Patents by Inventor Jia TIAN
Jia TIAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230118695Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.Type: ApplicationFiled: October 14, 2021Publication date: April 20, 2023Inventors: Bao Zhang, Jin Hong Fu, Shi Chong Ma, He Huang, Yong Yin, Jia Tian Zhong, XING XING SHEN, Jia Yu
-
Publication number: 20230071020Abstract: Examples described herein provide a computer-implemented method for multi-user debugging of a program. The method includes receiving a first request from a first developer to initiate a debug of the program and receiving a second request from a second developer to initiate the debug of the program. The method further includes, responsive to receiving the first request and the second request, initiating the debug of the program. The method further includes sending first source code for the program to the first developer, wherein the first source code is associated with the first developer. The method further includes sending second source code for the program to the second developer, wherein the second source code is associated with the second developer. The method further includes updating the program responsive to receiving a change to at least one of the first source code or the second source code.Type: ApplicationFiled: September 7, 2021Publication date: March 9, 2023Inventors: Zhen Liu, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
-
Patent number: 11586631Abstract: An embodiment includes deriving usage data associated with records of a database by monitoring requests to perform read operations on the records of the database. The embodiment generates record correlation data representative of correlations between respective groups of records of the database by parsing the usage data associated with the records of the database. The embodiment stores a plurality of records received as respective write requests during a first time interval in an intermediate storage medium. The embodiment identifies a correlation in the record correlation data between a first record of the plurality of records and a second record of the plurality of records. The embodiment selects, responsive to identifying the correlation, a first location in the database for writing the first record and a second location in the database for writing the second record based on a proximity of the first location to the second location.Type: GrantFiled: June 10, 2021Date of Patent: February 21, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Guang Han Sui, Peng Hui Jiang, Jia Tian Zhong, Jun Su
-
Patent number: 11580210Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.Type: GrantFiled: February 18, 2021Date of Patent: February 14, 2023Assignee: International Business Machines CorporationInventors: Jia Tian Zhong, Xing Xing Shen, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
-
Publication number: 20230026103Abstract: A cigarette device management system includes an information management module, and a maintenance prediction module, a device state acquisition module and a purchase statistics module which are in communication connection with it. The maintenance prediction module is built by an artificial neural network model and is configured to predict a failure interval. The device state acquisition module acquires a device operating parameter and an operating duration of the device in real time, and compares the device operating parameter with a safety parameter range. In accordance with the system, the maintenance timing of the device can be predicted, the purchase quantity of the spare part and the purchase timing of the spare part also can be predicted.Type: ApplicationFiled: July 22, 2022Publication date: January 26, 2023Applicant: Zhangjiakou Cigarette Factory Co., Ltd.Inventors: Bo LIU, Aihua ZHANG, Hengzhu SHI, Xiaotang LI, Weidong YAO, Guoping WANG, Zijuan LI, Chuan YANG, Junjie PANG, Peng JI, Mingqi NAN, Zhanbo JIANG, Xiaohua YANG, Jia TIAN, Dongfeng LI, Dong YAN
-
Publication number: 20230013048Abstract: Determining which data should be located in each partition of a hard disk drive storage device based on growth values and/or data access frequency values.Type: ApplicationFiled: July 16, 2021Publication date: January 19, 2023Inventors: Shuo Li, Jia Tian Zhong, Xiaobo Wang, Sheng Yan Sun
-
Publication number: 20220398250Abstract: An embodiment includes deriving usage data associated with records of a database by monitoring requests to perform read operations on the records of the database. The embodiment generates record correlation data representative of correlations between respective groups of records of the database by parsing the usage data associated with the records of the database. The embodiment stores a plurality of records received as respective write requests during a first time interval in an intermediate storage medium. The embodiment identifies a correlation in the record correlation data between a first record of the plurality of records and a second record of the plurality of records. The embodiment selects, responsive to identifying the correlation, a first location in the database for writing the first record and a second location in the database for writing the second record based on a proximity of the first location to the second location.Type: ApplicationFiled: June 10, 2021Publication date: December 15, 2022Applicant: International Business Machines CorporationInventors: Guang Han Sui, Peng Hui Jiang, Jia Tian Zhong, Jun Su
-
