Patents by Inventor Guangrui Fu

Guangrui Fu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240118919
    Abstract: Some embodiments provide a novel method for deploying containerized applications. The method of some embodiments deploys a data collecting agent on a machine that operates on a host computer and executes a set of one or more workload applications. From this agent, the method receives data regarding consumption of a set of resources allocated to the machine by the set of workload applications. The method assesses excess capacity of the set of resources for use to execute a set of one or more containers, and then deploys the set of one or more containers on the machine to execute one or more containerized applications. In some embodiments, the set of workload applications are legacy workloads deployed on the machine before the installation of the data collecting agent. By deploying one or more containers on the machine, the method of some embodiments maximizes the usages of the machine, which was previously deployed to execute legacy non-containerized workloads.
    Type: Application
    Filed: September 27, 2023
    Publication date: April 11, 2024
    Inventors: Rohit Seth, Kenji Kaneda, Somik Behera, Guangrui Fu, Ruyang Lin, Jun Mukai
  • Publication number: 20240118989
    Abstract: Some embodiments provide a novel method for deploying containerized applications. The method of some embodiments deploys a data collecting agent on a machine that operates on a host computer and executes a set of one or more workload applications. From this agent, the method receives data regarding consumption of a set of resources allocated to the machine by the set of workload applications. The method assesses excess capacity of the set of resources for use to execute a set of one or more containers, and then deploys the set of one or more containers on the machine to execute one or more containerized applications. In some embodiments, the set of workload applications are legacy workloads deployed on the machine before the installation of the data collecting agent. By deploying one or more containers on the machine, the method of some embodiments maximizes the usages of the machine, which was previously deployed to execute legacy non-containerized workloads.
    Type: Application
    Filed: September 27, 2023
    Publication date: April 11, 2024
    Inventors: Rohit Seth, Kenji Kaneda, Somik Behera, Guangrui Fu, Ruyang Lin, Jun Mukai
  • Publication number: 20230004370
    Abstract: Some embodiments provide a novel method for deploying containerized applications. The method of some embodiments deploys a data collecting agent on a machine that operates on a host computer and executes a set of one or more workload applications. From this agent, the method receives data regarding consumption of a set of resources allocated to the machine by the set of workload applications. The method assesses excess capacity of the set of resources for use to execute a set of one or more containers, and then deploys the set of one or more containers on the machine to execute one or more containerized applications. In some embodiments, the set of workload applications are legacy workloads deployed on the machine before the installation of the data collecting agent. By deploying one or more containers on the machine, the method of some embodiments maximizes the usages of the machine, which was previously deployed to execute legacy non-containerized workloads.
    Type: Application
    Filed: July 4, 2022
    Publication date: January 5, 2023
    Inventors: Rohit Seth, Kenji Kaneda, Somik Behera, Guangrui Fu, Ruyang Lin
  • Publication number: 20230004447
    Abstract: Some embodiments provide a novel method for deploying containerized applications. The method of some embodiments deploys a data collecting agent on a machine that operates on a host computer and executes a set of one or more workload applications. From this agent, the method receives data regarding consumption of a set of resources allocated to the machine by the set of workload applications. The method assesses excess capacity of the set of resources for use to execute a set of one or more containers, and then deploys the set of one or more containers on the machine to execute one or more containerized applications. In some embodiments, the set of workload applications are legacy workloads deployed on the machine before the installation of the data collecting agent. By deploying one or more containers on the machine, the method of some embodiments maximizes the usages of the machine, which was previously deployed to execute legacy non-containerized workloads.
    Type: Application
    Filed: July 4, 2022
    Publication date: January 5, 2023
    Inventors: Rohit Seth, Kenji Kaneda, Somik Behera, Guangrui Fu, Ruyang Lin
  • Patent number: 8880126
    Abstract: A method and a system discover a wireless LAN network for a multi-mode handset in a power-efficient way. The method extends stand-by time for the cellular and wireless LAN multi-mode handset, taking advantage of that fact that the cellular interface demands less energy from the battery than the wireless LAN (WLAN)-based interface in such a handset. The method therefore uses the cellular interface as an always-on proxy for the wireless LAN interface to receive the initial packets of a communication session, and uses the initial packet or packets to activate the handset's interface with the wireless LAN.
