Patents by Inventor Jan Pazdziora
Jan Pazdziora has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10585862Abstract: Various example embodiments are directed to systems and methods for migrating a database from a source database having a source schema to a target database having a target schema. For example the migrating may comprise a pre-migration phase and a migration phase. The pre-migration phase may comprise either executing a pre-migration command to modify at least a portion of the source database or generating a pre-migration object at the source database. The migration phase may comprise selecting at least one column from the source database that was modified during the pre-migration phase and writing the at least one column to the target database.Type: GrantFiled: February 28, 2014Date of Patent: March 10, 2020Assignee: Red Hat, Inc.Inventors: Jan Pazdziora, Milan Zazrivec
-
Patent number: 10104042Abstract: A method performed by a computing system includes, with a computing system, receiving an application and a security policy corresponding to the application, the security policy for use with a security enforcement mechanism, with the computing system, receiving a data structure associated with the application and the security policy, wherein the data structure associates a logged denial by the security enforcement mechanism with a rule of the security policy, wherein the data structure further associates the logged denial with a test for the rule, the test to determine if the rule prevents the denial, with the computing system, applying the test using a temporary security policy, the temporary security policy having the rule removed, and with the computing system, in response to determining that the applying does not result in a denial corresponding to the logged denial, flagging the data structure.Type: GrantFiled: January 27, 2015Date of Patent: October 16, 2018Assignee: RED HAT, INC.Inventor: Jan Pazdziora
-
Publication number: 20160217286Abstract: A method performed by a computing system includes, with a computing system, receiving an application and a security policy corresponding to the application, the security policy for use with a security enforcement mechanism, with the computing system, receiving a data structure associated with the application and the security policy, wherein the data structure associates a logged denial by the security enforcement mechanism with a rule of the security policy, wherein the data structure further associates the logged denial with a test for the rule, the test to determine if the rule prevents the denial, with the computing system, applying the test using a temporary security policy, the temporary security policy having the rule removed, and with the computing system, in response to determining that the applying does not result in a denial corresponding to the logged denial, flagging the data structure.Type: ApplicationFiled: January 27, 2015Publication date: July 28, 2016Inventor: Jan Pazdziora
-
Patent number: 9299094Abstract: Some embodiments of a system and a method to verify compliance in a disconnected system have been presented. For instance, a provider server can collect system management server state hashes from a set of computer systems in transactions not directly related to billing between the provider server and the computer systems. The computer systems may be coupled to a system management server that is within an internal network of a customer. The provider server can verify compliance information submitted by the customer using the system management server state hashes collected without communicating with the system management server in the internal network.Type: GrantFiled: May 20, 2010Date of Patent: March 29, 2016Assignee: Red Hat Inc.Inventors: Jan Pazdziora, Tomá{hacek over (s)} Mráz
-
Patent number: 9288058Abstract: Systems and methods for executing compliance verification or remediation scripts. An example method may comprise: identifying, by a computer system, a compliance script to be executed; determining a value of a cryptographic hash function of at least part of the identified compliance script; identifying, based on the value of the cryptographic hash function, an installation path of a corresponding digitally signed compliance script pre-installed on the computer system, the digitally signed compliance script associated with a security context; and executing, within the security context, the digitally signed compliance script.Type: GrantFiled: September 3, 2013Date of Patent: March 15, 2016Assignee: Red Hat, Inc.Inventors: Jan Pazdziora, {hacek over (S)}imon Luka{hacek over (s)}ik
-
Patent number: 9154305Abstract: Some embodiments of a system and a method to verify compliance in a connected system have been presented. For instance, a system management server provided by a software vendor is installed in a customer's network to manage a set of computer systems belonging to the customer. The system management server can provide cryptographically timestamped hashes of states of the system management server to the software vendor periodically to allow the software vendor to verify compliance information from the customer.Type: GrantFiled: May 20, 2010Date of Patent: October 6, 2015Assignee: Red Hat, Inc.Inventors: Jan Pazdziora, Tomá{hacek over (s)} Mráz
