Patents by Inventor Hui Jiang

Hui Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230409444
    Abstract: An approach for managing data set access based on data set relevance. The approach monitors data set access activities associated with a user. The approach detects access of a first data set by the user. The approach determines a group of data sets associated with the first data set based on a data set mapping associated with the user. The approach recalls one or more data sets of the group of data sets from a slower storage device to a faster storage device.
    Type: Application
    Filed: June 21, 2022
    Publication date: December 21, 2023
    Inventors: Jing Wen Chen, Zhao Yu Wang, Peng Hui Jiang, Jing BJ Ren, Yi Jie Ma, Wen Zhong Liu
  • Publication number: 20230409308
    Abstract: An approach for recommending an application of a software code update. The approach receives components of an executable program. The approach scans the components to divide the executable program into units. The approach creates a logical layer of entry lists, based on the units, for instantiations of the executable program. The approach loads the instantiations of the executable program based on the logical layers. The approach monitors the execution of the instantiations to increment counters based on executions of the units. The approach creates a heatmap of the executions based on the counters. The approach generates a recommendation to update the executable based on the heatmap.
    Type: Application
    Filed: June 17, 2022
    Publication date: December 21, 2023
    Inventors: Bo Chen Zhu, Peng Hui Jiang, Chu Yun Tong, Ai Ping Feng, Xinzhe Wang, Cheng Fang Wang
  • Publication number: 20230409593
    Abstract: An embodiment for analyzing and tracking data flow to determine proper schemas for unstructured data. The embodiment may automatically use a sidecar to collect schema discovery rules during conversion of raw data to unstructured data. The embodiment may automatically generate multiple schemas for different tenants using the collected schema discovery rules. The embodiment may automatically use ETL to export unstructured data to SQL databases with the generated multiple schemas for the different tenants. The embodiment may automatically monitor usage data of the SQL databases and collect the usage data. The embodiment may automatically optimize schema discovery using the collected usage data. The embodiment may automatically discover schemas with hot usage and apply the discovered schemas with hot usage to other tenants for consumption and further monitoring.
    Type: Application
    Filed: June 21, 2022
    Publication date: December 21, 2023
    Inventors: Peng Hui Jiang, Jun Su, Sheng Yan Sun, Hong Mei Zhang, Meng Wan
  • Publication number: 20230401328
    Abstract: A method and implementing system protects sensitive data dump information. The method comprises using a processor receiving a dump file (DF) associated with an application. The method further comprises allocating user classification profiles defining security access levels to different regions of the DF and encrypting a first encrypted region that is a proper subset of the different regions using a first encryption key associated with a first user classification profile of the user classification profiles to produce an encrypted DF (EDF). The method further comprises determining a first user to be a member of the first user classification profile, and providing access to the EDF and a first decryption key useable to decrypt the first encrypted region to the first user.
    Type: Application
    Filed: June 13, 2022
    Publication date: December 14, 2023
    Inventors: Xi Bo Zhu, Bo Chen Zhu, Peng Hui Jiang, Cheng Fang Wang
  • Patent number: 11842038
    Abstract: A method for sharing hidden information in a virtual meeting is disclosed. In one embodiment, such a method includes sharing, by way of a web-conference server, a source window presented on a source system with a target window presented on a target system. The method detects selection of a specific area on the target window and correlates the specific area on the target window with a corresponding area on the source window. The method determines whether the corresponding area on the source window links to hidden information, such as a hyperlink, on the source window. If the corresponding area links to hidden information, the method communicates one or more of the hidden information and a link to the hidden information to the target system. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: December 31, 2022
    Date of Patent: December 12, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jing Wen Chen, Zhao Yu Wang, Peng Hui Jiang, Xiao Yi Tian, Jing Ren, Yi Jie Ma, Xizhuo Zhang, Jing Zhang
  • Publication number: 20230396628
    Abstract: Authentication management by receiving a request to initiate an authentication from a computing device of a user, directing the request to a selected authentication service of a plurality of authentication services, wherein the selected authentication service is determined dynamically based on respective authentication metrics of the plurality of authentication services, receiving authentication information via the selected authentication service, and authenticating the user based on the received authentication information.
    Type: Application
    Filed: August 22, 2023
    Publication date: December 7, 2023
    Inventors: Feng Zhang, Peng Hui Jiang, TING YIN, Jun Su, Zhe Hua Peng
  • Patent number: 11829394
    Abstract: An embodiment includes receiving a request to delete a specified document from a primary shard of a sharded database. The embodiment also includes inserting a soft-deletion document to a soft-deletion shard, wherein the soft-deletion document identifies the specified document, which remains in the primary shard. The embodiment also includes receiving a query from a client application, wherein the specified document satisfies the query. The embodiment also includes blocking the specified document from being returned in response to the query while the soft-deletion document associated with the specified document remains in the soft-deletion shard.
