Patents by Inventor Shao Jun Ding
Shao Jun Ding has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11775398Abstract: Embodiments of the present disclosure relate to rollback of services with a global variable change. Embodiment techniques detect that at least two of a plurality of services in a transaction are executed to change a value of a first global variable. Tracing information is obtained to indicate a first order in which the at least two services change the value of the first global variable during execution of the plurality of services. In response to a failure of the transaction, a rollback execution plan for a plurality of compensating services is determined at least based on the tracing information, where the plurality of compensating services are configured to compensate for the plurality of services respectively. The plurality of compensating services subsequently executed according to the rollback execution plan.Type: GrantFiled: September 30, 2021Date of Patent: October 3, 2023Assignee: International Business Machines CorporationInventors: Yue Wang, Jing Jing Wei, Yingchun Guo, Shao Jun Ding, Jian Nan Guo
-
Patent number: 11632397Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.Type: GrantFiled: July 17, 2019Date of Patent: April 18, 2023Assignee: International Business Machines CorporationInventors: Dong Chen, Wu Mi Zhong, Ting Yin, Zhi Li Guan, Yang Liang, Shao Jun Ding
-
Patent number: 11621978Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.Type: GrantFiled: December 21, 2017Date of Patent: April 4, 2023Assignee: International Business Machines CorporationInventors: Dong Chen, Wu Mi Zhong, Ting Yin, Zhi Li Guan, Yang Liang, Shao Jun Ding
-
Publication number: 20230095620Abstract: Embodiments of the present disclosure relate to rollback of services with a global variable change. Embodiment techniques detect that at least two of a plurality of services in a transaction are executed to change a value of a first global variable. Tracing information is obtained to indicate a first order in which the at least two services change the value of the first global variable during execution of the plurality of services. In response to a failure of the transaction, a rollback execution plan for a plurality of compensating services is determined at least based on the tracing information, where the plurality of compensating services are configured to compensate for the plurality of services respectively. The plurality of compensating services subsequently executed according to the rollback execution plan.Type: ApplicationFiled: September 30, 2021Publication date: March 30, 2023Inventors: Yue Wang, Jing Jing Wei, YINGCHUN GUO, Shao Jun Ding, Jian Nan Guo
-
Patent number: 11422791Abstract: Approaches presented herein enable hot upgrading a microservices sequence in a cloud computing environment. More specifically, a next microservice of microservice subsequence in a running sequence is obtained, in response to a message to invoke the microservice or subsequence. The running microservice sequence includes at least one unexecuted microservice or subsequence that is to be hot upgraded. The running microservice sequence is generated based on a sequence that is to be hot upgraded which comprises an ordered list of microservices and/or subsequences. The approach may include determining the status of a next microservice or subsequence. The approach may further include invoking the next microservice or subsequence in the running sequence, in response to the status of the next microservice or subsequence being upgrade-complete.Type: GrantFiled: December 31, 2020Date of Patent: August 23, 2022Assignee: International Business Machines CorporationInventors: Yingchun Guo, Jing Jing Wei, Yue Wang, Shao Jun Ding, Jian Nan Guo
-
Publication number: 20220206782Abstract: Approaches presented herein enable hot upgrading a microservices sequence in a cloud computing environment. More specifically, a next microservice of microservice subsequence in a running sequence is obtained, in response to a message to invoke the microservice or subsequence. The running microservice sequence includes at least one unexecuted microservice or subsequence that is to be hot upgraded. The running microservice sequence is generated based on a sequence that is to be hot upgraded which comprises an ordered list of microservices and/or subsequences. The approach may include determining the status of a next microservice or subsequence. The approach may further include invoking the next microservice or subsequence in the running sequence, in response to the status of the next microservice or subsequence being upgrade-complete.Type: ApplicationFiled: December 31, 2020Publication date: June 30, 2022Inventors: YINGCHUN GUO, JING JING WEI, YUE WANG, SHAO JUN DING, JIAN NAN GUO
-
Patent number: 11029981Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.Type: GrantFiled: April 15, 2020Date of Patent: June 8, 2021Assignee: International Business Machines CorporationInventors: Dong Chen, Shao Jun Ding, Zhi Li Guan, Yang Liang, Ting Yin, Wu Mi Zhong
-
Patent number: 10949271Abstract: An enhanced copy-and-paste function copies multiple logical and physical software objects from a source computing environment to a distinct target computing environment. A physical object can be any software-data entity, such as a document, a container, a database, or a disk image. A logical object contains a hierarchy of two or more physical or logical objects. Objects are copied to a logical copy clipboard, where they may be assembled into logical objects. Each physical object is then transferred one at a time to a conventional physical clipboard, transmitted to a corresponding physical clipboard in a corresponding target environment, and then forwarded to a logical paste clipboard, where the original logical objects are reconstructed and pasted into the target environment. Each logical object may be pasted into multiple target environments and may contain physical objects copied from multiple source environments. Multiple logical objects may contain the same physical object.Type: GrantFiled: March 22, 2017Date of Patent: March 16, 2021Assignee: International Business Machines CorporationInventors: Dong Chen, Shao Jun Ding, Zhi Li Guan, Yang Liang, Xin Peng Liu, Ting Yin, Wu Mi Zhong
-
Publication number: 20200241898Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.Type: ApplicationFiled: April 15, 2020Publication date: July 30, 2020Inventors: Dong Chen, Shao Jun Ding, Zhi Li Guan, Yang Liang, Ting Yin, Wu Mi Zhong
-
Patent number: 10691474Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.Type: GrantFiled: January 3, 2017Date of Patent: June 23, 2020Assignee: International Business Machines CorporationInventors: Dong Chen, Shao Jun Ding, Zhi Li Guan, Yang Liang, Ting Yin, Wu Mi Zhong
-
Publication number: 20190356698Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.Type: ApplicationFiled: July 17, 2019Publication date: November 21, 2019Inventors: Dong Chen, Wu Mi Zhong, Ting Yin, Zhi Li Guan, Yang Liang, Shao Jun Ding
-
Publication number: 20190199750Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.Type: ApplicationFiled: December 21, 2017Publication date: June 27, 2019Inventors: Dong Chen, Wu Mi Zhong, Ting Yin, Zhi Li Guan, Yang Liang, Shao Jun Ding
-
Publication number: 20180276057Abstract: An enhanced copy-and-paste function copies multiple logical and physical software objects from a source computing environment to a distinct target computing environment. A physical object can be any software-data entity, such as a document, a container, a database, or a disk image. A logical object contains a hierarchy of two or more physical or logical objects. Objects are copied to a logical copy clipboard, where they may be assembled into logical objects. Each physical object is then transferred one at a time to a conventional physical clipboard, transmitted to a corresponding physical clipboard in a corresponding target environment, and then forwarded to a logical paste clipboard, where the original logical objects are reconstructed and pasted into the target environment. Each logical object may be pasted into multiple target environments and may contain physical objects copied from multiple source environments. Multiple logical objects may contain the same physical object.Type: ApplicationFiled: March 22, 2017Publication date: September 27, 2018Inventors: Dong Chen, Shao Jun Ding, Zhi Li Guan, Yang Liang, Xin Peng Liu, Ting Yin, Wu Mi Zhong
-
Publication number: 20180188914Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.Type: ApplicationFiled: January 3, 2017Publication date: July 5, 2018Inventors: Dong Chen, Shao Jun Ding, Zhi Li Guan, Yang Liang, Ting Yin, Wu Mi Zhong