Patents by Inventor Timothy J. Vincent
Timothy J. Vincent has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8983985Abstract: Access to a data element stored within a database object is controlled. A request is received from a user to perform an operation in relation to the database object, the operation including retrieval of information from the data element of the database object. Prior to retrieving information from the data element, a determination is made whether at least a portion of the information from the data element is subject to masking in accordance with an access policy. In response to determining that information from the data element is subject to masking, the request is modified to require that information from the data element be retrieved in a masked condition.Type: GrantFiled: January 28, 2011Date of Patent: March 17, 2015Assignee: International Business Machines CorporationInventors: Stephen Yao Ching Chen, Curt L. Cotner, Gerald G. Kiernan, Irene Ching-Hua Liu, Claire W. McFeely, Walid Rjaibi, Timothy J. Vincent
-
Patent number: 8930410Abstract: According to one embodiment of the present invention, a system processes a database query, and comprises a computer system including at least one processor. The system identifies one or more expressions within the database query utilizing a database object with value masking. Masking requirements are determined for each identified expression and the database object utilized by that identified expression is replicated to provide masked and actual versions of that database object in response to the masking requirements for that expression including masked values and actual values of that database object. The value masking of the database object is applied to the identified expressions within the database query based on the determined masking requirements to produce search results with masked values for the database query. Embodiments of the present invention further include a method and computer program product for processing a database query in substantially the same manner described above.Type: GrantFiled: October 3, 2011Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Eric L. Alton, Thomas A. Beavin, Harley W. Boughton, Yao-Ching S. Chen, Curt L. Cotner, Yuping Ding, Dengfeng Gao, Gerald G. Kiernan, Xun Li, Irene C. Liu, Walid Rjaibi, Gregory R. Stager, Joyce A. Taylor, Timothy J. Vincent, Liyan Zhou
-
Patent number: 8515948Abstract: Provided are techniques for creating one or more fine-grained access control rules that are associated with a base table. A materialized query table is created from the base table without applying the one or more fine-grained access control rules associated with the base table when obtaining data from the base table. A fine-grained access control protection indicator is turned on for the materialized query table. In response to receiving a direct access request to the materialized query table in a query referencing the materialized query table, access is provided to the data in the materialized query table by applying one or more fine-grained access control rules associated directly with the materialized query table to the data in the materialized query table before returning the data.Type: GrantFiled: March 9, 2011Date of Patent: August 20, 2013Assignee: International Business Machines CorporationInventors: Yao-Ching S. Chen, Curt L. Cotner, Gerald G. Kiernan, David J. Kuang, Irene C. Liu, Regina J. Liu, Walid Rjaibi, Timothy J. Vincent
-
Publication number: 20130086088Abstract: According to one embodiment of the present invention, a system processes a database query, and comprises a computer system including at least one processor. The system identifies one or more expressions within the database query utilizing a database object with value masking. Masking requirements are determined for each identified expression and the database object utilized by that identified expression is replicated to provide masked and actual versions of that database object in response to the masking requirements for that expression including masked values and actual values of that database object. The value masking of the database object is applied to the identified expressions within the database query based on the determined masking requirements to produce search results with masked values for the database query. Embodiments of the present invention further include a method and computer program product for processing a database query in substantially the same manner described above.Type: ApplicationFiled: October 3, 2011Publication date: April 4, 2013Applicant: International Business Machines CorporationInventors: Eric L. Alton, Thomas A. Beavin, Harley W. Boughton, Yao-Ching S. Chen, Curt L. Cotner, Yuping Ding, Dengfeng Gao, Gerald G. Kiernan, Xun Li, Irene C. Liu, Walid Rjaibi, Gregory R. Stager, Joyce A. Taylor, Timothy J. Vincent, Liyan Zhou
-