    Type: Grant
    Filed: December 13, 2006
    Date of Patent: November 4, 2014
    Assignee: NTT DoCoMo, Inc.
    Inventors: Guangrui Fu, Fujio Watanabe
  • Patent number: 7743158
    Abstract: A network system includes a network edge point configured to provide a terminal with access to a network. The network edge point includes a security policy associated with the terminal, and controls communications between the network and the terminal according to the security policy. The security policy may include a personal filter downloaded from the terminal, a service filter downloaded from a service policy server, and/or a domain filter downloaded from a domain policy server. The terminal may access the network through a second network edge point. The second network edge point may download one or more of the filters from the first network edge point, and control communications between the network and the terminal according to the security policy.
    Type: Grant
    Filed: December 4, 2002
    Date of Patent: June 22, 2010
    Assignee: NTT DOCOMO, Inc.
    Inventors: Guangrui Fu, Daichi Funato, Toshiro Kawahara, Jonathan Wood
  • Publication number: 20070140157
    Abstract: A method and a system discover a wireless LAN network for a multi-mode handset in a power-efficient way. The method extends stand-by time for the cellular and wireless LAN multi-mode handset, taking advantage of that fact that the cellular interface demands less energy from the battery than the wireless LAN (WLAN)-based interface in such a handset. The method therefore uses the cellular interface as an always-on proxy for the wireless LAN interface to receive the initial packets of a communication session, and uses the initial packet or packets to activate the handset's interface with the wireless LAN.
    Type: Application
    Filed: December 13, 2006
    Publication date: June 21, 2007
    Inventors: Guangrui Fu, Fujio Watanabe
  • Patent number: 7206579
    Abstract: A method and system for providing an adaptive IP handoff triggering system for a wireless communication system that consists of either the same or heterogeneous wireless access technologies. A mobile node is notified of at least one pre-trigger timing parameter by a current access network. At least one variable handoff threshold is constructed with the mobile node based on the at least one pre-trigger timing parameter. An IP handoff is then initiated to a candidate access network when pilot beacon signal strength of the mobile node reaches the variable handoff threshold.
    Type: Grant
    Filed: June 27, 2002
    Date of Patent: April 17, 2007
    Assignee: NTT DoCoMo, Inc.
    Inventors: Youngjune Gwon, Daichi Funato, Guangrui Fu, Atsushi Takeshita
  • Patent number: 7093242
    Abstract: Method and apparatus for extending functionality of a first set of classes and methods in an application hosted by a computing arrangement. A mapping is established that maps original class names in the first set to corresponding substitute class names of classes in a second set. The classes in the second set change the functionality of the classes in the first set. In response to loading a class file of a class in the first set, the original class names are replaced with corresponding substitute class names in the class file. Classes referenced by the substitute class names are then instantiated in lieu of classes referenced by the original class names.
    Type: Grant
    Filed: November 19, 2001
    Date of Patent: August 15, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Philippe Bernadat, Dejan Milojicic, Guangrui Fu, Alan Messer, Ira Greenberg
  • Patent number: 7020800
    Abstract: A system and method for memory failure recovery is disclosed. The method discloses the steps of maintaining a predetermined number of duplicate and primary processes; keeping the processes in synchronization; managing the processes so that a single process image is presented to an external environment; detecting a computer system exception which affects one of the processes; and terminating the affected process. The system discloses, a primary process memory space which hosts a primary process; a duplicate process memory space which hosts a duplicate process corresponding to the primary process; a synchronization buffer which keeps the duplicate process in synchronization with the primary process; a processor which generates an exception signal in response to detection of a memory failure condition which affects the primary process; and an operating system which receives the exception signal, terminates the affected primary process, and maintains a predetermined number of primary and duplicate processes.
