-
公开(公告)号:US11593498B2
公开(公告)日:2023-02-28
申请号:US16896289
申请日:2020-06-09
IPC分类号: G06F21/62 , G06F16/178
摘要: Aspects include receiving a notification that a value of a data element stored in a source storage location in a source format has been changed to an updated value. The change is replicated to a plurality of target storage locations. The replicating includes, for each of the plurality of target storage locations, determining a target format of the data element in the target storage location. The target format is one of a plurality of different formats, including the source format. Each of the different formats provide a different level of data protection for the data element. In response to determining that the target format is not the same as the source format, the updated value of the data element is converted into the target format, and the updated value of the data element is stored in the target format at the target storage location.
-
公开(公告)号:US11526534B2
公开(公告)日:2022-12-13
申请号:US16868896
申请日:2020-05-07
摘要: A computer-implemented method for replicating data changes through distributed invalidation includes receiving, by a distributed database system, an instruction to change a data element in a table. The distributed database system includes at least a first server and a second server. A first copy of the table is stored on the first server, and a second copy of the table is stored on the second server. The method further includes in response to the instruction, determining that the data element is secured by a replication key that is stored on a shared key management system that is accessible by the first server and by the second server, wherein the replication key is unique to the data element. The method further includes invalidating the replication key and modifying the first copy of the table on the first server according to the instruction that is received.
-
公开(公告)号:US20210037030A1
公开(公告)日:2021-02-04
申请号:US16524433
申请日:2019-07-29
IPC分类号: H04L29/06 , G06F16/245 , G06F9/54
摘要: An example computer-implemented method includes receiving, by a processing device, the data records. The data records can be of a plurality of data record types. The method further includes analyzing, by the processing device, the data records by comparing the data records of different record types. The method further includes identifying, by the processing device and based at least in part on the analysis, a unit of work that is flooding the data records as the anomaly.
-
公开(公告)号:US20200233978A1
公开(公告)日:2020-07-23
申请号:US16251243
申请日:2019-01-18
发明人: Anthony Thomas Sofia
IPC分类号: G06F21/64 , G06F21/62 , H04L9/32 , G06F16/2457 , G06F16/23
摘要: Aspects include accessing, by a processing system, one or more data records and a metadata record. The metadata record includes a first digital signature associated with the one or more data records. One or more additional digital signatures associated with the one or more data records are generated, where the first digital signature and the one or more additional digital signatures are generated based on applying at least one different digital signature generation aspect with respect to the one or more data records. The one or more additional digital signatures are stored in the metadata record.
-
公开(公告)号:US11562080B2
公开(公告)日:2023-01-24
申请号:US16869727
申请日:2020-05-08
摘要: Aspects include receiving an outbound payload for output to a requestor as part of a response to a call by the requestor to an application programming interface (API). Clear data in the outbound payload is selected for encryption based on policy information. The clear data is encrypted to generate encrypted data, and the encrypted data is inserted into the outbound payload in place of the clear data to generate an updated outbound payload. The response, including the updated outbound payload, is sent to the requestor.
-
公开(公告)号:US11501014B2
公开(公告)日:2022-11-15
申请号:US16868902
申请日:2020-05-07
发明人: Anthony Thomas Sofia , Jason G. Katonica , Trent Matthew Balta , Michael Terrence Cohoon , Torin Reilly
摘要: A described method includes receiving, by a database system, an instruction to change a first data element in a table in a database, which includes a first copy and a second copy of the table. A first entry is created in a first change-table. The first entry includes an updated value for a first data element. A second entry is created in a second change-table. Creating the second entry includes, changing the updated value into a ciphertext if the first data element is secured, and storing the ciphertext into the second entry. If the first data element is non-secured, the updated value is stored into the second entry as is. The second copy of the table is modified using the second change-table. The second copy of the table is used to respond to subsequent queries.
-
公开(公告)号:US11295031B2
公开(公告)日:2022-04-05
申请号:US16595563
申请日:2019-10-08
摘要: Embodiments are described for generating, by the processor, a first event record in response to an event being performed by the computer and generating, by the processor, a first tamper resistance record in response to the first event record being generated. The first tamper resistance record includes a first signature is created based at least in part on the first event record and a second signature is created based at least in part on the first event record. Aspects also includes validating the first event record based on the first signature and the second signature in the first tamper resistance record in response to a request to detect tampering of the first event record.
-
公开(公告)号:US20220058291A1
公开(公告)日:2022-02-24
申请号:US16995922
申请日:2020-08-18
IPC分类号: G06F21/64 , G06F16/25 , G06F21/62 , G06F16/27 , G06F16/2453
摘要: Aspects include receiving a query at a data engine. The data engine includes data in a protected format stored in a secured database and a copy of the data in a clear format stored in a secured database replica. The query is received from a requestor. The query is processed at the secured database replica to generate a query response in the clear format. The query response is converted into the protected format. The converted query response in the protected format is provided to the requestor.
-
9.
公开(公告)号:US20200272528A1
公开(公告)日:2020-08-27
申请号:US16286987
申请日:2019-02-27
发明人: Matthias Klein , Simon Weishaupt , Anthony Thomas Sofia , Jonathan D. Bradbury , Mark S. Farrell , Mahmoud Amin , Timothy Slegel
摘要: A method is provided that includes receiving, by a firmware from an originating software, an asynchronous request for an instruction of an algorithm for compression of data. The firmware operates on a first processor and the originating software operates on a second processor. The firmware issues a synchronous request to the first processor to cause the processor to execute the instruction synchronously. It is determined, by the firmware, whether an interrupt is received from the first processor with respect to the first processor executing the instruction. The firmware retries the issuance of the synchronous request each time the interrupt is received until a retry threshold is reached.
-
公开(公告)号:US10666289B1
公开(公告)日:2020-05-26
申请号:US16249029
申请日:2019-01-16
IPC分类号: H03M7/40
摘要: Embodiments of the present invention are directed to a computer-implemented method for data compression. The method includes monitoring data, from a data stream, stored in an input buffer and system memory of a data compression system. The method further includes choosing an encoding scheme based in part upon the amount of data in the input buffer. The method further includes encoding data using the encoding scheme to compress the data from the data stream. The method further includes reevaluating, during the data stream, an encoding scheme choice based in part upon the amount of data in the input buffer.
-
-
-
-
-
-
-
-
-