会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 4. 发明授权
    • Detecting renaming operations
    • 检测重命名操作
    • US09460142B2
    • 2016-10-04
    • US14273153
    • 2014-05-08
    • Bjoern Mielenhausen
    • Bjoern Mielenhausen
    • G06F17/30G06F11/07
    • G06F17/30356G06F11/079G06F17/30297
    • System, method, and computer program product embodiments transform data from a first version, for example an initial version of a database, to a second version, for example a subsequent version of a database. An embodiment includes modifying the metadata of the data to include transformational clauses, each of which describes how a portion of the data in the first version is transformed to data in the second version. Another exemplary embodiment includes differentiating between rename and add/delete operations to reduce the amount of transformational clauses included in the metadata. For example, rename operations can be identified by ignoring commonly-named columns between two versions, and identifying columns where the name has changed between the two versions while the data type has not changed.
    • 系统,方法和计算机程序产品实施例将来自第一版本(例如数据库的初始版本)的数据转换为第二版本,例如数据库的后续版本。 一个实施例包括修改数据的元数据以包括变换子句,每个子句描述第一版本中的一部分数据如何被转换成第二版本中的数据。 另一个示例性实施例包括区分重命名和添加/删除操作以减少包含在元数据中的变换子句的数量。 例如,重命名操作可以通过忽略两个版本之间的常用列来识别,并且在数据类型未更改时识别名称在两个版本之间发生更改的列。
    • 8. 发明授权
    • Auditable abrogation of privacy enhancements in columnar in-memory databases
    • 可审查的废除在柱状内存数据库中的隐私增强
    • US09201912B2
    • 2015-12-01
    • US13926622
    • 2013-06-25
    • Jens OdenheimerUdo Klein
    • Jens OdenheimerUdo Klein
    • G06F17/30
    • G06F17/303G06F17/30569
    • Disclosed herein are system, method, and computer program product embodiments for the auditable abrogation of columnar in-memory databases. An embodiment operates by retrieving column-oriented data of a column-oriented database associated with an auditing request to access the column-oriented data. The column-oriented data is transformed into corresponding row-oriented data and stored in a row-oriented database independent of the column-oriented database. A response to the auditing request is processed based on the row-oriented data, wherein the processing is performed independent of the column-oriented database, and the response is provided to the auditing request.
    • 这里公开了用于可审查地废弃柱状存储器内数据库的系统,方法和计算机程序产品实施例。 一个实施例通过检索与审核请求相关联的面向列的数据库的面向列的数据以访问面向列的数据来操作。 面向列的数据被转换成相应的面向行的数据,并且存储在独立于面向列的数据库的面向行的数据库中。 基于面向行数据处理对审核请求的响应,其中独立于面向列的数据库执行处理,并且将响应提供给审计请求。
    • 9. 发明申请
    • Intelligent Unmasking in an In-Memory Database
    • 内存数据库中的智能取消显示
    • US20150331911A1
    • 2015-11-19
    • US14276643
    • 2014-05-13
    • ZHIQIANG WU
    • ZHIQIANG WU
    • G06F17/30
    • G06F17/30498G06F17/30466G06F17/30595
    • Database data is unmasked in order to facilitate its efficient handling by a database engine. In response to a request for data of a masked table including a masked element, an engine identifies a mask interval, and then performs a first join with unmasked elements sharing a common key. The table resulting from this first join is then grouped according to a highest level location of the mask. A second join is then performed between the results of this grouping and the mask interval, to produce a corresponding unmasked table including a plurality of unmasked elements corresponding to the masked element. Unmasking according to embodiments may be particularly useful in leveraging processing power of an in-memory database engine, allowing it to efficiently perform batch processing of requests for masked data received from software of an overlying application layer.
    • 数据库数据被隐藏,以便于数据库引擎的有效处理。 响应于对包含掩蔽元素的掩蔽表的数据的请求,引擎识别掩码间隔,然后执行与共享公共密钥的未屏蔽元素的第一连接。 然后,根据该第一连接产生的表根据掩码的最高级别位置进行分组。 然后在该分组的结果和屏蔽间隔之间执行第二连接,以产生包括对应于被屏蔽元素的多个未屏蔽元素的对应的未屏蔽表。 根据实施例的拆卸可以特别适用于利用内存中数据库引擎的处理能力,从而允许其有效地执行对从覆盖的应用层的软件接收的屏蔽数据的请求的批处理。