Patents by Inventor Kai Mike Zhang

Kai Mike Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9514201
    Abstract: A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: December 6, 2016
    Assignee: International Business Machines Corporation
    Inventors: Atul R. Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Patent number: 9274857
    Abstract: A computer program product is disclosed. The computer program product includes a computer useable medium that has a computer readable program. The computer readable program when executive on a computer causes the computer to receive a request from a component to invoke a function. Further, the computer readable program, when executed on a computer, causes the computer to asynchronously perform the function according to the request. In addition, the computer readable program, when executed on a computer, causes the computer to provide, to one or more programs, an indication that the function has completed work according to the request.
    Type: Grant
    Filed: October 13, 2006
    Date of Patent: March 1, 2016
    Assignee: International Business Machines Corporation
    Inventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Patent number: 9047144
    Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.
    Type: Grant
    Filed: November 4, 2009
    Date of Patent: June 2, 2015
    Assignee: International Business Machines Corporation
    Inventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Patent number: 8549144
    Abstract: Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.
    Type: Grant
    Filed: August 31, 2007
    Date of Patent: October 1, 2013
    Assignee: International Business Machines Corporation
    Inventors: Manoj Khangaonkar, Wen Chao Li, Weixin Xu, Kai Mike Zhang
  • Patent number: 8392700
    Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Grant
    Filed: July 2, 2008
    Date of Patent: March 5, 2013
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Patent number: 8352912
    Abstract: A computer program product is provided. The computer program product includes a computer useable medium having a computer readable program. The computer readable program when executed on a computer causes the computer to generate a topology role in a topology role tier that is included in a topology pattern. Further, the computer readable program when executed on a computer causes the computer to create a component in a component tier that is defined in the topology pattern such that the component corresponds to the topology role. In addition, the computer readable program when executed on a computer causes the computer to map the topology role to a deployment target.
    Type: Grant
    Filed: December 15, 2008
    Date of Patent: January 8, 2013
    Assignee: International Business Machines Corporation
    Inventors: Mandar Ganesh Bhatkhande, Srikanth Bhattiprolu, Atul Ravindra Daherkar, Thomas Pollinger, Charles James Redlin, Chidanandan Theyancheri, Kai Mike Zhang
  • Publication number: 20110107354
    Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.
    Type: Application
    Filed: November 4, 2009
    Publication date: May 5, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Patent number: 7895602
    Abstract: Provided are a system and article of manufacture for duplicate message elimination during recovery when multiple threads are delivering messages from a message store to a destination queue. A plurality of message threads process operations to deliver messages from a message store to a destination queue, wherein one message thread processes one message. An in-doubt list is generated identifying messages that are in-progress of being delivered form the message store to the destination queue by the message threads. One message thread processing one message adds an entry including the message identifier and the thread identifier to a monitor queue. The message thread further adds the message to the destination queue. A recovery thread is generated in response to detecting a failure in the processing by the threads to deliver the messages from the message store to the destination queue.
    Type: Grant
    Filed: November 25, 2008
    Date of Patent: February 22, 2011
    Assignee: International Business Machines Corporation
    Inventors: Kenneth L. Astl, Subramanyam Agraharam Gooty, Arul Sundaramurthy, Kai Mike Zhang
  • Publication number: 20100153164
    Abstract: A system and method for business calendar event modeling comprises receiving a plurality of events from a computerized calendar user wherein each event is classified as an OnTime, OffTime or OtherTime event. Wherein, an OnTime event is defined as a calendar period where the calendar user is available, an OffTime event is defined as a calendar period where the calendar user is unavailable; and an OtherTime event is defined as a calendar period unrelated to the calendar user's availability. Then, calculating the calendar user's net OnTime, wherein net OnTime is a sum of periods of a day wherein an OnTime event period does not overlap with an OffTime event period. Also, calculating user available days wherein a user available day is a day having net OnTime. Calculating the number of user available days, hours and minutes before an event.
    Type: Application
    Filed: December 11, 2008
    Publication date: June 17, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Atul Ravindra DAHERKAR, Manoj KHANGAONKAR, Chidanandan THEYANCHERI, Kai Mike ZHANG
  • Publication number: 20100153916
    Abstract: A computer program product is provided. The computer program product includes a computer useable medium having a computer readable program. The computer readable program when executed on a computer causes the computer to generate a topology role in a topology role tier that is included in a topology pattern. Further, the computer readable program when executed on a computer causes the computer to create a component in a component tier that is defined in the topology pattern such that the component corresponds to the topology role. In addition, the computer readable program when executed on a computer causes the computer to map the topology role to a deployment target.
