Patents by Inventor Fuhwei Lwo

Fuhwei Lwo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9529820
    Abstract: Source file information is associated with source file content in response to a copy operation of the source file content from a source file. An automated conversion of the source file content to a form compatible with a target file is performed based upon differences between the source file information and target file information in response to a paste operation.
    Type: Grant
    Filed: May 23, 2008
    Date of Patent: December 27, 2016
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Fuhwei Lwo
  • Patent number: 8271798
    Abstract: Limiting access to publicly exposed object-oriented interfaces is disclosed. A system includes inter-related first objects that share a predetermined password. First object-oriented interfaces define methods supported by the first objects. The first objects publicly expose the first interfaces, which are queryable by the first objects and second objects. Each first interface includes a password argument to limit access to the first objects. The system may also include second object-oriented interfaces that define methods supported by the first objects that publicly expose the second interfaces, which are queryable by the first and the second objects. The second interfaces are required by specification, such as that for the Common Information Model (CIM), and correspond to the first interfaces. The second interfaces lack password arguments to limit access, and the methods defined thereby return “not implemented” messages when invoked.
    Type: Grant
    Filed: September 1, 2008
    Date of Patent: September 18, 2012
    Assignee: International Business Machines Corporation
    Inventor: Fuhwei Lwo
  • Patent number: 7877399
    Abstract: A method and system for comparing two documents, such as XML (Extensible Markup Language) files, where each document is capable of being parsed into a DOM (Document Object Model) trees. Each tree structure is converted into an array of leaf paths containing nodes. These arrays are then compared to identify corresponding matched nodes—either exactly matched nodes or schema matched nodes. In reporting the results of the comparison, unmatched nodes of the source document are reported as “deleted nodes”, that is, existing in the source but not in the target. Similarly all unmatched nodes of the target document are reported as “added nodes”, that is, existing in the target but not in the source. In addition, schema matched nodes are reported as “modified nodes” between source and target documents.
    Type: Grant
    Filed: August 15, 2003
    Date of Patent: January 25, 2011
    Assignee: International Business Machines Corporation
    Inventor: Fuhwei Lwo
  • Patent number: 7721276
    Abstract: Under the present invention, source input corresponding to a first release of Java byte code and target input corresponding to a second release of the Java byte code is received. The input is transformed into a first list containing class names associated with the first release and a second list containing class names associated with the second release. Thereafter, any classes corresponding to class names that appear on both lists (e.g., matching class names) are loaded. The methods within the matching classes are then compared to determine if any of the APIs have been modified between the two releases. After the comparison, the matching class names are removed from the lists. Any class names remaining on the first list represent APIs that have been removed from the second release, while any class names remaining on the second list represent APIs that have been added for the second release.
    Type: Grant
    Filed: February 20, 2004
    Date of Patent: May 18, 2010
    Assignee: International Business Machines Corporation
    Inventor: Fuhwei Lwo
  • Publication number: 20090292994
    Abstract: Source file information is associated with source file content in response to a copy operation of the source file content from a source file. An automated conversion of the source file content to a form compatible with a target file is performed based upon differences between the source file information and target file information in response to a paste operation.
    Type: Application
    Filed: May 23, 2008
    Publication date: November 26, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventor: Fuhwei Lwo
  • Patent number: 7493492
    Abstract: Inter-related second objects attempt to access a first object-oriented interface defining a method support by an inter-related first object. The first object-oriented interface includes a password argument to limit access thereto. The first and the second objects share a password. The first object-oriented interface has a corresponding second object-oriented interface defining a method supported by the first object, which is required by a predetermined specification but that lacks a password argument to limit access. The password is passed via the first object-oriented interface by the second objects such that the second objects are able to invoke the method. A third object not inter-related with the first and the second objects also attempts to access the first object-oriented interface. However, the third object is not privy to the password, and therefore is unable to invoke the method defined by the first object-oriented interface, although it can query the first object-oriented interface.
    Type: Grant
    Filed: April 17, 2004
    Date of Patent: February 17, 2009
    Assignee: International Business Machines Corporation
    Inventor: Fuhwei Lwo
  • Publication number: 20080320559
    Abstract: Limiting access to publicly exposed object-oriented interfaces is disclosed. A system includes inter-related first objects that share a predetermined password. First object-oriented interfaces define methods supported by the first objects. The first objects publicly expose the first interfaces, which are queryable by the first objects and second objects. Each first interface includes a password argument to limit access to the first objects. The system may also include second object-oriented interfaces that define methods supported by the first objects that publicly expose the second interfaces, which are queryable by the first and the second objects. The second interfaces are required by specification, such as that for the Common Information Model (CIM), and correspond to the first interfaces. The second interfaces lack password arguments to limit access, and the methods defined thereby return “not implemented” messages when invoked.
    Type: Application
    Filed: September 1, 2008
    Publication date: December 25, 2008
    Inventor: Fuhwei Lwo
  • Publication number: 20050235339
    Abstract: Limiting access to publicly exposed object-oriented interfaces is disclosed. A system includes inter-related first objects that share a predetermined password. First object-oriented interfaces define methods supported by the first objects. The first objects publicly expose the first interfaces, which are queryable by the first objects and second objects. Each first interface includes a password argument to limit access to the first objects. The system may also include second object-oriented interfaces that define methods supported by the first objects that publicly expose the second interfaces, which are queryable by the first and the second objects. The second interfaces are required by specification, such as that for the Common Information Model (CIM), and correspond to the first interfaces. The second interfaces lack password arguments to limit access, and the methods defined thereby return “not implemented” messages when invoked.
    Type: Application
    Filed: April 17, 2004
    Publication date: October 20, 2005
    Inventor: Fuhwei Lwo
  • Publication number: 20050188356
    Abstract: Under the present invention, source input corresponding to a first release of Java byte code and target input corresponding to a second release of the Java byte code is received. The input is transformed into a first list containing class names associated with the first release and a second list containing class names associated with the second release. Thereafter, any classes corresponding to class names that appear on both lists (e.g., matching class names) are loaded. The methods within the matching classes are then compared to determine if any of the APIs have been modified between the two releases. After the comparison, the matching class names are removed from the lists. Any class names remaining on the first list represent APIs that have been removed for the second release, while any class names remaining on the second list represent APIs that have been added for the second release.
    Type: Application
    Filed: February 20, 2004
    Publication date: August 25, 2005
    Inventor: Fuhwei Lwo
  • Publication number: 20050039117
    Abstract: A method and system for comparing two documents, such as XML (Extensible Markup Language) files, where each document is capable of being parsed into a DOM (Document Object Model) trees. Each tree structure is converted into an array of leaf paths containing nodes. These arrays are then compared to identify corresponding matched nodes—either exactly matched nodes or schema matched nodes. In reporting the results of the comparison, unmatched nodes of the source document are reported as “deleted nodes”, that is, existing in the source but not in the target. Similarly all unmatched nodes of the target document are reported as “added nodes”, that is, existing in the target but not in the source. In addition, schema matched nodes are reported as “modified nodes”between source and target documents.
    Type: Application
    Filed: August 15, 2003
    Publication date: February 17, 2005
    Inventor: Fuhwei Lwo