Patents by Inventor Curt Cotner

Curt Cotner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9870483
    Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Grant
    Filed: November 4, 2016
    Date of Patent: January 16, 2018
    Assignee: International Business Machines Corporation
    Inventors: Curt Cotner, Roger Lee Miller
  • Publication number: 20170053133
    Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Application
    Filed: November 4, 2016
    Publication date: February 23, 2017
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Curt COTNER, Roger Lee MILLER
  • Patent number: 9514328
    Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Grant
    Filed: September 30, 2008
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Curt Cotner, Roger Lee Miller
  • Patent number: 8478713
    Abstract: An access control system provides multilevel and mandatory access control for a database management system. The access control systems provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Grant
    Filed: September 30, 2008
    Date of Patent: July 2, 2013
    Assignee: International Business Machines Corporation
    Inventors: Curt Cotner, Roger Lee Miller
  • Patent number: 8131664
    Abstract: An access control system provides multilevel and mandatory access control for a database management system. The access control systems provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Grant
    Filed: September 30, 2008
    Date of Patent: March 6, 2012
    Assignee: International Business Machines Corporation
    Inventors: Curt Cotner, Roger Lee Miller
  • Publication number: 20090043775
    Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Application
    Filed: September 30, 2008
    Publication date: February 12, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Curt Cotner, Roger Lee Miller
  • Publication number: 20090030907
    Abstract: An access control system provides multilevel and mandatory access control for a database management system. The access control systems provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Application
    Filed: September 30, 2008
    Publication date: January 29, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Curt Cotner, Roger Lee Miller
  • Patent number: 7464080
    Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: December 9, 2008
    Assignee: International Business Machines Corporation
    Inventors: Curt Cotner, Roger Lee Miller
  • Publication number: 20070244898
    Abstract: An access control system and access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Application
    Filed: May 10, 2007
    Publication date: October 18, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Curt Cotner, Roger Miller
  • Publication number: 20070239719
    Abstract: A shared memory device called the Coupling Facility (CF) is used to record the indoubt transaction entries for each member of the database cluster, avoiding the CPU cost and elapsed time impact of persisting this information to disk (either via a log write or a relational table I/O). The CF provides full read/write access and data coherency for concurrent access by all the members in the database cluster. At any given point in time, the CF will contain the full list of indoubt transactions for the entire database cluster. CF duplexing is used to guarantee the integrity of the CF structure used for the indoubt list. In the event of complete loss of both CF structures (which will not happen except in major disaster situations), data sharing group restart processing can reconstruct the CF structures from the individual member logs.
    Type: Application
    Filed: June 19, 2007
    Publication date: October 11, 2007
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Curt Cotner, Brian Howell, Jeffrey Josten, James Pickel
  • Patent number: 7269607
    Abstract: According to the method for establishing a log point an information technology infrastructure is provided. Transactions are performed by at least two database units of the information technology infrastructure. Then, “suspending prepare to commit”-requests are sent from said coordinating device to said database units. The log writes of all database units are suspended and recorded, whereas these log points form a global log point. Finally the log writes of all database units and all the suspended transactions are resumed.
    Type: Grant
    Filed: June 29, 2004
    Date of Patent: September 11, 2007
    Assignee: International Business Machines Coproartion
    Inventors: Curt Cotner, Namik Hrle, James Teng
  • Publication number: 20070174838
    Abstract: Techniques are provided for tuning work. In response to identifying a trigger for a work, automatic tuning is invoked. The trigger indicates that a performance goal for the work has been missed. The work is analyzed. A tuning operation is selected for the work based on a tuning history. The selected tuning operation is implemented for the work.
    Type: Application
    Filed: January 24, 2006
    Publication date: July 26, 2007
    Inventors: Curt Cotner, You-Chin Fuh, Holger Karn, James Porell, Bryan Smith
  • Patent number: 7240046
    Abstract: An access control system and access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.
    Type: Grant
    Filed: September 4, 2002
    Date of Patent: July 3, 2007
    Assignee: International Business Machines Corporation
    Inventors: Curt Cotner, Roger Lee Miller
  • Publication number: 20070143249
    Abstract: An SQL procedure deployment system deploys a query procedure comprising a procedural logic component and a database request component from a source system to a target system. At generation of the query procedure, the system generates a query procedure source code, a symbol table, and an encapsulated optimization results to regenerate run-time instructions for query statements of the database request component and make the query statements function with a deployed procedural logic component. The system maintains an association between the procedural logic component and the database request component during deployment. The system copies an internal representation of the procedural logic component to the target system without regeneration. The system regenerates the database request component to recreate the query procedure on the target system and to maintain a consistent interface between the procedural logic component and database request component.
