Patents by Inventor He Yuan Huang
He Yuan Huang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11012462Abstract: Implementations of the present disclosure relate to methods, systems, and computer program products for security management. In one implementation, a computer-implemented method is disclosed. In the method, a message sequence associated with a user may be obtained from a list of historical messages that are logged in a data system. A candidate operation may be determined based on the obtained message sequence and an association model, where the association model indicates associations between message sequences and operations that are supported in the data system. A security level of the candidate operation may be evaluated based on at least one historical operation that has been performed by the user in the data system. In other implementations, a computer-implemented system and a computer program product for security management are disclosed.Type: GrantFiled: October 20, 2017Date of Patent: May 18, 2021Assignee: International Business Machines CorporationInventors: He Yuan Huang, Wen Sun, Jun Wang, Guan Qun Zhang
-
Patent number: 10891693Abstract: A method for evaluating fraudulent data in a Usage Based Insurance (UBI) system, includes retrieving trip data for a driver from a database. A processor on a computer determines tough context incidents in the trip data. Driving behavior of the driver during said tough context incidents is compared with driving behavior of other drivers during similar tough context incidents. The trip data is identified as potentially fraudulent if the driver's driving behavior is better by a predetermined amount compared to the other drivers' driving behavior.Type: GrantFiled: October 15, 2015Date of Patent: January 12, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: He Yuan Huang, Ning Duan, Zhi Hu Wang, Kai Li
-
Publication number: 20200052983Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: ApplicationFiled: October 8, 2019Publication date: February 13, 2020Inventors: HE YUAN HUANG, XIAO XI LIU, QI HU, GUAN QUN ZHANG
-
Patent number: 10447560Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: GrantFiled: June 26, 2017Date of Patent: October 15, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: He Yuan Huang, Xiao Xi Liu, Qi Hu, Guan Qun Zhang
-
Publication number: 20190124107Abstract: Implementations of the present disclosure relate to methods, systems, and computer program products for security management. In one implementation, a computer-implemented method is disclosed. In the method, a message sequence associated with a user may be obtained from a list of historical messages that are logged in a data system. A candidate operation may be determined based on the obtained message sequence and an association model, where the association model indicates associations between message sequences and operations that are supported in the data system. A security level of the candidate operation may be evaluated based on at least one historical operation that has been performed by the user in the data system. In other implementations, a computer-implemented system and a computer program product for security management are disclosed.Type: ApplicationFiled: October 20, 2017Publication date: April 25, 2019Inventors: He Yuan Huang, Wen Sun, Jun Wang, Guan Qun Zhang
-
Patent number: 10219750Abstract: A method of determining a remediation action includes detecting an acoustic event in a vehicle, detecting an environmental condition in the vehicle, detecting a respiratory disease symptom of a passenger in the vehicle based on the detected acoustic event, correlating the detected respiratory disease symptom with the environmental condition in the vehicle, and determining a remediation action for the detected respiratory disease symptom.Type: GrantFiled: September 30, 2016Date of Patent: March 5, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Ning Duan, Peng Gao, He Yuan Huang, Jingchang Huang
-
Publication number: 20180092603Abstract: A method of determining a remediation action includes detecting an acoustic event in a vehicle, detecting an environmental condition in the vehicle, detecting a respiratory disease symptom of a passenger in the vehicle based on the detected acoustic event, correlating the detected respiratory disease symptom with the environmental condition in the vehicle, and determining a remediation action for the detected respiratory disease symptom.Type: ApplicationFiled: September 30, 2016Publication date: April 5, 2018Inventors: Ning DUAN, Peng Gao, He Yuan Huang, Jingchang Huang
-
