Patents by Inventor Dong Hui Liu

Dong Hui Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240134805
    Abstract: A method, including: identifying static application features of an application; identifying resource access features of the application; labeling a translation lookaside buffer (TLB) miss threshold of a runtime feature of the application; determining utilization of larger pages during the runtime based on the TLB miss threshold; and setting the TLB miss threshold based on the determined utilization of the larger pages.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Inventors: Naijie Li, Dong Hui Liu, Jing Lu, Peng Hui Jiang, Xiao Yan Tang, Bao Zhang, Yong Yin, Jun Su, Jia Yu
  • Patent number: 11947498
    Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
    Type: Grant
    Filed: May 12, 2022
    Date of Patent: April 2, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, Jun Su, Jia Yu, Yong Yin
  • Publication number: 20240095359
    Abstract: An embodiment includes generating a caller list of callers that issue requests for calling a designated program at runtime. The embodiment also includes generating an authorized caller list of authorized callers allowed to call the designated program, wherein the authorized callers are selected from among callers on the caller list. The embodiment also includes generating an authorization key for each of the authorized callers that the designated program will require as a condition for completing call requests.
    Type: Application
    Filed: September 20, 2022
    Publication date: March 21, 2024
    Applicant: International Business Machines Corporation
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Jia Yu, Jun Su, Xiao Yan Tang, Yong Yin
  • Patent number: 11928513
    Abstract: Mechanisms are provided for scheduling a workload in a cloud computing system. A cloud affinity factor (CAF) computer model is trained, via a machine learning process based on a training dataset comprising static characteristics of a workload binary for a workload, and dynamic characteristics corresponding to historical performance data for the workload, such that the trained CAF computer model predicts a performance classification for a given workload binary. The trained CAF computer model processes a new workload to generate a performance classification for the new workload. Cloud affinity factor(s) are generated based on the performance classification for the new workload. Node affinity and dispatch rule(s) are applied to the cloud affinity factor(s) to select one or more nodes of the cloud computing system to which to dispatch the workload. The workload is then scheduled on the selected one or more nodes.
    Type: Grant
    Filed: December 28, 2022
    Date of Patent: March 12, 2024
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Dong Hui Liu, Jia Tian Zhong, Xing Xing Shen, Jia Yu, Yong Yin
  • Publication number: 20230367745
    Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
    Type: Application
    Filed: May 12, 2022
    Publication date: November 16, 2023
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, Jun Su, Jia Yu, Yong Yin
  • Publication number: 20230315715
    Abstract: A computer-implemented method, system and computer program product for improving accuracy and efficiency of auditing databases. A table, list or index of a database is analyzed to identify metadata, which includes time series data, user data, an Internet Protocol address and operation data. The identified metadata is associated with the corresponding record or row of the table, list or index from which the metadata was extracted. A determination is then made as to whether to record a raw data image associated with the record or row of the analyzed table, list or index based on the corresponding data operation. The identified metadata as well as the recorded data images, if any, are stored in a structured audit log. Auditing information is then obtained from a structured audit log based on matching the record or row identifier (RID) associated with the query with the RID associated with the structured audit log.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Inventors: Jia Tian Zhong, Peng Hui Jiang, Dong Hui Liu, Xing Xing Shen, Jia Yu, Yong Yin, Jing Lu, Xiao Yan Tang
  • Publication number: 20230290261
    Abstract: A method, system, and computer program product for dynamic cue generation for language learning are provided. The method identifies one or more listener actions for a listener engaged in listening learning. Based on the one or more listener actions, a language level of the listener is determined. A set of prompt metrics are generated based on the language level and the one or more listener actions. A set of audio stream levels is generated based on the set of prompt metrics. The method selects an audio stream level for a listening prompt, where the audio stream level is selected from the set of audio stream levels based on the language level of the listener.
    Type: Application
    Filed: March 8, 2022
    Publication date: September 14, 2023
    Inventors: Zhan Peng Huo, Jia Yu, Jia Tian Zhong, Yong Yin, Dong Hui Liu, Peng Hui Jiang
  • Patent number: 11675593
    Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.
