Patents by Inventor Bilung Lee
Bilung Lee has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 7836096Abstract: The present invention provides a method, computer program product and article for creating and reusing a value object for data that is requested a first time and again in subsequent data requests in related result sets. Mutation directives and an associated methodology are presented in one of four different levels which permit the present invention to operate within the JDBC standard.Type: GrantFiled: December 14, 2006Date of Patent: November 16, 2010Assignee: International Business Machines CorporationInventors: Bilung Lee, Paul A. Ostler, Maryela E. Weihrauch
-
Publication number: 20100257200Abstract: According to one embodiment of the present invention, a system, method and computer program product or the administration of client side property settings in a distributed and heterogeneous environment is provided. According to one embodiment of the present invention, a method comprises establishing communication between a plurality of property agents and a property service, and looking up an identifier in a property repository for each property agent. A property setting in an updated client application associated with a selected one of the property agents is then modified by a database administrator. Changed property settings from the selected one of the property agents are then sent to the property service. Property settings associated with the updated client application are updated in the property repository. The updated property settings are sent from the property service to a plurality of property agents. The property agents may then merge the updated property settings into an associated application.Type: ApplicationFiled: April 3, 2009Publication date: October 7, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bilung Lee, Paul Arnold Ostler
-
Patent number: 7770214Abstract: An apparatus, system, and method for establishing a reusable and reconfigurable trusted connection within a trusted context. The invention enhances interoperability with any existing authentication methods including the Kerberos, the DCE, and a combination of a user name and a password. The present invention includes common interfaces in a database driver for a middleware server to obtain a trusted connection. The invention enhances trusted context interoperability by allowing different types of trusted connections such as a normal connection, a pooled connection, or even a distribution transaction connection. The database driver generates unique identifiable information once a trusted connection is authenticated that can be utilized to reuse and reconfigure the trusted connection without re-authentication.Type: GrantFiled: April 17, 2007Date of Patent: August 3, 2010Assignee: International Business Machines CorporationInventors: Bilung Lee, Huaxin Gao, Paul A. Ostler
-
Patent number: 7761468Abstract: A method for connecting a client to a database server are provided. The method provide for providing a generic interface, the generic interface being operable to interoperate with one or more non-GSSAPI (Generic Security Services Application Programming Interface) compliant security mechanisms, providing a set of specialized interfaces, the set of specialized interface being operable to interoperate with one or more GSSAPI compliant security mechanisms, and establishing a connection between a client and a database server using the generic interface or the set of specialized interfaces depending on a security mechanism used by the client. The one or more non-GSSAPI compliant security mechanisms and the one or more GSSAPI compliant security mechanisms may be predefined or user-defined.Type: GrantFiled: October 4, 2006Date of Patent: July 20, 2010Assignee: International Business Machines CorporationInventors: Huaxin Gao, Bilung Lee, Paul A. Ostler
-
Publication number: 20100094988Abstract: Provided are techniques for monitoring information. In response to a database process starting, a monitoring agent is loaded under control of the database process, wherein the monitoring agent invokes a discovery service to discover a central server and monitoring service. Under control of the monitoring agent, monitor information about the database process is sent to the central server and monitoring service.Type: ApplicationFiled: October 9, 2008Publication date: April 15, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: David W. Chang, Holger Karn, Bilung Lee, Paul Arnold Ostler
-
Publication number: 20100024038Abstract: A system and method for database security provides multiple choices of security mechanisms for enabling access to a database through a database driver. A security mechanism that is compatible with a database is selected and the security mechanisms between an application and a database server are automatically determined using the selected security mechanism.Type: ApplicationFiled: November 10, 2007Publication date: January 28, 2010Applicant: International Business Machines CorporationInventors: Satheesh E. Bandaram, Huaxin Gao, Bilung Lee, Paul Ostler
-
Publication number: 20090292953Abstract: Systems and methods to modify a set of connection records are described. A determination is made that an application failed to access a first database via a connection record, where the connection record includes data to access the first database. A determination is made that a second database is accessible, where the second database is a failover database to the first database. A set of connection records associated with the first database is modified to enable access to the second database.Type: ApplicationFiled: May 20, 2008Publication date: November 26, 2009Applicant: International Business Machines CorporationInventors: Soloman J. Barghouthi, Sherry Guo, Bilung Lee, Paul Arnold Ostler
-
