Patents by Inventor Shiping Chen
Shiping Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20180203771Abstract: Restoring of a database table in the database system (e.g., an in-memory insert-only database system, etc.) is initiated. Thereafter, a transaction log volume storing data log records and multi-version concurrency control (MVCC) log records corresponding to the database table is accessed. Based on such access, data log records corresponding to the database table are replayed while insert and update MVCC log records corresponding to the database table are skipped. Subsequently, restoring of the database table in the database system is finalized. Related apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: January 19, 2017Publication date: July 19, 2018Inventors: Martin Heidel, Andreas Tonder, Shiping Chen
-
Publication number: 20180150539Abstract: A computer implemented method for manipulating data comprises receiving log transaction information from a primary database system at a secondary database system and parsing the log transaction information to identify data objects that have been modified on the primary database system. The secondary database system determines whether the data objects are present in main memory on the secondary database system. If the data objects are not in the main memory, they are copied from persistence data volumes to the main memory. The data objects are modified by replaying the log transactions on the data objects in the main memory. Then, the data objects in the persistence data volumes are modified. Related apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: November 30, 2016Publication date: May 31, 2018Inventors: Mihnea Andrei, Rolando Blanco, Shiping Chen, Martin Heidel, Vivek Kandiyanallur, Thomas Peh, Joern Schmidt, Liang Song, Peter Steinemann
-
Patent number: 9957564Abstract: The invention provides a PCR sequencing method, wherein the combination of primer indexes, DNA incomplete shearing strategy and the second generation sequencing technique (Paired-End sequencing technique) can make the length of PCR products that can be sequenced by a sequencer longer than the maximum sequencing length of the sequencer while making full use of the characteristics of the second generation sequencing technique such as high throughput and low cost, thereby greatly broadening its applicable scope. In addition, the present invention also provides primer indexes for the PCR sequencing method and the use of the method in genotyping, particularly in HLA analysis, and also provides the PCR primers used, particularly the PCR primers for HLA-A, B, HLA-C and HLA-DQB1 gene.Type: GrantFiled: June 30, 2011Date of Patent: May 1, 2018Assignee: BGI Genomics Co., Ltd.Inventors: Jian Li, Shiping Chen, Xiandong Zhang, Ying Liu, Caifen Zhang, Tao Liu, Meiru Zhao
-
Patent number: 9811549Abstract: Disclosed herein are system, method, and computer program product embodiments for directly restoring a database from a log volume. An embodiment operates by reading one or more database transaction log records from a log volume. The embodiment then loads from a database table persistent storage one or more pages containing rows in the database table that will be read from or written to by the one or more database transaction log records. The embodiment then loads a dictionary for each column associated with the one or more database transaction log records. The embodiment then applies the one or more database transaction log records directly into the one or more loaded pages and the one or more dictionaries. Each dictionary and page modified in memory is then written to the database table persistent storage when a savepoint operation is performed.Type: GrantFiled: November 25, 2014Date of Patent: November 7, 2017Assignee: SAP SEInventors: Ivan Schreter, Shiping Chen, David Wein, Steffen Geiβinger
-
Publication number: 20170303684Abstract: A mirrored storage cabinet is disclosed, including: a cabinet body formed by a bottom plate and an upper frame, a lower frame, a left frame and a right frame installed at four sides of the bottom plate; and a cabinet door installed at an opening of the cabinet body, wherein a first separating plate and a second separating plate are provided on the bottom plate close to the left frame and the right frame, side mirrors are provided respectively above the left frame and the first separating plate and above the right frame and the second separating plate, LED light strips are installed below the side mirrors via supports on the bottom plate, a division plate is provided between the first separating plate and the second separating plate, and the cabinet door is movably installed at the side edge of the first separating plate.Type: ApplicationFiled: April 5, 2017Publication date: October 26, 2017Applicant: Guangdong Mirror Light Bathroom Technology Co., LT DInventor: Shiping CHEN
-
Patent number: 9779104Abstract: Log records are accessed as part of a database operation in a database. The log records log insert, update, and delete operations in the database and include, for each row, a row position, a fragment identifier (ID), and a row ID. Thereafter, as part of the database operation, rows specified by the log records are located by: using the fragment identifier and the row position within the corresponding record of the log if the fragment with the corresponding fragment identifier is still available, otherwise, using the row identifier within the corresponding record of the log to look up the row position in an index of a corresponding row identifier column. The database operation is then finalized using the located rows. Related apparatus, systems, techniques and articles are also described.Type: GrantFiled: November 25, 2014Date of Patent: October 3, 2017Assignee: SAP SEInventors: Mihnea Andrei, Ivan Schreter, David Wein, Shiping Chen, Panfeng Zhou, Steffen Geissinger
-