Patent number: 11461315Abstract: In an approach for improving performance of a batch job running on database servers in an active-active architecture. A processor, responsive to a batch job being ready to be executed on a source database server, sends a first communication to a target database server with a synchronization start point. While executing the batch job, a processor utilizes a pre-lock function, pre-load function, and lock avoidance function to prevent lock conflicts. A processor, responsive to either the source database server or the target database server encountering a commit statement, suspends the respective database server and sends a second communication to ask if the other respective database server is ready to complete the commit statement. A processor, responsive to the other respective database server confirming its ready to complete the commit statement, completes the commit statement on both the source database server and the target database server.Type: GrantFiled: December 3, 2020Date of Patent: October 4, 2022Assignee: International Business Machines CorporationInventors: Shuo Li, Xiaobo Wang, Jia Tian Zhong, Sheng Yan Sun
-
Publication number: 20220261470Abstract: Embodiments of the present invention relate to password authentication. According to an embodiment of the present invention, a password associated with a user identification is received from a user device. The password is authenticated based on a preset relationship between a seed password and a graphical password associated with the user identification. The seed password consists of a string of characters. The graphical password is a directed path traversing all keys of a keypad in an order. Each of the keys represents one of the characters and is associated with an order number according to the order of the keys being traversed. The preset relationship is that the password consists of respective order numbers associated with respective keys representing corresponding characters of the seed password.Type: ApplicationFiled: February 18, 2021Publication date: August 18, 2022Inventors: Jia Tian Zhong, XING XING SHEN, Peng Hui Jiang, Dong Hui Liu, Yong Yin, Jia Yu
-
Publication number: 20220245130Abstract: Database log writing is based on log pipeline contention. A determination is made as to whether contention in writing data to a log pipeline, which is used in writing data from memory to storage, is at a prespecified level. Based on determining that the contention in writing the data to the log pipeline is at the prespecified level, a split operation is automatically performed to create a new log pipeline.Type: ApplicationFiled: January 29, 2021Publication date: August 4, 2022Inventors: Shuo Li, Xiaobo Wang, Jia Tian Zhong, Sheng Yan Sun
-
Patent number: 11392473Abstract: Provided is a method for determining data storage is insufficient for a program. A processor may receive a set of marked data associated with a set of source code. The processor may identify a scope of the code associated with the marked data. The processor may generate a first set of instructions for taking a first snapshot of a variable storage space associated with the marked data when entering the scope and a second snapshot of the variable storage space when exiting the scope. The processor may generate a second set of instructions for comparing the first and second snapshots to determine a usage amount of the variable storage. The processor may generate a third set of instructions for performing an action in response to the usage amount of the variable storage space exceeding a threshold. The processor may compile the code into an executable.Type: GrantFiled: December 10, 2020Date of Patent: July 19, 2022Assignee: International Business Machines CorporationInventors: Zhen Liu, Ming Lei Zhang, Jia Tian Zhong, Le Chang, Ting Ting Zhan, Xiao Yan Tian
-
Patent number: 11379468Abstract: Aspects of the invention include computer-implemented method that includes generating a preliminary control flow graph from memory dump data and compiler listing data in response to an exception event at a computing program. Code segments associated with each block of the preliminary control flow graph are translated to Boolean statements. Each Boolean statement is determined to be either satisfied or unsatisfied based on input values retrieved from the memory dump data. An edge property value of a first edge and a second edge of a plurality of edges of the preliminary control flow graph based are calculated based on a satisfaction of the Boolean statements. The edge property value of the first edge is compared to the edge property value of the second edge. The preliminary control flow graph is refined by deleting the first edge of the plurality of edges based at least in part on the comparison.Type: GrantFiled: May 12, 2021Date of Patent: July 5, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bao Zhang, Shi Chong Ma, Jin Hong Fu, He Huang, Jia Tian Zhong, Xing Xing Shen, Xiang Zu, Jia Yu
-
Publication number: 20220188206Abstract: Provided is a method for determining data storage is insufficient for a program. A processor may receive a set of marked data associated with a set of source code. The processor may identify a scope of the code associated with the marked data. The processor may generate a first set of instructions for taking a first snapshot of a variable storage space associated with the marked data when entering the scope and a second snapshot of the variable storage space when exiting the scope. The processor may generate a second set of instructions for comparing the first and second snapshots to determine a usage amount of the variable storage. The processor may generate a third set of instructions for performing an action in response to the usage amount of the variable storage space exceeding a threshold. The processor may compile the code into an executable.Type: ApplicationFiled: December 10, 2020Publication date: June 16, 2022Inventors: Zhen Liu, Ming Lei Zhang, Jia Tian Zhong, Le Chang, Ting Ting Zhan, Xiao Yan Tian