Publication number: 20090254556Abstract: Systems and methods to implement optimistic locking in online and offline environments are provided. A particular method includes receiving from an application an application data request related to retrieving a data item from a data store. The method also includes sending an optimistic locking information request to the data store to retrieve optimistic locking information, such as an identifier, associated with the data item. Additionally, the method includes receiving a data item update statement from the application while a connection between the application and a database server coupled to the data store persists or after a connection between the application and the database server has terminated and reconnected. The data item update statement relates to storing an updated version of the data item at the data store. Further, the method includes synchronizing the data item with the updated version of the data item based on the optimistic locking information.Type: ApplicationFiled: April 8, 2008Publication date: October 8, 2009Applicant: International Business Machines CorporationInventors: Sherry Guo, Ryan Jerome Kern, Bilung Lee, Paul Arnold Ostler
-
Publication number: 20090232315Abstract: A system and method for database security provides, a database security method that receives an encryption property from an application and receives information relating to a database server. The method then requests security access to a database server using the strongest encryption algorithm server may support. If this request gets turned down, then the method determines the strongest encryption algorithm the server actually supports using the information the database server sent back and calculates the encryption keys. The method then caches the encryption algorithm along with the encryption keys in a persistent storage. For subsequent connections, the method checks the persistent storage first and retrieves the encryption algorithm and encryption keys from the persistent storage if the cache values are available, and sends the cached value to database server. By doing this, the database driver doesn't need to synchronize the encryption algorithm with server and calculate the encryption keys again.Type: ApplicationFiled: March 13, 2008Publication date: September 17, 2009Applicant: International Business Machines CorporationInventors: Satheesh E. Bandaram, Huaxin Gao, Bilung Lee, Paul Arnold Ostler
-
Publication number: 20090199211Abstract: A system, method and computer program product for database driver for the global, dynamic, remote and centralized configuration of database drivers. In an embodiment of the invention the system includes a remote controller host and a central controller disposed in the remote controller host. A plurality of application hosts and a plurality of applications are disposed in each of the application hosts. A single attachment agent is disposed in each of the application hosts, the single attachment agent being coupled to each of the plurality of applications in the application hosts. The central controller provides each of the attachment agents with information regarding how to connect the database driver to the central controller.Type: ApplicationFiled: February 5, 2008Publication date: August 6, 2009Applicant: International Business Machines CorporationInventors: David Wei-Jye Chang, Bilung Lee, Paul Arnold Ostler
-
Publication number: 20090119536Abstract: Embodiments of the invention provide techniques for disaster recovery in the event of a database connection failure. In one embodiment, a network address for a secondary server may be stored in multiple data objects of a client computer. In the event of a failed connection to a primary server, the network address of the secondary server may be retrieved from one of the data objects stored in the client computer. When an updated network address for the secondary server is received, it may be propagated to the data objects of the client computer.Type: ApplicationFiled: November 7, 2007Publication date: May 7, 2009Inventors: SHERRY GUO, Bilung Lee, Paul Ostler
-
Publication number: 20090113406Abstract: A method is provided for developing a software module including support for multiple versions of an operating environment. The method includes determining a first set of references associated with a first version of an application operating environment. A second set of references associate with a second version of the computing environment is determined. A first class loader is associated with the first version of the computing environment. A second class loader is associated with the second version of the computing environment. The method also includes encapsulating the first set of references, the second set of references, the first class loader, and the second class loader in a software module, wherein the second set of references are obscured from the first class loader.Type: ApplicationFiled: October 26, 2007Publication date: April 30, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: SATHEESH BANDARAM, Sherry Guo, Bilung Lee, Paul Ostler
-
Publication number: 20090064199Abstract: A method, system, and computer program product for managing a heterogeneous connection pooling structure. The heterogeneous architecture of pooling management comprises connections having different connection attributes (i.e. different data source properties) that can share a same connection pool (i.e. same connection pool data source). An application requests a connection from data source having a specified data source property. An application server searches a pool module for an available cached connection. If a cached connection is available, the cached connection is automatically selected as a returned connection. A connection reuse protocol and a statement reuse protocol is determined and invoked to reconfigure the cached connection for reuse as a connection between the application and a database server.Type: ApplicationFiled: August 30, 2007Publication date: March 5, 2009Inventors: Sigitas Bidelis, Sherry Guo, Bilung Lee, Paul A. Ostler
-
Publication number: 20080263653Abstract: An apparatus, system, and method for establishing a reusable and reconfigurable trusted connection within a trusted context. The invention enhances interoperability with any existing authentication methods including the Kerberos, the DCE, and a combination of a user name and a password. The present invention includes common interfaces in a database driver for a middleware server to obtain a trusted connection. The invention enhances trusted context interoperability by allowing different types of trusted connections such as a normal connection, a pooled connection, or even a distribution transaction connection. The database driver generates unique identifiable information once a trusted connection is authenticated that can be utilized to reuse and reconfigure the trusted connection without re-authentication.Type: ApplicationFiled: April 17, 2007Publication date: October 23, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bilung Lee, Huaxin Gao, Paul A. Ostler
