Patents by Inventor He Yuan Huang
He Yuan Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9521218Abstract: A method for optimizing migration efficiency of a data file over network is provided. Specifically, a total time of compression time of the data file, transfer time of the data file over the network, and decompression time of the data file, is minimized by adaptively selecting compression methods to compress each data block of the data file. For selecting a compression method for a data block, information entropy of the data block is analyzed, and a real status of computing and system resources is considered. Further, trade-off among the resource usage, compassion speed and compression ratio is made to calculate an optimized transmission solution over the network for each data block of the data file.Type: GrantFiled: January 21, 2016Date of Patent: December 13, 2016Assignee: International Business Machines CorporationInventors: Liya Fan, Yong Deng Hu, He Yuan Huang, Chen Tian, Jian Wang, Zhe Yan, Ke Zhang
-
Publication number: 20160360418Abstract: A method to detect unauthorized beacons includes receiving position information that defines a positional pattern for a plurality of authorized beacons, receiving beacon identifiers from a plurality of beacons with a beacon receiving device, determining a movement path of the beacon receiving device relative to the positional pattern, and determining whether the movement path has an anomaly. A corresponding computer program product and computer system are also disclosed herein.Type: ApplicationFiled: February 29, 2016Publication date: December 8, 2016Inventors: Qiang Guan, He Yuan Huang, Chun hua Tian, Feng Juan Wang, Yu Wang, Zhi Jun Wang, Chao Zhang
-
Publication number: 20160359885Abstract: A method to detect unauthorized beacons includes receiving position information that defines a positional pattern for a plurality of authorized beacons, receiving beacon identifiers from a plurality of beacons with a beacon receiving device, determining a movement path of the beacon receiving device relative to the positional pattern, and determining whether the movement path has an anomaly. A corresponding computer program product and computer system are also disclosed herein.Type: ApplicationFiled: June 4, 2015Publication date: December 8, 2016Inventors: Qiang Guan, He Yuan Huang, Chun hua Tian, Feng Juan Wang, Yu Wang, Zhi Jun Wang, Chao Zhang
-
Publication number: 20160234250Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.Type: ApplicationFiled: February 10, 2015Publication date: August 11, 2016Inventors: Paul Anthony ASHLEY, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
-
Publication number: 20160234224Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.Type: ApplicationFiled: June 25, 2015Publication date: August 11, 2016Inventors: Paul Anthony ASHLEY, Stefan BERGER, Tian Cheng LIU, He Yuan HUANG, Sreekanth Ramakrishna IYER, Ashish KUNDU, Nataraj NAGARATNAM, Dimitrios PENDARAKIS, Ronald Becker WILLIAMS
-
Patent number: 9411645Abstract: A method for scheduling MapReduce tasks includes receiving a set of task statistics corresponding to task execution within a MapReduce job, estimating a completion time for a set of tasks to be executed to provide an estimated completion time, calculating a soft decision point based on a convergence of a workload distribution corresponding to a set of executed tasks, calculating a hard decision point based on the estimated completion time for the set of tasks to be executed, determining a selected decision point based on the soft decision point and the hard decision point, and scheduling upcoming tasks for execution based on the selected decision point. The method may also include estimating a map task completion time and estimating a shuffle operation completion time. A computer program product and computer system corresponding to the method are also disclosed.Type: GrantFiled: December 29, 2015Date of Patent: August 9, 2016Assignee: International Business Machines CorporationInventors: Ning Duan, Liya Fan, He Yuan Huang, Jian Wang, Zhi Hu Wang
-
Patent number: 9220094Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.Type: GrantFiled: October 16, 2013Date of Patent: December 22, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
-
Publication number: 20150347742Abstract: A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties.Type: ApplicationFiled: August 13, 2015Publication date: December 3, 2015Inventors: He Yuan Huang, Liu Jian, Min Li, Xiao Xi Liu
-
Patent number: 9122863Abstract: A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties.Type: GrantFiled: December 19, 2012Date of Patent: September 1, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: He Yuan Huang, Liu Jian, Min Li, Xiao Xi Liu
-
Patent number: 8875269Abstract: A method for single sign-on with established federation includes triggering a single sign-on operation from a first service to a second service, retrieving, by the first service, an associated federation key and pseudo identification for a user agent, generating, by the first service, a token signed with a federation key for the user agent based on the pseudo identification, redirecting, by the first service, the user agent to the second service, wherein the user agent transfers the token to the second service, verifying, by the second service, the token and determining an associated identification in the second service, and returning, by the second service, a resource to the user agent.Type: GrantFiled: February 23, 2011Date of Patent: October 28, 2014Assignee: International Business Machines CorporationInventors: Paula K. Austel, He Yuan Huang, Michael McIntosh, Bin Wang, Jing Min Xu
-
