Patents by Inventor Bilung Lee

Bilung Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7836096
    Abstract: The present invention provides a method, computer program product and article for creating and reusing a value object for data that is requested a first time and again in subsequent data requests in related result sets. Mutation directives and an associated methodology are presented in one of four different levels which permit the present invention to operate within the JDBC standard.
    Type: Grant
    Filed: December 14, 2006
    Date of Patent: November 16, 2010
    Assignee: International Business Machines Corporation
    Inventors: Bilung Lee, Paul A. Ostler, Maryela E. Weihrauch
  • Publication number: 20100257200
    Abstract: According to one embodiment of the present invention, a system, method and computer program product or the administration of client side property settings in a distributed and heterogeneous environment is provided. According to one embodiment of the present invention, a method comprises establishing communication between a plurality of property agents and a property service, and looking up an identifier in a property repository for each property agent. A property setting in an updated client application associated with a selected one of the property agents is then modified by a database administrator. Changed property settings from the selected one of the property agents are then sent to the property service. Property settings associated with the updated client application are updated in the property repository. The updated property settings are sent from the property service to a plurality of property agents. The property agents may then merge the updated property settings into an associated application.
    Type: Application
    Filed: April 3, 2009
    Publication date: October 7, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bilung Lee, Paul Arnold Ostler
  • Patent number: 7770214
    Abstract: An apparatus, system, and method for establishing a reusable and reconfigurable trusted connection within a trusted context. The invention enhances interoperability with any existing authentication methods including the Kerberos, the DCE, and a combination of a user name and a password. The present invention includes common interfaces in a database driver for a middleware server to obtain a trusted connection. The invention enhances trusted context interoperability by allowing different types of trusted connections such as a normal connection, a pooled connection, or even a distribution transaction connection. The database driver generates unique identifiable information once a trusted connection is authenticated that can be utilized to reuse and reconfigure the trusted connection without re-authentication.
    Type: Grant
    Filed: April 17, 2007
    Date of Patent: August 3, 2010
    Assignee: International Business Machines Corporation
    Inventors: Bilung Lee, Huaxin Gao, Paul A. Ostler
  • Patent number: 7761468
    Abstract: A method for connecting a client to a database server are provided. The method provide for providing a generic interface, the generic interface being operable to interoperate with one or more non-GSSAPI (Generic Security Services Application Programming Interface) compliant security mechanisms, providing a set of specialized interfaces, the set of specialized interface being operable to interoperate with one or more GSSAPI compliant security mechanisms, and establishing a connection between a client and a database server using the generic interface or the set of specialized interfaces depending on a security mechanism used by the client. The one or more non-GSSAPI compliant security mechanisms and the one or more GSSAPI compliant security mechanisms may be predefined or user-defined.
    Type: Grant
    Filed: October 4, 2006
    Date of Patent: July 20, 2010
    Assignee: International Business Machines Corporation
    Inventors: Huaxin Gao, Bilung Lee, Paul A. Ostler
  • Publication number: 20100094988
    Abstract: Provided are techniques for monitoring information. In response to a database process starting, a monitoring agent is loaded under control of the database process, wherein the monitoring agent invokes a discovery service to discover a central server and monitoring service. Under control of the monitoring agent, monitor information about the database process is sent to the central server and monitoring service.
    Type: Application
    Filed: October 9, 2008
    Publication date: April 15, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: David W. Chang, Holger Karn, Bilung Lee, Paul Arnold Ostler
  • Publication number: 20100024038
    Abstract: A system and method for database security provides multiple choices of security mechanisms for enabling access to a database through a database driver. A security mechanism that is compatible with a database is selected and the security mechanisms between an application and a database server are automatically determined using the selected security mechanism.
    Type: Application
    Filed: November 10, 2007
    Publication date: January 28, 2010
    Applicant: International Business Machines Corporation
    Inventors: Satheesh E. Bandaram, Huaxin Gao, Bilung Lee, Paul Ostler
  • Publication number: 20090292953
    Abstract: Systems and methods to modify a set of connection records are described. A determination is made that an application failed to access a first database via a connection record, where the connection record includes data to access the first database. A determination is made that a second database is accessible, where the second database is a failover database to the first database. A set of connection records associated with the first database is modified to enable access to the second database.
    Type: Application
    Filed: May 20, 2008
    Publication date: November 26, 2009
    Applicant: International Business Machines Corporation
    Inventors: Soloman J. Barghouthi, Sherry Guo, Bilung Lee, Paul Arnold Ostler
  • Publication number: 20090254556
    Abstract: Systems and methods to implement optimistic locking in online and offline environments are provided. A particular method includes receiving from an application an application data request related to retrieving a data item from a data store. The method also includes sending an optimistic locking information request to the data store to retrieve optimistic locking information, such as an identifier, associated with the data item. Additionally, the method includes receiving a data item update statement from the application while a connection between the application and a database server coupled to the data store persists or after a connection between the application and the database server has terminated and reconnected. The data item update statement relates to storing an updated version of the data item at the data store. Further, the method includes synchronizing the data item with the updated version of the data item based on the optimistic locking information.
