Patents by Inventor John J. McKenna

John J. McKenna has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11934397
    Abstract: Techniques are disclosed relating to database query optimizers. In some embodiments, a query parser of a database system receives a query requesting data from a multi-tenant database. The query includes a first constraint that restricts a query optimizer's selection of a set of execution plans available to implement the query. The database system determines whether an override has been specified for a particular tenant associated with the received query, the override indicating that the first constraint is to be replaced with a second constraint for the particular tenant. In response to determining that the override has been specified for the particular tenant, the database system replaces the first constraint in the query with the second constraint and provides the query with the second constraint to the query optimizer for selection of an execution plan in accordance with the second constraint.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: March 19, 2024
    Assignee: Salesforce, Inc.
    Inventors: Rama Krishna Korlapati, William J. McKenna, John Francis O'Brien
  • Patent number: 9208321
    Abstract: A countermeasure for a computer security threat to a computer system is administered by establishing a baseline identification of an operating or application system type and an operating or application system release level for the computer system that is compatible with a Threat Management Vector (TMV). A TMV is then received, including therein a first field that provides identification of at least one operating system type that is affected by a computer security threat, a second field that provides identification of an operating system release level for the operating system type, and a third field that provides identification of a set of possible countermeasures for an operating system type and an operating system release level. Countermeasures that are identified in the TMV are processed if the TMV identifies the operating system type and operating system release level for the computer system as being affected by the computer security threat.
    Type: Grant
    Filed: May 7, 2008
    Date of Patent: December 8, 2015
    Assignee: Trend Micro Incorporated
    Inventors: Jeffrey S. Bardsley, Ashley A. Brock, Charles K. Davis, III, Nathaniel W. Kim, John J. McKenna, Carlos F. Villegas
  • Publication number: 20130263267
    Abstract: Computer security threat management information is generated by receiving a notification of a security threat and/or a notification of a test that detects intrusion of a computer security threat. A computer-actionable TMV is generated from the notification that was received.
    Type: Application
    Filed: May 24, 2013
    Publication date: October 3, 2013
    Applicant: International Business Machines Corporation
    Inventor: John J. McKenna
  • Patent number: 8458793
    Abstract: Computer security threat management information is generated by receiving a notification of a security threat and/or a notification of a test that detects intrusion of a computer security threat. A computer-actionable TMV is generated from the notification that was received.
    Type: Grant
    Filed: July 13, 2004
    Date of Patent: June 4, 2013
    Assignee: International Business Machines Corporation
    Inventor: John J. McKenna
  • Patent number: 7770203
    Abstract: The invention relates to the integration of a security operations policy into a threat management vector.
    Type: Grant
    Filed: April 17, 2007
    Date of Patent: August 3, 2010
    Assignee: International Business Machines Corporation
    Inventor: John J. McKenna
  • Publication number: 20090328206
    Abstract: A countermeasure for a computer security threat to a computer system is administered by establishing a baseline identification of an operating or application system type and an operating or application system release level for the computer system that is compatible with a Threat Management Vector (TMV). A TMV is then received, including therein a first field that provides identification of at least one operating system type that is affected by a computer security threat, a second field that provides identification of an operating system release level for the operating system type, and a third field that provides identification of a set of possible countermeasures for an operating system type and an operating system release level. Countermeasures that are identified in the TMV are processed if the TMV identifies the operating system type and operating system release level for the computer system as being affected by the computer security threat.
    Type: Application
    Filed: May 7, 2008
    Publication date: December 31, 2009
    Inventors: Jeffrey S. Bardsley, Ashley A. Brock, Charles K. Davis, III, Nathaniel W. Kim, John J. McKenna, Carlos F. Villegas
  • Publication number: 20080263664
    Abstract: The invention relates to the integration of a security operations policy into a threat management vector.
    Type: Application
    Filed: April 17, 2007
    Publication date: October 23, 2008
    Inventor: John J. McKenna
  • Patent number: 7386883
    Abstract: A countermeasure for a computer security threat to a computer system is administered by establishing a baseline identification of an operating or application system type and an operating or application system release level for the computer system that is compatible with a Threat Management Vector (TMV). A TMV is then received, including therein a first field that provides identification of at least one operating system type that is affected by a computer security threat, a second field that provides identification of an operating system release level for the operating system type, and a third field that provides identification of a set of possible countermeasures for an operating system type and an operating system release level. Countermeasures that are identified in the TMV are processed if the TMV identifies the operating system type and operating system release level for the computer system as being affected by the computer security threat.
    Type: Grant
    Filed: July 22, 2003
    Date of Patent: June 10, 2008
    Assignee: International Business Machines Corporation
    Inventors: Jeffrey S. Bardsley, Ashley A. Brock, Charles K. Davis, III, Nathaniel W. Kim, John J. McKenna, Carlos F. Villegas
  • Patent number: 7370345
    Abstract: A threat management domain controller is responsive to a computer-actionable threat management vector that includes a first computer-readable field that provides identification of at least one system type that is affected by a computer security threat, a second computer-readable field that provides identification of a release level for the system type and a third computer-readable field that provides identification of a set of possible countermeasures for a system type and release level. The threat management domain controller processes a threat management vector that is received for use by a domain of target computer systems, and transmits the threat management vector that has been processed to at least one of the target computer systems in the domain of target computer systems.
    Type: Grant
    Filed: March 2, 2004
    Date of Patent: May 6, 2008
    Assignee: Lenovo Singapore Pte. Ltd
    Inventors: Jeffrey S. Bardsley, Ashley A. Brock, Charles K. Davis, III, Nathaniel W. Kim, John J. McKenna, Carlos F. Villegas
  • Patent number: 4507752
    Abstract: The present invention provides in a data processing system storing a plurality of discrete entities, each identified by a single parameter within a monotonic parameter spectrum, resident at an addressable location and locatable by searching a system maintained hierarchical index mapping parameters onto location addresses, a method of compressing the index by the system, which method is interruptable to permit valid searching of the index and executes in a variable length ordered sequence of processing cycles, each comprising a variable length sequence of two part iterations, each iteration comprising the selective performance of each of an ordered fixed sequence of basic operations, wherein each full cycle initially operates on successive index levels in the direction opposite to that in which the index is searched while performing the first part of each iteration and thereafter operates on successive levels in the reverse direction performing the second part of each iteration, parameter relocation at a level
    Type: Grant
    Filed: February 22, 1983
    Date of Patent: March 26, 1985
    Assignee: International Business Machines Corporation
    Inventors: John J. McKenna, John M. Thompson