Patents by Inventor Xin Peng Liu

Xin Peng Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10275223
    Abstract: A processor within a networked distributed drafting platform generates a public key-value context file that includes initial default key-value mappings between keywords and values for use in a distributed drafting project. Refined project-level key-value mappings are elected by considering differences between the initial default key-value mappings and personal key-value mappings within a set of distributed personal key-value context files each maintained by different drafters of the distributed drafting project. The initial default key-value mappings of the public key-value context file are updated with the elected refined project-level key-value mappings within the networked distributed drafting platform.
    Type: Grant
    Filed: June 22, 2017
    Date of Patent: April 30, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Shuo Li, Xin Peng Liu, Meng M. Wan, Chen Xin Yu
  • Publication number: 20190114164
    Abstract: A facility is provided for automatically updating a version of a base image included within an application container of a container-based processing environment. The facility includes providing an application container having an associated configuration file with automatic update specified in connection with a referenced based image. The application container includes an existing version of the referenced base image. Availability of an updated version of the base image with the container-based processing environment is identified, and based on identifying availability of the updated version of the base image, the application container is automatically updated to an updated container, which includes the updated version of the base image.
    Type: Application
    Filed: October 13, 2017
    Publication date: April 18, 2019
    Inventors: Chih-Hong WONG, Xin Peng LIU, Yuan Yuan JIA, Dan Qing HUANG
  • Publication number: 20190079973
    Abstract: A first query is received by a computing device to access data in a database. A first access path is identified based on optimization information about a second query. The first access path is applied.
    Type: Application
    Filed: September 8, 2017
    Publication date: March 14, 2019
    Inventors: Xiaobo Wang, Shuo Li, Xin Peng Liu, ShengYan Sun
  • Patent number: 10223650
    Abstract: A method for enforcing a number of context model based policies with forward chaining comprising applying a policy set including a plurality of policies to an instantiated context model which includes a set of referenced instance documents in XML format, determining whether the instantiated context model should be updated, if the instantiated context model should be updated, executing an updating operation, re-generating a new instantiated context model according to the updated instance documents and the instantiated context model, and applying the policy set to the new instantiated context model, and wherein the policies include a condition part and an action part.
    Type: Grant
    Filed: November 25, 2008
    Date of Patent: March 5, 2019
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Xin Peng Liu, Xi Ning Wang, Liang Xue, Ke Xin Zhou, Yu Chen Zhou
  • Publication number: 20190050272
    Abstract: A method, computer system, and a computer program product for migrating a service from one container to another container is provided. The present invention may include obtaining a first group of requests that are accessing a service launched in a first container instance and a second group of requests that are waiting for accessing the service. The present invention may also include generating a migrated service in a second container instance by migrating the service from the first container instance to the second container instance based on the obtained first and second groups of requests. The present invention may further include directing the second group of requests to the migrated service in the second container instance.
    Type: Application
    Filed: August 14, 2017
    Publication date: February 14, 2019
    Inventors: Xin Peng Liu, Ying Mao, Kun Yang, Jing You, Wu Mi Zhong
  • Patent number: 10200271
    Abstract: A method for testing a composite service is provided. The method may include installing a first debug probe on a first service. The method may include installing a second debug probe on a second service. The method may include executing the composite service, whereby the composite service comprises the first service and the second service. The method may include receiving a first service interaction log and a second service interaction log, whereby the first interaction log records a first plurality of I/O, and whereby the second interaction log records a second plurality of I/O. The method may include generating a global scheduling script based on the first service interaction log and the second interaction log. The method may include sending the first plurality of I/O to the first debug probe and the second plurality of I/O to the second debug probe based on the global scheduling script.
    Type: Grant
    Filed: April 12, 2016
    Date of Patent: February 5, 2019
    Assignee: International Business Machines Corporation
    Inventors: Hong Liang Han, Xin Peng Liu, Bing Dong Ma, Jeremiah S. Swan
  • Patent number: 10176000
    Abstract: A method for providing application assistants on applications is provided. The method may include performing pattern analyses on the applications, wherein application features are collected. The method may include determining application pattern types based on the pattern analyses. The method may include determining whether user customizations associated with the determined application pattern types are received. The method may include in response to the determination that user customizations are not received, associating the determined application pattern types with the applications, and generating application assistants based on the associated determined application pattern types. The method may include in response to the determination that user customizations are received, associating the user customizations with the applications, and generating application assistants based on the associated user customizations.
