Patents by Inventor Pedro M. Barbas

Pedro M. Barbas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10073866
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for prioritizing test cases for relational database systems. The method includes identifying one or more data tables within a relational database. The method further includes identifying an exclusivity value for each of the one or more identified data tables. The method further includes calculating a table weight for each of the one or more identified data tables. The method further includes prioritizing the one or more identified data tables based on the respective calculated table weights. The method further includes identifying one or more sequences of database statements corresponding to the prioritized data tables, wherein a database statement is a command executed on one of the prioritized data tables. The method further includes prioritizing the one or more identified sequences based on the corresponding database statements.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: September 11, 2018
    Assignee: International Business Machines Corporation
    Inventor: Pedro M. Barbas
  • Publication number: 20180189503
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Application
    Filed: February 15, 2018
    Publication date: July 5, 2018
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20180173744
    Abstract: Evaluating integrity of database workloads includes receiving transactional database lock commands from concurrent users and identifying a usage pattern of lock actions when results of an execution of the transactional database lock commands match a usage pattern for a data integrity rule. The data integrity rule is added to a set of one or more data integrity rules for the transactional database lock commands. The transactional database lock commands and the set of one or more data integrity rules are forwarded from a primary database server to a duplicate database server that is equivalent to the primary database server and configured to execute the transactional database lock commands while applying the one or more data integrity rules. Anomalies indicating a data integrity problem may be detected based on a comparison of the results of the executions at the primary database server and the duplicate database server.
    Type: Application
    Filed: December 20, 2016
    Publication date: June 21, 2018
    Inventors: Pedro M. Barbas, Paddy Burke, Gary F. Murtagh, David M. Tilson
  • Publication number: 20180137112
    Abstract: Data structures stored on a source database are migrated to a destination database in which the data are structured in a different format than that of the source database. Dictionaries are stored that are based on representations of the data structures stored on the source database that are formatted in other than the structural format used on the source database for the data structures. One of the data structures and a corresponding one of the dictionaries are transferred from the source database to a destination database. The transferred data structure is loaded onto the destination database in accordance with the transferred dictionary.
    Type: Application
    Filed: November 14, 2016
    Publication date: May 17, 2018
    Inventors: Pedro M. Barbas, Konrad Emanowicz, Gareth Jenkins, Enda McCallig, Lei Pan
  • Publication number: 20180137114
    Abstract: Data structures stored on a source database are migrated to a destination database in which the data are structured in a different format than that of the source database. Dictionaries are stored that are based on representations of the data structures stored on the source database that are formatted in other than the structural format used on the source database for the data structures. One of the data structures and a corresponding one of the dictionaries are transferred from the source database to a destination database. The transferred data structure is loaded onto the destination database in accordance with the transferred dictionary.
    Type: Application
    Filed: December 6, 2017
    Publication date: May 17, 2018
    Inventors: Pedro M. Barbas, Konrad Emanowicz, Gareth Jenkins, Enda McCallig, Lei Pan
  • Patent number: 9971905
    Abstract: One embodiment is a system for implementing context-aware access control of data in a relational database system. The system includes a memory having computer readable instructions and one or more processors for executing the computer readable instructions. According to the computer readable instructions, a request is received to access one or more tables of a database. Further according to the computer readable instructions, a context-aware access control, defined for at least a portion of the one or more tables, is identified. It is verified that the context-aware access control is satisfied. Access to the at least a portion of the one or more tables is permitted, responsive to verifying that the context-aware access control is satisfied.
    Type: Grant
    Filed: February 10, 2015
    Date of Patent: May 15, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Pedro M. Barbas
  • Patent number: 9953172
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: September 14, 2017
    Date of Patent: April 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20180096051
    Abstract: As disclosed herein, a method includes receiving a plurality of datasets from a database, wherein each dataset comprises one or more data fields represented in a single data format, and wherein the data fields from at least two of the datasets are represented in different data formats, combining the plurality of datasets to provide a created data column corresponding to all of the data fields from the plurality of datasets, organizing the data column into data clusters, wherein each data cluster includes data fields represented in a single data format, and wherein each data field belongs to a data cluster, providing a key-value map referencing data fields with respect to their corresponding data formats, and verifying the database with respect to the created column. A corresponding computer program product and computer system are also disclosed.
    Type: Application
    Filed: December 7, 2017
    Publication date: April 5, 2018
    Inventors: Pedro M. Barbas, Konrad Emanowicz, Enda McCallig, Aslam F. Nomani, Lei Pan
  • Patent number: 9929861
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: March 27, 2018
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Patent number: 9916460
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: October 31, 2016
    Date of Patent: March 13, 2018
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20180012028
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Application
    Filed: September 14, 2017
    Publication date: January 11, 2018
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20170351746
    Abstract: As disclosed herein, a method includes receiving a plurality of datasets from a database, wherein each dataset comprises one or more data fields represented in a single data format, and wherein the data fields from at least two of the datasets are represented in different data formats, combining the plurality of datasets to provide a created data column corresponding to all of the data fields from the plurality of datasets, organizing the data column into data clusters, wherein each data cluster includes data fields represented in a single data format, and wherein each data field belongs to a data cluster, providing a key-value map referencing data fields with respect to their corresponding data formats, and verifying the database with respect to the created column. A corresponding computer program product and computer system are also disclosed.
