Patents by Inventor Sheng Yan Sun
Sheng Yan Sun has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220019587Abstract: A computer-implemented method for access path optimization is provided according to embodiments of the present disclosure. In the method, a plurality of real values of an access path factor may be collected during a specified time period. One of the real values may be generated when a query is executed on a first access path. Then, at least one second access path may be generated for the query based on the plurality of real values of the access path factor. Moreover, an optimal access path for the query may be identified from the first access path and the at least one second access path.Type: ApplicationFiled: July 17, 2020Publication date: January 20, 2022Inventors: Xiao Xiao Chen, Xiaobo Wang, Shuo Li, Sheng Yan Sun
-
Publication number: 20220019574Abstract: Systems and methods for pre-allocating and utilizing storage space in a relational database are provided. In embodiments a method includes: obtaining transaction data including data regarding record insertions in a relational database, wherein each record of the record insertions is associated with a key value; identifying a type of each of the record insertions as either a random insertion type or a key range insertion type based on the database transaction data, wherein the random insertion type comprises records associated with respective key values inserted in a random order, and the key range insert type comprises records associated with a range of key values inserted within a certain time period; predicting a new range of key values associated with future record insertions based on the type of each of the record insertions; and pre-allocating page space in one or more pages of the relational database for the future record insertions.Type: ApplicationFiled: July 17, 2020Publication date: January 20, 2022Inventors: Frances Hwa VILLAFUERTE, Hong Mei ZHANG, Xiaobo WANG, Shuo LI, Sheng Yan SUN
-
Patent number: 11228595Abstract: Techniques are provided for evaluating the security of data access statements. Specifically, in one embodiment of the claimed subject matter there is provided a technique for evaluating the security of data access statements, comprising: evaluating the criticality of multiple SQL statements contained in multiple sessions accessing a database; generating a critical item set from the multiple sessions, each element in the critical item set indicating one or more SQL statements contained in a session; extracting at least one association rule from the critical item set, each of the at least association rule indicating a sequence of SQL statements contained in a session; and calculating the criticality of each of the at least one association rule.Type: GrantFiled: February 11, 2020Date of Patent: January 18, 2022Assignee: International Business Machines CorporationInventors: Hao Feng, Sheng Yan Sun
-
Publication number: 20220004531Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for generating one or more in-memory data structures for data access. According to the method, target data associated with a database is identified. Further, the method determines at least one data structure for the target data based on at least one access pattern of the target data in a plurality of historical queries against the database, wherein the target data is accessed in execution of the plurality of historical queries. The method further implements the at least one data structure in a memory to store the target data. The at least one data structure is used for further access to the target data in execution of a further query against the database.Type: ApplicationFiled: July 2, 2020Publication date: January 6, 2022Inventors: Xiaobo Wang, Shuo Li, Sheng Yan Sun, Peng Hui Jiang
-
Patent number: 11108823Abstract: A method, an apparatus, a system, and a computer program product for handling security threats in a network data processing system. A computer system determines a connection type for a connection in response to detecting the connection between a target resource in the network data processing system and a requestor. The computer system redirects the connection to a virtual resource in place of the target resource when the connection type is a threat connection, wherein the requestor originating the connection to the target resource is unable to perceive a redirection of the connection to the virtual resource. The computer system records information in the connection redirected to the virtual resource to form recorded information. The computer system adjusts a security policy for handling connections in the network data processing system using the recorded information, wherein the security threats in the network data processing system are decreased using the security policy.Type: GrantFiled: July 31, 2018Date of Patent: August 31, 2021Assignee: International Business Machines CorporationInventors: Sheng Yan Sun, Shuo Li, Xiaobo Wang, Hong Mei Zhang, Yu Wang
-