Patent number: 9934074Abstract: A method for scheduling MapReduce tasks includes receiving a set of task statistics corresponding to task execution within a MapReduce job, estimating a completion time for a set of tasks to be executed to provide an estimated completion time, calculating a soft decision point based on a convergence of a workload distribution corresponding to a set of executed tasks, calculating a hard decision point based on the estimated completion time for the set of tasks to be executed, determining a selected decision point based on the soft decision point and the hard decision point, and scheduling upcoming tasks for execution based on the selected decision point. The method may also include estimating a map task completion time and estimating a shuffle operation completion time. A computer program product and computer system corresponding to the method are also disclosed.Type: GrantFiled: June 1, 2016Date of Patent: April 3, 2018Assignee: International Business Machines CorporationInventors: Ning Duan, Liya Fan, He Yuan Huang, Jian Wang, Zhi Hu Wang
-
Patent number: 9891950Abstract: A method for scheduling MapReduce tasks includes receiving a set of task statistics corresponding to task execution within a MapReduce job, estimating a completion time for a set of tasks to be executed to provide an estimated completion time, calculating a soft decision point based on a convergence of a workload distribution corresponding to a set of executed tasks, calculating a hard decision point based on the estimated completion time for the set of tasks to be executed, determining a selected decision point based on the soft decision point and the hard decision point, and scheduling upcoming tasks for execution based on the selected decision point. The method may also include estimating a map task completion time and estimating a shuffle operation completion time. A computer program product and computer system corresponding to the method are also disclosed.Type: GrantFiled: January 26, 2017Date of Patent: February 13, 2018Assignee: International Business Machines CorporationInventors: Ning Duan, Liya Fan, He Yuan Huang, Jian Wang, Zhi Hu Wang
-
Publication number: 20180006909Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: ApplicationFiled: June 26, 2017Publication date: January 4, 2018Inventors: HE YUAN HUANG, XIAO XI LIU, QI HU, GUAN QUN ZHANG
-
Patent number: 9852012Abstract: A method for scheduling MapReduce tasks includes receiving a set of task statistics corresponding to task execution within a MapReduce job, estimating a completion time for a set of tasks to be executed to provide an estimated completion time, calculating a soft decision point based on a convergence of a workload distribution corresponding to a set of executed tasks, calculating a hard decision point based on the estimated completion time for the set of tasks to be executed, determining a selected decision point based on the soft decision point and the hard decision point, and scheduling upcoming tasks for execution based on the selected decision point. The method may also include estimating a map task completion time and estimating a shuffle operation completion time. A computer program product and computer system corresponding to the method are also disclosed.Type: GrantFiled: August 26, 2015Date of Patent: December 26, 2017Assignee: International Business Machines CorporationInventors: Ning Duan, Liya Fan, He Yuan Huang, Jian Wang, Zhi Hu Wang
-
Publication number: 20170214773Abstract: A method for optimizing migration efficiency of a data file over network is provided. Specifically, a total time of compression time of the data file, transfer time of the data file over the network, and decompression time of the data file, is minimized by adaptively selecting compression methods to compress each data block of the data file. For selecting a compression method for a data block, information entropy of the data block is analyzed, and a real status of computing and system resources is considered. Further, trade-off among the resource usage, compassion speed and compression ratio is made to calculate an optimized transmission solution over the network for each data block of the data file.Type: ApplicationFiled: October 21, 2016Publication date: July 27, 2017Inventors: Liya Fan, Yong Deng Hu, He Yuan Huang, Chen Tian, Jian Wang, Zhe Yan, Ke Zhang
-
Patent number: 9705759Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: GrantFiled: February 23, 2012Date of Patent: July 11, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: He Yuan Huang, Xiao Xi Liu, Qi Hu, Guan Qun Zhang
-
Publication number: 20170139747Abstract: A method for scheduling MapReduce tasks includes receiving a set of task statistics corresponding to task execution within a MapReduce job, estimating a completion time for a set of tasks to be executed to provide an estimated completion time, calculating a soft decision point based on a convergence of a workload distribution corresponding to a set of executed tasks, calculating a hard decision point based on the estimated completion time for the set of tasks to be executed, determining a selected decision point based on the soft decision point and the hard decision point, and scheduling upcoming tasks for execution based on the selected decision point. The method may also include estimating a map task completion time and estimating a shuffle operation completion time. A computer program product and computer system corresponding to the method are also disclosed.Type: ApplicationFiled: January 26, 2017Publication date: May 18, 2017Inventors: Ning Duan, Liya Fan, He Yuan Huang, Jian Wang, Zhi Hu Wang