Publication number: 20160147778Abstract: Disclosed herein are system, method, and computer program product embodiments for directly restoring a database from a log volume. An embodiment operates by reading one or more database transaction log records from a log volume. The embodiment then loads from a database table persistent storage one or more pages containing rows in the database table that will be read from or written to by the one or more database transaction log records. The embodiment then loads a dictionary for each column associated with the one or more database transaction log records. The embodiment then applies the one or more database transaction log records directly into the one or more loaded pages and the one or more dictionaries. Each dictionary and page modified in memory is then written to the database table persistent storage when a savepoint operation is performed.Type: ApplicationFiled: November 25, 2014Publication date: May 26, 2016Inventors: Ivan SCHRETER, Shiping Chen, David Wein, Steffen Geißinger
-
Publication number: 20160147786Abstract: Log records are accessed as part of a database operation in a database. The log records log insert, update, and delete operations in the database and include, for each row, a row position, a fragment identifier (ID), and a row ID. Thereafter, as part of the database operation, rows specified by the log records are located by: using the fragment identifier and the row position within the corresponding record of the log if the fragment with the corresponding fragment identifier is still available, otherwise, using the row identifier within the corresponding record of the log to look up the row position in an index of a corresponding row identifier column. The database operation is then finalized using the located rows. Related apparatus, systems, techniques and articles are also described.Type: ApplicationFiled: November 25, 2014Publication date: May 26, 2016Inventors: Mihnea Andrei, Ivan Schreter, David Wein, Shiping Chen, Panfeng Zhou, Steffen Geissinger
-
Patent number: 9158933Abstract: System, method, computer program product embodiments and combinations and sub-combinations thereof for protection of encryption keys in a database are described herein. An embodiment includes a master key and a dual master key, both of which are used to encrypt encryption keys in a database. To access encrypted data, the master key and dual master key must be supplied to a database server by two separate entities, thus requiring dual control of the master and dual master keys. Furthermore, passwords for the master and dual master keys must be supplied separately and independently, thus requiring split knowledge to access the master and dual master keys. In another embodiment, a master key and a key encryption key derived from a user password is used for dual control. An embodiment also includes supplying the secrets for the master key and dual master key through server-private files.Type: GrantFiled: May 12, 2009Date of Patent: October 13, 2015Assignee: Sybase, Inc.Inventors: Barbara Jane Banks, Rajnish Kumar Chitkara, Shiping Chen
-
Patent number: 8644353Abstract: A packet flow side channel encoder and decoder embeds and extracts a side channel communication in an overt communication data stream transmitted over a network. The encoder selects more than one group of related packets being transmitted on the network, relates a packet of one group to a packet of another group to form a pair of packets; and delays the timing of at least one packet from each pair of packets The decoder determines inter-packet delays that are the difference in timing between two packets in a pair of packets; determines at least one inter-packet delay difference between two or more determined inter-packet delays; and extracts a bit using the at least one interpacket delay difference.Type: GrantFiled: September 30, 2010Date of Patent: February 4, 2014Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Shiping Chen, Sushil Jajodia
-
Publication number: 20130294826Abstract: The invention provides an apparatus for securing an object on a frame, wherein the object comprises a surface for displaying a sample. The apparatus can comprise a first clamping member movably mounted on a frame, wherein the first clamping member changes from an open position to a closed position to secure an object on the frame.Type: ApplicationFiled: May 3, 2013Publication date: November 7, 2013Applicant: ADVANCED CELL DIAGNOSTICS, INC.Inventor: Shiping CHEN
-
Publication number: 20130237432Abstract: The invention provides a PCR sequencing method, wherein the combination of primer indexes, DNA incomplete shearing strategy and the second generation sequencing technique (Paired-End sequencing technique) can make the length of PCR products that can be sequenced by a sequencer longer than the maximum sequencing length of the sequencer whilst making full use of the characteristics of the second generation sequencing technique such as high throughput and low cost, thereby greatly broadening its applicable scope. In addition, the present invention also provides primer indexes for the PCR sequencing method and the use of the method in genotyping, particularly in HLA analysis, and also provides the PCR primers used, particularly the PCR primers for HLA-A, B, HLA-C and HLA-DQB1 gene.Type: ApplicationFiled: June 30, 2011Publication date: September 12, 2013Inventors: Jian Li, Shiping Chen, Xiandong Zhang, Ying Liu, Calfen Zhang, Tao Liu, Meiru Zhao
-
Publication number: 20130171621Abstract: Methods of detecting the presence or absence of a class of nucleic acid targets in single cells through direct or indirect capture of labels to the nucleic acids are provided, where such labels to the class of nucleic acid targets are indistinguishable from each other. Also described are methods of detecting individual cells, particularly a cell of a specific type from large heterogeneous cell populations, through detection of one or more of nucleic acid targets, where the labels to the one or more of nucleic acid targets are indistinguishable from each other. Related kits are also described.Type: ApplicationFiled: January 31, 2011Publication date: July 4, 2013Inventors: Yuling Luo, Huei-Yu Wang, John James Flanagan, Shiping Chen
-
Publication number: 20100290623Abstract: System, method, computer program product embodiments and combinations and sub-combinations thereof for protection of encryption keys in a database are described herein. An embodiment includes a master key and a dual master key, both of which are used to encrypt encryption keys in a database. To access encrypted data, the master key and dual master key must be supplied to a database server by two separate entities, thus requiring dual control of the master and dual master keys. Furthermore, passwords for the master and dual master keys must be supplied separately and independently, thus requiring split knowledge to access the master and dual master keys. In another embodiment, a master key and a key encryption key derived from a user password is used for dual control. An embodiment also includes supplying the secrets for the master key and dual master key through server-private files.Type: ApplicationFiled: May 12, 2009Publication date: November 18, 2010Applicant: Sybase, Inc.Inventors: Barbara Jane Banks, Rajnish Kumar Chitkara, Shiping Chen
