Patents by Inventor Frederic Duminy

Frederic Duminy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10796008
    Abstract: A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a process invoking the privileged function. The method includes communicating, to a computer process, access information of the privileged function, to allow the computer process to invoke the privileged function. The method includes executing the privileged function for the computer process. Executing the privileged function includes setting a processor that is being used by the computer process to use the first privilege level associated with the privileged function, executing the privileged function with that processor at the first privilege level, then restoring that processor to a previous privilege level, and returning control of that processor to the computer process.
    Type: Grant
    Filed: August 21, 2017
    Date of Patent: October 6, 2020
    Assignee: CA, INC.
    Inventors: Howard Israel Nayberg, Frederic Duminy
  • Patent number: 10726145
    Abstract: Embodiments of the present disclosure relate to automatically and dynamically elevating permissions on a mainframe system. Initially, a user may request an elevation class which corresponds to elevated class resources of the mainframe system. The elevation class may enable the user to perform actions to datasets, files, applications, or systems of the mainframe system the user may not otherwise be able to perform. If the user has permission to the elevation class, a user identification corresponding to the user and the elevation class is registered in an elevated permission structure. An access control environment element (ACEE) is dynamically created with the elevated permission structure and the elevated class resources of the elevation class are associated with the ACEE. The user can then be validated with access to the elevated class resources. At the expiration of a limited duration of time, the elevated class resources are automatically disassociated with the ACEE.
    Type: Grant
    Filed: February 8, 2018
    Date of Patent: July 28, 2020
    Inventors: Frederic Duminy, Linwood Hugh Overby, Jr., Kevin Cunningham, Paul Reichl
  • Patent number: 10606799
    Abstract: A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: March 31, 2020
    Assignee: CA, Inc.
    Inventors: Frederic Duminy, Jammie Pringle, Terry W. Chaisson, Dean Harrington
  • Publication number: 20200050785
    Abstract: A method includes performing by a host system processor: receiving a record insert request for a database, the record insert request comprising a primary key value and a semi-unique key value, the database comprising a record structure comprising a first primary key field, a second primary key field, and a semi-unique key field, the first primary key field comprising a flag portion for which a first flag value is indicative of the first primary key field containing a primary key and a second flag value is indicative of the first primary key field containing an alternate primary key, generating an alternate primary key value based on the primary key value and the semi-unique key value, the alternate primary key value having a portion thereof corresponding to the flag portion of the first primary key field set to the second flag value, generating a record comprising the alternate primary key value in the first primary key field, the primary key value in the second primary key field, and the semi-unique key valu
    Type: Application
    Filed: August 10, 2018
    Publication date: February 13, 2020
    Inventors: Frederic Duminy, David Pflum, Timothy Dockter, James W. Peters, John C. Pinkowski
  • Publication number: 20190243984
    Abstract: Embodiments of the present disclosure relate to automatically and dynamically elevating permissions on a mainframe system. Initially, a user may request an elevation class which corresponds to elevated class resources of the mainframe system. The elevation class may enable the user to perform actions to datasets, files, applications, or systems of the mainframe system the user may not otherwise be able to perform. If the user has permission to the elevation class, a user identification corresponding to the user and the elevation class is registered in an elevated permission structure. An access control environment element (ACEE) is dynamically created with the elevated permission structure and the elevated class resources of the elevation class are associated with the ACEE. The user can then be validated with access to the elevated class resources. At the expiration of a limited duration of time, the elevated class resources are automatically disassociated with the ACEE.
    Type: Application
    Filed: February 8, 2018
    Publication date: August 8, 2019
    Inventors: FREDERIC DUMINY, LINWOOD HUGH OVERBY, JR., KEVIN CUNNINGHAM, PAUL REICHL
  • Publication number: 20190073485
    Abstract: Inventive embodiments are directed to a system and methods that manage file access in an MVS file management system, which allows for the same name to be allocated to different files. When multiple files share the same name, the name of each file is modified in order to render those files unrecognizable to an operating system. Thereafter, one file may be purposefully provided with the “shared” name. When a computer process requests access to a file and specifies the shared name, the operating system locates the first instance of the shared name in the MVS file management system. As the other files are unrecognizable, the operating system locates the only instance of the shared name and the corresponding file that was purposefully provided with the shared name. The operating system provides the computer process with access to that particular file. The name shared by the unrecognizable files may be subsequently restored.
