Patents by Inventor Curt Cotner
Curt Cotner has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9870483Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: GrantFiled: November 4, 2016Date of Patent: January 16, 2018Assignee: International Business Machines CorporationInventors: Curt Cotner, Roger Lee Miller
-
Publication number: 20170053133Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: ApplicationFiled: November 4, 2016Publication date: February 23, 2017Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Curt COTNER, Roger Lee MILLER
-
Patent number: 9514328Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: GrantFiled: September 30, 2008Date of Patent: December 6, 2016Assignee: International Business Machines CorporationInventors: Curt Cotner, Roger Lee Miller
-
Patent number: 8478713Abstract: An access control system provides multilevel and mandatory access control for a database management system. The access control systems provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: GrantFiled: September 30, 2008Date of Patent: July 2, 2013Assignee: International Business Machines CorporationInventors: Curt Cotner, Roger Lee Miller
-
Patent number: 8131664Abstract: An access control system provides multilevel and mandatory access control for a database management system. The access control systems provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: GrantFiled: September 30, 2008Date of Patent: March 6, 2012Assignee: International Business Machines CorporationInventors: Curt Cotner, Roger Lee Miller
-
Publication number: 20090043775Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: ApplicationFiled: September 30, 2008Publication date: February 12, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Curt Cotner, Roger Lee Miller
-
Publication number: 20090030907Abstract: An access control system provides multilevel and mandatory access control for a database management system. The access control systems provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: ApplicationFiled: September 30, 2008Publication date: January 29, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Curt Cotner, Roger Lee Miller
-
Patent number: 7464080Abstract: Access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: GrantFiled: May 10, 2007Date of Patent: December 9, 2008Assignee: International Business Machines CorporationInventors: Curt Cotner, Roger Lee Miller
-
Publication number: 20070244898Abstract: An access control system and access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: ApplicationFiled: May 10, 2007Publication date: October 18, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Curt Cotner, Roger Miller
-
Publication number: 20070239719Abstract: A shared memory device called the Coupling Facility (CF) is used to record the indoubt transaction entries for each member of the database cluster, avoiding the CPU cost and elapsed time impact of persisting this information to disk (either via a log write or a relational table I/O). The CF provides full read/write access and data coherency for concurrent access by all the members in the database cluster. At any given point in time, the CF will contain the full list of indoubt transactions for the entire database cluster. CF duplexing is used to guarantee the integrity of the CF structure used for the indoubt list. In the event of complete loss of both CF structures (which will not happen except in major disaster situations), data sharing group restart processing can reconstruct the CF structures from the individual member logs.Type: ApplicationFiled: June 19, 2007Publication date: October 11, 2007Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Curt Cotner, Brian Howell, Jeffrey Josten, James Pickel
-
Patent number: 7269607Abstract: According to the method for establishing a log point an information technology infrastructure is provided. Transactions are performed by at least two database units of the information technology infrastructure. Then, “suspending prepare to commit”-requests are sent from said coordinating device to said database units. The log writes of all database units are suspended and recorded, whereas these log points form a global log point. Finally the log writes of all database units and all the suspended transactions are resumed.Type: GrantFiled: June 29, 2004Date of Patent: September 11, 2007Assignee: International Business Machines CoproartionInventors: Curt Cotner, Namik Hrle, James Teng
-
Publication number: 20070174838Abstract: Techniques are provided for tuning work. In response to identifying a trigger for a work, automatic tuning is invoked. The trigger indicates that a performance goal for the work has been missed. The work is analyzed. A tuning operation is selected for the work based on a tuning history. The selected tuning operation is implemented for the work.Type: ApplicationFiled: January 24, 2006Publication date: July 26, 2007Inventors: Curt Cotner, You-Chin Fuh, Holger Karn, James Porell, Bryan Smith
-
Patent number: 7240046Abstract: An access control system and access control methods provide multilevel and mandatory access control for a database management system. The access control techniques provide access control at the row level in a relational database table. The database table contains a security label column within which is recorded a security label that is defined within a hierarchical security scheme. A user's security label is encoded with security information concerning the user. When a user requests access to a row, a security mechanism compares the user's security information with the security information in the row. If the user's security dominates the row's security, the user is given access to the row.Type: GrantFiled: September 4, 2002Date of Patent: July 3, 2007Assignee: International Business Machines CorporationInventors: Curt Cotner, Roger Lee Miller
-