Publication number: 20120233148Abstract: Provided are techniques for creating one or more fine-grained access control rules that are associated with a base table. A materialized query table is created from the base table without applying the one or more fine-grained access control rules associated with the base table when obtaining data from the base table. A fine-grained access control protection indicator is turned on for the materialized query table. In response to receiving a direct access request to the materialized query table in a query referencing the materialized query table, access is provided to the data in the materialized query table by applying one or more fine-grained access control rules associated directly with the materialized query table to the data in the materialized query table before returning the data.Type: ApplicationFiled: March 9, 2011Publication date: September 13, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yao-Ching S. CHEN, Curt L. COTNER, Gerald G. KIERNAN, David J. KUANG, Irene C. LIU, Regina J. LIU, Walid RJAIBI, Timothy J. VINCENT
-
Publication number: 20120197919Abstract: Access to a data element stored within a database object is controlled. A request is received from a user to perform an operation in relation to the database object, the operation including retrieval of information from the data element of the database object. Prior to retrieving information from the data element, a determination is made whether at least a portion of the information from the data element is subject to masking in accordance with an access policy. In response to determining that information from the data element is subject to masking, the request is modified to require that information from the data element be retrieved in a masked condition.Type: ApplicationFiled: January 28, 2011Publication date: August 2, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Stephen Yao Ching Chen, Curt L. Cotner, Gerald G. Kiernan, Irene Ching-Hua Liu, Claire W. McFeely, Walid Rjaibi, Timothy J. Vincent
-
Publication number: 20080201288Abstract: A method, system and program product for identifying caching opportunities is provided. The method includes identifying one or more data sources stored on a database system that are utilized by an application, establishing a pre-set read-update ratio threshold for data accessed from a data source, and tracking the read-update ratio threshold for data accessed from the data source, such that exceeding the pre-set read-update ratio threshold for the data accessed identifies a caching opportunity. The method further includes defining an action to be taken when the pre-set read-update ratio threshold for the data accessed from the data source has been exceeded and taking the action defined when the pre-set read-update ratio threshold for the data accessed from the data source has been exceeded. The action defined includes either advising a user of an opportunity to cache the data accessed or automatically caching the data accessed from the data source.Type: ApplicationFiled: February 15, 2007Publication date: August 21, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Gennaro A. Cuomo, Thomas R. Gissel, Stephen Rees, Timothy J. Vincent
-
Patent number: 7289978Abstract: A method, computer program product and computing device for promoting reuse of previously generated access plans are disclosed. SQL statements containing literals are amended so as to substitute a parameter marker for each literal. Amended statements are provided to the DBMS along with parameters including the substituted literals and a substitution indicator indicating that the substitution has been performed. The DBMS assesses the soundness of the substitutions that are performed. Soundness may be measured in terms of the semantic correctness of the amended statement and the likelihood that the literal substitution will improve DBMS efficiency. If a substitution is unsound, the DBMS may obtain and optimize the original version of the amended SQL statement. Otherwise, the amended statement is optimized. Advantageously, SQL statements originally differing only in the value of one or more literals may become functionally equivalent, and the reuse of cached, previously generated access plans is thus promoted.Type: GrantFiled: March 13, 2003Date of Patent: October 30, 2007Assignee: International Business Machines CoporationInventors: Joseph Serge Limoges, Robert A. Begg, Dominique J. Evans, William T. O'Connell, Klaus Bernhard Schiefer, Timothy J. Vincent
-
Patent number: 7076489Abstract: A system provides efficient multi-protocol database transaction processing in a multi-communications protocol and multi-programming model computing environment. The system separates the source and the target functionalities, and uses generic function names linked to function pointers, in order to permit the source layer to call embedded functions in the target layer. As an example, the system provides a source layer code path that includes embedded call-back functions and embedded generic function names. A target layer code path is set to include embedded functions and generic call-back function names. A function pointer array permits the source layer code path to call functions embedded in the target layer code path using the generic function names. A call-back function pointer array permits the target layer code path to call the call-back functions embedded in the source layer code path using the generic call-back function names.Type: GrantFiled: March 14, 2003Date of Patent: July 11, 2006Assignee: International Business Machines CorporationInventors: Robert A. Begg, Jo-Anne M. Kirton, Timothy J. Vincent
-
