UPDATING A SECONDARY INDEX FROM AN AUDIT TRAIL

    公开(公告)号:US20230315708A1

    公开(公告)日:2023-10-05

    申请号:US17709752

    申请日:2022-03-31

    CPC classification number: G06F16/2272 G06F16/2246

    Abstract: A processor-based method of updating a secondary index for a B-tree in a database in a DBMS to include subsequent changes that occurred during creation of the secondary index includes opening an audit trail and moving back in the audit trail to a captured system time; making the secondary index visible to the DBMS for INSERT, UPDATE and DELETE processing; reading a next committed set of database updates from the audit trail; creating a secondary index modification for each row on each audit trail update and applying it to the secondary index; clearing the captured system time from control information for the B-tree to indicate completion; and making the secondary index visible to the DBMS for all processing.

    VISUAL INSTRUCTION DURING RUNNING OF A VISUAL INSTRUCTION SEQUENCE

    公开(公告)号:US20230034682A1

    公开(公告)日:2023-02-02

    申请号:US17391266

    申请日:2021-08-02

    Abstract: A method of improving a visual instruction during running of a visual instruction sequence includes playing a visual instruction sequence to a user from a point-of-view of the user; monitoring the user for user data related to the visual instruction sequence; using the user data to improve the visual instruction sequence; generating an improved visual instruction sequence; and playing the improved visual instruction sequence to the user from a point-of-view of the user. A system for improving a visual instruction during running of a visual instruction sequence includes a computer device for playing a visual instruction sequence to a user from a point-of-view of the user, monitoring the user for user data related to the visual instruction sequence, using the user data to improve the visual instruction sequence, generating an improved visual instruction sequence; and playing the improved visual instruction sequence to the user from a point-of-view of the user.

    Secured file system management
    8.
    发明授权
    Secured file system management 有权
    安全文件系统管理

    公开(公告)号:US09576144B2

    公开(公告)日:2017-02-21

    申请号:US14486255

    申请日:2014-09-15

    Abstract: Systems and methods for accessing data secured and encrypted using a file system manager are disclosed. One method includes determining whether a community of interest (COI) key obtained from a security appliance matches a COI key associated with a file structure managed by the file system manager that is the subject of a file system request issued by a caller. The method further includes identifying an entry included in a key bank associated with the COI key and the file structure that is the subject of the file system request, the key bank storing encrypted versions of a metadata key. The method also includes decrypting the metadata key using the COI key, decrypting at least one block encryption key using the metadata key, and decrypting a block of data associated with the at least one block encryption key.

    Abstract translation: 公开了使用文件系统管理器访问受保护和加密的数据的系统和方法。 一种方法包括确定从安全设备获得的兴趣社区(COI)密钥是否与由作为由呼叫者发出的文件系统请求的对象的文件系统管理器管理的文件结构相关联的COI密钥相匹配。 该方法还包括识别与COI密钥相关联的密钥库中包括的条目和作为文件系统请求的对象的文件结构,密钥库存储元数据密钥的加密版本。 该方法还包括使用COI密钥对元数据密钥进行解密,使用元数据密钥解密至少一个块加密密钥,以及解密与该至少一个块加密密钥相关联的数据块。

    Memory bypass in accessing large data objects in a relational database management system
    9.
    发明授权
    Memory bypass in accessing large data objects in a relational database management system 有权
    在关系数据库管理系统中访问大型数据对象时的内存绕过

    公开(公告)号:US07509359B1

    公开(公告)日:2009-03-24

    申请号:US11012701

    申请日:2004-12-15

    CPC classification number: G06F17/30595 Y10S707/99953 Y10S707/99956

    Abstract: Bypassing loading of memory in accessing large data objects in a relational database. A relational database may include a plurality of first type data items and associated second type data items. In response to an update-type access request, requester memory is bypassed in writing to the relational database a second type data item referenced by a file location specified in the update-type request. In response to retrieve-type request, requester memory is bypassed in reading from the relational database a second type data item referenced in the retrieve-type request and writing the second type data item at a file location specified in the retrieve-type request.

    Abstract translation: 在访问关系数据库中的大型数据对象时绕过内存的加载。 关系数据库可以包括多个第一类型数据项和相关联的第二类型数据项。 响应于更新类型的访问请求,请求者存储器以书面形式绕过关系数据库,由更新类型请求中指定的文件位置所引用的第二类型数据项。 响应于检索类型请求,请求者存储器在从关系数据库中读取在检索类型请求中引用的第二类型数据项并将第二类型数据项写入在检索类型请求中指定的文件位置时被绕过。

    SYSTEM AND METHOD FOR VERIFYING A SECURED FILE, DIRECTORY OR META-DATA

    公开(公告)号:US20230353384A1

    公开(公告)日:2023-11-02

    申请号:US17734942

    申请日:2022-05-02

    CPC classification number: H04L9/3247 H04L9/3242 H04L9/3268

    Abstract: A processor-based method for verifying a secured file, directory, or meta-data, comprising: extracting a persistent, independent signature for a secured file, directory, or meta-data from a directory signature file, the signature identifying a certificate identifier, a hash algorithm identifier, and an encrypted hash value for that secured file, directory, or meta-data; retrieving a public key corresponding to the certificate identifier; decrypting the encrypted hash using the public key and a decryption tool, resulting in a clear text hash value; creating a new hash value for the secured file, directory, or meta-data, the hash creation corresponding to the hash algorithm identifier; and verifying the signature when the new hash value for the secured file, directory, or meta-data matches the unencrypted hash value from the persistent, independent signature for the secured file, directory, or meta-data,

Patent Agency Ranking