    Type: Grant
    Filed: January 24, 2002
    Date of Patent: March 28, 2006
    Assignee: Hewlett-Packard Development Company L.P.
    Inventors: Guangrui Fu, Alan Messer, Dejan S. Milojicic, Philippe Bernadat
  • Patent number: 6990662
    Abstract: A method for offloading execution load from a resource-constrained device to allow the device to run a resource intensive software program. A program is accessed using a first device and determines whether execution of the program will exceed resources of the first device. If the execution will exceed the resources of the first device, a load split is determined to split the program into a first portion and a second portion. The second portion of the program is offloaded to a second device, while the first portion of the program is retained on the first device. The first portion and second portion communicate via a network connection. Full program functionality is provided using the first device, wherein the functionality is provided by the first portion and second portion executing respectively on the first device and the second device.
    Type: Grant
    Filed: October 31, 2001
    Date of Patent: January 24, 2006
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Alan Messer, Ira Greenberg, Dejan Miljicic, Philippe Bernadat, Guangrui Fu
  • Patent number: 6931571
    Abstract: Method and apparatus for managing memory of a data processing system. In one embodiment, memory objects are allocated in response to memory allocation requests. Each object has an associated plurality of addresses. Type-identifier codes are respectively stored in association with the memory objects. Upon detection of a transient memory error at a memory address a recovery action is selected and performed based on the type-identifier code of the object that is associated with the erring memory address.
    Type: Grant
    Filed: November 20, 2001
    Date of Patent: August 16, 2005
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Philippe Bernadat, Dejan Milojicic, Guangrui Fu, Alan Messer
  • Patent number: 6832087
    Abstract: The present invention provides a tunnel-based IP handoff process that can minimize the handoff latency associated with the standard Mobile IP registration. In the present invention, when neighboring nodes are detected, these detected nodes are identified as candidate nodes. Detection of just the existence of neighboring nodes should be possible even in situations where these neighboring nodes use different access technologies. For instance, pilot beacon signals may be taken as indication of the existence of candidate nodes although it may be impossible to compare them quantitatively if the beacon signals emanate from different access technologies. As soon as candidate nodes are identified, tunnels are established between the source node and the candidate nodes. The tunnels are used to forward data to the mobile node after a communication link between the mobile node and the source node goes down.
    Type: Grant
    Filed: June 28, 2002
    Date of Patent: December 14, 2004
    Assignee: NTT DoCoMo Inc.
    Inventors: Youngjune Gwon, Daichi Funato, Guangrui Fu, Atsushi Takeshita
  • Publication number: 20040111519
    Abstract: A network system includes a network edge point configured to provide a terminal with access to a network. The network edge point includes a security policy associated with the terminal, and controls communications between the network and the terminal according to the security policy. The security policy may include a personal filter downloaded from the terminal, a service filter downloaded from a service policy server, and/or a domain filter downloaded from a domain policy server. The terminal may access the network through a second network edge point. The second network edge point may download one or more of the filters from the first network edge point, and control communications between the network and the terminal according to the security policy.
    Type: Application
    Filed: December 4, 2002
    Publication date: June 10, 2004
    Inventors: Guangrui Fu, Daichi Funato, Toshiro Kawahara, Jonathan Wood
  • Publication number: 20030140281
    Abstract: A system and method for memory failure recovery is disclosed. The method discloses the steps of maintaining a predetermined number of duplicate and primary processes; keeping the processes in synchronization; managing the processes so that a single process image is presented to an external environment; detecting a computer system exception which affects one of the processes; and terminating the affected process. The system discloses, a primary process memory space which hosts a primary process; a duplicate process memory space which hosts a duplicate process corresponding to the primary process; a synchronization buffer which keeps the duplicate process in synchronization with the primary process; a processor which generates an exception signal in response to detection of a memory failure condition which affects the primary process; and an operating system which receives the exception signal, terminates the affected primary process, and maintains a predetermined number of primary and duplicate processes.
