The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 24, 2023

Filed:

Oct. 17, 2019
Applicant:

Oracle International Corporation, Redwood Shores, CA (US);

Inventors:

Shrikumar Hariharasubrahmanian, Palo Alto, CA (US);

Jean-Pierre Dijcks, Belmont, CA (US);

Jacco Draaijer, Belmont, CA (US);

Assignee:

Oracle International Corporation, Redwood Shores, CA (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
G06F 16/00 (2019.01); G06F 21/62 (2013.01); H04L 9/30 (2006.01); G06F 16/22 (2019.01); G06F 40/205 (2020.01); G06F 40/284 (2020.01);
U.S. Cl.
CPC ...
G06F 21/6209 (2013.01); G06F 16/221 (2019.01); G06F 40/205 (2020.01); G06F 40/284 (2020.01); H04L 9/30 (2013.01);
Abstract

Herein are spatially scalable techniques for anisotropic compression of shared entropy between alternate representations of same data. In an embodiment, a computer compresses an uncompressed independent column into a compressed independent column. Based on the compressed independent column, an uncompressed dependent column is compressed into a compressed dependent column. The compressed independent column and the compressed dependent column are stored in a same file. In an embodiment, a computer stores, in metadata, an encrypted private key for decrypting an encrypted column. The encrypted column and the metadata are stored in a file. A request to read the encrypted column is received. Based on a public key and the file, the encrypted private key is decrypted into a decrypted private key. The public key is contained in the request and/or the file. The request is executed by decrypting, based on the decrypted private key and the file, the encrypted column.


Find Patent Forward Citations

Loading…