    Type: Application
    Filed: December 15, 2008
    Publication date: June 17, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Mandar Ganesh Bhatkhande, Srikanth Bhattiprolu, Atul Ravindra Daherkar, Thomas Pollinger, Charles James Redlin, Chidanandan Theyancheri, Kai Mike Zhang
  • Patent number: 7644266
    Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.
    Type: Grant
    Filed: September 23, 2004
    Date of Patent: January 5, 2010
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Patent number: 7607006
    Abstract: A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Grant
    Filed: September 23, 2004
    Date of Patent: October 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Publication number: 20090119680
    Abstract: Provided are a system and article of manufacture for duplicate message elimination during recovery when multiple threads are delivering messages from a message store to a destination queue. A plurality of message threads process operations to deliver messages from a message store to a destination queue, wherein one message thread processes one message. An in-doubt list is generated identifying messages that are in-progress of being delivered form the message store to the destination queue by the message threads. One message thread processing one message adds an entry including the message identifier and the thread identifier to a monitor queue. The message thread further adds the message to the destination queue. A recovery thread is generated in response to detecting a failure in the processing by the threads to deliver the messages from the message store to the destination queue.
    Type: Application
    Filed: November 25, 2008
    Publication date: May 7, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Kenneth L. ASTL, Subramanyam Agraharam GOOTY, Arul SUNDARAMURTHY, Kai Mike ZHANG
  • Publication number: 20090063563
    Abstract: Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. Configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.
    Type: Application
    Filed: August 31, 2007
    Publication date: March 5, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Manoj Khangaonkar, Wen Chao Li, Weixin Xu, Kai Mike Zhang
  • Patent number: 7480918
    Abstract: Provided is a method for duplicate message elimination A plurality of message threads process operations to deliver messages from a message store to a destination queue. An in-doubt list is generated identifying messages that are in-progress of being delivered from the message store to the destination queue by the message threads. One message thread processing one message adds an entry including the message identifier to a monitor queue. The message thread further adds the message to the destination queue. A recovery thread is generated in response to detecting a failure in the processing by the threads to deliver the messages from the message store to the destination queue. The recovery thread processes the messages indicated in the in-doubt list and compares with message identifiers in the monitor queue to prevent duplicate delivery of messages to the destination queue.
    Type: Grant
    Filed: February 18, 2005
    Date of Patent: January 20, 2009
    Assignee: International Business Machines Corporation
    Inventors: Kenneth L. Astl, Subramanyam Agraharam Gooty, Arul Sundaramurthy, Kai Mike Zhang
  • Publication number: 20080285752
    Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.
    Type: Application
    Filed: July 2, 2008
    Publication date: November 20, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
  • Publication number: 20080148299
    Abstract: A computer program product is disclosed. The computer program product includes a computer useable medium that has a computer readable program. The computer readable program when executive on a computer causes the computer to receive a request from a component to invoke a function. Further, the computer readable program, when executed on a computer, causes the computer to asynchronously perform the function according to the request. In addition, the computer readable program, when executed on a computer, causes the computer to provide, to one or more programs, an indication that the function has completed work according to the request.
    Type: Application
    Filed: October 13, 2006
    Publication date: June 19, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Publication number: 20080091712
    Abstract: A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.
    Type: Application
    Filed: October 13, 2006
    Publication date: April 17, 2008
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Atul R. Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
  • Publication number: 20040205770
    Abstract: A method for preventing the delivery of duplicate messages in a message system, wherein each message comprises a unique message identifier that identifies itself from adjacent messages, comprises the steps of polling a message store for messages directed to a specified receiver; receiving from the message store at least one message directed to the specified receiver; processing the at least one message; receiving, from a monitor queue, a message identifier for the last message successfully delivered to the specified receiver; and comparing the message identifier received from the monitor queue to the message identifier of the message received from the message store.
    Type: Application
    Filed: February 11, 2003
    Publication date: October 14, 2004
    Applicant: International Business Machines Corporation
    Inventors: Kai Mike Zhang, Kenneth L. Astl, Subramanyam Agraharam Gooty, Arul Prabhu Sundaramurthy