Patents by Inventor Fenghui Jiang
Fenghui Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11182276Abstract: Development-time awareness of production environment dependency injection configuration in a software development or test environment. In a software development or test environment, metadata is retrieved relating to configuration data of injection sources and target injection sites in applications of a configured target production server or a representation of a configured target production server. A configuration data structure is formed that cross-references target injection sites and injectable sources determined from the configuration data, the configuration data structure being associated with the production server and available to the software development or test environment. The configuration data structure is referenced to carry out dependency injection related features.Type: GrantFiled: September 16, 2019Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Fenghui Jiang, Ashley Robertson, Gordon Hutchison, Benjamin A. Confino, Thomas A. Evans
-
Publication number: 20200012590Abstract: Development-time awareness of production environment dependency injection configuration in a software development or test environment. In a software development or test environment, metadata is retrieved relating to configuration data of injection sources and target injection sites in applications of a configured target production server or a representation of a configured target production server. A configuration data structure is formed that cross-references target injection sites and injectable sources determined from the configuration data, the configuration data structure being associated with the production server and available to the software development or test environment. The configuration data structure is referenced to carry out dependency injection related features.Type: ApplicationFiled: September 16, 2019Publication date: January 9, 2020Inventors: Fenghui Jiang, Ashley Robertson, Gordon Hutchison, Benjamin A. Confino, Thomas A. Evans
-
Patent number: 10452231Abstract: One or more aspects relate to a screen reader. Markup code for a visual interface containing at least one visual control is located. A screen reader menu for the visual interface is created. A visual control name and screen location, both corresponding to the at least one visual control, are extracted from the markup code. A menu item is generated in the screen reader menu corresponding to the at least one visual control. The menu item is set to simulate an action at the screen location corresponding to the at least one visual control on selection of the menu item whereby on user selection of the menu item the action is simulated at the screen location corresponding to the at least one visual control.Type: GrantFiled: June 26, 2015Date of Patent: October 22, 2019Assignee: International Business Machines CorporationInventors: Veli Akiner, Benjamin A. Confino, Fenghui Jiang, Martin A. Ross, Bradley G. Whitehouse
-
Patent number: 10417118Abstract: Development-time awareness of production environment dependency injection configuration in a software development or test environment. In a software development or test environment, metadata is retrieved relating to configuration data of injection sources and target injection sites in applications of a configured target production server or a representation of a configured target production server. A configuration data structure is formed that cross-references target injection sites and injectable sources determined from the configuration data, the configuration data structure being associated with the production server and available to the software development or test environment. The configuration data structure is referenced to carry out dependency injection related features.Type: GrantFiled: November 14, 2017Date of Patent: September 17, 2019Assignee: International Business Machines CorporationInventors: Fenghui Jiang, Ashley Robertson, Gordon Hutchison, Benjamin A. Confino, Thomas A. Evans
-
Patent number: 10394421Abstract: One or more aspects relate to providing a user interface menu in a screen reader reading an application. A graphical user interface (GUI) is screen scraped to determine GUI components and a user option menu is created including user options corresponding to the determined GUI components. A corresponding GUI component is activated when a user option is selected.Type: GrantFiled: June 26, 2015Date of Patent: August 27, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Veli Akiner, Benjamin A. Confino, Fenghui Jiang, Martin A. Ross, Bradley G. Whitehouse
-
Publication number: 20190146902Abstract: Development-time awareness of production environment dependency injection configuration in a software development or test environment. In a software development or test environment, metadata is retrieved relating to configuration data of injection sources and target injection sites in applications of a configured target production server or a representation of a configured target production server. A configuration data structure is formed that cross-references target injection sites and injectable sources determined from the configuration data, the configuration data structure being associated with the production server and available to the software development or test environment. The configuration data structure is referenced to carry out dependency injection related features.Type: ApplicationFiled: November 14, 2017Publication date: May 16, 2019Inventors: Fenghui Jiang, Ashley Robertson, Gordon Hutchison, Benjamin A. Confino, Thomas A. Evans
