Patent Issued for Automated Data Store Access Source Code Review (USPTO 10,585,663) - Insurance News | InsuranceNewsNet

InsuranceNewsNet — Your Industry. One Source.™

Sign in
  • Subscribe
  • About
  • Advertise
  • Contact
Home Now reading Newswires
Topics
    • Advisor News
    • Annuity Index
    • Annuity News
    • Companies
    • Earnings
    • Fiduciary
    • From the Field: Expert Insights
    • Health/Employee Benefits
    • Insurance & Financial Fraud
    • INN Magazine
    • Insiders Only
    • Life Insurance News
    • Newswires
    • Property and Casualty
    • Regulation News
    • Sponsored Articles
    • Washington Wire
    • Videos
    • ———
    • About
    • Meet our Editorial Staff
    • Advertise
    • Contact
    • Newsletters
  • Exclusives
  • NewsWires
  • Magazine
  • Newsletters
Sign in or register to be an INNsider.
  • AdvisorNews
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Exclusives
  • INN Magazine
  • Insurtech
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Video
  • Washington Wire
  • Life Insurance
  • Annuities
  • Advisor
  • Health/Benefits
  • Property & Casualty
  • Insurtech
  • About
  • Advertise
  • Contact
  • Editorial Staff

Get Social

  • Facebook
  • X
  • LinkedIn
Newswires
Newswires RSS Get our newsletter
Order Prints
March 24, 2020 Newswires
Share
Share
Post
Email

Patent Issued for Automated Data Store Access Source Code Review (USPTO 10,585,663)

Insurance Daily News

2020 MAR 24 (NewsRx) -- By a News Reporter-Staff News Editor at Insurance Daily News -- State Farm Mutual Automobile Insurance Company (Bloomington, Illinois, United States) has been issued patent number 10,585,663, according to news reporting originating out of Alexandria, Virginia, by NewsRx editors.

The patent’s inventors are Anderson, Matthew (Bloomington, IL); Snyder, Richard T. (Colfax, IL); Galvin, Daniel George (Bloomington, IL).

This patent was filed on October 13, 2017 and was published online on March 23, 2020.

From the background information supplied by the inventors, news correspondents obtained the following quote: “Field of the Invention

“Embodiments of the current invention relate to methods and devices for automatically reviewing data store or database access source code.

“Description of the Related Art

“Large-scale data stores, or databases, such as those maintained by an insurance provider or a financial institution, not only include a great volume of data, but are also accessed at a high frequency. An exemplary insurance provider may have anywhere from hundreds of thousands to tens of millions of customers or clients. Associated with each customer may be personal information, such as a name, a birthdate, an address, etc., and policy information, such as a homeowner’s policy with coverage terms and details about the house or property being covered, or an automobile policy with coverage terms and details about the vehicle being covered. Also associated with each customer may be account information, such as payment history and the like. All of this information is stored in one or more data stores. An exemplary insurance provider may further have thousands of employees, such as agents, representatives, adjusters, accountants, and so forth. Each employee may wish to access the data stores to create new policies, update existing policies, retrieve information about policies, delete accounts, retrieve account information, or the like. In addition, some requests for access may involve hundreds of accounts, such as preparing billing information on any given day. If the insurance provider also offers online or web service for customers to directly access policy or account information, then the traffic to the data stores could increase significantly.

“Access to the data stores is controlled by data store access software. The software may include deployables, which are built from source code files. Each task or type of task may require one or more deployables. For example, creating new policies may require a first one or more deployables, while updating policy data may require a second one or more deployables, and so forth. Given the volume of data to be handled and the frequency of access, each deployable must be as efficient in adding, retrieving, or modifying data as possible. Typically, data store managers, database administrators (DBAs), data access developers, or other information technology (IT) personnel review the source code used to build the deployables to ensure proper operation and performance. Since new deployables, or modifications to existing deployables, may be built or updated every day, it is difficult for data store managers and IT personnel to adequately review the source code and ensure proper performance. This leads to either inefficient code being deployed or long delays in implementing properly operating deployables.

