Resumable and Online Schema Transformations
    1.
    发明申请

    公开(公告)号:US20180121494A1

    公开(公告)日:2018-05-03

    申请号:US15588323

    申请日:2017-05-05

    Abstract: A database command is received from a user for modifying an existing data structure or creating a new data structure. The database command is used to construct a query that is provided to a query optimizer component where the query is transformed into a first query execution plan including operations that persist operation state. Some data specified in the query is received, and some of the new data structure is constructed by executing some of the first query plan. While receiving some of data specified in the query and constructing some of the new data structure, operation state of execution is persisted. When an interruption of execution of the first query plan occurs, an updated query plan is generated using persisted operation state. External updates occur, before or after the interruption, but before executing the updated query plan. The external updates are transactionally validated.

    DATA DIODE FOR ENHANCING DATA SECURITY

    公开(公告)号:US20240406002A1

    公开(公告)日:2024-12-05

    申请号:US18326493

    申请日:2023-05-31

    Abstract: Data diode systems and methods are disclosed herein for enhancing data security. Encrypted data transmitted from a first node (e.g., an entity coupled to a network) is received. The data transmitted is encrypted with a public key associated with a second node (e.g., the node to which to which the encrypted data is transmitted). The encrypted data is decrypted with a private key associated with the second node to generate decrypted data. A determination is made whether a digital signature in the decrypted data corresponds to a ledger entry mapped to the first node in a first set of ledger entries. The first node is verified to be a trusted entity based on the digital signature having been determined to correspond to the ledger entry. Based on the verification, the transmission of the encrypted data from the first node is determined to be a permissible data transmission.

    VERIFIABLE ATTRIBUTE MAPS
    3.
    发明公开

    公开(公告)号:US20240104229A1

    公开(公告)日:2024-03-28

    申请号:US17934730

    申请日:2022-09-23

    CPC classification number: G06F21/62 H04L9/50

    Abstract: Verifiable attribute maps that maintain references to identities and attribute information associated with the identities are disclosed. A verifiable attribute map is maintained by a ledger database that provides tamper-resistant/evident capabilities for tables (comprising the map) thereof. For instance, when a materialized view of the database is generated, the database provides a digest representative of a state thereof to computing devices that access the map for the attribute information. When the database receives a request from a device to access the map, the digest is received along therewith. The database is validated based on the digest to determine whether the database has been tampered with since the provision of the digest. Responsive to a successful validation, the database provides access in accordance with the request. When attribute information in the map is updated, the database subsequently generates a new digest, which is provided to the computing device.

    SYSTEM AND METHOD FOR REPRESENTING AND VERIFYING A DATA SET USING A TREE-BASED DATA STRUCTURE

    公开(公告)号:US20220253546A1

    公开(公告)日:2022-08-11

    申请号:US17173039

    申请日:2021-02-10

    Abstract: Embodiments described herein are directed to generating a tree-based data structure representative of a data set and the verification thereof. As each data item of a data set is updated, a leaf node is generated that stores a hash value therefor. For every even leaf node generated, a parent node storing a hash value based on the hash values of its child nodes is generated. For each level of the tree, the hash value of the last odd node generated therefor is maintained. The foregoing process is performed recursively at each level of the tree. During verification, a new root hash value is determined for a new tree-based data structure generated for the data set to be verified. The old and new root hash values are compared. If the hash values do not match, a remediation is performed to restore the data set.

    VERIFIABLE IDENTITY MAPS
    5.
    发明公开

    公开(公告)号:US20240056424A1

    公开(公告)日:2024-02-15

    申请号:US17819030

    申请日:2022-08-11

    CPC classification number: H04L63/0428 H04L9/0822 H04L9/50

    Abstract: Embodiments described herein are directed to a verifiable identity map that maintains identities and public keys associated with the identities. The map is maintained by a ledger database that provides tamper-resistant/evident capabilities for tables (comprising the map) thereof. For instance, when a materialized view of the database is generated, the database provides a digest representative of a state thereof to computing devices that access the map for the keys. When the database receives a request from a device to access the map, the digest is received along therewith. The database is validated based on the digest to determine whether the database has been tampered with since the provision of the digest. Responsive to a successful validation, the database provides access in accordance with the request. When a key in the map is updated, the database subsequently generates a new digest, which is provided to the computing device.

    ASYNCHRONOUSLY DETERMINING RELATIONAL DATA INTEGRITY USING CRYPTOGRAPHIC DATA STRUCTURES

    公开(公告)号:US20230269088A1

    公开(公告)日:2023-08-24

    申请号:US18309352

    申请日:2023-04-28

    Abstract: Methods for asynchronously determining relational data integrity using cryptographic data structures are performed by systems and devices. Changes in current tables of relational databases are reflected in associated history tables. Cryptographic hybrid blockchain ledgers are updated with transaction records, for entry changes in current and history tables, including transaction information and hash values of corresponding entry changes. Hybrid blockchain ledgers also include root hash values of Merkle trees of transaction records in current blocks, and hash values of prior blocks. A current block receipt is asynchronously generated and provided as a single hash value from which the validity states of the tables and ledger are able to be verified. Cryptographic receipts of specific transactions reflected in table entry changes are generated and provide immutable evidence of specific transaction existence for users. Ledger-enabled tables are provided for mixed database operations with ledger-disabled tables, and temporal history table database operations are enabled.

    RESUMABLE MERGE SORT
    8.
    发明申请

    公开(公告)号:US20190317727A1

    公开(公告)日:2019-10-17

    申请号:US15953000

    申请日:2018-04-13

    Abstract: A method may include receiving a database command to sort an unsorted dataset; dividing a sort operation, for sorting the unsorted dataset, into a plurality of portions; performing a first portion of the sort operation; persisting intermediate results from the first portion of the sort operation; and persisting a state of the sort operation identifying the portions of the sort operation have been performed.

    BLIND SUBPOENA PROTECTION
    10.
    发明公开

    公开(公告)号:US20240119168A1

    公开(公告)日:2024-04-11

    申请号:US17938711

    申请日:2022-10-07

    CPC classification number: G06F21/6227 H04L9/085 H04L9/3263

    Abstract: Embodiments described herein enable at least one of a plurality of entities to access data protected by a security policy in response to validating respective digital access requests from the entities. The respective digital access requests are received, each comprising a proof. For each request, an encrypted secret share is obtained from a respective ledger database. Each request is validated based at least on the respective encrypted secret share and the proof, without decrypting the respective encrypted secret share. In response to validating all of the requests, a verification that an access criteria of a security policy is met is made. If so, at least one of the entities is provided with access to data protected by the security policy. In an aspect, embodiments enable a blind subpoena to be performed. In another aspect, embodiments enable the at least one entity to access the data for an isolated purpose.

Patent Agency Ranking