Issued Patents All Time
Showing 26–50 of 65 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 7827212 | System and method for improved clearing of JAVA object's variables | — | 2010-11-02 |
| 7743036 | High performance support for XA protocols in a clustered shared database | Brian K. Howell, Jeffrey W. Josten, James W. Pickel | 2010-06-22 |
| 7716213 | Apparatus, system, and method for efficiently supporting generic SQL data manipulation statements | Christopher M. Farrar, Robert Miller, Maryela E. Weihrauch | 2010-05-11 |
| 7711746 | System and method for deploying an SQL procedure | Margaret Bernal, Yao-Ching Chen, Ding-Wei Chieh, Baoqiu Cui, Tammie Dang +11 more | 2010-05-04 |
| 7668805 | System and method for managing query access to information | Paul M. Bird, Patrick Dantressangle | 2010-02-23 |
| 7661125 | System for providing and utilizing a network trusted context | Paul M. Bird, Gayathiri Chandran, Adrian B. Lobo, James W. Pickel, Walid Rjaibi | 2010-02-09 |
| 7647626 | Method for establishing a trusted relationship between a data server and a middleware server | Paul M. Bird, Walid Rjaibi, Timothy Vincent | 2010-01-12 |
| 7624119 | Low-overhead built-in timestamp column for relational database systems | Yao-Ching Chen | 2009-11-24 |
| 7603336 | Peephole DBMS reorganization allowing concurrent data manipulation | James A. Ruddy | 2009-10-13 |
| 7580958 | Supporting multiple versions of a routine | Yao-Ching Chen, Baoqiu Cui, Tammie Dang, Joe Cheng-yu Huang, Claire McFeely +6 more | 2009-08-25 |
| 7568039 | Method for providing and utilizing a network trusted context | Paul M. Bird, Gayathiri Chandran, Adrian B. Lobo, James W. Pickel, Walid Rjaibi | 2009-07-28 |
| 7526489 | Methods to integrate user-defined operations into a database | Vander R. Alves, Mary Ann Roth, Morgan Y. Tong, Charles D. Wolfson | 2009-04-28 |
| 7487159 | Method implementing scrollable cursors in a distributed database system | Margaret A. Dong | 2009-02-03 |
| 7478387 | System and method for creating a restartable non-native language routine execution environment | Margaret A. Abelite | 2009-01-13 |
| 7464080 | Row-level security in a relational database management system | Roger L. Miller | 2008-12-09 |
| 7433950 | Method and mechanism to multiplex multiple application server requests over a single database connection | Paul M. Bird, William Robert Bireley, Tammie Dang, Margaret A. Dong, Georgia C. Fuller +3 more | 2008-10-07 |
| 7269607 | Method and information technology infrastructure for establishing a log point for automatic recovery of federated databases to a prior point in time | Namik Hrle, James Zu-Chia Teng | 2007-09-11 |
| 7260589 | High performance support for XA protocols in a clustered shared database | Brian K. Howell, Jeffrey W. Josten, James W. Pickel | 2007-08-21 |
| 7240046 | Row-level security in a relational database management system | Roger L. Miller | 2007-07-03 |
| 7136847 | Method and system for dynamically changing cursor attributes in an embedded SQL application | Tammie Dang, William Robert Bireley, Claire McFeely, James W. Pickel, Koichi Yamaguchi | 2006-11-14 |
| 7039651 | System and method for executing a large object fetch query against a database | Robert Begg, Brent Gross, Paul A. Ostler, Timothy Vincent | 2006-05-02 |
| 6990477 | Method, system, and program for implementing scrollable cursors in a distributed database system | Margaret A. Dong | 2006-01-24 |
| 6978261 | Using database management system's infrastructure to invoke a stored procedure for creating and preparing a database application | Thomas T. Eng, Susan Malaika | 2005-12-20 |
| 6959305 | Unique identification of SQL cursor occurrences in a repetitive, nested environment | Paul M. Bird, Timothy Vincent | 2005-10-25 |
| 6931630 | Method of, system for, and computer program product for providing automatic identification of a computer program code candidate for web deployment or a stored procedure | Laurence England, Howard Justin Glaser, Howard M. Hess | 2005-08-16 |