Patents by Inventor Frederic Duminy
Frederic Duminy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10796008Abstract: A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a process invoking the privileged function. The method includes communicating, to a computer process, access information of the privileged function, to allow the computer process to invoke the privileged function. The method includes executing the privileged function for the computer process. Executing the privileged function includes setting a processor that is being used by the computer process to use the first privilege level associated with the privileged function, executing the privileged function with that processor at the first privilege level, then restoring that processor to a previous privilege level, and returning control of that processor to the computer process.Type: GrantFiled: August 21, 2017Date of Patent: October 6, 2020Assignee: CA, INC.Inventors: Howard Israel Nayberg, Frederic Duminy
-
Patent number: 10726145Abstract: Embodiments of the present disclosure relate to automatically and dynamically elevating permissions on a mainframe system. Initially, a user may request an elevation class which corresponds to elevated class resources of the mainframe system. The elevation class may enable the user to perform actions to datasets, files, applications, or systems of the mainframe system the user may not otherwise be able to perform. If the user has permission to the elevation class, a user identification corresponding to the user and the elevation class is registered in an elevated permission structure. An access control environment element (ACEE) is dynamically created with the elevated permission structure and the elevated class resources of the elevation class are associated with the ACEE. The user can then be validated with access to the elevated class resources. At the expiration of a limited duration of time, the elevated class resources are automatically disassociated with the ACEE.Type: GrantFiled: February 8, 2018Date of Patent: July 28, 2020Inventors: Frederic Duminy, Linwood Hugh Overby, Jr., Kevin Cunningham, Paul Reichl
-
Patent number: 10606799Abstract: A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.Type: GrantFiled: July 6, 2017Date of Patent: March 31, 2020Assignee: CA, Inc.Inventors: Frederic Duminy, Jammie Pringle, Terry W. Chaisson, Dean Harrington
-
Publication number: 20200050785Abstract: A method includes performing by a host system processor: receiving a record insert request for a database, the record insert request comprising a primary key value and a semi-unique key value, the database comprising a record structure comprising a first primary key field, a second primary key field, and a semi-unique key field, the first primary key field comprising a flag portion for which a first flag value is indicative of the first primary key field containing a primary key and a second flag value is indicative of the first primary key field containing an alternate primary key, generating an alternate primary key value based on the primary key value and the semi-unique key value, the alternate primary key value having a portion thereof corresponding to the flag portion of the first primary key field set to the second flag value, generating a record comprising the alternate primary key value in the first primary key field, the primary key value in the second primary key field, and the semi-unique key valuType: ApplicationFiled: August 10, 2018Publication date: February 13, 2020Inventors: Frederic Duminy, David Pflum, Timothy Dockter, James W. Peters, John C. Pinkowski
-
Publication number: 20190243984Abstract: Embodiments of the present disclosure relate to automatically and dynamically elevating permissions on a mainframe system. Initially, a user may request an elevation class which corresponds to elevated class resources of the mainframe system. The elevation class may enable the user to perform actions to datasets, files, applications, or systems of the mainframe system the user may not otherwise be able to perform. If the user has permission to the elevation class, a user identification corresponding to the user and the elevation class is registered in an elevated permission structure. An access control environment element (ACEE) is dynamically created with the elevated permission structure and the elevated class resources of the elevation class are associated with the ACEE. The user can then be validated with access to the elevated class resources. At the expiration of a limited duration of time, the elevated class resources are automatically disassociated with the ACEE.Type: ApplicationFiled: February 8, 2018Publication date: August 8, 2019Inventors: FREDERIC DUMINY, LINWOOD HUGH OVERBY, JR., KEVIN CUNNINGHAM, PAUL REICHL
-
Publication number: 20190073485Abstract: Inventive embodiments are directed to a system and methods that manage file access in an MVS file management system, which allows for the same name to be allocated to different files. When multiple files share the same name, the name of each file is modified in order to render those files unrecognizable to an operating system. Thereafter, one file may be purposefully provided with the “shared” name. When a computer process requests access to a file and specifies the shared name, the operating system locates the first instance of the shared name in the MVS file management system. As the other files are unrecognizable, the operating system locates the only instance of the shared name and the corresponding file that was purposefully provided with the shared name. The operating system provides the computer process with access to that particular file. The name shared by the unrecognizable files may be subsequently restored.Type: ApplicationFiled: September 1, 2017Publication date: March 7, 2019Inventors: FREDERIC DUMINY, LINWOOD HUGH OVERBY, JR., JOHN WILLIAM BAY, DANIEL J. SHEA