-
Patent number: 7830923Abstract: An interval centroid-based watermark encoder encodes a watermark into a packet flow. Intervals are defined for the packet flow. Some of the intervals are selected as group A intervals while other intervals are selected as group B intervals. Group A and group B intervals are paired and assigned to watermark bits. A first or second value may be encoded by increasing the relative packet time between packets in either the group A (for the first bit value) or group B (for the second bit value) interval(s) of the interval pair(s) assigned to the watermark bits that are to represent the first or second bit value and the beginning of the same group interval(s). The relative packet times may be measured by a decoder and used to calculate a centroid difference for each interval pair. The centroid differences may be used to reconstruct the watermark.Type: GrantFiled: April 12, 2010Date of Patent: November 9, 2010Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Shiping Chen
-
Patent number: 7822073Abstract: A packet flow side channel encoder and decoder embeds and extracts a side channel communication in an overt communication data stream transmitted over a network. The encoder selects more than one group of related packets being transmitted on the network, relates a packet of one group to a packet of another group to form a pair of packets; and delays the timing of at least one packet from each pair of packets The decoder determines inter-packet delays that are the difference in timing between two packets in a pair of packets; determines at least one inter-packet delay difference between two or more determined inter-packet delays; and extracts a bit using the at least one interpacket delay difference.Type: GrantFiled: November 3, 2006Date of Patent: October 26, 2010Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Shiping Chen, Sushil Jajodia
-
Patent number: 7797342Abstract: A database system providing encrypted column data support with decrypt default functionality. In a database system, a method providing automated encryption support for column data comprises steps of: defining Structured Query Language (SQL) extensions for creating and managing column encryption keys and database tables with encrypted column data; receiving an SQL statement specifying creation of a column encryption key; receiving an SQL statement specifying creation of a database table having particular column data encrypted with the column encryption key; receiving an SQL statement specifying a default value to be provided in response to requests for the column data without decrypt permission; in response to a subsequent database operation requesting encrypted column data from a user with decrypt permission, automatically decrypting the column data; and in response to a subsequent database operation requesting the encrypted column data from a user without decrypt permission, returning the default value.Type: GrantFiled: August 17, 2007Date of Patent: September 14, 2010Assignee: Sybase, Inc.Inventors: Barbara J. Banks, Rajnish Kumar Chitkara, Shiping Chen
-
Publication number: 20100195819Abstract: An interval centroid-based watermark encoder encodes a watermark into a packet flow. Intervals are defined for the packet flow. Some of the intervals are selected as group A intervals while other intervals are selected as group B intervals. Group A and group B intervals are paired and assigned to watermark bits. A first or second value may be encoded by increasing the relative packet time between packets in either the group A (for the first bit value) or group B (for the second bit value) interval(s) of the interval pair(s) assigned to the watermark bits that are to represent the first or second bit value and the beginning of the same group interval(s). The relative packet times may be measured by a decoder and used to calculate a centroid difference for each interval pair. The centroid differences may be used to reconstruct the watermark.Type: ApplicationFiled: April 12, 2010Publication date: August 5, 2010Inventors: Xinyuan Wang, Shiping Chen
-
Patent number: 7724782Abstract: An interval centroid-based watermark encoder encodes a watermark into a packet flow. Intervals are defined for the packet flow. Some of the intervals are selected as group A intervals while other intervals are selected as group B intervals. Group A and group B intervals are paired and assigned to watermark bits. A first or second value may be encoded by increasing the relative packet time between packets in either the group A (for the first bit value) or group B (for the second bit value) interval(s) of the interval pair(s) assigned to the watermark bits that are to represent the first or second bit value and the beginning of the same group interval(s). The relative packet times may be measured by a decoder and used to calculate a centroid difference for each interval pair. The centroid differences may be used to reconstruct the watermark.Type: GrantFiled: March 20, 2008Date of Patent: May 25, 2010Assignee: George Mason Intellectual Properties, Inc.Inventors: Xinyuan Wang, Shiping Chen
-
Publication number: 20090081688Abstract: Methods of detecting multiple nucleic acid targets in single cells through indirect capture of labels to the nucleic acids are provided. Methods of assaying the relative levels of nucleic acid targets through normalization to levels of reference nucleic acids are also provided. Methods of detecting individual cells, particularly rare cells from large heterogeneous cell populations, through detection of nucleic acids are described. Related compositions, systems, and kits are also provided.Type: ApplicationFiled: September 17, 2008Publication date: March 26, 2009Applicant: Advanced Cell DiagnosticsInventors: Yuling Luo, Shiping Chen, Huei-Yu Fay Wang, John James Flanagan