    Type: Grant
    Filed: March 11, 2021
    Date of Patent: November 28, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peng Hui Jiang, Jun Su, Dong Chen, Huai Ying Hy Xia, Su Liu
  • Patent number: 11827933
    Abstract: Provided are an adaptor element in a bubble shape, a method of constructing a sequencing library with such an adapter element. The adaptor element is a hybrid formed with a long-chain nucleic acid A and a short-chain nucleic acid B. The hybrid is in the bubble shape with paired regions at two terminals and a non-paired region in the middle.
    Type: Grant
    Filed: February 10, 2021
    Date of Patent: November 28, 2023
    Assignee: MGI TECH CO., LTD.
    Inventors: Yuan Jiang, Xia Zhao, Qiaoling Li, Shengmao Liu, Bo Wang, Li Chen, Wenwei Zhang, Hui Jiang, Radoje Drmanac
  • Patent number: 11822547
    Abstract: Shared materialized views are maintained during data changes to the primary data and during creation of new materialized views. Shared data stored for use by shared materialized views is distinguished from data stored by an independent materialized view. A view selector manages data updates to shared materialized views and corresponding mapping table. The view selector directs movement of data between a shared materialized view and an independent materialized view through the lifecycle of the materialized views.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: November 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Jun Su, Yan Lin Ren, Zhang Li, Hong Qing Zhou
  • Patent number: 11824836
    Abstract: Validating microservice calls is provided. It is determined whether a microservice call to a microservice hosted by a computer is valid based on a policy in a proactive condition map of a validation proxy that matches the microservice call. In response to determining that the microservice call is invalid based on the policy in the proactive condition map that matches the microservice call, the microservice call is blocked to the microservice. It is determined whether the microservice call needs to be redirected to another microservice based on the policy. In response to determining that the microservice call does need to be redirected to another microservice based on the policy, the microservice call is redirected to the other microservice with a callback to the microservice.
    Type: Grant
    Filed: November 8, 2021
    Date of Patent: November 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Meng Wang, Kun Yang, Jun Su
  • Publication number: 20230367745
    Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
    Type: Application
    Filed: May 12, 2022
    Publication date: November 16, 2023
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, Jun Su, Jia Yu, Yong Yin
  • Publication number: 20230361997
    Abstract: Computer technology for combining an encryption / decryption (e/d) key with additional information to obtain a specialized e/d key. The additional information one or more of the following types of additional information: client UUID (universally unique identifier), FQDN (fully qualified domain name), database hardware information, data physical position on the hard disk and/or stored data creation date. By combining the basic key with these kind(s) of operational information and/or software / hardware identifier information, the security of the underlying encrypted data can be meaningfully enhanced.
    Type: Application
    Filed: May 5, 2022
    Publication date: November 9, 2023
    Inventors: Peng Hui Jiang, XI QING ZHANG, Ming Zhe Jiang, Mu Chen, CHUN LING LI
  • Patent number: 11811599
    Abstract: A connection request from one computing entity is obtained. The connection request is a request to connect to another computing entity and includes a requested connectivity protocol configuration. A determination is made as to whether the requested connectivity protocol configuration is a match to a particular connectivity protocol configuration of the other computing entity. Based on determining that the requested connectivity protocol configuration is not a match to the particular connectivity protocol configuration of the other computing entity, a selected configuration file that is a match to the requested connectivity protocol configuration is selected from a plurality of configuration files. Based on selecting the selected configuration file, routing of the connection request to a connectivity protocol service corresponding to the selected configuration file is initiated to facilitate establishing a connection between the one computing entity and the other computing entity.
    Type: Grant
    Filed: January 23, 2023
    Date of Patent: November 7, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jiu Chang Du, Kui Zhang, Zhan Peng Huo, Yong Qing Xu, Peng Hui Jiang
  • Patent number: 11807465
    Abstract: The present disclosure provides a system for monitoring a scraper chain based on a measurement on transmittance of a torsion spring and a method thereof. The system includes a sprocket-wheel torsion detection device, a fixing device, a wireless receiver, an A/D converter and an industrial computer. In the method, the relative torsion of the two sprocket wheels is converted into the density change of the torsion spring, the light transmission area is converted into the current value by the laser sensing panel, a varying range of the torsion spring is calculated by the industrial computer through the preset threshold and its own program to monitor the operating conditions of the chain. The method has a novel concept, a stable and reliable system, and a high promotion value.