    Type: Application
    Filed: April 8, 2008
    Publication date: October 8, 2009
    Applicant: International Business Machines Corporation
    Inventors: Sherry Guo, Ryan Jerome Kern, Bilung Lee, Paul Arnold Ostler
  • Publication number: 20090232315
    Abstract: A system and method for database security provides, a database security method that receives an encryption property from an application and receives information relating to a database server. The method then requests security access to a database server using the strongest encryption algorithm server may support. If this request gets turned down, then the method determines the strongest encryption algorithm the server actually supports using the information the database server sent back and calculates the encryption keys. The method then caches the encryption algorithm along with the encryption keys in a persistent storage. For subsequent connections, the method checks the persistent storage first and retrieves the encryption algorithm and encryption keys from the persistent storage if the cache values are available, and sends the cached value to database server. By doing this, the database driver doesn't need to synchronize the encryption algorithm with server and calculate the encryption keys again.
    Type: Application
    Filed: March 13, 2008
    Publication date: September 17, 2009
    Applicant: International Business Machines Corporation
    Inventors: Satheesh E. Bandaram, Huaxin Gao, Bilung Lee, Paul Arnold Ostler
  • Publication number: 20090199211
    Abstract: A system, method and computer program product for database driver for the global, dynamic, remote and centralized configuration of database drivers. In an embodiment of the invention the system includes a remote controller host and a central controller disposed in the remote controller host. A plurality of application hosts and a plurality of applications are disposed in each of the application hosts. A single attachment agent is disposed in each of the application hosts, the single attachment agent being coupled to each of the plurality of applications in the application hosts. The central controller provides each of the attachment agents with information regarding how to connect the database driver to the central controller.
    Type: Application
    Filed: February 5, 2008
    Publication date: August 6, 2009
    Applicant: International Business Machines Corporation
    Inventors: David Wei-Jye Chang, Bilung Lee, Paul Arnold Ostler
  • Publication number: 20090119536
    Abstract: Embodiments of the invention provide techniques for disaster recovery in the event of a database connection failure. In one embodiment, a network address for a secondary server may be stored in multiple data objects of a client computer. In the event of a failed connection to a primary server, the network address of the secondary server may be retrieved from one of the data objects stored in the client computer. When an updated network address for the secondary server is received, it may be propagated to the data objects of the client computer.
    Type: Application
    Filed: November 7, 2007
    Publication date: May 7, 2009
    Inventors: SHERRY GUO, Bilung Lee, Paul Ostler
  • Publication number: 20090113406
    Abstract: A method is provided for developing a software module including support for multiple versions of an operating environment. The method includes determining a first set of references associated with a first version of an application operating environment. A second set of references associate with a second version of the computing environment is determined. A first class loader is associated with the first version of the computing environment. A second class loader is associated with the second version of the computing environment. The method also includes encapsulating the first set of references, the second set of references, the first class loader, and the second class loader in a software module, wherein the second set of references are obscured from the first class loader.
    Type: Application
    Filed: October 26, 2007
    Publication date: April 30, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: SATHEESH BANDARAM, Sherry Guo, Bilung Lee, Paul Ostler
  • Publication number: 20090064199
    Abstract: A method, system, and computer program product for managing a heterogeneous connection pooling structure. The heterogeneous architecture of pooling management comprises connections having different connection attributes (i.e. different data source properties) that can share a same connection pool (i.e. same connection pool data source). An application requests a connection from data source having a specified data source property. An application server searches a pool module for an available cached connection. If a cached connection is available, the cached connection is automatically selected as a returned connection. A connection reuse protocol and a statement reuse protocol is determined and invoked to reconfigure the cached connection for reuse as a connection between the application and a database server.
    Type: Application
    Filed: August 30, 2007
    Publication date: March 5, 2009
    Inventors: Sigitas Bidelis, Sherry Guo, Bilung Lee, Paul A. Ostler
  • Publication number: 20080263653
    Abstract: An apparatus, system, and method for establishing a reusable and reconfigurable trusted connection within a trusted context. The invention enhances interoperability with any existing authentication methods including the Kerberos, the DCE, and a combination of a user name and a password. The present invention includes common interfaces in a database driver for a middleware server to obtain a trusted connection. The invention enhances trusted context interoperability by allowing different types of trusted connections such as a normal connection, a pooled connection, or even a distribution transaction connection. The database driver generates unique identifiable information once a trusted connection is authenticated that can be utilized to reuse and reconfigure the trusted connection without re-authentication.
