| 12430464 |
Data leakage protection using generative large language models |
Jeffery L. Crume, Aankur Bhatia, Youngja Park |
2025-09-30 |
| 8983985 |
Masking sensitive data of table columns retrieved from a database |
Stephen Yao Ching Chen, Curt L. Cotner, Gerald G. Kiernan, Irene Ching-Hua Liu, Claire McFeely +1 more |
2015-03-17 |
| 8930410 |
Query transformation for masking data within database objects |
Eric L. Alton, Thomas A. Beavin, Harley W. Boughton, Yao-Ching Chen, Curt L. Cotner +9 more |
2015-01-06 |
| 8577906 |
Method for modifying a query by use of an external system for managing assignment of user and data classifications |
Paul M. Bird |
2013-11-05 |
| 8515948 |
Managing materialized query tables (MQTS) over fine-grained access control (FGAC) protected tables |
Yao-Ching Chen, Curt L. Cotner, Gerald G. Kiernan, David J. Kuang, Irene Ching-Hua Liu +2 more |
2013-08-20 |
| 8234299 |
Method and system for using fine-grained access control (FGAC) to control access to data in a database |
Paul M. Bird, Yao-Ching Chen, George Gerald Kiernan, Scott Ian Logan, Allen William Luniewski |
2012-07-31 |
| 8176088 |
Incremental cardinality estimation for a set of data values |
Peter J. Haas |
2012-05-08 |
| 7930312 |
System for consolidating data from distributed databases |
Stefan G. Hild, Rene A. Pawlitzek, Markus Stolze |
2011-04-19 |
| 7913172 |
Fine-grained, label-based, XML access control model |
Zheng Zhang |
2011-03-22 |
| 7865521 |
Access control for elements in a database object |
Paul M. Bird |
2011-01-04 |
| 7860875 |
Method for modifying a query by use of an external system for managing assignment of user and data classifications |
Paul M. Bird |
2010-12-28 |
| 7827608 |
Data leak protection system, method and apparatus |
Paul M. Bird, David L. Kaminsky, Sam S. Lightstone |
2010-11-02 |
| 7661125 |
System for providing and utilizing a network trusted context |
Paul M. Bird, Gayathiri Chandran, Curt L. Cotner, Adrian B. Lobo, James W. Pickel |
2010-02-09 |
| 7647626 |
Method for establishing a trusted relationship between a data server and a middleware server |
Paul M. Bird, Curt L. Cotner, Timothy Vincent |
2010-01-12 |
| 7568039 |
Method for providing and utilizing a network trusted context |
Paul M. Bird, Gayathiri Chandran, Curt L. Cotner, Adrian B. Lobo, James W. Pickel |
2009-07-28 |
| 7568235 |
Controlling data access using security label components |
Paul M. Bird |
2009-07-28 |
| 7542975 |
Computing frequent value statistics in a partitioned relational database |
— |
2009-06-02 |
| 7496584 |
Incremental cardinality estimation for a set of data values |
Peter J. Haas |
2009-02-24 |
| 7401101 |
Automatic data consolidation |
Stefan G. Hild, Rene A. Pawlitzek, Markus Stolze |
2008-07-15 |
| 7243097 |
Extending relational database systems to automatically enforce privacy policies |
Rakesh Agrawal, Paul M. Bird, Tyrone W. A. Grandison, Gerald G. Kiernan, Scott Ian Logan |
2007-07-10 |
| 7124146 |
Incremental cardinality estimation for a set of data values |
Peter J. Haas |
2006-10-17 |
| 6732110 |
Estimation of column cardinality in a partitioned relational database |
Guy M. Lohman, Peter J. Haas |
2004-05-04 |
| 6615222 |
System and process for evaluating the performance of a database system |
John Frederick Hornibrook, John E. Lumby, Calisto P. Zuzarte |
2003-09-02 |