    Type: Application
    Filed: January 24, 2002
    Publication date: July 24, 2003
    Inventors: Guangrui Fu, Alan Messer, Dejan S. Milojicic, Philippe Bernadat
  • Publication number: 20030125027
    Abstract: The present invention provides a tunnel-based IP handoff process that can minimize the handoff latency associated with the standard Mobile IP registration. In the present invention, when neighboring nodes are detected, these detected nodes are identified as candidate nodes. Detection of just the existence of neighboring nodes should be possible even in situations where these neighboring nodes use different access technologies. For instance, pilot beacon signals may be taken as indication of the existence of candidate nodes although it may be impossible to compare them quantitatively if the beacon signals emanate from different access technologies. As soon as candidate nodes are identified, tunnels are established between the source node and the candidate nodes. The tunnels are used to forward data to the mobile node after a communication link between the mobile node and the source node goes down.
    Type: Application
    Filed: June 28, 2002
    Publication date: July 3, 2003
    Applicant: DoCoMo Communications Laboratories USA Inc.
    Inventors: Youngjune Gwon, Daichi Funato, Guangrui Fu, Atsushi Takeshita
  • Publication number: 20030119508
    Abstract: A method and system for providing an adaptive IP handoff triggering system for a wireless communication system that consists of either the same or heterogeneous wireless access technologies. A mobile node is notified of at least one pre-trigger timing parameter by a current access network. At least one variable handoff threshold is constructed with the mobile node based on the at least one pre-trigger timing parameter. An IP handoff is then initiated to a candidate access network when pilot beacon signal strength of the mobile node reaches the variable handoff threshold.
    Type: Application
    Filed: June 27, 2002
    Publication date: June 26, 2003
    Inventors: Youngjune Gwon, Daichi Funato, Guangrui Fu, Atsushi Takeshita
  • Publication number: 20030106043
    Abstract: Method and apparatus for extending functionality of a first set of classes and methods in an application hosted by a computing arrangement. A mapping is established that maps original class names in the first set to corresponding substitute class names of classes in a second set. The classes in the second set change the functionality of the classes in the first set. In response to loading a class file of a class in the first set, the original class names are replaced with corresponding substitute class names in the class file. Classes referenced by the substitute class names are then instantiated in lieu of classes referenced by the original class names.
    Type: Application
    Filed: November 19, 2001
    Publication date: June 5, 2003
    Inventors: Philippe Bernadat, Dejan Milojicic, Guangrui Fu, Alan Messer, Ira Greenberg
  • Publication number: 20030097606
    Abstract: Method and apparatus for managing memory of a data processing system. In one embodiment, memory objects are allocated in response to memory allocation requests. Each object has an associated plurality of addresses. Type-identifier codes are respectively stored in association with the memory objects. Upon detection of a transient memory error at a memory address a recovery action is selected and performed based on the type-identifier code of the object that is associated with the erring memory address.
    Type: Application
    Filed: November 20, 2001
    Publication date: May 22, 2003
    Inventors: Philippe Bernadat, Dejan Milojicic, Guangrui Fu, Alan Messer
  • Publication number: 20030084435
    Abstract: A method for offloading execution load from a resource-constrained device to allow the device to run a resource intensive software program. The method includes the step of accessing a program using a first device and determining whether execution of the program will exceed resources of the first device. If the execution will exceed the resources of the first device, a load split is determined for the program to split the program into a first portion and a second portion. The second portion of the program is offloaded to a second device, while the first portion of the program is retained on the first device. The first portion and second portion communicate via a network connection between the first device and the second device. Full program functionality is provided using the first device, wherein the functionality is provided by the first portion and second portion executing respectively on the first device and the second device.
    Type: Application
    Filed: October 31, 2001
    Publication date: May 1, 2003
    Inventors: Alan Messer, Ira Greenberg, Dejan Milojicic, Philippe Bernadat, Guangrui Fu