-
Publication number: 20170109827Abstract: A method for evaluating fraudulent data in a Usage Based Insurance (UBI) system, includes retrieving trip data for a driver from a database. A processor on a computer determines tough context incidents in the trip data. Driving behavior of the driver during said tough context incidents is compared with driving behavior of other drivers during similar tough context incidents. The trip data is identified as potentially fraudulent if the driver's driving behavior is better by a predetermined amount compared to the other drivers' driving behavior.Type: ApplicationFiled: October 15, 2015Publication date: April 20, 2017Inventors: He Yuan HUANG, Ning DUAN, Zhi Hu WANG, Kai LI
-
Patent number: 9621592Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.Type: GrantFiled: June 25, 2015Date of Patent: April 11, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul Anthony Ashley, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
-
Patent number: 9609023Abstract: A method includes retrieving, from a memory accessible by a computer, a document comprising a workload definition document that defines an intended virtual configuration to include at least one virtual machine and at least one network appliance to be associated with at least one of the virtual machines in the intended virtual configuration, each network appliance respectively serving a role in the intended virtual configuration of transforming, inspecting, filtering, or otherwise manipulating all the network traffic, before it reaches an intended virtual machine, for purpose other than a data packet forwarding in a virtual configuration. The workload definition document is parsed to extract attributes of each of the network appliances, including one or more security policy to be applied to each network appliance. Configuration data is extracted from the parsed workload definition document that is related to any security policy of any of the network appliances to be deployed.Type: GrantFiled: February 10, 2015Date of Patent: March 28, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Paul Anthony Ashley, Stefan Berger, Tian Cheng Liu, He Yuan Huang, Sreekanth Ramakrishna Iyer, Ashish Kundu, Nataraj Nagaratnam, Dimitrios Pendarakis, Ronald Becker Williams
-
Publication number: 20170060630Abstract: A method for scheduling MapReduce tasks includes receiving a set of task statistics corresponding to task execution within a MapReduce job, estimating a completion time for a set of tasks to be executed to provide an estimated completion time, calculating a soft decision point based on a convergence of a workload distribution corresponding to a set of executed tasks, calculating a hard decision point based on the estimated completion time for the set of tasks to be executed, determining a selected decision point based on the soft decision point and the hard decision point, and scheduling upcoming tasks for execution based on the selected decision point. The method may also include estimating a map task completion time and estimating a shuffle operation completion time. A computer program product and computer system corresponding to the method are also disclosed.Type: ApplicationFiled: August 26, 2015Publication date: March 2, 2017Inventors: Ning Duan, Liya Fan, He Yuan Huang, Jian Wang, Zhi Hu Wang
-
Publication number: 20170060643Abstract: A method for scheduling MapReduce tasks includes receiving a set of task statistics corresponding to task execution within a MapReduce job, estimating a completion time for a set of tasks to be executed to provide an estimated completion time, calculating a soft decision point based on a convergence of a workload distribution corresponding to a set of executed tasks, calculating a hard decision point based on the estimated completion time for the set of tasks to be executed, determining a selected decision point based on the soft decision point and the hard decision point, and scheduling upcoming tasks for execution based on the selected decision point. The method may also include estimating a map task completion time and estimating a shuffle operation completion time. A computer program product and computer system corresponding to the method are also disclosed.Type: ApplicationFiled: June 1, 2016Publication date: March 2, 2017Inventors: Ning Duan, Liya Fan, He Yuan Huang, Jian Wang, Zhi Hu Wang
-
Patent number: 9576125Abstract: A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties.Type: GrantFiled: August 13, 2015Date of Patent: February 21, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: He Yuan Huang, Liu Jian, Min Li, Xiao Xi Liu