-
Publication number: 20150248404Abstract: Various example embodiments are directed to systems and methods for migrating a database from a source database having a source schema to a target database having a target schema. For example, a computing device may identify a first source schema table associated with a first migration instruction. The first migration instruction may comprise a plurality of migration instruction sets. Each of the plurality of migration instruction sets may correspond to a version of the first source schema table. The computing device may determine that there is a match between the first source schema table and a first migration instruction set and may execute the first migration instruction set. Executing the first migration instruction set may comprise selecting at least one column of the first source schema table and writing the at least one column of the first source schema table to a first target schema table.Type: ApplicationFiled: April 30, 2014Publication date: September 3, 2015Applicant: Red Hat, Inc.Inventors: Jan Pazdziora, Milan Zazrivec
-
Publication number: 20150248403Abstract: Various example embodiments are directed to systems and methods for migrating a database from a source database having a source schema to a target database having a target schema. For example the migrating may comprise a pre-migration phase and a migration phase. The pre-migration phase may comprise either executing a pre-migration command to modify at least a portion of the source database or generating a pre-migration object at the source database. The migration phase may comprise selecting at least one column from the source database that was modified during the pre-migration phase and writing the at least one column to the target database.Type: ApplicationFiled: February 28, 2014Publication date: September 3, 2015Applicant: Red Hat, Inc.Inventors: Jan Pazdziora, Milan Zazrivec
-
Publication number: 20150067342Abstract: Systems and methods for executing compliance verification or remediation scripts. An example method may comprise: identifying, by a computer system, a compliance script to be executed; determining a value of a cryptographic hash function of at least part of the identified compliance script; identifying, based on the value of the cryptographic hash function, an installation path of a corresponding digitally signed compliance script pre-installed on the computer system, the digitally signed compliance script associated with a security context; and executing, within the security context, the digitally signed compliance script.Type: ApplicationFiled: September 3, 2013Publication date: March 5, 2015Applicant: Red Hat, Inc.Inventors: Jan Pazdziora, Simon Lukasík
-
Patent number: 8745076Abstract: The database command rewriting system rewrites a first database command that includes language specific for a first database management system command into a second database command suitable for a second database management system. The database command rewriting system receives the first database command and identifies the specific language. Furthermore, the database command rewriting system retrieves a rule based on the identified language. Using the retrieved rule, the database command system rewrites the first database command to the second database command and transmits the second database command to the second database management system.Type: GrantFiled: January 13, 2009Date of Patent: June 3, 2014Assignee: Red Hat, Inc.Inventor: Jan Pazdziora
-
Patent number: 8291402Abstract: A computer system can be updated and/or reconfigured quickly by preparing a list of attributes of the system and computing a fingerprint based on the list. The fingerprint serves as a key to a database of precomputed upgrade plans. If a matching plan is found, it can be executed to update the computer system without performing a time-consuming dependency resolution operation. If no applicable precomputed plan is found, a plan must then be computed, but the computed plan may be saved in the database to speed up future system updates.Type: GrantFiled: November 29, 2007Date of Patent: October 16, 2012Assignee: Red Hat, Inc.Inventor: Jan Pazdziora
-
Patent number: 8266180Abstract: An upgrade controller that compares the contents of a reference database with an upgraded database is described. In one embodiment, the upgrade controller connects to the reference and upgraded database and retrieves the list of tables. For each of the tables, the upgrade controller compares the content of the reference and the upgraded table. The upgrade controller compares the table contents by comparing the contents on a record-by-record basis. In addition, the upgrade controller can use a whitelist of tables and columns to reduce the number of false positive(s) that could be generated during the comparison.Type: GrantFiled: May 27, 2010Date of Patent: September 11, 2012Assignee: Red Hat, Inc.Inventors: Milan Zázrivec, Jan Pazdziora
-
