Patents by Inventor He Yuan Huang

He Yuan Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9521218
    Abstract: A method for optimizing migration efficiency of a data file over network is provided. Specifically, a total time of compression time of the data file, transfer time of the data file over the network, and decompression time of the data file, is minimized by adaptively selecting compression methods to compress each data block of the data file. For selecting a compression method for a data block, information entropy of the data block is analyzed, and a real status of computing and system resources is considered. Further, trade-off among the resource usage, compassion speed and compression ratio is made to calculate an optimized transmission solution over the network for each data block of the data file.
    Type: Grant
    Filed: January 21, 2016
    Date of Patent: December 13, 2016
    Assignee: International Business Machines Corporation
    Inventors: Liya Fan, Yong Deng Hu, He Yuan Huang, Chen Tian, Jian Wang, Zhe Yan, Ke Zhang
  • Publication number: 20160360418
    Abstract: A method to detect unauthorized beacons includes receiving position information that defines a positional pattern for a plurality of authorized beacons, receiving beacon identifiers from a plurality of beacons with a beacon receiving device, determining a movement path of the beacon receiving device relative to the positional pattern, and determining whether the movement path has an anomaly. A corresponding computer program product and computer system are also disclosed herein.
    Type: Application
    Filed: February 29, 2016
    Publication date: December 8, 2016
    Inventors: Qiang Guan, He Yuan Huang, Chun hua Tian, Feng Juan Wang, Yu Wang, Zhi Jun Wang, Chao Zhang
  • Publication number: 20160359885
    Abstract: A method to detect unauthorized beacons includes receiving position information that defines a positional pattern for a plurality of authorized beacons, receiving beacon identifiers from a plurality of beacons with a beacon receiving device, determining a movement path of the beacon receiving device relative to the positional pattern, and determining whether the movement path has an anomaly. A corresponding computer program product and computer system are also disclosed herein.
    Type: Application
    Filed: June 4, 2015
    Publication date: December 8, 2016
    Inventors: Qiang Guan, He Yuan Huang, Chun hua Tian, Feng Juan Wang, Yu Wang, Zhi Jun Wang, Chao Zhang
  • Publication number: 20160234250
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Application
    Filed: February 10, 2015
    Publication date: August 11, 2016
    Inventors: Paul Anthony ASHLEY, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
  • Publication number: 20160234224
    Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.
    Type: Application
    Filed: June 25, 2015
    Publication date: August 11, 2016
    Inventors: Paul Anthony ASHLEY, Stefan BERGER, Tian Cheng LIU, He Yuan HUANG, Sreekanth Ramakrishna IYER, Ashish KUNDU, Nataraj NAGARATNAM, Dimitrios PENDARAKIS, Ronald Becker WILLIAMS
  • Patent number: 9411645
    Abstract: A method for scheduling MapReduce tasks includes receiving a set of task statistics corresponding to task execution within a MapReduce job, estimating a completion time for a set of tasks to be executed to provide an estimated completion time, calculating a soft decision point based on a convergence of a workload distribution corresponding to a set of executed tasks, calculating a hard decision point based on the estimated completion time for the set of tasks to be executed, determining a selected decision point based on the soft decision point and the hard decision point, and scheduling upcoming tasks for execution based on the selected decision point. The method may also include estimating a map task completion time and estimating a shuffle operation completion time. A computer program product and computer system corresponding to the method are also disclosed.
    Type: Grant
    Filed: December 29, 2015
    Date of Patent: August 9, 2016
    Assignee: International Business Machines Corporation
    Inventors: Ning Duan, Liya Fan, He Yuan Huang, Jian Wang, Zhi Hu Wang
  • Patent number: 9220094
    Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: December 22, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
  • Publication number: 20150347742
    Abstract: A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties.
    Type: Application
    Filed: August 13, 2015
    Publication date: December 3, 2015
    Inventors: He Yuan Huang, Liu Jian, Min Li, Xiao Xi Liu
  • Patent number: 9122863
    Abstract: A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties.
    Type: Grant
    Filed: December 19, 2012
    Date of Patent: September 1, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: He Yuan Huang, Liu Jian, Min Li, Xiao Xi Liu
  • Patent number: 8875269
    Abstract: A method for single sign-on with established federation includes triggering a single sign-on operation from a first service to a second service, retrieving, by the first service, an associated federation key and pseudo identification for a user agent, generating, by the first service, a token signed with a federation key for the user agent based on the pseudo identification, redirecting, by the first service, the user agent to the second service, wherein the user agent transfers the token to the second service, verifying, by the second service, the token and determining an associated identification in the second service, and returning, by the second service, a resource to the user agent.
    Type: Grant
    Filed: February 23, 2011
    Date of Patent: October 28, 2014
    Assignee: International Business Machines Corporation
    Inventors: Paula K. Austel, He Yuan Huang, Michael McIntosh, Bin Wang, Jing Min Xu
  • Patent number: 8819800
    Abstract: A method and apparatus for protecting user information. The method includes receiving a request for accessing the user information from an application. When the request does not include an authorized token, the user is requested to temporally confirm the request for access. In response to the confirmation, a token is generated and the user on a mobile service platform is associated with the request for access by the token. The application is then allowed to access the user information based on the token associating the user with the request for accessing the user information from the application.