“Furthermore, the deployables may be created from at least three types of source code files. A first type of source code may provide modification to the data store contents, by adding, deleting, or changing data. A second type of source code may provide an interface between the first type of source code and applications, typically business applications, that seek to access the data store. A third type of source code may provide configuration of the software components of the first and second types of source code. It is possible that each type of source code may be written by a different group of coders or programmers. Each group may specialize in the type of source code that they write, but may have little knowledge of the requirements of the other types of source code. The fact that different groups with different concerns write the data store access source code may further contribute to inconsistencies and inefficiencies in the deployables.”

Supplementing the background information on this patent, NewsRx reporters also obtained the inventors’ summary information for this patent: “Embodiments of the current invention solve the above-mentioned problems and provide a distinct advance in the art of automated source code review. Specifically, embodiments of the current invention provide computer-implemented methods that may automatically review data store access source code files by checking for compliance with guidelines on a plurality of levels. The methods may check the three types of source code, including data store modification source code files, application interface source code files, and configuration source code files, among others. If any of the source code files do not comply with the guidelines, then deployment of the source code may be halted until issues can be examined.

“In one embodiment, the current invention provides a computer-implemented automated review method for source code files seeking to access a data store broadly comprising the steps of: receiving a request to review data store access source code; determining computer files which include the data access source code; examining structured query language (SQL) source code files and determining compliance with non-syntax-related guidelines; setting the issue flag if the guidelines are not followed; examining data access object (DAO) source code files and determining compliance with guidelines for invoking SQL components within Java source code; setting the issue flag if the guidelines are not followed; examining configuration source code files and determining compliance with data store connection and object definition guidelines; setting the issue flag if the guidelines are not followed; examining configuration source code files and determining compliance with transaction-related guidelines; setting the issue flag if the guidelines are not followed; examining configuration source code files and determining compliance with datasource configuration guidelines; setting the issue flag if the guidelines are not followed; reviewing the status of the issue flag; issuing a halt signal if the issue flag is set; and issuing a proceed signal if the issue flag is not set.

“In another embodiment, the current invention provides a computer-implemented automated review method for source code files seeking to access a data store broadly comprising the steps of: receiving a request to review data store access source code; determining computer files which include the data access source code; examining structured query language (SQL) source code files and determining compliance with non-syntax-related guidelines, the guidelines including determining whether a type of data to be written to the data store matches a type of data in the data store; setting the issue flag if the guidelines are not followed; examining data access object (DAO) source code files and determining compliance with guidelines for invoking SQL components within Java source code, the guidelines including checking that a type of data passed to the SQL components matches a type of data expected by the SQL components; setting the issue flag if the guidelines are not followed; examining configuration source code files and determining compliance with data store connection and object definition guidelines, the guidelines including checking that a bean definition for a database points to the data store; setting the issue flag if the guidelines are not followed; examining configuration source code files and DAO source code files and determining compliance with transaction-related guidelines, the guidelines including checking for the presence of a transaction manager definition; setting the issue flag if the guidelines are not followed; examining configuration source code files and determining compliance with datasource configuration guidelines, the guidelines including checking for a definition of a datasource; setting the issue flag if the guidelines are not followed; reviewing the status of the issue flag; issuing a halt signal if the issue flag is set; and issuing a proceed signal if the issue flag is not set.

“In yet another embodiment, the current invention provides a computer-implemented automated review method for source code files seeking to access a data store broadly comprising the steps of: receiving a request to review data store access source code; determining computer files which include the data access source code; determining service operations in each source code file; determining an execution frequency and an execution time of each service operation based on business volumetrics; setting an issue flag if the execution frequency of any service operation is greater than an execution frequency threshold; setting the issue flag if the execution time of any service operation is less than an execution time threshold; examining structured query language (SQL) source code files and determining compliance with non-syntax-related guidelines; setting the issue flag if the guidelines are not followed; examining data access object (DAO) source code files and determining compliance with guidelines for invoking SQL components within Java source code; setting the issue flag if the guidelines are not followed; examining configuration source code files and determining compliance with data store connection and object definition guidelines; setting the issue flag if the guidelines are not followed; examining configuration source code files and determining compliance with transaction-related guidelines; setting the issue flag if the guidelines are not followed; examining configuration source code files and determining compliance with datasource configuration guidelines; setting the issue flag if the guidelines are not followed; reviewing the status of the issue flag; issuing a halt signal if the issue flag is set; and issuing a proceed signal if the issue flag is not set.

