Oracle Patent Applications

VISUAL FORM DESIGNER

Granted: April 27, 2017
Application Number: 20170115864
A visual form designer is disclosed. A target user interface is configured to display a particular form. A design user interface is used to design the target user interface. The target user interface includes an instance of an interface widget. A customizable widget property of the interface widget is a set of selectable values for the interface widget. As an example, the interface widget may be a dropdown menu for accepting one of a set of selectable values. The design user interface…

MEMORY MANAGEMENT USING VIRTUAL ADDRESS MASKING

Granted: April 27, 2017
Application Number: 20170115923
A method for memory management may include dividing a memory into pools. Each pool includes blocks. The method may further include receiving a request to allocate a first block of a first size, selecting a pool based on the first size, allocating the first block from the selected pool, and creating metadata for a pointer to the first block. The pointer includes a pre-normalized address of the first block. The method may further include storing the metadata in the pointer, receiving a…

APPLICATION BUILDER WITH AUTOMATED DATA OBJECTS CREATION

Granted: April 27, 2017
Application Number: 20170115968
Techniques for simplifying the process of building an application and making changes to the application. The process of creating and editing an application is simplified such that a non-technical user can build and edit applications without having any programming or technical knowledge. An infrastructure is provided for building an application that enables a user to create an application by simply designing a user interface for the application using one or more provided user interface…

MANAGING HIGHLY SCALABLE CONTINUOUS DELIVERY PIPELINES

Granted: April 27, 2017
Application Number: 20170115976
Systems and methods are provided for managing and tracking process pipelines and other flows in a way that reduces the requirement for a central controlling process to manage every step of the associated pipeline flow and the state associated with each running instance. Job information and pipeline state are tracked by each worker involved in the pipeline. This enables some key capabilities within these process pipelines such as dynamic process re-writing and cross security domain job…

GUARANTEEING THE EVENT ORDER FOR MULTI-STAGE PROCESSING IN DISTRIBUTED SYSTEMS

Granted: April 27, 2017
Application Number: 20170116050
Systems and methods for guaranteeing the event order for multi-stage processing in distributed systems are disclosed. In some examples, a warm-up period is used to accurately determine a starting point for ordered events of an event stream. Skip-beats may be utilized as dummy events so that the event processor does not wait too long for events that were filtered out at earlier stages.

SYSTEMS AND METHODS FOR PRIORITIZING A SUPPORT BUNDLE

Granted: April 27, 2017
Application Number: 20170116098
Implementations described and claimed herein provide systems and methods for prioritizing a support bundle. In one implementation, a fault indication specifying at least one fault of a storage device is generated. A request for support data for diagnosing a cause of the fault is received at the storage device. Low priority data for diagnosing the fault is identified from the support data. A prioritized support bundle is generated having a low priority bundle subset containing the low…

DATABASE SYSTEM FEATURE MANAGEMENT

Granted: April 27, 2017
Application Number: 20170116230
Systems for database system management. A method embodiment commences upon intercepting a feature or command that is issued from a software application that interfaces with a database management system. Rules are used to identify that the feature or command is of a first type (e.g., an older type). The feature or command is analyzed to determine if it is a candidate to be modified or upgraded to implement a newer feature or command of a second type (e.g., a newer type). Modifications are…

NON-BLOCKING DATABASE TABLE ALTERATION

Granted: April 27, 2017
Application Number: 20170116241
Systems for managing large database systems. Storage devices hold a set of one or more subject database tables that hold subject data accessed by one or more users. A data definition statement to perform a table alteration operation (e.g., a table partition operation) over a particular table in the subject database is received, parsed, and the table alteration operation over the particular table is initiated. During the processing of the data definition statement to complete the table…

HIGHLY SELECTIVE INVALIDATION OF DATABASE CURSORS

Granted: April 27, 2017
Application Number: 20170116253
A method commences upon receiving a database language statement pertaining to a database comprising database objects that are accessed by computing processes. The method analyzes the database language statement to form or identify a cursor object that has dependencies on one or more referenced data objects. The cursor object is associated with a set of cursor attributes that are stored in a cursor metadata data structure. By analyzing a subsequently-received database language statement,…

TUPLE EXTRACTION USING DYNAMICALLY GENERATED EXTRACTOR CLASSES

Granted: April 27, 2017
Application Number: 20170116283
Systems and methods for extracting tuples using dynamically generated extractor classes are disclosed. In some examples, an optimized tuple extraction class can be dynamically generated to enable more efficient tuple extraction.

