Patents by Inventor Hui Jiang

Hui Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230092253
    Abstract: Aspects of the invention include determining an event associated with a computing system, the event occurring at a first time, obtaining system data associated with the computing system, determining a system state of the computing system at the first time based on the system data, determining, based on the system state, two or more system data clusters comprising clustered system data associated with the system state of the computing system, determining, via an interpolation algorithm, an interpolated data value for the first time based on the system data, and adjusting the interpolated data value based on a determination that the interpolate data value is outside the two or more system data clusters.
    Type: Application
    Filed: September 17, 2021
    Publication date: March 23, 2023
    Inventors: Zhi LI, Xing Xing SHEN, Xiao Dong LI, He Jiang JIA, Sheng Jie BJ HAN, Ye TIAN, Bo Tong LIU, Peng Hui JIANG
  • Publication number: 20230092902
    Abstract: Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.
    Type: Application
    Filed: September 20, 2021
    Publication date: March 23, 2023
    Inventors: Peng Hui Jiang, Xin Peng Liu, Wei Wu, Xiao Ling Chen
  • Publication number: 20230091577
    Abstract: Aspects of the invention include splitting a first file retrieved from a first cloud computing environment of a hybrid cloud computing environment into multiple chunks. A respective chunk signature is calculated for each chunk of the multiple chunks, wherein the calculation is based at least in part on static metadata and the dynamic metadata retrieved from the first file. The respective chunk signatures are compared to chunk signatures from a metadata repository to identify a duplicate second file, wherein the first file is a variant of a second file stored in a second cloud computing environment of the hybrid cloud computing environment. Either the first file or the second file is selected as candidate for deletion. The candidate for deletion is deleted.
    Type: Application
    Filed: September 20, 2021
    Publication date: March 23, 2023
    Inventors: Peng Hui Jiang, Hai Dong Xue, WEN YI GAO, Si Bo Niu, Sen Wang, Mei Liu
  • Publication number: 20230081324
    Abstract: A computer-implemented method includes receiving, by a processing unit, from a first tenant, a query to retrieve data from a nonrelational database system. The method further includes determining, by the processing unit, that an index associated with the query is cached in a shared index cache, wherein the shared index cache stores indexes for a plurality of tenants. The method further includes retrieving, by the processing unit, a result of the query based on the index in the shared index cache. The method further includes outputting, by the processing unit, the result of the query.
    Type: Application
    Filed: September 15, 2021
    Publication date: March 16, 2023
    Inventors: Peng Hui JIANG, Xing Xing SHEN, Guang Han SUI, Jun SU, Hai Ling ZHANG
  • Publication number: 20230078577
    Abstract: A computer implemented method processes a search query from a requestor. A number of processor units selects an access path from access paths for each database in a set of databases based on reducing a cost for searching the set of databases using a set of access paths selected for the set of databases in response to receiving the search query from a requestor. The number of processor units receives a result set from searching the set of databases using the set of access paths selected for the set of databases. The number of processor units removes a number of duplicate records from records in the result set. The number of processor units sends the result set with the number of duplicate records removed to the requestor.
    Type: Application
    Filed: September 14, 2021
    Publication date: March 16, 2023
    Inventors: Sheng Yan Sun, Shuo Li, Xiaobo Wang, Peng Hui Jiang
  • Publication number: 20230085277
    Abstract: Long-chain non-coding RNA are used in the preparation of drugs for the treatment of Fuchs' endothelial corneal dystrophy. Overexpression of the long-chain non-coding RNA NEAT1 can effectively reduce corneal endothelial damage, alleviate the symptoms of corneal edema, can be used for the treatment of Fuchs' endothelial corneal malnutrition.
    Type: Application
    Filed: October 7, 2022
    Publication date: March 16, 2023
    Inventors: Weiyun SHI, Qun WANG, Qingjun ZHOU, Shengqian DOU, Hui JIANG, Bin ZHANG
  • Publication number: 20230068592
    Abstract: Embodiments of the invention are directed to synchronous multi-point update of associated text. Aspects include receiving, from a user, a request to associate a first text with one or more other instances of the first text and looking up the first text in a text association table. Based on determining that no entry in the text association table corresponds to the first text, aspects include creating an entry in the text association table corresponding to the first text. Aspects also include adding an address of the first text to the entry in the text association table. Based on detecting a change to one of the first text and one of the one or more other instances of the first text, aspects further include updating the first text and each of the one or more other instances of the first text that was not changed.
