The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Oct. 28, 2025
Filed:
Mar. 14, 2024
Gravic, Inc., Malvern, PA (US);
Paul J. Holenstein, Downingtown, PA (US);
John R. Hoffmann, Kennett Square, PA (US);
Bruce D. Holenstein, Media, PA (US);
Wilbur H. Highleyman, Blairstown, NJ (US);
GRAVIC, INC., Malvern, PA (US);
Abstract
Methods are provided for preventing constraint violations at a target database by a database replication system. The database replication system replicates database transactions from a change log of a source database to the target database. Each source database and each target database have one or more tables, and at least one of the target database tables has one or more constraints. The database replication system replicates database transactions from a change log for the source database to the target database. Each of the source database tables has an associated change log disk cache. For each database transaction, a database change is detected to the at least one of the source database tables that potentially causes a constraint violation at the target database as a result of one or more of the target database tables having one or more constraints. An application call, or a programmatic call by a database management system, is then made when the database change is detected to flush to a change log disk contents of the associated change log disk cache for the at least one of the source database tables which has a change log disk cache that may flush to the change log disk in a misordered manner compared to change log disk cache flushes from at least one other source database table. The application call, or the programmatic call by the database management system, prevents the potential constraint violation at the target database by the database replication system.