    Type: Application
    Filed: April 17, 2007
    Publication date: October 23, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bilung Lee, Huaxin Gao, Paul A. Ostler
  • Publication number: 20080256089
    Abstract: A computer program product and database driver for connecting a client to a database server are provided. The computer program product and database driver provide for providing a generic interface, the generic interface being operable to interoperate with one or more non-GSSAPI (Generic Security Services Application Programming Interface) compliant security mechanisms, providing a set of specialized interfaces, the set of specialized interface being operable to interoperate with one or more GSSAPI compliant security mechanisms, and establishing a connection between a client and a database server using the generic interface or the set of specialized interfaces depending on a security mechanism used by the client. The one or more non-GSSAPI compliant security mechanisms and the one or more GSSAPI compliant security mechanisms may be predefined or user-defined.
    Type: Application
    Filed: June 23, 2008
    Publication date: October 16, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Huaxin GAO, Bilung Lee, Paul A. Ostler
  • Patent number: 7405677
    Abstract: An apparatus and method are disclosed for converting XML data to a destination encoding format. A receive module receives a request for bytes of XML data in a destination encoding format streamed from a source XML file. A transfer module transfers the requested bytes from a byte conversion buffer to a request buffer in response to the request and the byte conversion buffer having at least the requested bytes. A conversion module, in response to the byte conversion buffer lacking the requested quantity of bytes, transfers part of the requested bytes to the request buffer, fetches input bytes from an XML file, stores the bytes in a receive buffer, transfers the input bytes through a byte-to-character converter to a character conversion buffer, transfers the characters through a character-to-byte converter to the byte conversion buffer, and transfers enough bytes to the request buffer to satisfy the request.
    Type: Grant
    Filed: August 8, 2006
    Date of Patent: July 29, 2008
    Assignee: International Business Machines Corporation
    Inventors: Anshul Dawra, Bilung Lee, Paul Arnold Ostler
  • Publication number: 20080147594
    Abstract: The present invention provides a method, computer program product and article for creating and reusing a value object for data that is requested a first time and again in subsequent data requests in related result sets. Mutation directives and an associated methodology are presented in one of four different levels which permit the present invention to operate within the JDBC standard.
    Type: Application
    Filed: December 14, 2006
    Publication date: June 19, 2008
    Applicant: International Business Machines Corporation
    Inventors: Bilung Lee, Paul A. Ostler, Maryela E. Weihrauch
  • Patent number: 7375657
    Abstract: A computer readable medium encoded with a computer program for performing streaming of character-based data from a storage system is provided. The computer program comprises code for fetching a block of data from the storage system, wherein the character-based data includes the block of the data; converting a portion of the block of the data into a part of a character; retaining a remaining part of the block, if any, the remaining part of the block of the data corresponding to a portion of the character and a portion of an additional character; and converting the remaining part of the block of the data into one of the portion of the character and the portion of the additional character in a next conversion responsive to the next conversion including the character or the additional character.
    Type: Grant
    Filed: May 8, 2007
    Date of Patent: May 20, 2008
    Assignee: International Business Machines Corporation
    Inventors: Anshul Dawra, Bilung Lee, Paul Arnold Ostler
  • Publication number: 20080086472
    Abstract: A method, computer program product, and database driver for connecting a client to a database server are provided. The method, computer program product, and database driver provide for providing a generic interface, the generic interface being operable to interoperate with one or more non-GSSAPI (Generic Security Services Application Programming Interface) compliant security mechanisms, providing a set of specialized interfaces, the set of specialized interface being operable to interoperate with one or more GSSAPI compliant security mechanisms, and establishing a connection between a client and a database server using the generic interface or the set of specialized interfaces depending on a security mechanism used by the client. The one or more non-GSSAPI compliant security mechanisms and the one or more GSSAPI compliant security mechanisms may be predefined or user-defined.
    Type: Application
    Filed: October 4, 2006
    Publication date: April 10, 2008
    Applicant: International Business Machines Corporation
    Inventors: Huaxin Gao, Bilung Lee, Paul A. Ostler
  • Publication number: 20080036629
    Abstract: An apparatus and method are disclosed for converting XML data to a destination encoding format. A receive module receives a request for bytes of XML data in a destination encoding format streamed from a source XML file. A transfer module transfers the requested bytes from a byte conversion buffer to a request buffer in response to the request and the byte conversion buffer having at least the requested bytes. A conversion module, in response to the byte conversion buffer lacking the requested quantity of bytes, transfers part of the requested bytes to the request buffer, fetches input bytes from an XML file, stores the bytes in a receive buffer, transfers the input bytes through a byte-to-character converter to a character conversion buffer, transfers the characters through a character-to-byte converter to the byte conversion buffer, and transfers enough bytes to the request buffer to satisfy the request.
    Type: Application
    Filed: August 8, 2006
    Publication date: February 14, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Anshul Dawra, Bilung Lee, Paul Arnold Ostler