Patent number: 8819800Abstract: A method and apparatus for protecting user information. The method includes receiving a request for accessing the user information from an application. When the request does not include an authorized token, the user is requested to temporally confirm the request for access. In response to the confirmation, a token is generated and the user on a mobile service platform is associated with the request for access by the token. The application is then allowed to access the user information based on the token associating the user with the request for accessing the user information from the application.Type: GrantFiled: July 30, 2010Date of Patent: August 26, 2014Assignee: International Business Machines CorporationInventors: Zhi Guo Gao, He Yuan Huang, Li Li, Rui Xiong Tian
-
Patent number: 8677327Abstract: The present invention provides a service testing method and system using a surrogate. The service testing method comprises steps of: generating, according to service description of a service to be simulated, a service-specific surrogate for said service to be simulated; deploying the generated service-specific surrogate onto a runtime system; specifying a test case by referring to the generated service-specific surrogate, wherein said test case comprises test configuration; and setting, according to the test configuration, a configuration option of the deployed surrogate on the runtime system. In the service testing method and system according to the present invention, parameters of the surrogate are dynamically configured without necessity of rewriting and deployment, thereby reducing the burden of designing and generating Mock objects.Type: GrantFiled: April 9, 2008Date of Patent: March 18, 2014Assignee: International Business Machines CorporationInventors: He Yuan Huang, Shih-Gong Li, Zhong Jie Li, Jun Zhu
-
Publication number: 20140044077Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Are Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.Type: ApplicationFiled: October 16, 2013Publication date: February 13, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
-
Patent number: 8611298Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.Type: GrantFiled: July 31, 2012Date of Patent: December 17, 2013Assignee: International Business Machines CorporationInventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
-
Patent number: 8595700Abstract: The present invention provides a component reuse method for reusing at least first component that is selected from a first software system to a second software system. The method comprises the steps of: analyzing the first software system, determining dependencies of the at least one first component of the first software system and acquiring relevant interface information; generating surrogates based on the dependencies and the interface information, which will be deployed in the first operating environment and in the second operating environment respectively, wherein the surrogates allow the second software system to invoke service provided by the at least one first component in the first operating environment and allow the at least one first component to invoke relevant service provided in the second software system.Type: GrantFiled: May 6, 2008Date of Patent: November 26, 2013Assignee: International Business Machines CorporationInventors: He Yuan Huang, Shih-Gong Li, Hua Fang Tan, Wei Zhao, Jun Zhu
-
Patent number: 8572562Abstract: A method, apparatus, system, and computer program products for implementing non-function logic extensibly and independently of functional logic, the method comprising the steps of: acquiring association relationship between a policy and a required plug-in based on a loaded policy demand configuration; generating a plug-in context definition according to the acquired association relationship, the plug-in context definition being part of a plug-in context associated with the plug-in, wherein the plug-in context defines services provided by the plug-in and reference to other plug-ins related to the plug-in; and generating a plug-in context object based on the plug-in context definition, wherein the plug-in context object is an instantiated plug-in context definition.Type: GrantFiled: September 12, 2008Date of Patent: October 29, 2013Assignee: International Business Machines CorporationInventors: He Yuan Huang, Hua Fang Tan, Jian Xu, Jun Zhu
-
Patent number: 8543813Abstract: Computer-implemented methods and apparatus to perform a valid transfer of an electronic mobile ticket on a mobile device by a ticketing application system of a ticket processing center. One method includes: receiving a first electronic message from a first user, where the first message includes an encrypted electronic mobile ticket and a mobile device number of a second user, and where the electronic mobile ticket is encrypted with a key shared between the first user and the ticketing application system; decrypting the encrypted electronic mobile ticket; generating an electronic mobile ticket encrypted with a key shared by the ticketing application system and the second user; and transmitting a second electronic message that includes the electronic mobile ticket encrypted with the key shared between the ticketing application system and the second user to a mobile device of the second user.Type: GrantFiled: September 29, 2010Date of Patent: September 24, 2013Assignee: International Business Machines CorporationInventors: Chen Hua Feng, He Yuan Huang, Xiao Xi Liu, Bin Wang
-
Publication number: 20120294297Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Are Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.Type: ApplicationFiled: July 31, 2012Publication date: November 22, 2012Applicant: International Business Machines CorporationInventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
-
Patent number: 8265027Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.Type: GrantFiled: October 28, 2009Date of Patent: September 11, 2012Assignee: International Business Machines CorporationInventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
-
Publication number: 20120222110Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: ApplicationFiled: February 23, 2012Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: HE YUAN HUANG, XIAO XI LIU, QI HU, GUAN QUN ZHANG