Publication number: 20070143249Abstract: An SQL procedure deployment system deploys a query procedure comprising a procedural logic component and a database request component from a source system to a target system. At generation of the query procedure, the system generates a query procedure source code, a symbol table, and an encapsulated optimization results to regenerate run-time instructions for query statements of the database request component and make the query statements function with a deployed procedural logic component. The system maintains an association between the procedural logic component and the database request component during deployment. The system copies an internal representation of the procedural logic component to the target system without regeneration. The system regenerates the database request component to recreate the query procedure on the target system and to maintain a consistent interface between the procedural logic component and database request component.Type: ApplicationFiled: December 17, 2005Publication date: June 21, 2007Inventors: Margaret Bernal, Yao-Ching Chen, Ding-Wei Chieh, Curt Cotner, Baoqiu Cui, Tammie Dang, Marion Farber, Georgia Fuller, Joe Huang, Hui-An Lee, Claire McFeely, Chunfeng Pei, James Pickel, Yumi Tsuji, Jay Yothers, Margaret Zagelow, Liyan Zhou
-
Publication number: 20070143313Abstract: A method, apparatus and program storage device readable by a computer tangibly embodying a program of instructions executable by the computer is provided for reorganization of database data. The computer database reorganization method reorganizes one set of database data blocks at a time, allowing concurrent data manipulation. Method identifies a set of data blocks for reorganization in a sliding peephole mode, re-orders the set of data blocks and replaces the original set of data blocks with the re-ordered set of data blocks, if possible. Preferred embodiments include an overlapping peephole method, which chooses, for each set of data block to be reorganized, a next succeeding set of data blocks plus an overlap segment, wherein the overlap segment includes a set of empty pages other than intentionally specified free pages, and the overlap segment is a subset of the preceding set of data blocks.Type: ApplicationFiled: December 19, 2005Publication date: June 21, 2007Applicant: International Business Machines CorporationInventors: Curt Cotner, James Ruddy
-
Publication number: 20060288052Abstract: Techniques are provided for supporting versions of a routine. A first version of the routine is created. A second version of the routine is generated in response to receiving an alter statement including an add version clause. The second version of the routine is activated in response to receiving an alter statement including an activate version clause.Type: ApplicationFiled: June 17, 2005Publication date: December 21, 2006Inventors: Yao-Ching Chen, Curt Cotner, Baoqiu Cui, Tammie Dang, Joe Huang, Claire McFeely, Robert Miller, Manogari Simanjuntak, Yumi Tsuji, Xiaoyu Yang, Jay Yothers, Margaret Zagelow
-
Publication number: 20060143436Abstract: A method and system for establishing a connection between a data server and a middleware server is disclosed. The method and system include defining a plurality of trust attributes corresponding to a trusted context between the middleware server and the data server and validating the plurality of trust attributes against a plurality of attributes corresponding to the middleware server. The plurality of attributes provided in a connection request. The method and system also include establishing the trusted context based on the validating the plurality of trust attributes.Type: ApplicationFiled: December 27, 2004Publication date: June 29, 2006Inventors: Paul Bird, Gayathiri Chandran, Curt Cotner, Adrian Lobo, James Pickel, Walid Rjaibi
-
Publication number: 20060123468Abstract: A data server of a data processing system is operably coupled to a database and in communication with a middleware server. A connection between the data server and the middleware server is established and managed. A set of attributes identifying trusted middleware servers is instituted with the data server. The middleware server transmits a connection request to the data server. The connection request has request attributes including identifying the connection request as being for a new connection or reuse of an existing connection with different connection request attributes. A connection with the middleware server is established by the data server based on the connection request. A connection status message is received by the middleware server from the data server indicating a status of the connection request. A trust indicator for the connection is established at the data server according to a trust status identified by the set of attributes for the middleware server.Type: ApplicationFiled: December 8, 2004Publication date: June 8, 2006Inventors: Paul Bird, Curt Cotner, Walid Rjaibi, Timothy Vincent
-
Publication number: 20050228823Abstract: Provided is a method, system, and program for accessing data in a distributed database environment. A client program receives multiple requests for data from a database object satisfying specified search predicates from an application program. Each request includes a request for at least one row from the table. The client program transfers a database command and a rowset parameter indicating a maximum number of rows to return to a server program over a network if the requested row is not maintained by the client program. A data block is generated with the server program including rows from the database object satisfying the search predicates in response to the database command. The rows included in the data block do not exceed the rowset parameter. The server program transfers the data block to the client program. In turn, the client program returns at least one requested row from the received data block in response to one request for the at least one row of data from the application program.Type: ApplicationFiled: June 6, 2005Publication date: October 13, 2005Inventors: Curt Cotner, Margaret Dong
-
Publication number: 20050177590Abstract: An improved automatically updated timestamp for database systems is disclosed. The automatically updated timestamp can be provided in a hidden timestamp column for a table, where the value of the timestamp column can be retrieved with a query that calls the column by name. Optionally, the timestamp column can be provided for each table in the database system to ensure its availability to applications. For cases where a timestamp for each row in a table is not desired, an automatically updated timestamp can be provided for a data page. This timestamp can be retrieved from an update timestamp recorded on disk and in the buffer pool or from a log relative byte address. Although this is a page-level timestamp, its use may be desirable for infrequently updated tables or where space on the disk and buffer pool is at a premium.Type: ApplicationFiled: February 11, 2004Publication date: August 11, 2005Inventors: Yao-Ching Chen, Curt Cotner