    Type: Application
    Filed: December 17, 2005
    Publication date: June 21, 2007
    Inventors: Margaret Bernal, Yao-Ching Chen, Ding-Wei Chieh, Curt Cotner, Baoqiu Cui, Tammie Dang, Marion Farber, Georgia Fuller, Joe Huang, Hui-An Lee, Claire McFeely, Chunfeng Pei, James Pickel, Yumi Tsuji, Jay Yothers, Margaret Zagelow, Liyan Zhou
  • Publication number: 20070143313
    Abstract: A method, apparatus and program storage device readable by a computer tangibly embodying a program of instructions executable by the computer is provided for reorganization of database data. The computer database reorganization method reorganizes one set of database data blocks at a time, allowing concurrent data manipulation. Method identifies a set of data blocks for reorganization in a sliding peephole mode, re-orders the set of data blocks and replaces the original set of data blocks with the re-ordered set of data blocks, if possible. Preferred embodiments include an overlapping peephole method, which chooses, for each set of data block to be reorganized, a next succeeding set of data blocks plus an overlap segment, wherein the overlap segment includes a set of empty pages other than intentionally specified free pages, and the overlap segment is a subset of the preceding set of data blocks.
    Type: Application
    Filed: December 19, 2005
    Publication date: June 21, 2007
    Applicant: International Business Machines Corporation
    Inventors: Curt Cotner, James Ruddy
  • Publication number: 20060288052
    Abstract: Techniques are provided for supporting versions of a routine. A first version of the routine is created. A second version of the routine is generated in response to receiving an alter statement including an add version clause. The second version of the routine is activated in response to receiving an alter statement including an activate version clause.
    Type: Application
    Filed: June 17, 2005
    Publication date: December 21, 2006
    Inventors: Yao-Ching Chen, Curt Cotner, Baoqiu Cui, Tammie Dang, Joe Huang, Claire McFeely, Robert Miller, Manogari Simanjuntak, Yumi Tsuji, Xiaoyu Yang, Jay Yothers, Margaret Zagelow
  • Publication number: 20060143436
    Abstract: A method and system for establishing a connection between a data server and a middleware server is disclosed. The method and system include defining a plurality of trust attributes corresponding to a trusted context between the middleware server and the data server and validating the plurality of trust attributes against a plurality of attributes corresponding to the middleware server. The plurality of attributes provided in a connection request. The method and system also include establishing the trusted context based on the validating the plurality of trust attributes.
    Type: Application
    Filed: December 27, 2004
    Publication date: June 29, 2006
    Inventors: Paul Bird, Gayathiri Chandran, Curt Cotner, Adrian Lobo, James Pickel, Walid Rjaibi
  • Publication number: 20060123468
    Abstract: A data server of a data processing system is operably coupled to a database and in communication with a middleware server. A connection between the data server and the middleware server is established and managed. A set of attributes identifying trusted middleware servers is instituted with the data server. The middleware server transmits a connection request to the data server. The connection request has request attributes including identifying the connection request as being for a new connection or reuse of an existing connection with different connection request attributes. A connection with the middleware server is established by the data server based on the connection request. A connection status message is received by the middleware server from the data server indicating a status of the connection request. A trust indicator for the connection is established at the data server according to a trust status identified by the set of attributes for the middleware server.
    Type: Application
    Filed: December 8, 2004
    Publication date: June 8, 2006
    Inventors: Paul Bird, Curt Cotner, Walid Rjaibi, Timothy Vincent
  • Publication number: 20050228823
    Abstract: Provided is a method, system, and program for accessing data in a distributed database environment. A client program receives multiple requests for data from a database object satisfying specified search predicates from an application program. Each request includes a request for at least one row from the table. The client program transfers a database command and a rowset parameter indicating a maximum number of rows to return to a server program over a network if the requested row is not maintained by the client program. A data block is generated with the server program including rows from the database object satisfying the search predicates in response to the database command. The rows included in the data block do not exceed the rowset parameter. The server program transfers the data block to the client program. In turn, the client program returns at least one requested row from the received data block in response to one request for the at least one row of data from the application program.
    Type: Application
    Filed: June 6, 2005
    Publication date: October 13, 2005
    Inventors: Curt Cotner, Margaret Dong
  • Publication number: 20050177590
    Abstract: An improved automatically updated timestamp for database systems is disclosed. The automatically updated timestamp can be provided in a hidden timestamp column for a table, where the value of the timestamp column can be retrieved with a query that calls the column by name. Optionally, the timestamp column can be provided for each table in the database system to ensure its availability to applications. For cases where a timestamp for each row in a table is not desired, an automatically updated timestamp can be provided for a data page. This timestamp can be retrieved from an update timestamp recorded on disk and in the buffer pool or from a log relative byte address. Although this is a page-level timestamp, its use may be desirable for infrequently updated tables or where space on the disk and buffer pool is at a premium.
    Type: Application
    Filed: February 11, 2004
    Publication date: August 11, 2005
    Inventors: Yao-Ching Chen, Curt Cotner