Patent number: 8250119Abstract: Some embodiments of a system and a method to validate database schema upgrade using denormalization have been presented. For instance, a database deployment engine may upgrade a database from a first version to a second version. The database upgraded stores a set of entities. By applying denormalization to both the upgraded database and a reference database (which contains a newly installed second version of the database), a database validation engine may reduce false positives during validation of the database schema upgrade scripts usable by customers to upgrade their database schema to the latest version.Type: GrantFiled: February 26, 2010Date of Patent: August 21, 2012Assignee: Red Hat, Inc.Inventors: Milan Z{dot over (a)}zrivec, Jan Pazdziora
-
Publication number: 20110295876Abstract: An upgrade controller that compares the contents of a reference database with an upgraded database is described. In one embodiment, the upgrade controller connects to the reference and upgraded database and retrieves the list of tables. For each of the tables, the upgrade controller compares the content of the reference and the upgraded table. The upgrade controller compares the table contents by comparing the contents on a record-by-record basis. In addition, the upgrade controller can use a whitelist of tables and columns to reduce the number of false positive(s) that could be generated during the comparison.Type: ApplicationFiled: May 27, 2010Publication date: December 1, 2011Inventors: Milan Zázrivec, Jan Pazdziora
-
Publication number: 20110289002Abstract: Some embodiments of a system and a method to verify compliance in a connected system have been presented. For instance, a system management server provided by a software vendor is installed in a customer's network to manage a set of computer systems belonging to the customer. The system management server can provide cryptographically timestamped hashes of states of the system management server to the software vendor periodically to allow the software vendor to verify compliance information from the customer.Type: ApplicationFiled: May 20, 2010Publication date: November 24, 2011Inventors: Jan Pazdziora, Tomás Mráz
-
Publication number: 20110288973Abstract: Some embodiments of a system and a method to verify compliance in a disconnected system have been presented. For instance, a provider server can collect system management server state hashes from a set of computer systems in transactions not directly related to billing between the provider server and the computer systems. The computer systems may be coupled to a system management server that is within an internal network of a customer. The provider server can verify compliance information submitted by the customer using the system management server state hashes collected without communicating with the system management server in the internal network.Type: ApplicationFiled: May 20, 2010Publication date: November 24, 2011Inventors: Jan Pazdziora, Tomás Mráz
-
Publication number: 20110213759Abstract: Some embodiments of a system and a method to validate database schema upgrade using denormalization have been presented. For instance, a database deployment engine may upgrade a database from a first version to a second version. The database upgraded stores a set of entities. By applying denormalization to both the upgraded database and a reference database (which contains a newly installed second version of the database), a database validation engine may reduce false positives during validation of the database schema upgrade scripts usable by customers to upgrade their database schema to the latest version.Type: ApplicationFiled: February 26, 2010Publication date: September 1, 2011Inventors: Milan Zazrivec, Jan Pazdziora
-
Publication number: 20100185645Abstract: The database command rewriting system rewrites a first database command that includes language specific for a first database management system command into a second database command suitable for a second database management system. The database command rewriting system receives the first database command and identifies the specific language. Furthermore, the database command rewriting system retrieves a rule based on the identified language. Using the retrieved rule, the database command system rewrites the first database command to the second database command and transmits the second database command to the second database management system.Type: ApplicationFiled: January 13, 2009Publication date: July 22, 2010Inventor: Jan Pazdziora
-
Publication number: 20090144719Abstract: A computer system can be updated and/or reconfigured quickly by preparing a list of attributes of the system and computing a fingerprint based on the list. The fingerprint serves as a key to a database of precomputed upgrade plans. If a matching plan is found, it can be executed to update the computer system without performing a time-consuming dependency resolution operation. If no applicable precomputed plan is found, a plan must then be computed, but the computed plan may be saved in the database to speed up future system updates.Type: ApplicationFiled: November 29, 2007Publication date: June 4, 2009Inventor: Jan Pazdziora