    Type: Grant
    Filed: June 15, 2021
    Date of Patent: November 7, 2023
    Assignee: CHINA UNIVERSITY OF MINING AND TECHNOLOGY
    Inventors: Hao Lu, Hui Jiang, Zhencai Zhu, Guohua Cao, Yuxing Peng, Gongbo Zhou, Gang Shen, Fan Jiang, Yu Tang, Xiang Li, Wei Wang
  • Publication number: 20230342978
    Abstract: A method for analyzing droplets based on images: obtaining a working dye channel image and a reference dye channel image corresponding to a droplet system (S1); separately performing a preset image processing operation on the working dye channel image and the reference dye channel image (S2); using the working dye channel image or the reference dye channel image as a target image (S3), and determining a region in which each droplet is located from within the target image (S4); and on the basis of the determined region in which each droplet is located, analyzing the droplet system (S5). The method can effective effectively improve the accuracy of droplet analysis. Further provided are a computer device and a storage medium.
    Type: Application
    Filed: February 14, 2020
    Publication date: October 26, 2023
    Inventors: YUN XIA, YANG XI, XIA ZHAO, XINGYE CUI, HANJIE SHEN, FANG CHEN, HUI JIANG
  • Patent number: 11798001
    Abstract: Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.
    Type: Grant
    Filed: September 20, 2021
    Date of Patent: October 24, 2023
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Xin Peng Liu, Wei Wu, Xiao Ling Chen
  • Publication number: 20230325471
    Abstract: A supervised similarity measure machine learning method, system, and computer program product that includes generating embeddings by training a supervised deep neural network (DNN) on a feature data to determine which nodes correspond to which clustered learning group of clustered learning groups, performing half-distributed learning by distributing data in a time-series database to the clustered learning groups, and evaluating, based on the embeddings, new tenant data in the clustered learning groups with an upward bow pose.
    Type: Application
    Filed: April 7, 2022
    Publication date: October 12, 2023
    Inventors: Meng Wan, Sheng Yan Sun, Peng Hui Jiang, Hong Mei Zhang
  • Publication number: 20230325256
    Abstract: A processor receives an optimization target for a first cluster in a distributed computing environment. A processor trains a neural network based on the optimization target. A processor generates a decision tree based on the neural network. A processor selects a workload executing in the first cluster of the distributed computing environment. A processor identifies a second cluster to relocate the workload. A processor determines a current optimization of the distributed computing environment based on the workload being retained in the first cluster. A processor determines a migration optimization of the distributed computing environment based on the workload being migrated to the second cluster. A processor, in response to the migration optimization improving the current optimization of the distributed computing environment, migrates the workload to the second cluster.
    Type: Application
    Filed: March 23, 2022
    Publication date: October 12, 2023
    Inventors: Sheng Yan Sun, Meng Wan, Peng Hui Jiang, Hong Mei Zhang
  • Publication number: 20230315715
    Abstract: A computer-implemented method, system and computer program product for improving accuracy and efficiency of auditing databases. A table, list or index of a database is analyzed to identify metadata, which includes time series data, user data, an Internet Protocol address and operation data. The identified metadata is associated with the corresponding record or row of the table, list or index from which the metadata was extracted. A determination is then made as to whether to record a raw data image associated with the record or row of the analyzed table, list or index based on the corresponding data operation. The identified metadata as well as the recorded data images, if any, are stored in a structured audit log. Auditing information is then obtained from a structured audit log based on matching the record or row identifier (RID) associated with the query with the RID associated with the structured audit log.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Inventors: Jia Tian Zhong, Peng Hui Jiang, Dong Hui Liu, Xing Xing Shen, Jia Yu, Yong Yin, Jing Lu, Xiao Yan Tang
  • Publication number: 20230315880
    Abstract: Building and using a smart contract in order to resolve the isolation between database users and service operators for hyper-protect database as a service (DBaaS). The use of the smart contract in the hyper-protect DBaaS environment allows the service operator to perform operations on sensitive and secure data in the database owned by a user without necessarily revealing the content of the sensitive and secure data.
    Type: Application
    Filed: March 28, 2022
    Publication date: October 5, 2023
    Inventors: Peng Hui Jiang, Timo Kussmaul, Stefan Schmitt, Xiang Dong Hu