-
Patent number: 10136098Abstract: Methods and systems are provided for integrity verification of an audio-visual data stream. The method includes inserting a watermark into a frame of the visual data stream or into an audio window of a corresponding audio data stream, where the watermark includes: a hash code of the previous frame of the visual data stream and a hash code of the audio window of the audio data stream, and where the audio window corresponds in time to the previous frame of the visual data stream.Type: GrantFiled: March 28, 2017Date of Patent: November 20, 2018Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Edward Altenburger, Benjamin A. Confino, Gordon D. Hutchison, Fenghui Jiang, Geoffrey S. Pirie, Ashley Robertson
-
Publication number: 20180288362Abstract: Methods and systems are provided for integrity verification of an audio-visual data stream. The method includes inserting a watermark into a frame of the visual data stream or into an audio window of a corresponding audio data stream, where the watermark includes: a hash code of the previous frame of the visual data stream and a hash code of the audio window of the audio data stream, and where the audio window corresponds in time to the previous frame of the visual data stream.Type: ApplicationFiled: March 28, 2017Publication date: October 4, 2018Inventors: Edward ALTENBURGER, Benjamin A. CONFINO, Gordon D. HUTCHISON, Fenghui JIANG, Geoffrey S. PIRIE, Ashley ROBERTSON
-
Patent number: 10044828Abstract: A method, system and program for uploading a resource from remote storage to a remote service. The method comprises the steps of connecting to the remote service, initiating an upload of the resource to the remote service, selecting the remote storage as a source of the resource, acquiring the resource from the remote storage, and uploading the resource to the remote service. In one embodiment, at least part of the method is executed by a proxy server and the step of acquiring the resource from the remote storage comprises downloading the resource to the proxy server. In another embodiment, the remote service communicates directly with the remote storage. In this further embodiment, a client device acquires authentication data for the resource from the remote storage and the step of acquiring the resource from the remote storage includes providing the authentication data to the remote storage.Type: GrantFiled: December 8, 2015Date of Patent: August 7, 2018Assignee: International Business Machines CorporationInventors: Emlyn Whittick, Martin E. D. Adams, Fenghui Jiang, Jasmin H. Deakin
-
Publication number: 20160378274Abstract: One or more aspects relate to a screen reader. Markup code for a visual interface containing at least one visual control is located. A screen reader menu for the visual interface is created. A visual control name and screen location, both corresponding to the at least one visual control, are extracted from the markup code. A menu item is generated in the screen reader menu corresponding to the at least one visual control. The menu item is set to simulate an action at the screen location corresponding to the at least one visual control on selection of the menu item whereby on user selection of the menu item the action is simulated at the screen location corresponding to the at least one visual control.Type: ApplicationFiled: June 26, 2015Publication date: December 29, 2016Inventors: Veli Akiner, Benjamin A. Confino, Fenghui Jiang, Martin A. Ross, Bradley G. Whitehouse
-
Publication number: 20160378275Abstract: One or more aspects relate to providing a user interface menu in a screen reader reading an application. A graphical user interface (GUI) is screen scraped to determine GUI components and a user option menu is created including user options corresponding to the determined GUI components. A corresponding GUI component is activated when a user option is selected.Type: ApplicationFiled: June 26, 2015Publication date: December 29, 2016Inventors: Veli Akiner, Benjamin A. Confino, Fenghui Jiang, Martin A. Ross, Bradley G. Whitehouse
-
Publication number: 20160094677Abstract: A method, system and program for uploading a resource from remote storage to a remote service. The method comprises the steps of connecting to the remote service, initiating an upload of the resource to the remote service, selecting the remote storage as a source of the resource, acquiring the resource from the remote storage, and uploading the resource to the remote service. In one embodiment, at least part of the method is executed by a proxy server and the step of acquiring the resource from the remote storage comprises downloading the resource to the proxy server. In another embodiment, the remote service communicates directly with the remote storage. In this further embodiment, a client device acquires authentication data for the resource from the remote storage and the step of acquiring the resource from the remote storage includes providing the authentication data to the remote storage.Type: ApplicationFiled: December 8, 2015Publication date: March 31, 2016Inventors: Emlyn Whittick, Martin E. D. Adams, Fenghui Jiang, Jasmin H. Deakin
-