    Type: Application
    Filed: August 26, 2021
    Publication date: March 2, 2023
    Inventors: Dong Chen, Peng Hui Jiang, Jing Bai, Ting Ting Zhan, Xiaoli Duan, Jun Su
  • Publication number: 20230068521
    Abstract: Embodiments of the invention include a computer-implemented method that uses a processor to access cryptographic-function constraints associated with an encrypted message. Based on a determination that the cryptographic-function constraints do not include mandatory cryptographic computing resource requirements, first resource-scaling operations are performed that include an analysis of cryptographic metrics associated with a processor. The cryptographic metrics include information associated with the encrypted message, along with performance measurements of cryptographic functions performed by the processor.
    Type: Application
    Filed: August 25, 2021
    Publication date: March 2, 2023
    Inventors: Heng Wang, Wan Yue Chen, Chen Guang Liu, Jing Li, Xiao Ling Chen, Peng Hui Jiang
  • Publication number: 20230061270
    Abstract: Embodiments of the invention are directed to updating a dynamic library. Aspects include receiving an indication that the dynamic library has been updated and identifying all program modules that depend on the dynamic library. Aspects also include, for each program module that depends on the dynamic library, reassigning an application program interface (API) address for a current version of the dynamic library to an API address of the updated version of the dynamic library.
    Type: Application
    Filed: August 31, 2021
    Publication date: March 2, 2023
    Inventors: Jing Lu, Dong Hui Liu, Xiao Yan Tang, Yong Yin, Peng Hui Jiang, Xiang Zu, Jia Yu
  • Publication number: 20230058477
    Abstract: Aspects include applying a patch to a first instance of software code and verifying that the first instance of the software code with the patch applied is operating as expected. The verifying includes sending a request to the first instance of the software code and sending the request to a second instance of the software code where the patch was previously applied. The verifying also includes comparing a first result received from the first instance of the software code in response to the request and a second result received from the second instance of the software code in response to the request. The verifying further includes determining that the first instance of the software code with the patch applied is operating as expected based on the first result being within a similarity threshold of the second result.
    Type: Application
    Filed: August 23, 2021
    Publication date: February 23, 2023
    Inventors: Peng Hui Jiang, Jun Su, Hong Qing Zhou, Zhang Li, Yan Lin Ren
  • Patent number: 11586631
    Abstract: An embodiment includes deriving usage data associated with records of a database by monitoring requests to perform read operations on the records of the database. The embodiment generates record correlation data representative of correlations between respective groups of records of the database by parsing the usage data associated with the records of the database. The embodiment stores a plurality of records received as respective write requests during a first time interval in an intermediate storage medium. The embodiment identifies a correlation in the record correlation data between a first record of the plurality of records and a second record of the plurality of records. The embodiment selects, responsive to identifying the correlation, a first location in the database for writing the first record and a second location in the database for writing the second record based on a proximity of the first location to the second location.
    Type: Grant
    Filed: June 10, 2021
    Date of Patent: February 21, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Guang Han Sui, Peng Hui Jiang, Jia Tian Zhong, Jun Su
  • Patent number: 11586604
    Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for generating one or more in-memory data structures for data access. According to the method, target data associated with a database is identified. Further, the method determines at least one data structure for the target data based on at least one access pattern of the target data in a plurality of historical queries against the database, wherein the target data is accessed in execution of the plurality of historical queries. The method further implements the at least one data structure in a memory to store the target data. The at least one data structure is used for further access to the target data in execution of a further query against the database.
    Type: Grant
    Filed: July 2, 2020
    Date of Patent: February 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Xiaobo Wang, Shuo Li, Sheng Yan Sun, Peng Hui Jiang
  • Publication number: 20230051996
    Abstract: Embodiments of the invention are directed to database replication using heterogenous encoding. Aspects include obtaining a database and analyzing a data pattern of data in the database. Aspects also include identifying a plurality of candidate encoding formats and evaluating a computing cost for encoding the database for each of the plurality of candidate encoding formats. Aspects further include selecting an encoding format from the plurality of candidate encoding formats based at least in part on the computing cost and storing a backup copy of the database using the encoding format.
    Type: Application
    Filed: August 10, 2021
    Publication date: February 16, 2023
    Inventors: Peng Hui Jiang, Su Liu, Jun Su, He Fang Zhang
  • Patent number: 11580210
    Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.