“This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter. Other aspects and advantages of the current invention will be apparent from the following detailed description of the embodiments and the accompanying drawing figures.”

The claims supplied by the inventors are:

“Having thus described various embodiments of the invention, what is claimed as new and desired to be protected by Letters Patent includes the following:

“1. A computer-implemented automated review method for source code files seeking to access a data store, the method comprising the steps of: receiving a request to review data store access source code; determining computer files which include the data access source code; examining structured query language (SQL) source code files and determining compliance with non-syntax-related guidelines; executing an explain command on SQL statements in the SQL source code files and producing an explain output including information about a sequence of operations for executing the SQL statements; examining data access object (DAO) source code files and determining compliance with guidelines for invoking SQL components within Java source code; examining configuration source code files and determining compliance with data store connection and object definition guidelines; examining configuration source code files and DAO source code files and determining compliance with transaction-related guidelines; examining configuration source code files and determining compliance with datasource configuration guidelines; setting the issue flag if any of the guidelines are not followed; reviewing the status of the issue flag; issuing a first signal to information technology personnel to halt deployment of the source code files if the issue flag is set; and issuing a second signal to information technology personnel to proceed with deployment of the source code files if the issue flag is not set.

“2. The computer-implemented automated review method of claim 1, further comprising the steps of: determining service operations in each source code file; determining an execution frequency of each service operation based on business volumetrics; and setting an issue flag if the execution frequency of any service operation is greater than an execution frequency threshold for each service operation.

“3. The computer-implemented automated review method of claim 1, further comprising the steps of: determining service operations in each source code file; determining an execution time of each service operation based on business volumetrics; and setting the issue flag if the execution time of any service operation is less than an execution time threshold.

“4. The computer-implemented automated review method of claim 1, wherein the non-syntax-related guidelines for SQL source code files include determining the occurrence of specific SQL commands which are known to be time-consuming or resource-intensive to execute.

“5. The computer-implemented automated review method of claim 1, wherein the non-syntax-related guidelines for SQL source code files include determining whether a type of data to be written to the data store matches a type of data in the data store.

“6. The computer-implemented automated review method of claim 1, wherein the guidelines for invoking SQL source code within Java source code include checking for usage of spring Java database connectivity (JDBC) framework.

“7. The computer-implemented automated review method of claim 1, wherein the guidelines for invoking SQL components within Java source code include checking that a type of data passed to the SQL components matches a type of data expected by the SQL components.

“8. The computer-implemented automated review method of claim 1, wherein the guidelines for data store connection and object definitions include checking that a bean definition for a database points to the data store.

“9. The computer-implemented automated review method of claim 1, wherein the guidelines for data store connection and object definitions include checking that pointers to open source framework software are correct.

“10. The computer-implemented automated review method of claim 1, wherein the transaction-related guidelines include checking for the presence of a transaction manager definition.

“11. The computer-implemented automated review method of claim 1, wherein the datasource configuration guidelines include checking for a definition of a datasource.

“12. A computer-implemented automated review method for source code files seeking to access a data store, the method comprising the steps of: receiving a request to review data store access source code; determining computer files which include the data access source code; examining structured query language (SQL) source code files and determining compliance with non-syntax-related guidelines, the guidelines including determining whether a type of data to be written to the data store matches a type of data in the data store; executing an explain command on SQL statements in the SQL source code files and producing an explain output including information about a sequence of operations for executing the SQL statements; examining data access object (DAO) source code files and determining compliance with guidelines for invoking SQL components within Java source code, the guidelines including checking that a type of data passed to the SQL components matches a type of data expected by the SQL components; examining configuration source code files and determining compliance with data store connection and object definition guidelines, the guidelines including checking that a bean definition for a database points to the data store; examining configuration source code files and DAO source code files and determining compliance with transaction-related guidelines, the guidelines including checking for the presence of a transaction manager definition; examining configuration source code files and determining compliance with datasource configuration guidelines, the guidelines including checking for a definition of a datasource; setting the issue flag if any of the guidelines are not followed; reviewing the status of the issue flag; issuing a first signal to information technology personnel to halt deployment of the source code files if the issue flag is set; and issuing a second signal to information technology personnel to proceed with deployment of the source code files if the issue flag is not set.