Patent number: 10693877Abstract: Techniques are provided for evaluating the security of data access statements. Specifically, in one embodiment of the claimed subject matter there is provided a technique for evaluating the security of data access statements, comprising: evaluating the criticality of multiple SQL statements contained in multiple sessions accessing a database; generating a critical item set from the multiple sessions, each element in the critical item set indicating one or more SQL statements contained in a session; extracting at least one association rule from the critical item set, each of the at least association rule indicating a sequence of SQL statements contained in a session; and calculating the criticality of each of the at least one association rule.Type: GrantFiled: July 23, 2014Date of Patent: June 23, 2020Assignee: International Business Machines CorporationInventors: Hao Feng, Sheng Yan Sun
-
Publication number: 20200186529Abstract: Techniques are provided for evaluating the security of data access statements. Specifically, in one embodiment of the claimed subject matter there is provided a technique for evaluating the security of data access statements, comprising: evaluating the criticality of multiple SQL statements contained in multiple sessions accessing a database; generating a critical item set from the multiple sessions, each element in the critical item set indicating one or more SQL statements contained in a session; extracting at least one association rule from the critical item set, each of the at least association rule indicating a sequence of SQL statements contained in a session; and calculating the criticality of each of the at least one association rule.Type: ApplicationFiled: February 11, 2020Publication date: June 11, 2020Inventors: Hao Feng, Sheng Yan Sun
-
Publication number: 20200045078Abstract: A method, an apparatus, a system, and a computer program product for handling security threats in a network data processing system. A computer system determines a connection type for a connection in response to detecting the connection between a target resource in the network data processing system and a requestor. The computer system redirects the connection to a virtual resource in place of the target resource when the connection type is a threat connection, wherein the requestor originating the connection to the target resource is unable to perceive a redirection of the connection to the virtual resource. The computer system records information in the connection redirected to the virtual resource to form recorded information. The computer system adjusts a security policy for handling connections in the network data processing system using the recorded information, wherein the security threats in the network data processing system are decreased using the security policy.Type: ApplicationFiled: July 31, 2018Publication date: February 6, 2020Inventors: Sheng Yan Sun, Shuo Li, Xiaobo Wang, Hong Mei Zhang, Yu Wang
-
Patent number: 10362052Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.Type: GrantFiled: November 16, 2017Date of Patent: July 23, 2019Assignee: International Business Machines CorporationInventors: Shuo Li, Xin Peng Liu, Sheng Yan Sun, Hua Wang, Jun Wang
-
Patent number: 10171487Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.Type: GrantFiled: February 15, 2017Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Shuo Li, Xin Peng Liu, Sheng Yan Sun, Hua Wang, Jun Wang
-
Publication number: 20180234449Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.Type: ApplicationFiled: February 15, 2017Publication date: August 16, 2018Inventors: Shuo Li, Xin Peng Liu, Sheng Yan Sun, Hua Wang, Jun Wang
-
Publication number: 20180234450Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.Type: ApplicationFiled: November 16, 2017Publication date: August 16, 2018Inventors: Shuo Li, Xin Peng Liu, Sheng Yan Sun, Hua Wang, Jun Wang
-
Patent number: 9760797Abstract: The present invention discloses a method for protecting specific information, comprising: receiving an image containing specific information; identifying boundaries of the image; matching the image with a predetermined image template based on the boundaries so as to determine a specific information region of the image; and performing predetermined processing on the specific information region of the image to be presented in response to determining the specific information region of the image, so as to protect the specific information. The method of the invention for protecting specific information can efficiently protect relevant specific information without identifying detailed semantic content in an image.Type: GrantFiled: August 21, 2015Date of Patent: September 12, 2017Assignee: International Business Machines CorporationInventors: Hao Feng, Sheng Yan Sun, Jun Wang
-