    Type: Grant
    Filed: February 18, 2021
    Date of Patent: February 14, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jia Tian Zhong, Xing Xing Shen, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
  • Patent number: 11573837
    Abstract: Embodiments of the present disclosure relate to a method, system and computer program product for service retention in a computing environment. According to the method, a deprovision request for deprovisioning a target service instance provisioned in a computing environment is received. In response to the deprovision request, a retention policy associated with the target service instance is determined. The retention policy indicates an action to be applied on the target service instance. The action causes a resource usage level of the target service instance to reduce. Based on the retention policy, the target service instance is modified to obtain a retention service instance provisioned in the computing environment for use in restoration of the target service instance.
    Type: Grant
    Filed: July 27, 2020
    Date of Patent: February 7, 2023
    Assignee: International Business Machines Corporation
    Inventors: Meng Wang, Peng Hui Jiang, Li Jia Meng, Shao Mei Ji, Yuan Yuan Jia, Li Wei Wang, Ge Song
  • Publication number: 20230022619
    Abstract: Methods, computer program products, and/or systems are provided that perform the following operations: in a data replication environment, analyzing a database workload to generate a knowledge base of information related to compression; dividing a transfer data stream into different segments based, at least in part, on the knowledge base; obtaining candidate compression types for the transfer data stream based, at least in part, on the knowledge base; assigning respective compression types of the candidate compression types to the different segments; generating compressed segments based, at least in part, on the respective compression types assigned to the different segments; and providing the compressed segments to a replication target.
    Type: Application
    Filed: July 16, 2021
    Publication date: January 26, 2023
    Inventors: Peng Hui Jiang, Xiao Yi Tian, Di Li Hu, XiangXing Shi, Xian Wei Zhang
  • Publication number: 20230021006
    Abstract: Shared materialized views are maintained during data changes to the primary data and during creation of new materialized views. Shared data stored for use by shared materialized views is distinguished from data stored by an independent materialized view. A view selector manages data updates to shared materialized views and corresponding mapping table. The view selector directs movement of data between a shared materialized view and an independent materialized view through the lifecycle of the materialized views.
    Type: Application
    Filed: July 15, 2021
    Publication date: January 19, 2023
    Inventors: Peng Hui Jiang, Jun Su, Yan Lin Ren, Zhang Li, Hong Qing Zhou
  • Patent number: 11556499
    Abstract: A method, system and computer program product for container image migration service is provided. The method comprises identifying a latest version of a first customer container image stored in a container image repository. The method further comprises determining the latest version of the first customer container image is a migration image from a last version of the first customer container image; determining a set of commands in the Docker file of the last version of the first customer container image that have migrated to a corresponding set of commands in the Docker file of the migration image; identifying a latest version of a second customer container image having at least one Docker file command in common with at least one command in the set of commands; and recommending imminent migration of the second customer container image to include migration of the at least one Docker file command.
    Type: Grant
    Filed: January 21, 2021
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Wei Wu, Peng Hui Jiang, Jin Shi, Jun Su, Xiong Wei Zhao, Jing Yan Ma
  • Patent number: 11558448
    Abstract: In an approach for a sparse information sharing system, a processor receives a request from a host owner for a host to become a server of an information sharing system, wherein the request specifies at least one type of information the server will maintain and provide to visitors of the server. A processor syncs the server with other servers of the information sharing system with information of the specified at least one type of information. A processor, responsive to the server receiving updated information from a visitor of the server, notifies the other servers of the updated information.
    Type: Grant
    Filed: September 22, 2021
    Date of Patent: January 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Guang Han Sui, Peng Hui Jiang, Xing Xing Shen, Jun Su, Hai Ling Zhang
  • Patent number: 11550818
    Abstract: In an approach to improve asynchronous replication in database clusters embodiments retain committed transactions during database cluster replication. Embodiments build and run asynchronous replication logic using database nodes running as one or more standalone nodes, wherein the asynchronous replication logic is responsible for data replication from a primary database node to one or more secondary database nodes. Embodiments register a replication reader to a sender node to replicate journal logs and replay the journal logs on the one or more secondary database nodes. Further, embodiments monitor replication lag metrics from the sender node and notify a replication source and a replication target of a generated replication plan, wherein the cluster controller instructs the replication source and the replication target to be ready to initiate the replication plan. Additionally, embodiments adjust a replication plan to allow the asynchronous replication logic to catch up and complete uncommitted transactions.
    Type: Grant
    Filed: March 11, 2021
    Date of Patent: January 10, 2023
    Assignee: International Business Machines Corporation
    Inventors: Xiao Yi Tian, Guoxiang Zhang, Xian Wei Zhang, XiangXing Shi, Peng Hui Jiang, Zhang Li