“13. The computer-implemented automated review method of claim 12, further comprising the steps of: determining service operations in each source code file; determining an execution frequency of each service operation based on business volumetrics; and setting an issue flag if the execution frequency of any service operation is greater than an execution frequency threshold.

“14. The computer-implemented automated review method of claim 12, further comprising the steps of: determining service operations in each source code file; determining an execution time of each service operation based on business volumetrics; and setting the issue flag if the execution time of any service operation is less than an execution time threshold.

“15. The computer-implemented automated review method of claim 12, wherein the non-syntax-related guidelines for SQL source code files include determining the occurrence of specific SQL commands which are known to be time-consuming or resource-intensive to execute.

“16. The computer-implemented automated review method of claim 12, wherein the guidelines for invoking SQL source code within Java source code include checking for usage of spring Java database connectivity (JDBC) framework.

“17. The computer-implemented automated review method of claim 12, wherein the guidelines for data store connection and object definitions include checking that pointers to open source framework software are correct.

“18. A computer-implemented automated review method for data store access source code files, the method comprising the steps of: receiving a request to review data store access source code; determining computer files which include the data access source code; determining service operations in each source code file; determining an execution frequency and an execution time of each service operation based on business volumetrics; setting an issue flag if the execution frequency of any service operation is greater than an execution frequency threshold; setting the issue flag if the execution time of any service operation is less than an execution time threshold; examining structured query language (SQL) source code files and determining compliance with non-syntax-related guidelines; executing an explain command on SQL statements in the SQL source code files and producing an explain output including information about a sequence of operations for executing the SQL statements; examining data access object (DAO) source code files and determining compliance with guidelines for invoking SQL source code within Java source code; examining configuration source code files and determining compliance with data store connection and object definition guidelines; examining configuration source code files and DAO source code files and determining compliance with transaction-related guidelines; examining configuration source code files and determining compliance with datasource configuration guidelines; setting the issue flag if any of the guidelines are not followed; reviewing the status of the issue flag; issuing a first signal to information technology personnel to halt deployment of the source code files if the issue flag is set; and issuing a second signal to information technology personnel to proceed with deployment of the source code files if the issue flag is not set.

“19. The computer-implemented automated review method of claim 18, wherein the non-syntax-related guidelines for SQL source code files includes determining the occurrence of specific SQL commands which are known to be time-consuming or resource-intensive to execute, and determining whether a type of data to be written to the data store matches a type of data in the data store.

“20. The computer-implemented automated review method of claim 18, wherein the guidelines for invoking SQL source code within Java source code include checking for usage of spring Java database connectivity (JDBC) framework, and checking that a type of data passed to the SQL components matches a type of data expected by the SQL components.”

For the URL and additional information on this patent, see: Anderson, Matthew; Snyder, Richard T.; Galvin, Daniel George. Automated Data Store Access Source Code Review. U.S. Patent Number 10,585,663, filed October 13, 2017, and published online on March 23, 2020. Patent URL: http://patft.uspto.gov/netacgi/nph-Parser?Sect1=PTO1&Sect2=HITOFF&d=PALL&p=1&u=%2Fnetahtml%2FPTO%2Fsrchnum.htm&r=1&f=G&l=50&s1=10,585,663.PN.&OS=PN/10,585,663RS=PN/10,585,663

(Our reports deliver fact-based news of research and discoveries from around the world.)

Older

SBA Disaster Declaration Approved – Loans Now Available

Newer

Technical Mapping Advisory Council

Advisor News

  • Advisors must lead the policy risk conversation
  • Gen X more anxious than baby boomers about retirement
  • Taxing trend: How the OBBBA is breaking the standard deduction reliance
  • 6 in 10 Americans struggle with financial decisions
  • New Trump administration rule seeks to bail out private equity, credit with workers’ 401(k) savings
More Advisor News

