Patent application number | Description | Published |
20150310245 | Embedding Information in an Image for Fast Retrieval - A binary bit-string is encoded in a circular image. The circular image encodes substrings of the bit-string in sectors of the circular image and includes redundant bits, error correcting codes, and metadata pertaining to the encoding scheme. To encode the bit-strings, a circular image is generated that includes a center ring and a first ring. Outward from the first ring, additional rings represent bits in the bit-string according to the width of each ring. The exterior of the image includes an outer boundary ring. The width of the boundary rings is used to define the widths representing the value of each ring. To extract a bit-string from an image, the center of the circular image is identified and a direction is selected to evaluate the image outward, determining the boundaries of each ring. The boundaries are analyzed to determine the width of each ring and the encoded bit values. | 10-29-2015 |
20150310431 | Secure Payments Using a Mobile Wallet Application - A payment system implemented on a mobile device authenticates transactions made via the mobile device. The mobile device generates a public-private key pair and receives an authenticating input from a user of the device. The public key is sent to a secure payment system, and the authenticating input is used to generate a symmetric key that encrypts the private key. After a transaction is initiated, the mobile device receives an authenticating input from the user. The symmetric key is generated from the authenticating input and the mobile device attempts to decrypt the private key from the encrypted private key using the symmetric key generated by the user's input. The decrypted key is used to sign a transaction authorization message which is sent to the secure payment system, along with payment information, which can verify the signed message via the public key. Additional techniques related to secure payments are also disclosed. | 10-29-2015 |
20150310436 | Securely Storing and Using Sensitive Information for Making Payments Using a Wallet Application - A payment system implemented on a mobile device authorizes and processes transactions. The mobile device generates a public-private key pair and receives payment information. The private key and the payment information are split into a local and a remote fragment. The public key, a private key fragment, and a payment information fragment are sent to a secure payment system, and the other fragments are stored on the mobile device. When a transaction is received by the mobile device to authorize, the mobile device sends a payment fragment to the secure payment system and receives a private key fragment from the secure payment system. The mobile device authorizes the transaction using the private key, recovered from the private key fragments. The secure payment system verifies the transaction using the public key and processes the transaction using the recovered payment information. Additional techniques to process transactions using data splitting are disclosed. | 10-29-2015 |
Patent application number | Description | Published |
20080319959 | GENERATING INFORMATION ON DATABASE QUERIES IN SOURCE CODE INTO OBJECT CODE COMPILED FROM THE SOURCE CODE - Provided are a method, system, and article of manufacture for generating information on database queries in source code into object code compiled from the source code. Source code including query statements to perform operations with respect to a database is translated into executable object code. A statement descriptor for at least one query statement is generated into the object code, wherein the statement descriptor for the at least one query statement includes information on the query statement including the query statement in the source code. The statement descriptors in the object code are processed to output information on the query statements indicated in the statement descriptors. | 12-25-2008 |
20080320013 | STATEMENT GENERATION USING STATEMENT PATTERNS - Provided are techniques for generating a result set. A statement that includes at least one statement pattern is received, wherein each statement pattern is a template that indicates how a statement is to be modified for execution against a data store and wherein each statement pattern modifies program logic and control flow. Each statement pattern is expanded to generate one or more new statements, wherein each statement pattern is capable of being expanded to zero or more statement patterns. The one or more new statements are executed against a data store to obtain a result set. It is determined whether to modify the result set based on the at least one statement pattern. In response to determining that the result set is to be modified, modifying the result set. | 12-25-2008 |
20080320019 | PLUGGABLE MERGE PATTERNS FOR DATA ACCESS SERVICES - Provided are techniques for storing data. Invocation of a data access service is received, wherein the invocation identifies a data structure storing one or more data elements having a data format. An update handler to be plugged into a data access framework is identified, wherein the update handler processes data elements having the data format. Under control of the update handler, data elements are accessed in the data structure; one or more statements for storing the data elements into the data store are determined; and the one or more statements are forwarded to the data access framework. | 12-25-2008 |
20090007138 | STATIC EXECUTION OF STATEMENTS IN A PROGRAM - Provided are techniques for static execution of statements. Information from an execution file that describes statements that have been bound to a database during a previous execution of those statements dynamically and describes metadata about the statements is loaded. While executing a program that includes statements, for each of the statements, it is determined whether that statement is bound to the database. In response to determining that the statement is bound to the database, the statement is executed statically using the loaded information. In response to determining that the statement is not bound to the database, the statement is executed dynamically. | 01-01-2009 |
20090037893 | COVERAGE ANALYSIS TOOL FOR DATABASE-AWARE APPLICATIONS - Embodiments of the invention provide coverage analysis of database elements accessed by a software application, thus providing improved and more complete testing of database-aware applications. In one embodiment, database elements accessed by the software application are determined during a run-time test of the software application. | 02-05-2009 |
20100107139 | Cooperative Unwrapping Across Intervening Wrappers - A method of accessing layers in a multi-layer software architecture including a first layer, a second layer, and a third layer. The method includes: at the third layer, publishing an interface; and at the first layer, before execution of a first function, registering a callback routine with the third layer using the interface. | 04-29-2010 |
20100293209 | BATCHING HETEROGENEOUS DATABASE COMMANDS - Systems, methods and articles of manufacture are disclosed for batching heterogeneous database commands. The heterogeneous database commands may include at least two database command types. Further, at least two of the heterogeneous database commands may include host variables. A request to execute the heterogeneous database commands may be received. The heterogeneous database commands may be sent to a database system for execution, responsive to the request. | 11-18-2010 |