    Type: Grant
    Filed: July 30, 2010
    Date of Patent: August 26, 2014
    Assignee: International Business Machines Corporation
    Inventors: Zhi Guo Gao, He Yuan Huang, Li Li, Rui Xiong Tian
  • Patent number: 8677327
    Abstract: The present invention provides a service testing method and system using a surrogate. The service testing method comprises steps of: generating, according to service description of a service to be simulated, a service-specific surrogate for said service to be simulated; deploying the generated service-specific surrogate onto a runtime system; specifying a test case by referring to the generated service-specific surrogate, wherein said test case comprises test configuration; and setting, according to the test configuration, a configuration option of the deployed surrogate on the runtime system. In the service testing method and system according to the present invention, parameters of the surrogate are dynamically configured without necessity of rewriting and deployment, thereby reducing the burden of designing and generating Mock objects.
    Type: Grant
    Filed: April 9, 2008
    Date of Patent: March 18, 2014
    Assignee: International Business Machines Corporation
    Inventors: He Yuan Huang, Shih-Gong Li, Zhong Jie Li, Jun Zhu
  • Publication number: 20140044077
    Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Are Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.
    Type: Application
    Filed: October 16, 2013
    Publication date: February 13, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
  • Patent number: 8611298
    Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.
    Type: Grant
    Filed: July 31, 2012
    Date of Patent: December 17, 2013
    Assignee: International Business Machines Corporation
    Inventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
  • Patent number: 8595700
    Abstract: The present invention provides a component reuse method for reusing at least first component that is selected from a first software system to a second software system. The method comprises the steps of: analyzing the first software system, determining dependencies of the at least one first component of the first software system and acquiring relevant interface information; generating surrogates based on the dependencies and the interface information, which will be deployed in the first operating environment and in the second operating environment respectively, wherein the surrogates allow the second software system to invoke service provided by the at least one first component in the first operating environment and allow the at least one first component to invoke relevant service provided in the second software system.
    Type: Grant
    Filed: May 6, 2008
    Date of Patent: November 26, 2013
    Assignee: International Business Machines Corporation
    Inventors: He Yuan Huang, Shih-Gong Li, Hua Fang Tan, Wei Zhao, Jun Zhu
  • Patent number: 8572562
    Abstract: A method, apparatus, system, and computer program products for implementing non-function logic extensibly and independently of functional logic, the method comprising the steps of: acquiring association relationship between a policy and a required plug-in based on a loaded policy demand configuration; generating a plug-in context definition according to the acquired association relationship, the plug-in context definition being part of a plug-in context associated with the plug-in, wherein the plug-in context defines services provided by the plug-in and reference to other plug-ins related to the plug-in; and generating a plug-in context object based on the plug-in context definition, wherein the plug-in context object is an instantiated plug-in context definition.
    Type: Grant
    Filed: September 12, 2008
    Date of Patent: October 29, 2013
    Assignee: International Business Machines Corporation
    Inventors: He Yuan Huang, Hua Fang Tan, Jian Xu, Jun Zhu
  • Patent number: 8543813
    Abstract: Computer-implemented methods and apparatus to perform a valid transfer of an electronic mobile ticket on a mobile device by a ticketing application system of a ticket processing center. One method includes: receiving a first electronic message from a first user, where the first message includes an encrypted electronic mobile ticket and a mobile device number of a second user, and where the electronic mobile ticket is encrypted with a key shared between the first user and the ticketing application system; decrypting the encrypted electronic mobile ticket; generating an electronic mobile ticket encrypted with a key shared by the ticketing application system and the second user; and transmitting a second electronic message that includes the electronic mobile ticket encrypted with the key shared between the ticketing application system and the second user to a mobile device of the second user.
    Type: Grant
    Filed: September 29, 2010
    Date of Patent: September 24, 2013
    Assignee: International Business Machines Corporation
    Inventors: Chen Hua Feng, He Yuan Huang, Xiao Xi Liu, Bin Wang
  • Publication number: 20120294297
    Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Are Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.
    Type: Application
    Filed: July 31, 2012
    Publication date: November 22, 2012
    Applicant: International Business Machines Corporation
    Inventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
  • Patent number: 8265027
    Abstract: A method for selecting a channel for an access point (AP) in a Wireless Local Area Network (WLAN). The method includes the AP receiving network conditions of APs within the sensing range of a terminal sent by the terminal, and the AP selecting a channel based on the received network conditions. By forwarding the network conditions of other APs which can be detected by the terminal, the method of the present invention enables an AP to select a channel from the view of a terminal to avoid conflicts at the terminal, thereby improving the available bandwidth of the terminal, and giving a better experience to users.
    Type: Grant
    Filed: October 28, 2009
    Date of Patent: September 11, 2012
    Assignee: International Business Machines Corporation
    Inventors: Lin Chen, He Yuan Huang, Qian Ma, Yin Ben Xia, Yan Feng Zhu
  • Publication number: 20120222110
    Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.
    Type: Application
    Filed: February 23, 2012
    Publication date: August 30, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: HE YUAN HUANG, XIAO XI LIU, QI HU, GUAN QUN ZHANG