Annuity News

  • ‘I get confused:’ Regulators ponder increasing illustration complexities
  • Three ways the Corebridge/Equitable merger could shake up the annuity market
  • Corebridge, Equitable merge to create potential new annuity sales king
  • LIMRA: Final retail annuity sales total $464.1 billion in 2025
  • How annuities can enhance retirement income for post-pension clients
More Annuity News

Health/Employee Benefits News

  • Findings from Tufts Medical Center Has Provided New Information about Cancer (“Nothing Is as Great a Learning Experience as Getting a $15,000 Bill”A Mixed-Methods Study of Young Adult Cancer Survivors’ Experience With Insurance Coverage): Cancer
  • Layin' It on the Line: The long-term care crisis in Utah: Why national plans fail here and how to shield your assets (Part 1)
  • Guardian Completes Integration With FINEOS to Expand Digital Capabilities and Deliver a Simplified Leave Experience
  • Your health plan may cover more during pregnancy than you think
  • Wyoming's BearCare health plan for emergencies dies, for now
More Health/Employee Benefits News

Life Insurance News

  • AM Best Affirms Credit Ratings of MetLife, Inc. and Its Life/Health Subsidiaries
  • Guardian Completes Integration With FINEOS to Expand Digital Capabilities and Deliver a Simplified Leave Experience
  • From marathons to mountaineering: Ranking which sports and hobbies affect life insurance the most
  • AMERICA'S CREDIT UNIONS HIRES VETERAN WASHINGTON ADVOCATE TO LEAD POLICY STRATEGY
  • Society of Actuaries announces Clar Rosso as next CEO
More Life Insurance News

- Presented By -

Top Read Stories

More Top Read Stories >

NEWS INSIDE

  • Companies
  • Earnings
  • Economic News
  • INN Magazine
  • Insurtech News
  • Newswires Feed
  • Regulation News
  • Washington Wire
  • Videos

FEATURED OFFERS

Protectors Vegas Arrives Nov 9th - 11th
1,000+ attendees. 150+ speakers. Join the largest event in life & annuities this November.

An FIA Cap That Stays Locked
CapLock™ from Oceanview locks the cap at issue for 5 or 7 years. No resets. Just clarity.

Aim higher with Ascend annuities
Fixed, fixed-indexed, registered index-linked and advisory annuities to help you go above and beyond

Unlock the Future of Index-Linked Solutions
Join industry leaders shaping next-gen index strategies, distribution, and innovation.

Leveraging Underwriting Innovations
See how Pacific Life’s approach to life insurance underwriting can give you a competitive edge.

Press Releases

  • RFP #T01525
  • RFP #T01725
  • Insurate expands workers’ comp into: CA, FL, LA, NC, NJ, PA, VA
  • LifeSecure Insurance Company Announces Retirement of Brian Vestergaard, Additions to Executive Leadership
  • RFP #T02226
More Press Releases > Add Your Press Release >

How to Write For InsuranceNewsNet

Find out how you can submit content for publishing on our website.
View Guidelines

Topics

  • Advisor News
  • Annuity Index
  • Annuity News
  • Companies
  • Earnings
  • Fiduciary
  • From the Field: Expert Insights
  • Health/Employee Benefits
  • Insurance & Financial Fraud
  • INN Magazine
  • Insiders Only
  • Life Insurance News
  • Newswires
  • Property and Casualty
  • Regulation News
  • Sponsored Articles
  • Washington Wire
  • Videos
  • ———
  • About
  • Meet our Editorial Staff
  • Advertise
  • Contact
  • Newsletters

Top Sections

  • AdvisorNews
  • Annuity News
  • Health/Employee Benefits News
  • InsuranceNewsNet Magazine
  • Life Insurance News
  • Property and Casualty News
  • Washington Wire

Our Company

  • About
  • Advertise
  • Contact
  • Meet our Editorial Staff
  • Magazine Subscription
  • Write for INN

Sign up for our FREE e-Newsletter!

Get breaking news, exclusive stories, and money- making insights straight into your inbox.

select Newsletter Options
Facebook Linkedin Twitter
© 2026 InsuranceNewsNet.com, Inc. All rights reserved.
  • Terms & Conditions
  • Privacy Policy
  • InsuranceNewsNet Magazine

Sign in with your Insider Pro Account

Not registered? Become an Insider Pro.
Insurance News | InsuranceNewsNet