Patents by Inventor Chong Zhou

Chong Zhou has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20180232350
    Abstract: Embodiments of the present invention provide a method to quickly insert new rows or columns in a tabular data structure (such as a spreadsheet, or a table). The user expands a row height (or a column width). The expanded row (or column width) is automatically displayed with proposed divisions (for example, represented with dashed lines). The user indicates acceptance of the proposed divisions. The expanded row (or column) is automatically divided into multiple rows (or columns) as indicated by the proposed divisions.
    Type: Application
    Filed: May 4, 2018
    Publication date: August 16, 2018
    Inventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Chong Zhou
  • Publication number: 20180232349
    Abstract: Embodiments of the present invention provide a method to quickly insert new rows or columns in a tabular data structure (such as a spreadsheet, or a table). The user expands a row height (or a column width). The expanded row (or column width) is automatically displayed with proposed divisions (for example, represented with dashed lines). The user indicates acceptance of the proposed divisions. The expanded row (or column) is automatically divided into multiple rows (or columns) as indicated by the proposed divisions.
    Type: Application
    Filed: May 4, 2018
    Publication date: August 16, 2018
    Inventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Chong Zhou
  • Patent number: 10025768
    Abstract: Embodiments of the present invention provide a method to quickly insert new rows or columns in a tabular data structure (such as a spreadsheet, or a table). The user expands a row height (or a column width). The expanded row (or column width) is automatically displayed with proposed divisions (for example, represented with dashed lines). The user indicates acceptance of the proposed divisions. The expanded row (or column) is automatically divided into multiple rows (or columns) as indicated by the proposed divisions.
    Type: Grant
    Filed: August 8, 2016
    Date of Patent: July 17, 2018
    Assignee: International Business Machines Corporation
    Inventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Chong Zhou
  • Publication number: 20180196733
    Abstract: A method, computer program product and/or system for pre-fetching disassembly code. A breakpoint is set within an application under test (AUT). Setting of the breakpoint triggers pre-fetching of disassembly code associated with the breakpoint. The pre-fetched disassembly code is retained in a store local to a debug analysis system. When runtime processing of the AUT reaches the breakpoint, the debug analysis system retrieves the disassembly code from the local store.
    Type: Application
    Filed: January 9, 2017
    Publication date: July 12, 2018
    Inventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Jian Xu, Chong Zhou
  • Publication number: 20180196734
    Abstract: A method, computer program product and/or system for pre-fetching disassembly code. A breakpoint is set within an application under test (AUT). Setting of the breakpoint triggers pre-fetching of disassembly code associated with the breakpoint. The pre-fetched disassembly code is retained in a store local to a debug analysis system. When runtime processing of the AUT reaches the breakpoint, the debug analysis system retrieves the disassembly code from the local store.
    Type: Application
    Filed: August 22, 2017
    Publication date: July 12, 2018
    Inventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Jian Xu, Chong Zhou
  • Patent number: 9996518
    Abstract: Embodiments of the present invention provide a method to quickly insert new rows or columns in a tabular data structure (such as a spreadsheet, or a table). The user expands a row height (or a column width). The expanded row (or column width) is automatically displayed with proposed divisions (for example, represented with dashed lines). The user indicates acceptance of the proposed divisions. The expanded row (or column) is automatically divided into multiple rows (or columns) as indicated by the proposed divisions.
    Type: Grant
    Filed: July 19, 2017
    Date of Patent: June 12, 2018
    Assignee: International Business Machines Corporation
    Inventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Chong Zhou
  • Patent number: 9935881
    Abstract: A method of load sharing, includes: extracting a factor field capable of distinguishing data flow in a packet header of the classified data flow, and taking the factor field as an input factor of a default load sharing algorithm of a network forwarding device interface, or taking the factor field as an input factor of a load sharing algorithm capable of uniformly allocating the data flows and selected according to the flow characteristic of the data flows, calculating the paths of the data flows, and forwarding the data flows according to respective paths. The method is used for increasing the expansibility of the network forwarding device and achieving load balancing.
    Type: Grant
    Filed: March 27, 2015
    Date of Patent: April 3, 2018
    Assignee: Huawei Technologies Co., Ltd.
    Inventors: Shi Tang, Chong Zhou
  • Publication number: 20180039613
    Abstract: Embodiments of the present invention provide a method to quickly insert new rows or columns in a tabular data structure (such as a spreadsheet, or a table). The user expands a row height (or a column width). The expanded row (or column width) is automatically displayed with proposed divisions (for example, represented with dashed lines). The user indicates acceptance of the proposed divisions. The expanded row (or column) is automatically divided into multiple rows (or columns) as indicated by the proposed divisions.
    Type: Application
    Filed: July 19, 2017
    Publication date: February 8, 2018
    Inventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Chong Zhou
  • Publication number: 20180039612
    Abstract: Embodiments of the present invention provide a method to quickly insert new rows or columns in a tabular data structure (such as a spreadsheet, or a table). The user expands a row height (or a column width). The expanded row (or column width) is automatically displayed with proposed divisions (for example, represented with dashed lines). The user indicates acceptance of the proposed divisions. The expanded row (or column) is automatically divided into multiple rows (or columns) as indicated by the proposed divisions.