    Type: Application
    Filed: June 6, 2016
    Publication date: December 7, 2017
    Inventors: Pedro M. Barbas, Konrad Emanowicz, Enda McCallig, Aslam F. Nomani, Lei Pan
  • Publication number: 20170230177
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Application
    Filed: April 26, 2017
    Publication date: August 10, 2017
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Patent number: 9715594
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Grant
    Filed: October 15, 2015
    Date of Patent: July 25, 2017
    Assignee: International Business Machines Corporation
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20170147592
    Abstract: A computer-implemented method of a database statement for a relational database. The database comprises one or more tables comprising one or more data rows. A database statement is received. A set of predicates from the database statement and a set of data rows from the tables to use to generate the result of the database statement are determined. A set of interdiction statements applicable to one or more data rows is obtained. For each predicate, a set of masks applicable to one or more data rows is obtained, where for each mask, the data masked by the mask is used by the predicate. It is determined if a data row has an applicable interdiction statement, and contains data masked by a mask. If so, the result of the database statement without using the result of applying the predicate to the data row.
    Type: Application
    Filed: November 23, 2015
    Publication date: May 25, 2017
    Inventors: Pedro M. Barbas, Joseph Duffy, Lei Pan, David M. Tilson
  • Publication number: 20170139947
    Abstract: Disclosed is a computer-implemented method of compressing data in a columnar database comprising at least one column partitioned into a plurality of partitions including at least one empty partition and a plurality of filled partitions each comprising data entries associated with a set of parameters having parameter values relevant to the recurrence frequency of the data entry in the partition, the data entries being compressed in accordance with a compression dictionary based on the respective recurrence frequencies of the data entries in the filled partition.
    Type: Application
    Filed: November 16, 2015
    Publication date: May 18, 2017
    Inventors: Sami Abed, Pedro M. Barbas, Austin Clifford, Konrad Emanowicz
  • Publication number: 20170046521
    Abstract: As disclosed herein a computer system for secure database backup and recovery in a secure database network has N distributed data nodes. The computer system includes program instructions that include instructions to receive a database backup file, fragment the file using a fragment engine, and associate each fragment with one node, where the fragment is not stored on the associated node. The program instructions further include instructions to encrypt each fragment using a first encryption key, and store, randomly, encrypted fragments on the distributed data nodes. The program instructions further include instructions to retrieve the encrypted fragments, decrypt the encrypted fragments using the first encryption key, re-encrypt the decrypted fragments using a different encryption key, and store, randomly, the re-encrypted fragments on the distributed data nodes. A computer program product and method corresponding to the above computer system are also disclosed herein.
    Type: Application
    Filed: October 31, 2016
    Publication date: February 16, 2017
    Inventors: Pedro M. Barbas, Joseph Duffy, Ken Maycock, David M. Tilson
  • Publication number: 20170031984
    Abstract: In one embodiment, a method of processing a structured query language (SQL) statement is provided, comprising: determining whether a first query and a second query are equivalent, the first and second queries being respectively the left side and the right side operands of the OUTER JOIN operation; determining whether a SELECT output of the SQL statement does not refer to database columns from the left side of the OUTER JOIN operation which are not also partitioning columns of the OUTER JOIN operation; and responsive to determining that the first query and the second query are equivalent and that the SELECT output of the SQL statement does not refer to database columns from the left side of the OUTER JOIN operation which are not also partitioning columns of the OUTER JOIN operation, transforming the SQL statement into an optimized query SQL statement by removing the OUTER JOIN operation.
    Type: Application
    Filed: June 9, 2016
    Publication date: February 2, 2017
    Inventors: Pedro M. Barbas, Peter J. Duffy, Lei Pan, David M. Tilson
  • Publication number: 20170031989
    Abstract: In one embodiment, a method of processing a structured query language (SQL) statement is provided, comprising: determining whether a first query and a second query are equivalent, the first and second queries being respectively the left side and the right side operands of the OUTER JOIN operation; determining whether a SELECT output of the SQL statement does not refer to database columns from the left side of the OUTER JOIN operation which are not also partitioning columns of the OUTER JOIN operation; and responsive to determining that the first query and the second query are equivalent and that the SELECT output of the SQL statement does not refer to database columns from the left side of the OUTER JOIN operation which are not also partitioning columns of the OUTER JOIN operation, transforming the SQL statement into an optimized query SQL statement by removing the OUTER JOIN operation.
    Type: Application
    Filed: July 31, 2015
    Publication date: February 2, 2017
    Inventors: Pedro M. Barbas, Peter J. Duffy, Lei Pan, David M. Tilson
  • Publication number: 20160328405
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for prioritizing test cases for relational database systems. The method includes identifying one or more data tables within a relational database. The method further includes identifying an exclusivity value for each of the one or more identified data tables. The method further includes calculating a table weight for each of the one or more identified data tables. The method further includes prioritizing the one or more identified data tables based on the respective calculated table weights. The method further includes identifying one or more sequences of database statements corresponding to the prioritized data tables, wherein a database statement is a command executed on one of the prioritized data tables. The method further includes prioritizing the one or more identified sequences based on the corresponding database statements.
    Type: Application
    Filed: May 8, 2015
    Publication date: November 10, 2016
    Inventor: Pedro M. Barbas