Patent number: 9219778Abstract: A method, system and program for uploading a resource from remote storage to a remote service. The method comprises the steps of connecting to the remote service, initiating an upload of the resource to the remote service, selecting the remote storage as a source of the resource, acquiring the resource from the remote storage, and uploading the resource to the remote service. In one embodiment, at least part of the method is executed by a proxy server and the step of acquiring the resource from the remote storage comprises downloading the resource to the proxy server. In another embodiment, the remote service communicates directly with the remote storage. In this further embodiment, a client device acquires authentication data for the resource from the remote storage and the step of acquiring the resource from the remote storage includes providing the authentication data to the remote storage.Type: GrantFiled: September 14, 2012Date of Patent: December 22, 2015Assignee: International Business Machines CorporationInventors: Emlyn Whittick, Martin E. D. Adams, Fenghui Jiang, Jasmin H. Deakin
-
Patent number: 8931103Abstract: Embodiments of the invention relate to generating security permissions for applications. A static analysis on an application is carried out to determine security exceptions and to determine the application components responsible for the security exceptions. The determined security exceptions are analyzed to calculate permissions required for each component. A security policy file that includes a hierarchy of the required permissions suitable for the type of application is formatted and applied to the application to provide a security enabled application.Type: GrantFiled: July 30, 2012Date of Patent: January 6, 2015Assignee: International Business Machines CorporationInventors: Hannah Deakin, Fenghui Jiang, John McNamara, Emlyn Whittick
-
Patent number: 8813190Abstract: A method, system and program for uploading a resource from remote storage to a remote service. The method comprises the steps of connecting to the remote service, initiating an upload of the resource to the remote service, selecting the remote storage as a source of the resource, acquiring the resource from the remote storage, and uploading the resource to the remote service. In one embodiment, at least part of the method is executed by a proxy server and the step of acquiring the resource from the remote storage comprises downloading the resource to the proxy server. In another embodiment, the remote service communicates directly with the remote storage. In this further embodiment, a client device acquires authentication data for the resource from the remote storage and the step of acquiring the resource from the remote storage includes providing the authentication data to the remote storage.Type: GrantFiled: May 14, 2012Date of Patent: August 19, 2014Assignee: International Business Machines CorporationInventors: Emlyn Whittick, Martin E. D. Adams, Fenghui Jiang, Jasmin H. Deakin
-
Publication number: 20130067532Abstract: Embodiments of the invention relate to generating security permissions for applications. A static analysis on an application is carried out to determine security exceptions and to determine the application components responsible for the security exceptions. The determined security exceptions are analysed to calculate permissions required for each component. A security policy file that includes a hierarchy of the required permissions suitable for the type of application is formatted and applied to the application to provide a security enabled application.Type: ApplicationFiled: July 30, 2012Publication date: March 14, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Hannah Deakin, Fenghui Jiang, John J.P. McNamara, Emlyn Whittick
-
Publication number: 20130013745Abstract: A method, system and program for uploading a resource from remote storage to a remote service. The method comprises the steps of connecting to the remote service, initiating an upload of the resource to the remote service, selecting the remote storage as a source of the resource, acquiring the resource from the remote storage, and uploading the resource to the remote service. In one embodiment, at least part of the method is executed by a proxy server and the step of acquiring the resource from the remote storage comprises downloading the resource to the proxy server. In another embodiment, the remote service communicates directly with the remote storage. In this further embodiment, a client device acquires authentication data for the resource from the remote storage and the step of acquiring the resource from the remote storage includes providing the authentication data to the remote storage.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Emlyn Whittick, Martin E. D. Adams, Fenghui Jiang, Jasmin H. Deakin
-
Publication number: 20120297450Abstract: A method, system and program for uploading a resource from remote storage to a remote service. The method comprises the steps of connecting to the remote service, initiating an upload of the resource to the remote service, selecting the remote storage as a source of the resource, acquiring the resource from the remote storage, and uploading the resource to the remote service. In one embodiment, at least part of the method is executed by a proxy server and the step of acquiring the resource from the remote storage comprises downloading the resource to the proxy server. In another embodiment, the remote service communicates directly with the remote storage. In this further embodiment, a client device acquires authentication data for the resource from the remote storage and the step of acquiring the resource from the remote storage includes providing the authentication data to the remote storage.Type: ApplicationFiled: May 14, 2012Publication date: November 22, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Emlyn Whittick, Martin E. D. Adams, Fenghui Jiang, Jasmin H. Deakin