Patent classifications
G06F16/144
ATTACHABLE-AND-DETACHABLE DATABASE SESSIONS
In an embodiment, a database platform receives a request from a client for creation of an attachable-and-detachable database session, and responsively creates the requested attachable-and-detachable database session for the client. The database platform sets the attachable-and-detachable database session as a current database session for the client at the database platform. The database platform determines that the client has detached from the attachable-and-detachable database session, and thereafter continues to maintain the attachable-and-detachable database session in data storage at the database platform.
Blockchain implementing reliability database
An example operation may include one or more of receiving a request to modify a reliability value of an off-chain data source to generate a modified reliability value, determining whether a consensus on the modified reliability value has been received among a plurality of peer nodes, and in response to a determination that the consensus has been received, updating a storage to reflect the modified reliability value associated with the off-chain data source, and storing an identification of the modified reliability value within a block among a hash-linked chain of blocks on a distributed ledger shared among the plurality of peer nodes.
FILE COMPARISON METHOD
A method of comparing a candidate file with an exemplar file, includes: receiving a candidate file comprising candidate file data; processing the candidate file data to generate a candidate file fingerprint representing the candidate file, the candidate file fingerprint comprising a plurality of fingerprint strings each representing a portion of the candidate file data; and comparing the candidate file fingerprint with an exemplar file fingerprint representing the exemplar file, the exemplar file comprising exemplar file data and the exemplar file fingerprint comprising a plurality of fingerprint strings each representing a portion of the exemplar file data. A candidate file fingerprint is generated by applying a rolling hash function to the candidate file data to generate a sequence of strings, and adding to the candidate file fingerprint a fingerprint string comprising a substring from the sequence of strings when a predetermined string pattern appears in the sequence of strings.
Database management system and anonymization processing method
There is provided a database management system (DBMS) in order to make anonymization processing of the database efficient. When receiving a query including a conversion rule, the database management system is configured to process a relationship table in the database based on the conversion rule. At that time, the DBMS is configured to acquire data from a processing result table (result of processing the relationship table) stored in the past for tuples the number of which for each value appearing in a predetermined attribute satisfies a condition required for the anonymization processing. On the other hand, for tuples the number of which for each value appearing in a predetermined attribute does not satisfy the condition required for the anonymization processing, the DBMS is configured to acquire data from the database or from a result of processing the relationship table, the result being stored in rather than the processing result table.
System and method for pre-indexing filtering and correction of documents in search systems
Embodiments as disclosed herein provide a search system with an pre-indexing filter that provides both a sophisticated and contextually tailored approach to filtering documents and a corrector that is adapted to alter a document that has been designated to be filtered out from the indexing process and determine if the altered document should be indexed. The alteration of the document may be tied to the attributes, rules or thresholds used to initially filter the document from the indexing process. The filtering criteria can thus be tailored to a specific context such that both the initial filtering and the alteration process may be better suited for application in that context.
Encrypted Search over Encrypted Data with Reduced Volume Leakage
A method for performing encrypted search includes receiving a search query for a plurality of keywords from a user device that appear in one or more encrypted documents stored on an untrusted storage device. The method also includes accessing an encrypted search index to obtain a first list of document identifiers each representative of a document that includes a first keyword and a second keyword of the plurality of keywords. The method also includes, for each remaining keyword, determining a corresponding list of document identifiers each representative of a document that includes the first, second, and respective remaining keyword. The method includes determining, based on the first list of document identifiers and each corresponding list of document identifiers, a second list of document identifiers each representative of a document that includes each of the plurality of keywords. The method also includes returning the second list to the user device.
Intelligent Cloud Operations
Embodiments control software hosted by cloud providers and private clouds. Operational data received from the software correlates: •a time, •a user at the time, and •a software component accessed by the user at the time. The operational data relates to resources (e.g., storage, computational, network) that are consumed. Experiential data characterizing a quality of user interaction, is also received. The experiential data may be derived from operational data (e.g., inferred from time lags), or received separately as feedback. Operational data and experiential data are processed according to a ruleset or a neural network. Based upon the result, which optimizes towards costs, experience data (e.g., time lags) or policies (e.g. security constraints), a command causes an actuator to act upon the software. The actuator may trigger movement to a different host (e.g. different cloud provider). The move functionality, if applied to many customers at once, embodies a cloud provider switch service.
Blockchain implementing reliability database
An example operation may include one or more of receiving a request for trust information of an off-chain data source from a client, determining a category type of the off-chain data source from among a plurality of category types based on the request, retrieving a reliability value of the off-chain data source linked to one or more of an identity of the off-chain data source and the determined category type from a reliability database implemented via a distributed ledger shared among a plurality of peer nodes, and transmitting the retrieved reliability value linked to the category type to the client.
Tagging tool for managing data
A plurality of files that include unsearchable computer data may be analyzed and tagged. A plurality of tags that relate to characteristics of the files is determined. The characteristics relate to both the data included in the files as well as the general structure or nature of the files. The plurality of computer files is then tagged or associated with these tags, enabling the plurality of computer files to be searched to identify and retrieve relevant files of the computer files. The tags may be updated in response to various prompts to reflect changing computer files.
DIGITAL PROCESSING SYSTEMS AND METHODS FOR VIRTUAL FILE-BASED ELECTRONIC WHITE BOARD IN COLLABORATIVE WORK SYSTEMS
Systems and methods may include having an integrated unified filing engine. A system may include at least one processor configured to maintain at least one table containing a plurality of items and a plurality of asset designations, and to maintain at least one electronic whiteboard containing at least a subset of the plurality of asset designations. The processor may be further configured to maintain a data structure containing a plurality of links, wherein each link associates at least one of the subsets of asset designations with at least one location on the at least one electronic whiteboard, receive via a network access device, an activation of a particular link associated with a particular asset, alter a display of at least one electronic whiteboard containing an asset designation, and retrieving a presenting a corresponding asset in response to a received selection of a particular asset designation.