-
Publication number: 20220179852Abstract: In an approach for improving performance of a batch job running on database servers in an active-active architecture. A processor, responsive to a batch job being ready to be executed on a source database server, sends a first communication to a target database server with a synchronization start point. While executing the batch job, a processor utilizes a pre-lock function, pre-load function, and lock avoidance function to prevent lock conflicts. A processor, responsive to either the source database server or the target database server encountering a commit statement, suspends the respective database server and sends a second communication to ask if the other respective database server is ready to complete the commit statement. A processor, responsive to the other respective database server confirming its ready to complete the commit statement, completes the commit statement on both the source database server and the target database server.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Shuo Li, Xiaobo Wang, Jia Tian Zhong, Sheng Yan Sun
-
Publication number: 20220179623Abstract: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.Type: ApplicationFiled: February 7, 2022Publication date: June 9, 2022Inventors: ZHEN LIU, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
-
Patent number: 11354320Abstract: A method and system for determining causes. The method includes generating a set of cause indices. Each cause index includes a cause, at least one pattern, and a probability of the cause for the pattern. The method also includes receiving a data set, and determining that one or more indexed patterns match a pattern in the data set. Further, the method includes retrieving causes for the indexed patterns that match the pattern in the data set, as well as determining probabilities of the retrieved causes for the pattern in the data set.Type: GrantFiled: October 11, 2018Date of Patent: June 7, 2022Assignee: International Business Machines CorporationInventors: Jia Yu, Jia Tian Zhong, Xing Xing Shen, Zhan Peng Huo, Zhi Li Guan, Peng Hui Jiang
-
Patent number: 11347755Abstract: A method and system for determining causes. The method includes generating a set of cause indices. Each cause index includes a cause, at least one pattern, and a probability of the cause for the pattern. The method also includes receiving a data set, and determining that one or more indexed patterns match a pattern in the data set. Further, the method includes retrieving causes for the indexed patterns that match the pattern in the data set, as well as determining probabilities of the retrieved causes for the pattern in the data set.Type: GrantFiled: July 10, 2019Date of Patent: May 31, 2022Assignee: International Business Machines CorporationInventors: Jia Yu, Jia Tian Zhong, Xing Xing Shen, Zhan Peng Huo, Zhi Li Guan, Peng Hui Jiang
-
Publication number: 20220164341Abstract: A query on a data is received. One or more granularity of data is determined of the data to respond to the query. The one or more granularity of data includes a low granularity data and a high granularity data. Whether the low granularity data is stored in a cache is determined. Responsive to determining the low granularity data is stored in the cache, the low granularity data is retrieved. The low granularity data is displayed.Type: ApplicationFiled: November 23, 2020Publication date: May 26, 2022Inventors: Jian Jin, Feng Li, Ying Bai, Ying Qiu Deng, Jia Tian Zhong
-
Patent number: 11321392Abstract: The present disclosure relates to searching for and committing low-frequency data to a database. An example method generally includes receiving, from a requesting application, a query for data from the data repository. A database system retrieves a set of indices associated with the data specified in the query from an index table in the data repository. Upon determining that the set of indices comprises a non-null set, the database system retrieves records associated with each index in the set of indices from a data table associated with the index table and returns the retrieved records to the requesting application.Type: GrantFiled: February 19, 2019Date of Patent: May 3, 2022Assignee: International Business Machines CorporationInventors: Jia Tian Zhong, Bin Yang, Shuang H. Wang, Xing Xing Shen, Qi Guo
-
Publication number: 20220116739Abstract: Software for proximity positioning that performs the following operations: (i) receiving at least one parameter via an advertising channel of a first protocol, wherein the at least one parameter is encoded in an advertising packet of the first protocol, and wherein the first protocol supports a first proximity positioning technology; (ii) extracting the encoded at least one parameter from the advertising packet; and (iii) performing, by a second proximity positioning technology different from the first proximity positioning technology, a measurement of distance based, at least in part, on the at least one parameter.Type: ApplicationFiled: October 13, 2020Publication date: April 14, 2022Inventors: Yong Yin, Jia Tian Zhong, Dong Hui Liu, Peng Hui Jiang, Xing Xing Shen, Li Cao, Jia Yu