    Type: Grant
    Filed: February 29, 2016
    Date of Patent: January 8, 2019
    Assignee: International Business Machines Corporation
    Inventors: Shuo Li, Xin Peng Liu, Meng Wan
  • Patent number: 10171487
    Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: January 1, 2019
    Assignee: International Business Machines Corporation
    Inventors: Shuo Li, Xin Peng Liu, Sheng Yan Sun, Hua Wang, Jun Wang
  • Publication number: 20180373501
    Abstract: A processor within a networked distributed drafting platform generates a public key-value context file that includes initial default key-value mappings between keywords and values for use in a distributed drafting project. Refined project-level key-value mappings are elected by considering differences between the initial default key-value mappings and personal key-value mappings within a set of distributed personal key-value context files each maintained by different drafters of the distributed drafting project. The initial default key-value mappings of the public key-value context file are updated with the elected refined project-level key-value mappings within the networked distributed drafting platform.
    Type: Application
    Filed: June 22, 2017
    Publication date: December 27, 2018
    Inventors: Shuo Li, Xin Peng Liu, Meng M. Wan, Chen Xin Yu
  • Patent number: 10095599
    Abstract: This disclosure provides a computer-implemented method for monitoring an application at runtime. The method comprises building up a calling relationship graph for at least one type of system method called at runtime, by checking a stack trace generated when the application is running. An application method of the application that directly or indirectly calls this type of system method is represented as a node in the calling relationship graph. The method further comprises determining one or more target nodes in the calling relationship graph by analyzing the structure of the calling relationship graph. The method further comprises inserting callback methods into application method(s) of the application corresponding to the one or more target nodes only in a calling side. The method further comprises monitoring the application at runtime by using said callback methods.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: October 9, 2018
    Assignee: International Business Machines Corporation
    Inventors: Yang Che, Xiao Ming Hu, Xin Peng Liu, Ren Fu Ma, Li Jing Mu, Guoqing Wang, Jun Yu Zhang
  • Patent number: 10089385
    Abstract: A computer-implemented method for importing data for an Entity Relationship (E-R) model includes receiving an exported E-R model data file of the E-R model, and determining a dependency type correlation of an entity and importing the entity directly if the determined dependency type is one of weak correlation and no correlation. The method also includes determining whether the imported entity with no correlation or weak correlation affects an entity recorded in a strong correlation table, and storing the entity in the strong correlation table until a minimum reference number of a strong correlation is satisfied if the dependency type correlation is strong. The method further includes importing the entity recorded in the strong correlation table, and deleting the entity recorded in the strong correlation table from the strong correlation table when the imported entity with no correlation or weak correlation affects an entity recorded in the strong correlation table.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: October 2, 2018
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Xin Peng Liu, Lei Shi, Hao Wan
  • Publication number: 20180276057
    Abstract: An enhanced copy-and-paste function copies multiple logical and physical software objects from a source computing environment to a distinct target computing environment. A physical object can be any software-data entity, such as a document, a container, a database, or a disk image. A logical object contains a hierarchy of two or more physical or logical objects. Objects are copied to a logical copy clipboard, where they may be assembled into logical objects. Each physical object is then transferred one at a time to a conventional physical clipboard, transmitted to a corresponding physical clipboard in a corresponding target environment, and then forwarded to a logical paste clipboard, where the original logical objects are reconstructed and pasted into the target environment. Each logical object may be pasted into multiple target environments and may contain physical objects copied from multiple source environments. Multiple logical objects may contain the same physical object.
    Type: Application
    Filed: March 22, 2017
    Publication date: September 27, 2018
    Inventors: Dong Chen, Shao Jun Ding, Zhi Li Guan, Yang Liang, Xin Peng Liu, Ting Yin, Wu Mi Zhong
  • Publication number: 20180246845
    Abstract: A method for testing a client service locally using a shared memory transport is presented. The method may include recording a plurality of interactions between the client service located in a local host and a real server. The method may include generating a virtual server based on the recorded plurality of interactions. The method may include deploying the generated virtual server in the local host. The method may include executing the client service. The method may include receiving a TCP/IP request from the client service. The method may include converting the received TCP/IP request to a shared memory request. The method may include sending the shared memory request to the virtual server. The method may include receiving a shared memory reply from the virtual server. The method may include sending the shared memory reply to the client service.