Patent number: 9703854Abstract: The present invention discloses a mechanism for determining criticality of a SQL statement. A plurality of elements in the SQL statement is extracted. A score of the SQL statement is calculated based on a correlation relation among respective elements in the plurality of elements and base scores of the respective elements. The criticality of the SQL statement is determined based on the score of the SQL statement. In this way, a database administrator only needs to define a small number of rules according his own needs. In the meantime, the mechanism automatically analyzes a received simple or complex SQL statement according to the small number of rules defined by the user to determine its criticality, without missing any critical SQL statement, and thereby protect security of data in the database.Type: GrantFiled: August 6, 2014Date of Patent: July 11, 2017Assignee: International Business Machines CorporationInventors: Hao H H. Feng, Shuo B J. Li, Sheng Yan Sun, Xin Ying Yang
-
Patent number: 9680830Abstract: Techniques are provided for evaluating the security of data access statements. Specifically, in one embodiment of the claimed subject matter there is provided a technique for evaluating the security of data access statements, comprising: evaluating the criticality of multiple SQL statements contained in multiple sessions accessing a database; generating a critical item set from the multiple sessions, each element in the critical item set indicating one or more SQL statements contained in a session; extracting at least one association rule from the critical item set, each of the at least association rule indicating a sequence of SQL statements contained in a session; and calculating the criticality of each of the at least one association rule.Type: GrantFiled: March 24, 2014Date of Patent: June 13, 2017Assignee: International Business Machines CorporationInventors: Hao Feng, Sheng Yan Sun
-
Publication number: 20160055393Abstract: The present invention discloses a method for protecting specific information, comprising: receiving an image containing specific information; identifying boundaries of the image; matching the image with a predetermined image template based on the boundaries so as to determine a specific information region of the image; and performing predetermined processing on the specific information region of the image to be presented in response to determining the specific information region of the image, so as to protect the specific information. The method of the invention for protecting specific information can efficiently protect relevant specific information without identifying detailed semantic content in an image.Type: ApplicationFiled: August 21, 2015Publication date: February 25, 2016Inventors: Hao Feng, Sheng Yan Sun, Jun Wang
-
Publication number: 20150088913Abstract: The present invention discloses a mechanism for determining criticality of a SQL statement. A plurality of elements in the SQL statement is extracted. A score of the SQL statement is calculated based on a correlation relation among respective elements in the plurality of elements and base scores of the respective elements. The criticality of the SQL statement is determined based on the score of the SQL statement. In this way, a database administrator only needs to define a small number of rules according his own needs. In the meantime, the mechanism automatically analyzes a received simple or complex SQL statement according to the small number of rules defined by the user to determine its criticality, without missing any critical SQL statement, and thereby protect security of data in the database.Type: ApplicationFiled: August 6, 2014Publication date: March 26, 2015Inventors: Hao HH. Feng, Shuo BJ. Li, Sheng Yan Sun, Xin Ying Yang
-
Publication number: 20140337916Abstract: Techniques are provided for evaluating the security of data access statements. Specifically, in one embodiment of the claimed subject matter there is provided a technique for evaluating the security of data access statements, comprising: evaluating the criticality of multiple SQL statements contained in multiple sessions accessing a database; generating a critical item set from the multiple sessions, each element in the critical item set indicating one or more SQL statements contained in a session; extracting at least one association rule from the critical item set, each of the at least association rule indicating a sequence of SQL statements contained in a session; and calculating the criticality of each of the at least one association rule.Type: ApplicationFiled: July 23, 2014Publication date: November 13, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hao Feng, Sheng Yan Sun
-
Publication number: 20140298471Abstract: Techniques are provided for evaluating the security of data access statements. Specifically, in one embodiment of the claimed subject matter there is provided a technique for evaluating the security of data access statements, comprising: evaluating the criticality of multiple SQL statements contained in multiple sessions accessing a database; generating a critical item set from the multiple sessions, each element in the critical item set indicating one or more SQL statements contained in a session; extracting at least one association rule from the critical item set, each of the at least association rule indicating a sequence of SQL statements contained in a session; and calculating the criticality of each of the at least one association rule.Type: ApplicationFiled: March 24, 2014Publication date: October 2, 2014Applicant: International Business Machines CorporationInventors: Hao Feng, Sheng Yan Sun