SUPPORT SHARING THE SAME TABLE FOR PROTECTED AND NON-PROTECTED DATA COLUMNS

Granted: April 27, 2017
Application Number: 20170116428
Systems and methods are provided for supporting sharing the same table for protected and non-protected data columns. Different data object can be defined on the same database table. A discriminate flag can be defined to identify the data object to which a particular row belongs. The discriminate flag can be built into the data object so that rows belong to the data object are picked up during a query. Data protection can then be configured at the data object level so that rows that…

AUTOMATIC OPERATION DETECTION ON PROTECTED FIELD

Granted: April 27, 2017
Application Number: 20170116436
Systems and methods are provided for automatic operation detection on protected fields. A data model configuration can be used to specify which attributes of a data model used by a cloud-based application are protected by a data security provider monitoring communications between the application and a client device. A determination can be made automatically which operations of the cloud-based application are supported for protected fields. The cloud-based application can be configured to…

SENSOR TIME SERIES DATA: FUNCTIONAL SEGMENTATION FOR EFFECTIVE MACHINE LEARNING

Granted: April 27, 2017
Application Number: 20170116524
Feature engineering can be performed on time series data making the data easy to manipulate and accessible to business users for analysis according to existing best practices. A computer system can, after receiving time series data related to a device, contextualize the time series data based on business data related to the device from, for example, an enterprise resource planning database. The contextualized data can be windowed by a selected feature based on execution data related to…

MERCHANT IDENTIFICATION AND EXPENSE ITEM CLASSIFICATION FROM A MOBILE DEVICE CAPTURE OF AN EVENT RECEIPT

Granted: April 27, 2017
Application Number: 20170116679
Systems for determining a merchant name as used in mobile expense reporting applications. Embodiments commence upon receiving an image of an expense item receipt from a mobile user device. In addition to the image, embodiments receive metadata derived from a travel app running on the user device, which metadata is sent together with an association to the image. Further processing extracts a set of characteristics of text-containing regions of the expense item receipt, and then forms a…

PASSWORD-LESS AUTHENTICATION FOR ACCESS MANAGEMENT

Granted: April 27, 2017
Application Number: 20170118025
An access management system is disclosed that can provide access to resources by password-less authentication. The access management system can provide multiple layers of security for authentication taking into account risk factors (e.g., device, location, etc.) to ensure authentication without compromising access. Contextual details of a user based on a mobile device can be used for authentication based on possession of a device. Password-less authentication of a user may be enabled by…

NETWORK SWITCH WITH DYNAMIC MULTICAST QUEUES

Granted: April 27, 2017
Application Number: 20170118033
A system for communicating a multicast packet through a network switch fabric is described. The system receives the multicast packet at an input port of the network switch fabric, where the multicast packet is directed to multiple output ports, and where the network switch fabric has a virtual output queue (VOQ)-based architecture, in which each input port maintains a separate VOQ for unicast packets to each output port and one or more VOQs for multicast packets destined to multiple…

ENHANCED REST SERVICES WITH CUSTOM DATA

Granted: April 27, 2017
Application Number: 20170118095
The present disclosure relates generally to REpresentational State Transfer (REST) services, and more particularly, to techniques for enhancing REST services with custom data. One of the techniques includes receiving a request from an end user for a service provided by a REST end point, implementing a data retrieval from the REST end point on behalf of the end user to obtain one or more representations of resources for the requested service, extracting a primary key from the one or more…

WHITELIST CONSTRUCTION

Granted: April 27, 2017
Application Number: 20170118167
Techniques are provided for of constructing a whitelist of redirection uniform resource locators (URLs). A method can include receiving, by a computing system executing an access manager application, a request to log out a user from an application executing on a device; determining, by the access manager application, a redirection address for the application; validating, by the access manager application, the redirection address; and based on the validation, causing, by the access…

ACCESS MANAGER SESSION MANAGEMENT STRATEGY

Granted: April 27, 2017
Application Number: 20170118218
Techniques are disclosed for managing session information stored by an access management system. Certain techniques are disclosed for updating session information based characteristics of the session information to be updated. The disclose techniques disclose how session information is updated and the frequency in which the session information is updated. Certain embodiments may enable a descrease in computing performance overhead and/or memory usage overhead caused by managing session…

RUN-TIME TRUST MANAGEMENT SYSTEM FOR ACCESS IMPERSONATION

Granted: April 27, 2017
Application Number: 20170118222
Techniques are disclosed for facilitating impersonation for accessing resources through an access management system. When a user (“impersonator”) requests access to impersonate another user (“impersonatee”), the access management system may generate security data having two parts. One part may include a first security key that is sent to the impersonator and a second part may include a second security key that is sent to the impersonatee. Receipt of the second security key…