-
Publication number: 20080256089Abstract: A computer program product and database driver for connecting a client to a database server are provided. The computer program product and database driver provide for providing a generic interface, the generic interface being operable to interoperate with one or more non-GSSAPI (Generic Security Services Application Programming Interface) compliant security mechanisms, providing a set of specialized interfaces, the set of specialized interface being operable to interoperate with one or more GSSAPI compliant security mechanisms, and establishing a connection between a client and a database server using the generic interface or the set of specialized interfaces depending on a security mechanism used by the client. The one or more non-GSSAPI compliant security mechanisms and the one or more GSSAPI compliant security mechanisms may be predefined or user-defined.Type: ApplicationFiled: June 23, 2008Publication date: October 16, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Huaxin GAO, Bilung Lee, Paul A. Ostler
-
Patent number: 7405677Abstract: An apparatus and method are disclosed for converting XML data to a destination encoding format. A receive module receives a request for bytes of XML data in a destination encoding format streamed from a source XML file. A transfer module transfers the requested bytes from a byte conversion buffer to a request buffer in response to the request and the byte conversion buffer having at least the requested bytes. A conversion module, in response to the byte conversion buffer lacking the requested quantity of bytes, transfers part of the requested bytes to the request buffer, fetches input bytes from an XML file, stores the bytes in a receive buffer, transfers the input bytes through a byte-to-character converter to a character conversion buffer, transfers the characters through a character-to-byte converter to the byte conversion buffer, and transfers enough bytes to the request buffer to satisfy the request.Type: GrantFiled: August 8, 2006Date of Patent: July 29, 2008Assignee: International Business Machines CorporationInventors: Anshul Dawra, Bilung Lee, Paul Arnold Ostler
-
Publication number: 20080147594Abstract: The present invention provides a method, computer program product and article for creating and reusing a value object for data that is requested a first time and again in subsequent data requests in related result sets. Mutation directives and an associated methodology are presented in one of four different levels which permit the present invention to operate within the JDBC standard.Type: ApplicationFiled: December 14, 2006Publication date: June 19, 2008Applicant: International Business Machines CorporationInventors: Bilung Lee, Paul A. Ostler, Maryela E. Weihrauch
-
Patent number: 7375657Abstract: A computer readable medium encoded with a computer program for performing streaming of character-based data from a storage system is provided. The computer program comprises code for fetching a block of data from the storage system, wherein the character-based data includes the block of the data; converting a portion of the block of the data into a part of a character; retaining a remaining part of the block, if any, the remaining part of the block of the data corresponding to a portion of the character and a portion of an additional character; and converting the remaining part of the block of the data into one of the portion of the character and the portion of the additional character in a next conversion responsive to the next conversion including the character or the additional character.Type: GrantFiled: May 8, 2007Date of Patent: May 20, 2008Assignee: International Business Machines CorporationInventors: Anshul Dawra, Bilung Lee, Paul Arnold Ostler
-
Publication number: 20080086472Abstract: A method, computer program product, and database driver for connecting a client to a database server are provided. The method, computer program product, and database driver provide for providing a generic interface, the generic interface being operable to interoperate with one or more non-GSSAPI (Generic Security Services Application Programming Interface) compliant security mechanisms, providing a set of specialized interfaces, the set of specialized interface being operable to interoperate with one or more GSSAPI compliant security mechanisms, and establishing a connection between a client and a database server using the generic interface or the set of specialized interfaces depending on a security mechanism used by the client. The one or more non-GSSAPI compliant security mechanisms and the one or more GSSAPI compliant security mechanisms may be predefined or user-defined.Type: ApplicationFiled: October 4, 2006Publication date: April 10, 2008Applicant: International Business Machines CorporationInventors: Huaxin Gao, Bilung Lee, Paul A. Ostler
-
Publication number: 20080036629Abstract: An apparatus and method are disclosed for converting XML data to a destination encoding format. A receive module receives a request for bytes of XML data in a destination encoding format streamed from a source XML file. A transfer module transfers the requested bytes from a byte conversion buffer to a request buffer in response to the request and the byte conversion buffer having at least the requested bytes. A conversion module, in response to the byte conversion buffer lacking the requested quantity of bytes, transfers part of the requested bytes to the request buffer, fetches input bytes from an XML file, stores the bytes in a receive buffer, transfers the input bytes through a byte-to-character converter to a character conversion buffer, transfers the characters through a character-to-byte converter to the byte conversion buffer, and transfers enough bytes to the request buffer to satisfy the request.Type: ApplicationFiled: August 8, 2006Publication date: February 14, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Anshul Dawra, Bilung Lee, Paul Arnold Ostler