    Type: Grant
    Filed: August 31, 2021
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jing Lu, Dong Hui Liu, Xiao Yan Tang, Yong Yin, Peng Hui Jiang, Xiang Zu, Jia Yu
  • Patent number: 11647356
    Abstract: Software for proximity positioning that performs the following operations: (i) receiving at least one parameter via an advertising channel of a first protocol, wherein the at least one parameter is encoded in an advertising packet of the first protocol, and wherein the first protocol supports a first proximity positioning technology; (ii) extracting the encoded at least one parameter from the advertising packet; and (iii) performing, by a second proximity positioning technology different from the first proximity positioning technology, a measurement of distance based, at least in part, on the at least one parameter.
    Type: Grant
    Filed: October 13, 2020
    Date of Patent: May 9, 2023
    Assignee: International Business Machines Corporation
    Inventors: Yong Yin, Jia Tian Zhong, Dong Hui Liu, Peng Hui Jiang, Xing Xing Shen, Li Cao, Jia Yu
  • Publication number: 20230061270
    Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.
    Type: Application
    Filed: August 31, 2021
    Publication date: March 2, 2023
    Inventors: Jing Lu, Dong Hui Liu, Xiao Yan Tang, Yong Yin, Peng Hui Jiang, Xiang Zu, Jia Yu
  • Patent number: 11580210
    Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.
    Type: Grant
    Filed: February 18, 2021
    Date of Patent: February 14, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jia Tian Zhong, Xing Xing Shen, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
  • Publication number: 20220374233
    Abstract: In an approach for improving data access performance in memory, a processor monitors each data access to a data element in the memory from an application, wherein the application has a plurality of functions. A processor records, during runtime, each data access into a monitoring element table, wherein the record for each data access includes an identity, a start address, an end address, and a memory page number. A processor clusters recorded data accesses for each function based on a distance between data elements accessed in sequence. A processor allocates, based on the data element clustering result, the data elements in a same cluster into a same memory unit in the memory.
    Type: Application
    Filed: May 24, 2021
    Publication date: November 24, 2022
    Inventors: Ming Ran Liu, Xiao Yan Tang, Bao Zhang, Jing Lu, Dong Hui Liu, Peng Hui Jiang, Yong Yin, Jia Yu
  • Publication number: 20220261470
    Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.
    Type: Application
    Filed: February 18, 2021
    Publication date: August 18, 2022
    Inventors: Jia Tian Zhong, XING XING SHEN, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
  • Patent number: 11347523
    Abstract: Techniques include executing a software program having a function call to a shared library and reloading the shared library without stopping execution of the software program. A global offset table (GOT) is updated responsive to resolving a link address associated with the function call. An entry in GOT included a link address field, an index field, and a resolved field, the updating including updating the index field with an affirmative value and marking the resolved field with an affirmative flag for the entry in the GOT. Responsive to reloading the shared library, the entry in the GOT is found having the affirmative value in the index field and the affirmative flag in the resolved field. An address value in the link address field is returned for the entry having the affirmative value in the index field, responsive to a subsequent execution of the function call to the shared library.
    Type: Grant
    Filed: November 5, 2020
    Date of Patent: May 31, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Xiao Ling Chen, Zhan Peng Huo, Yong Yin, Dong Hui Liu, Qi Li, Jia Yu, Jiang Yi Liu, Xiao Xuan Fu, Cheng Fang Wang
  • Publication number: 20220137987
    Abstract: Techniques include executing a software program having a function call to a shared library and reloading the shared library without stopping execution of the software program. A global offset table (GOT) is updated responsive to resolving a link address associated with the function call. An entry in GOT included a link address field, an index field, and a resolved field, the updating including updating the index field with an affirmative value and marking the resolved field with an affirmative flag for the entry in the GOT. Responsive to reloading the shared library, the entry in the GOT is found having the affirmative value in the index field and the affirmative flag in the resolved field. An address value in the link address field is returned for the entry having the affirmative value in the index field, responsive to a subsequent execution of the function call to the shared library.