-
Publication number: 20170372081Abstract: A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a process invoking the privileged function. The method includes communicating, to a computer process, access information of the privileged function, to allow the computer process to invoke the privileged function. The method includes executing the privileged function for the computer process. Executing the privileged function includes setting a processor that is being used by the computer process to use the first privilege level associated with the privileged function, executing the privileged function with that processor at the first privilege level, then restoring that processor to a previous privilege level, and returning control of that processor to the computer process.Type: ApplicationFiled: August 21, 2017Publication date: December 28, 2017Inventors: Howard Israel Nayberg, Frederic Duminy
-
Publication number: 20170300501Abstract: A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.Type: ApplicationFiled: July 6, 2017Publication date: October 19, 2017Inventors: Frederic Duminy, Jammie Pringle, Terry W. Chaisson, Dean Harrington
-
Patent number: 9785783Abstract: A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a process invoking the privileged function. The method includes communicating, to a computer process, access information of the privileged function, to allow the computer process to invoke the privileged function. The method includes executing the privileged function for the computer process. Executing the privileged function includes setting a processor that is being used by the computer process to use the first privilege level associated with the privileged function, executing the privileged function with that processor at the first privilege level, then restoring that processor to a previous privilege level, and returning control of that processor to the computer process.Type: GrantFiled: July 23, 2015Date of Patent: October 10, 2017Assignee: CA, Inc.Inventors: Howard Israel Nayberg, Frederic Duminy
-
Patent number: 9727410Abstract: A computer-implemented method for handling errors is described. According to the method, a data bridge structure is received. The data bridge structure includes data being communicated between a driving caller using a first computer language layer and a set of computer code using a second computer language layer. In the method, the call between the computer language is re-driven in response to an error occurring. The re-driven call obtains an updated data bridge structure. In the method, the updated data bridge structure is returned to the caller in the first computer language layer driving the call.Type: GrantFiled: July 27, 2015Date of Patent: August 8, 2017Assignee: CA, INC.Inventors: Sai Swetha Gujja, Jammie Pringle, Frederic Duminy
-
Patent number: 9727567Abstract: A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.Type: GrantFiled: March 25, 2015Date of Patent: August 8, 2017Assignee: CA, INC.Inventors: Frederic Duminy, Jammie Pringle, Terry W. Chaisson, Dean Harrington
-
Publication number: 20170033896Abstract: A computer-implemented method for handling errors is described. According to the method, a data bridge structure is received. The data bridge structure includes data being communicated between a driving caller using a first computer language layer and a set of computer code using a second computer language layer. In the method, the call between the computer language is re-driven in response to an error occurring. The re-driven call obtains an updated data bridge structure. In the method, the updated data bridge structure is returned to the caller in the first computer language layer driving the call.Type: ApplicationFiled: July 27, 2015Publication date: February 2, 2017Applicant: CA, INC.Inventors: Sai Swetha Gujja, Jammie Pringle, Frederic Duminy
-
Publication number: 20170024571Abstract: A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a process invoking the privileged function. The method includes communicating, to a computer process, access information of the privileged function, to allow the computer process to invoke the privileged function. The method includes executing the privileged function for the computer process. Executing the privileged function includes setting a processor that is being used by the computer process to use the first privilege level associated with the privileged function, executing the privileged function with that processor at the first privilege level, then restoring that processor to a previous privilege level, and returning control of that processor to the computer process.Type: ApplicationFiled: July 23, 2015Publication date: January 26, 2017Applicant: CA, Inc.Inventors: Howard Israel Nayberg, Frederic Duminy
-
Publication number: 20160283492Abstract: A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.Type: ApplicationFiled: March 25, 2015Publication date: September 29, 2016Applicant: CA, INC.Inventors: Frederic Duminy, Jammie Pringle, Terry W. Chaisson, Dean Harrington