.