    Type: Application
    Filed: November 5, 2020
    Publication date: May 5, 2022
    Inventors: XIAO LING CHEN, Zhan Peng Huo, Yong Yin, Dong Hui Liu, Qi Li, Jia Yu, JIANG YI LIU, Xiao Xuan Fu, Cheng Fang Wang
  • Publication number: 20220116739
    Abstract: Software for proximity positioning that performs the following operations: (i) receiving at least one parameter via an advertising channel of a first protocol, wherein the at least one parameter is encoded in an advertising packet of the first protocol, and wherein the first protocol supports a first proximity positioning technology; (ii) extracting the encoded at least one parameter from the advertising packet; and (iii) performing, by a second proximity positioning technology different from the first proximity positioning technology, a measurement of distance based, at least in part, on the at least one parameter.
    Type: Application
    Filed: October 13, 2020
    Publication date: April 14, 2022
    Inventors: Yong Yin, Jia Tian Zhong, Dong Hui Liu, Peng Hui Jiang, Xing Xing Shen, Li Cao, Jia Yu
  • Publication number: 20220075764
    Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for comparison of database data. According to the method, a first tree structure corresponding to first data segments of first database data and a second tree structure corresponding to second data segments of second database data are at least partially obtained. Each node of the first or second tree structure indicating a characteristic value of at least one of the first or second data segments, and nodes of the first or second tree structure are divided into a first or second plurality of branches from a first or second root node based on update frequencies of the first or second data segments. A difference between the first data segments and the second data segments is determined by at least comparing characteristic values indicated by nodes in the obtained parts of the first and second tree structures.
    Type: Application
    Filed: September 10, 2020
    Publication date: March 10, 2022
    Inventors: Jia Tian Zhong, Xing Xing Shen, Peng Hui Jiang, Cai Zhou, Dong Hui Liu, Jia Yu, Yong Yin
  • Publication number: 20210123753
    Abstract: The present invention relates to a method for enhanced path mapping based on safety consideration. To provide a method to determine a superior path from at least two alternative paths, it is proposed that the navigation system adds one or more new safety parameters based on safety consideration in path mapping process and calculate a path safety index for the alternative paths. The safety parameters may include a biometric index of at least one of drivers of vehicles on the alternative paths, a physical status of the vehicles or environment, a driving habits index of at least one of drivers of the vehicles and/or an autonomous vehicle safety index of at least one of the vehicles.
    Type: Application
    Filed: October 24, 2019
    Publication date: April 29, 2021
    Inventors: Dong Hui Liu, Peng Hui Jiang, Yong Yin, Jia Yu, Jia Tian Zhong, Xing Xing Shen
  • Patent number: 10764836
    Abstract: A method, system and computer program product for wireless transmission of a broadcast message to a destination address that includes receiving, by one or more processors on a first device, a first broadcast message from a second device including a wireless-enabled device operating on a Low Energy (LE) advertising channel, the first broadcast message includes transmission power information associated with the second device, transmission data, and a destination address, determining, by the one or more processors, a Received Signal Strength Indication (RSSI) of the first device, and based on the determined RSSI of the first device and the transmission power information associated with the second device, sending, by the one or more processors, the transmission data to the destination address.
    Type: Grant
    Filed: September 16, 2019
    Date of Patent: September 1, 2020
    Assignee: International Business Machines Corporation
    Inventors: Dong Hui Liu, Yi Gong, Yong Yin, Jia Yu, Jia Tian Zhong
  • Publication number: 20200177841
    Abstract: Examples of techniques for obtaining video captured by a camera in a vehicle are disclosed. Aspects include receiving a request for a traffic video, the request including a location and a time period and transmitting, to a plurality of communications devices, a data request for information regarding videos captured by vehicles at the location during the time period. Aspects also include receiving, from one or more of the plurality of communications devices, data regarding videos captured at the location during the time period and analyzing the data received to identify one or more videos of interest. Aspects further include transmitting a request for the one or more videos of interest.
    Type: Application
    Filed: November 29, 2018
    Publication date: June 4, 2020
    Inventors: YONG YIN, JIA YU, DONG HUI LIU, JIA TIAN ZHONG, PENG HUI JIANG