Abstract: Method for making a consistent checkpoint of a page including at least one data object in a computer system having a primary and secondary storage, and a programmable software. The primary storage has at least one page which includes at least one original data object on the page. The computer system allows at least one write operation to modify at least one data object, and the page is written into the secondary storage during checkpointing. The method includes beginning the checkpointing, including at least one page in the primary storage into a group of pages to be checkpointed, altering at least one data object with at least one data write operation, marking at least one data object resulting from the data write operation, writing at least one of the data objects into the secondary storage, and altering the state of the pending data object to be the original data object.
Abstract: A method and arrangement for optimizing performance and data safety in a system includes first and second database servers coupled to a communication network. The first database server accepts transactions from a client application, stores them according to a data storage method, and sends them to the second database server via the communication network, whereupon the second database server also store the transactions. The first database server receives information about the server availability state of the second database server and detects changes in the availability state of the second database server in a such manner, that the data storage method of the first database server is changed according to the change in the availability state of the second database server.
Abstract: An apparatus for synchronizing data between DBMSs has a first DBMS and a second DBMS. The second DBMS has a storage for persistently storing data items in a form of a storage structure, i.e. database. The second DBMS has also a second data storage for persistently storing data in a form of a sequential order, i.e. a transaction log. The data to be synchronized from the first DBMS to the second DBMS is analysed and based on the analyzing, it is decided how to persistently store the data between the first and the second data storage in the second DBMS. There can be decided how to store the data between the first and the second data storage. The characteristics of the data to be stored may influence on the storage between the first and the second data storage. Thus, the storage depends on the actual data to be stored.
Abstract: A method and system for managing security material and security services, and for securely distributing them in a distributed database system where one or multiple distributed applications operate on distributed data. One database hosted by database server contains master version of the security data of databases hosted by database servers. The database hosted by database server has a global view of the security material for managing security of the other databases. A special database is responsible of providing security services to application database of a database server. The system and method control application programs access to data of a database in a database server, and also facilitates the security management issues of complex database topologies, such as multitier hierarchies or multi-master topologies.
Abstract: The invention is in the area of distributed system and database security. The invention relates to a method and an arrangement for increasing the level of trust between a master and a replica database by allowing the master database to perform an “unpredictable” audit of the replica database whenever deemed appropriate by the master database. The master database may for example define and generate an audit application and send it to at least one replica database using push synchronization and force the replica database to perform the audit application. The master database may also prepare expected results of the audit of the replica database and store them for later verification. After auditing the replica database may synchronize the results of the audit back to the master database for verification. The information flow between the master and replica databases is advantageously encrypted in a secure manner.
Abstract: The invention relates generally to the use of databases. Preferably the invention relates to a method and a system associated with the use of databases with mobile terminals. The objective of this invention is to present a method and a system which allows managing a large dynamically changeable set of applications in the mobile Internet. The objectives of the invention are attained by determining user profiles within communities, and the rights for using applications of a community server depends on the profiles of the user within the community. The identity information is preferably maintained in an identity server. The invention provides a solution to the problem of managing services and configuration of smart network node in environments where the services and their content data need to be managed remotely from multiple remote sources in a dynamic manner.
Abstract: This invention relates generally to database servers and computer systems and, more particularly, describes the mechanism to run transaction operations originating from a primary server used to replicate data in parallel in a secondary server. Especially the invention relates to running concurrent or parallel operations in a secondary server for redundancy, recovery and propagated transactions. This invention describes how parallel operation in a secondary server improves performance and availability and how it maintains transaction order and output congruent with the primary server where transaction operations are originated.
May 30, 2002
Date of Patent:
December 20, 2005
Solid Information Technology Oy
Jarmo Ruuth, Jarmo Parkkinen, Petri Soini, Antoni Wolski
Abstract: A plurality of steps, which are intended to modify the data in a transaction, form a transaction (40) comprising statements (41, 42, 43). In the method according to the invention there is formed a data exchange space (47) common to the transaction in order to make the parameters available to the statements belonging to the transaction and in order to transmit data between the statements belonging to the transaction. The system (30) maintaining the first version of the database is arranged to store the modifications to be made in the database as transactions, which comprise statements as well as parameters, both regarding the statements and regarding the transaction.