Patent number: 7039651Abstract: A database server helps to streamline the retrieval of LOB values by deciding to send a locator in replacement of the LOB value, or the LOB value itself, depending upon the specific LOB value being retrieved. A threshold value is determined in a fetch query, and the LOB sizes below that threshold are sent as values in a corresponding fetch response, and the lengths above are sent as locators in the fetch response. Indicators are inserted in a fetch parameter of the response to inform the receiving client the form of retrieval that was used for each requested LOB value being returned.Type: GrantFiled: April 29, 2003Date of Patent: May 2, 2006Assignee: International Business Machines CorporationInventors: Curt L. Cotner, Robert A. Begg, Brent P. Gross, Paul A. Ostler, Timothy J. Vincent
-
Patent number: 7016911Abstract: Library management for libraries of user-defined routines in a database system. Libraries are stored in a long-term storage device and loaded into working memory in the database system when routines in the libraries are to be executed. An unload thread is defined to carry out the process of unloading libraries from the working memory when such libraries are inactive. The unload thread becomes active on a defined timing interval. The unload thread accesses a hash table and a most recently used list to determine which of the loaded libraries is inactive and which of the libraries ought to be unloaded. The hash table maintains information as to which libraries have been accessed in the most recent past defined timing interval. The size of the most recently used list can be defined such that all libraries associated with the list are retained in working memory.Type: GrantFiled: December 10, 2002Date of Patent: March 21, 2006Assignee: International Business Machines CorporationInventors: Melissa N. Bousfield, Douglas J. Doole, Sean W. McKeough, Timothy J. Vincent, George M. Wilson
-
Patent number: 7010517Abstract: Working memory in an SQL database system is organized in workspaces. Agent workspaces are defined into which working copies of SQL executable logic information are loaded. Application workspaces are also defined for the loading of working copies of SQL executable logic information. Reference copies of the SQL information are available in a global SQL cache. An application SQL context data structure is used as an entry point to access working copies of SQL information in the agent or application workspaces. An application workspace is associated with an application and is maintained until the last application in the set is not active. An agent workspace is associated with an agent in the database system and is maintained until the agent is no longer active.Type: GrantFiled: December 10, 2002Date of Patent: March 7, 2006Assignee: International Business Machines CorporationInventors: Paul M. Bird, Timothy J. Vincent
-
Patent number: 7007016Abstract: An SQL database management system for executing SQL requests from applications. The SQL database management system includes a hierarchical arrangement of data structures comprising packages, section entries, sibling control blocks and sections, for representing SQL context information and SQL statement information. Each package represents SQL context information on an application component-level basis. Each section entry is associated with a package and corresponds to a set of SQL actions. Each section entry is potentially associated with one or more sibling control blocks. Each sibling control block is associated with one section and represents context information relating to a unique SQL request. Each section includes logic for a specific SQL statement.Type: GrantFiled: December 11, 2002Date of Patent: February 28, 2006Assignee: International Business Machines CorporationInventors: Paul M. Bird, Timothy J. Vincent
-
Patent number: 6985911Abstract: A database management system provides for the execution of invokable user-defined routines. Applications specify user-defined routines as being threadsafe or not threadsafe and specify the language of user-defined routines. Execution of routines will be carried out dependent on the threadsafe characteristic of the routines and on the language of the routines. Routines are assigned to processes based on their language to have any given process execute routines of the same language. Routines that are specified to be threadsafe are executed in threads in a potentially multi-threaded process. Each routine that is specified to be not threadsafe is executed in a fenced-mode processes in which no other routine is being executed.Type: GrantFiled: August 1, 2002Date of Patent: January 10, 2006Assignee: International Business Machines CorporationInventors: Douglas J. Doole, Sean W. McKeough, Timothy J. Vincent, George M. Wilson
-
Patent number: 6959305Abstract: A cursor query identifier is defined to uniquely identify cursors in a relational database system that supports nested routine invocation. The identifier includes a cursor nesting level value that corresponds to the nested level at which the cursor is opened. The identifier also includes a invocation identifier that corresponds to the routine within which a cursor is opened. The third part of the identifier is a unique cursor counter. The definition of the cursor query identifier permits cursors to be opened within nested levels of the same relational database context and to be uniquely identified for reference by database system and by applications accessing the system.Type: GrantFiled: December 10, 2002Date of Patent: October 25, 2005Assignee: International Business Machines CorporationInventors: Paul M. Bird, Timothy J. Vincent, Curt L. Cotner
