Dynamically managing predicate expression columns in an encrypted database

    公开(公告)号:US11157495B2

    公开(公告)日:2021-10-26

    申请号:US16519489

    申请日:2019-07-23

    Abstract: Methods, systems, and computer program products for dynamically managing predicate expression columns in an encrypted database are provided herein. A computer-implemented method includes dynamically parsing a query into multiple query predicate expressions; determining that one or more of the query predicate expressions require materialization in an encryption scheme compatible with operations in the predicate expressions; comparing (i) an amount of storage capacity to be consumed by materializing the one or more query predicate expressions to (ii) an amount of available storage budget for materialized columns in one or more databases; upon a determination that the amount of storage capacity to be consumed exceeds the amount of available storage budget, removing at least one existing materialized column from the databases; materializing the query predicate expressions by materializing one or more rows required for execution of the query; and executing the query based on the materialized query predicate expressions.

    EXTRACT-TRANSFORM-LOAD SCRIPT GENERATION

    公开(公告)号:US20220138216A1

    公开(公告)日:2022-05-05

    申请号:US17084161

    申请日:2020-10-29

    Abstract: One embodiment provides a computer implemented method, including: receiving, from a user, a natural language query for data contained within at least one data repository; identifying at least one concept from the natural language query, wherein the at least one concept includes an entity and an intent; identifying a plurality of datasets satisfying the natural language query by querying the at least one data repository utilizing the at least one concept; ranking the dataset based on relevance to the query; generating an extract-transform-load script that extracts, transforms, and loads a dataset selected by the user from the plurality of datasets; and retrieving data included in the dataset utilizing the extract-transform-load script, wherein the retrieving includes returning the data to the user.

    GENERATING DATA MIGRATION PLAN FOR IN-PLACE ENCRYPTION OF DATA

    公开(公告)号:US20200311287A1

    公开(公告)日:2020-10-01

    申请号:US16364926

    申请日:2019-03-26

    Abstract: Methods, systems, and computer program products for generating a data migration plan for in-place encryption of data are provided herein. A computer-implemented method includes receiving, from a user, a request to generate a migration plan for performing in-place encryption of data within a database, wherein the migration plan indicates periods of time in which portions of the data are to be encrypted; determining a set of constraints for performing the in-place encryption; generating the migration plan based at least in part on the set of constraints; and performing the in-place encryption of the data in accordance with the migration plan such that only a single copy of each of the portions is maintained during the in-place encryption, wherein the single copy comprises one of a plaintext copy of data corresponding to the portion, and an encrypted copy of data corresponding to the portion.

    DETECTING AND DELAYING EFFECT OF MACHINE LEARNING MODEL ATTACKS

    公开(公告)号:US20190362072A1

    公开(公告)日:2019-11-28

    申请号:US15986542

    申请日:2018-05-22

    Abstract: One embodiment provides a method for delaying malicious attacks on machine learning models that a trained using input captured from a plurality of users, including: deploying a model, said model designed to be used with an application, for responding to requests received from users, wherein the model comprises a machine learning model that has been previously trained using a data set; receiving input from one or more users; determining, using a malicious input detection technique, if the received input comprises malicious input; if the received input comprises malicious input, removing the malicious input from the input to be used to retrain the model; retraining the model using received input that is determined to not be malicious input; and providing, using the retrained model, a response to a received user query, the retrained model delaying the effect of malicious input on provided responses by removing malicious input from retraining input.

    INFORMATION SET PURCHASE RECOMMENDATIONS
    9.
    发明申请

    公开(公告)号:US20190355044A1

    公开(公告)日:2019-11-21

    申请号:US15981333

    申请日:2018-05-16

    Abstract: One embodiment provides a method, including: receiving, at a data service provider, a request from an information purchaser, wherein the request comprises (i) a budget identifying an amount of money to be spent on information and (ii) an objective function identifying a type of information that the information purchaser is requesting; accessing at least a subset of at least one information set of at least one information seller, wherein each of the at least one information sets comprises an information set available for purchase from the information seller; identifying whether at least one accessed information set that fulfills the received request; and providing, if at least one accessed information set fulfills the received request, a recommendation of an information set for purchase by the information purchaser, wherein the provided recommendation comprises at least one of the identified information sets that fulfills the received request.

    HALF-PYRAMID DATA ENCRYPTION
    10.
    发明申请

    公开(公告)号:US20190190695A1

    公开(公告)日:2019-06-20

    申请号:US15847181

    申请日:2017-12-19

    Abstract: One embodiment provides a method, including: receiving, from a data owner, an input string of plaintext data comprising a plurality of characters for storage in a database of a third-party storage provider; arranging the plurality of characters of the input string as a half pyramid, wherein the half pyramid comprises a plurality of rows, each row comprising at least one more character than a preceding row; encrypting, using a secure encryption scheme and based upon a key, each row of the half pyramid independently from each other row of the half pyramid; and storing, in the database of the third-party storage provider, the encrypted rows of the half pyramid. Other aspects are claimed and described.

Patent Agency Ranking