    Type: Application
    Filed: August 8, 2016
    Publication date: February 8, 2018
    Inventors: Xiao Ling Chen, Chuan He, Yan Huang, Jiang Yi Liu, Chong Zhou
  • Publication number: 20170300595
    Abstract: A data packet extraction method and apparatus is disclosed. Two hash values calculated based on quintuple information of different data packets of a same session are the same, that is, two calculated remainders are also the same at a same sampling ratio. When one remainder of the two calculated remainders is a preset sampling remainder, all the data packets in a network that belong to the session are extracted, so as to implement data packet extraction based on a session. When the quintuple information of the different data packets of the same session matches a first mapping table, either all the data packets of the same session can match the first mapping table, or none of the data packets of the same session can match the first mapping table, so as to implement data packet extraction based on a session.
    Type: Application
    Filed: June 30, 2017
    Publication date: October 19, 2017
    Inventors: Tianfu Fu, Chong Zhou, Yibo Zhang
  • Publication number: 20170249456
    Abstract: Embodiments of the present disclosure disclose an application program integrity verification method and a network device. The method includes: performing eigenvalue calculation on data of an application program when the application program starts, to obtain a first digest of the application program (101); decrypting a stored digital signature of the application program according to a public key in an embedded key pair to obtain a second digest of the application program, where the digital signature is obtained, according to a private key in the key pair, by signing data of the application program each time the application program is updated (102), and the key pair is a manufacturer key pair corresponding to the application program; and determining that integrity verification of the application program passes if the first digest and the second digest are the same, otherwise, determining that integrity verification of the application program does not pass (103).
    Type: Application
    Filed: May 12, 2017
    Publication date: August 31, 2017
    Inventors: Tianfu FU, Chong ZHOU
  • Publication number: 20170200010
    Abstract: Disclosed are a security control method and a network device. The method includes: a network device obtains confidential data generated by a software trusted platform module (TPM) running in the network device, where the confidential data includes permanent confidential data and refreshable confidential data, the permanent confidential data is data that cannot be updated during a startup process of the network device and the refreshable confidential data is data that can be updated during a startup process of the network device; the network device encrypts the permanent confidential data by using a white box algorithm and stores the permanent confidential data encrypted by using the white box algorithm and the refreshable confidential data in a storage unit whose address is hidden.
    Type: Application
    Filed: March 24, 2017
    Publication date: July 13, 2017
    Inventors: Tianfu Fu, Chong Zhou, Hao Lei, Liang Zhu, Yubai Ye
  • Publication number: 20170193220
    Abstract: Disclosed are a method and an apparatus for trusted measurement, where the method includes: obtaining a first processing result by performing a first-manner processing on a code segment, and using a result obtained by performing a second-manner processing on the first processing result as a reference value; obtaining, at a first moment when the system is running, a second processing result by performing the first-manner processing on the code segment, and obtaining a first measurement value by performing the second-manner processing on the second processing result; and determining whether the first measurement value and the reference value are equal, and when the first measurement value and the reference value are equal, the system is trusted, where the code segment in the memory is a code segment that does not change with normal running of the system during one start-up and a running process of the system.
    Type: Application
    Filed: March 16, 2017
    Publication date: July 6, 2017
    Inventors: Chong ZHOU, Tianfu FU
  • Patent number: 9407538
    Abstract: A ring network failure switching method, includes: receiving first data traffic, where the first data traffic includes a destination MAC address; querying a forwarding entry stored in a local node according to the destination MAC address, to obtain a ring network identifier corresponding to the destination MAC address, where the ring network identifier is uniquely corresponding to the first node connected to the destination MAC address; and obtain path state information of a link corresponding to the ring network identifier; and transmitting the first data traffic to the first node in a direction that is opposite to that of the link when the path state information indicates that the link is in a failure state.
    Type: Grant
    Filed: February 24, 2014
    Date of Patent: August 2, 2016
    Assignee: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Chong Zhou
  • Publication number: 20150200857
    Abstract: A method of load sharing, includes: extracting a factor field capable of distinguishing data flow in a packet header of the classified data flow, and taking the factor field as an input factor of a default load sharing algorithm of a network forwarding device interface, or taking the factor field as an input factor of a load sharing algorithm capable of uniformly allocating the data flows and selected according to the flow characteristic of the data flows, calculating the paths of the data flows, and forwarding the data flows according to respective paths. The method is used for increasing the expansibility of the network forwarding device and achieving load balancing.
    Type: Application
    Filed: March 27, 2015
    Publication date: July 16, 2015
    Inventors: Shi TANG, Chong ZHOU
  • Publication number: 20140169156
    Abstract: A ring network failure switching method, includes: receiving first data traffic, where the first data traffic includes a destination MAC address; querying a forwarding entry stored in a local node according to the destination MAC address, to obtain a ring network identifier corresponding to the destination MAC address, where the ring network identifier is uniquely corresponding to the first node connected to the destination MAC address; and obtain path state information of a link corresponding to the ring network identifier; and transmitting the first data traffic to the first node in a direction that is opposite to that of the link when the path state information indicates that the link is in a failure state.
    Type: Application
    Filed: February 24, 2014
    Publication date: June 19, 2014
    Applicant: HUAWEI TECHNOLOGIES CO., LTD.
    Inventor: Chong Zhou