-
Patent number: 6850942Abstract: A method for providing database connections in a network includes: (a) mapping a first plurality of logical connections for a transaction at the application server to a physical connection between the application server and the database server; (b) sending a request of the transaction to the database server utilizing one of the first plurality of logical connections, where the request is sent utilizing the physical connection; and (c) processing the request by a logical agent on the database server, where the logical agent is associated with the transaction, where the request is maintained in one of a second plurality of logical connections within the logical agent. In this manner, connections are logically separated from one another with minimal storage implications. Conflicts and unpredictable behavior can also be avoided.Type: GrantFiled: April 26, 2002Date of Patent: February 1, 2005Assignee: International Business Machines CorporationInventors: Curt L. Cotner, Paul M. Bird, Timothy J. Vincent
-
Patent number: 6807540Abstract: A system and method for managing deadlocks in a database management system (DBMS) for a demultiplexed database system. The DBMS supports applications that are capable of holding and retaining locks on database resources while disassociated from worker agents. The system and method includes an application scheduler for managing requests for access to the database, and a deadlock detector for identifying a deadlock. The application scheduler assigns one worker agent to an application requesting access to a database resource, assigns a flag to an application holding a lock on the database resource while disassociated from a worker agent, and in cooperation with the deadlock detector, resolves the deadlock between the application requesting access and the flagged application holding the lock.Type: GrantFiled: May 31, 2001Date of Patent: October 19, 2004Assignee: International Business Machines CorporationInventors: Matthew A. Huras, Sean W. McKeough, Timothy J. Vincent, Xun Xue, Roger L. Zheng
-
Publication number: 20040167879Abstract: A database server helps to streamline the retrieval of LOB values by deciding to send a locator in replacement of the LOB value, or the LOB value itself, depending upon the specific LOB value being retrieved. A threshold value is determined in a fetch query, and the LOB sizes below that threshold are sent as values in a corresponding fetch response, and the lengths above are sent as locators in the fetch response. Indicators are inserted in a fetch parameter of the response to inform the receiving client the form of retrieval that was used for each requested LOB value being returned.Type: ApplicationFiled: April 29, 2003Publication date: August 26, 2004Applicant: International Business Machines CorporationInventors: Curt L. Cotner, Robert A. Begg, Brent P. Gross, Paul A. Ostler, Timothy J. Vincent
-
Publication number: 20040078377Abstract: A system provides efficient multi-protocol database transaction processing in a multi-communications protocol and multi-programming model computing environment. The system separates the source and the target functionalities, and uses generic function names linked to function pointers, in order to permit the source layer to call embedded functions in the target layer. As an example, the system provides a source layer code path that includes embedded call-back functions and embedded generic function names. A target layer code path is set to include embedded functions and generic call-back function names. A function pointer array permits the source layer code path to call functions embedded in the target layer code path using the generic function names. A call-back function pointer array permits the target layer code path to call the call-back functions embedded in the source layer code path using the generic call-back function names.Type: ApplicationFiled: March 14, 2003Publication date: April 22, 2004Applicant: International Business Machines CorporationInventors: Robert A. Begg, Jo-Anne M. Kirton, Timothy J. Vincent
-
Publication number: 20030204505Abstract: A method for providing database connections in a network includes: (a) mapping a first plurality of logical connections for a transaction at the application server to a physical connection between the application server and the database server; (b) sending a request of the transaction to the database server utilizing one of the first plurality of logical connections, where the request is sent utilizing the physical connection; and (c) processing the request by a logical agent on the database server, where the logical agent is associated with the transaction, where the request is maintained in one of a second plurality of logical connections within the logical agent. In this manner, connections are logically separated from one another with minimal storage implications. Conflicts and unpredictable behavior can also be avoided.Type: ApplicationFiled: April 26, 2002Publication date: October 30, 2003Inventors: Curt L. Cotner, Paul M. Bird, Timothy J. Vincent