    Type: Application
    Filed: May 11, 2018
    Publication date: August 30, 2018
    Inventors: Xian Feng Diao, Shuo Li, Xin Peng Liu, Meng Wan, Chong Yuan Yin
  • Publication number: 20180246844
    Abstract: A method for testing a client service locally using a shared memory transport is presented. The method may include recording a plurality of interactions between the client service located in a local host and a real server. The method may include generating a virtual server based on the recorded plurality of interactions. The method may include deploying the generated virtual server in the local host. The method may include executing the client service. The method may include receiving a TCP/IP request from the client service. The method may include converting the received TCP/IP request to a shared memory request. The method may include sending the shared memory request to the virtual server. The method may include receiving a shared memory reply from the virtual server. The method may include sending the shared memory reply to the client service.
    Type: Application
    Filed: May 11, 2018
    Publication date: August 30, 2018
    Inventors: Xian Feng Diao, Shuo Li, Xin Peng Liu, Meng Wan, Chong Yuan Yin
  • Publication number: 20180234449
    Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.
    Type: Application
    Filed: February 15, 2017
    Publication date: August 16, 2018
    Inventors: Shuo Li, Xin Peng Liu, Sheng Yan Sun, Hua Wang, Jun Wang
  • Publication number: 20180234450
    Abstract: Determining a data security risk level of a virtual database is provided. An object catalog corresponding to a real database is imported into the virtual database. Objects in the object catalog are organized by levels. It is determined whether one or more data security policy definitions corresponding to a set of objects referenced by test query message traffic performed an action in response to determining that one or more test query messages in the test query message traffic run on the virtual database did not satisfy respective parameters of the one or more data security policy definitions. In response to determining that one or more of the data security policy definitions corresponding to the set of objects referenced by the test query message traffic did not perform the action, a test failure result is returned. A data security risk level for the virtual database is determined based on the result.
    Type: Application
    Filed: November 16, 2017
    Publication date: August 16, 2018
    Inventors: Shuo Li, Xin Peng Liu, Sheng Yan Sun, Hua Wang, Jun Wang
  • Publication number: 20180210768
    Abstract: API-based service command invocation is provided through a method that includes identifying one or more executable commands of a service. The one or more executable commands correspond to one or more service operations supported by the service. The method generates one or more application programming interfaces (APIs), each API of the one or more APIs to invoke a respective executable command of the one or more executable commands. The method exposes at least one API of the generated one or more APIs to an end-user of the service.
    Type: Application
    Filed: January 23, 2017
    Publication date: July 26, 2018
    Inventors: Jian Wu DAI, Yuan Yao DENG, Qian Dv DU, Xin Peng LIU, Xi Xq QIAO, Tao N. ZHANG, Wu Mi Wm ZHONG
  • Publication number: 20180189114
    Abstract: Managing service container dependency is provided. A notification that a first service container is running on a host environment is received. It is determined whether the first service container is dependent on a second service container being up and running on the host environment. In response to determining that the first service container is dependent on a second service container being up and running on the host environment, it is determined whether the second service container is running on the host environment. In response to determining that the second service container is not running on the host environment, service requests from the first service container to the second service container are responded to using stub data that corresponds to the second service container.
    Type: Application
    Filed: January 5, 2017
    Publication date: July 5, 2018
    Inventors: Xuan Jiang, Xin Peng Liu, Bing Dong Ma, Hong Mei Zhao
  • Publication number: 20180173775
    Abstract: A database processing system includes a coordinator agent controller and a virtual node data base. The coordinator agent controller detects a request to access a database by an application program and to extracts database objects from a database protocol stream based on a requirement requested by the application program. The virtual node database is generated according to the extracted database objects. The virtual node database includes memory dump storage that stores the database objects extracted from the database protocol stream, and based on the database objects the virtual node database generates virtual database objects corresponding to the database protocol stream. The extraction of database objects is performed directly on the database protocol stream without communicating with a target real database.
    Type: Application
    Filed: November 16, 2017
    Publication date: June 21, 2018
    Inventors: Shuo Li, Xin Peng Liu, Xiaobo Wang, Chong Yuan Yin, Chen Xin Yu
  • Publication number: 20180173773
    Abstract: A database processing system includes a coordinator agent controller and a virtual node data base. The coordinator agent controller detects a request to access a database by an application program and to extracts database objects from a database protocol stream based on a requirement requested by the application program. The virtual node database is generated according to the extracted database objects. The virtual node database includes memory dump storage that stores the database objects extracted from the database protocol stream, and based on the database objects the virtual node database generates virtual database objects corresponding to the database protocol stream. The extraction of database objects is performed directly on the database protocol stream without communicating with a target real database.
    Type: Application
    Filed: December 20, 2016
    Publication date: June 21, 2018
    Inventors: Shuo Li, Xin Peng Liu, Xiaobo Wang, Chong Yuan Yin, Chen Xin Yu