    Type: Application
    Filed: September 1, 2017
    Publication date: March 7, 2019
    Inventors: FREDERIC DUMINY, LINWOOD HUGH OVERBY, JR., JOHN WILLIAM BAY, DANIEL J. SHEA
  • Publication number: 20170372081
    Abstract: A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a process invoking the privileged function. The method includes communicating, to a computer process, access information of the privileged function, to allow the computer process to invoke the privileged function. The method includes executing the privileged function for the computer process. Executing the privileged function includes setting a processor that is being used by the computer process to use the first privilege level associated with the privileged function, executing the privileged function with that processor at the first privilege level, then restoring that processor to a previous privilege level, and returning control of that processor to the computer process.
    Type: Application
    Filed: August 21, 2017
    Publication date: December 28, 2017
    Inventors: Howard Israel Nayberg, Frederic Duminy
  • Publication number: 20170300501
    Abstract: A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.
    Type: Application
    Filed: July 6, 2017
    Publication date: October 19, 2017
    Inventors: Frederic Duminy, Jammie Pringle, Terry W. Chaisson, Dean Harrington
  • Patent number: 9785783
    Abstract: A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a process invoking the privileged function. The method includes communicating, to a computer process, access information of the privileged function, to allow the computer process to invoke the privileged function. The method includes executing the privileged function for the computer process. Executing the privileged function includes setting a processor that is being used by the computer process to use the first privilege level associated with the privileged function, executing the privileged function with that processor at the first privilege level, then restoring that processor to a previous privilege level, and returning control of that processor to the computer process.
    Type: Grant
    Filed: July 23, 2015
    Date of Patent: October 10, 2017
    Assignee: CA, Inc.
    Inventors: Howard Israel Nayberg, Frederic Duminy
  • Patent number: 9727410
    Abstract: A computer-implemented method for handling errors is described. According to the method, a data bridge structure is received. The data bridge structure includes data being communicated between a driving caller using a first computer language layer and a set of computer code using a second computer language layer. In the method, the call between the computer language is re-driven in response to an error occurring. The re-driven call obtains an updated data bridge structure. In the method, the updated data bridge structure is returned to the caller in the first computer language layer driving the call.
    Type: Grant
    Filed: July 27, 2015
    Date of Patent: August 8, 2017
    Assignee: CA, INC.
    Inventors: Sai Swetha Gujja, Jammie Pringle, Frederic Duminy
  • Patent number: 9727567
    Abstract: A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: August 8, 2017
    Assignee: CA, INC.
    Inventors: Frederic Duminy, Jammie Pringle, Terry W. Chaisson, Dean Harrington
  • Publication number: 20170033896
    Abstract: A computer-implemented method for handling errors is described. According to the method, a data bridge structure is received. The data bridge structure includes data being communicated between a driving caller using a first computer language layer and a set of computer code using a second computer language layer. In the method, the call between the computer language is re-driven in response to an error occurring. The re-driven call obtains an updated data bridge structure. In the method, the updated data bridge structure is returned to the caller in the first computer language layer driving the call.
    Type: Application
    Filed: July 27, 2015
    Publication date: February 2, 2017
    Applicant: CA, INC.
    Inventors: Sai Swetha Gujja, Jammie Pringle, Frederic Duminy
  • Publication number: 20170024571
    Abstract: A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a process invoking the privileged function. The method includes communicating, to a computer process, access information of the privileged function, to allow the computer process to invoke the privileged function. The method includes executing the privileged function for the computer process. Executing the privileged function includes setting a processor that is being used by the computer process to use the first privilege level associated with the privileged function, executing the privileged function with that processor at the first privilege level, then restoring that processor to a previous privilege level, and returning control of that processor to the computer process.
    Type: Application
    Filed: July 23, 2015
    Publication date: January 26, 2017
    Applicant: CA, Inc.
    Inventors: Howard Israel Nayberg, Frederic Duminy
  • Publication number: 20160283492
    Abstract: A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.
    Type: Application
    Filed: March 25, 2015
    Publication date: September 29, 2016
    Applicant: CA, INC.
    Inventors: Frederic Duminy, Jammie Pringle, Terry W. Chaisson, Dean Harrington