Patents by Inventor Jin Hong Fu

Jin Hong Fu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240104000
    Abstract: Determination and provision of improved representations of program flow control are provided by a method that monitors execution of binary code of a program on a computer system. The monitoring includes monitoring manipulation(s) of call stack(s) maintained by the computer system for the execution of the binary code. The method, based on the monitoring, determines function call pattern(s) and branch pattern(s) exhibited by the execution of the binary code. The method identifies, from the binary code and using the determined function call pattern(s) and branch pattern(s), function calls and branches, relations between the function calls and branches, and function and variable names. The method also provides a representation of program flow control of the program using the identified function calls and branches, relations, and function and variable names.
    Type: Application
    Filed: September 28, 2022
    Publication date: March 28, 2024
    Inventors: Bao Zhang, Jin Hong Fu, Peng Hui Jiang, Shi Chong Ma, He Huang, Jia Yu
  • Patent number: 11940900
    Abstract: Determination and provision of improved representations of program flow control are provided by a method that monitors execution of binary code of a program on a computer system. The monitoring includes monitoring manipulation(s) of call stack(s) maintained by the computer system for the execution of the binary code. The method, based on the monitoring, determines function call pattern(s) and branch pattern(s) exhibited by the execution of the binary code. The method identifies, from the binary code and using the determined function call pattern(s) and branch pattern(s), function calls and branches, relations between the function calls and branches, and function and variable names. The method also provides a representation of program flow control of the program using the identified function calls and branches, relations, and function and variable names.
    Type: Grant
    Filed: September 28, 2022
    Date of Patent: March 26, 2024
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bao Zhang, Jin Hong Fu, Peng Hui Jiang, Shi Chong Ma, He Huang, Jia Yu
  • Publication number: 20240086333
    Abstract: A computer-implemented method, computer program product and computer system are provided. A processor receives an indication of sensitive data in one or more files. A processor updates at least one bit in the virtual address space for the one or more files indicated to have sensitive data. A processor, in response to a program accessing the one or more files, evaluates a respective virtual address for the one or more files. A processor, in response to the at least one bit in the respective virtual address for the one or more files, marks intermediate data generated by the program as sensitive data.
    Type: Application
    Filed: September 8, 2022
    Publication date: March 14, 2024
    Inventors: He Huang, Jin Hong Fu, Shi Chong Ma, Bao Zhang, Jia Yu, Peng Hui Jiang
  • Patent number: 11928460
    Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for dynamic update of a computer program in memory. According to the method, one or more processors obtain incremental information, the incremental information specifying an incremental update to at least one section of at least one target function in a computer program. One or more processors identify, based on the incremental information, the at least one target function to be updated from the computer program. One or more processors generate at least one updated copy of the at least one target function by updating the at least one section of the at least one target function based on the incremental information. One or more processors update the computer program based on the at least one updated copy of the at least one target function while the computer program is running.
    Type: Grant
    Filed: April 20, 2022
    Date of Patent: March 12, 2024
    Assignee: International Business Machines Corporation
    Inventors: Jin Hong Fu, Bao Zhang, Shi Chong Ma, He Huang, Naijie Li, Jia Yu
  • Publication number: 20230409568
    Abstract: A method, computer system, and a computer program for monitoring synchronization and aggregation are provided. The method may include receiving a plurality of metrics and identifying a plurality of metadata associated with the plurality of metrics. The method may further include calculating a hash value of the plurality of metadata based on the plurality of metrics. The method may further include detecting at least one modification to the plurality of metadata based on the hash value and updating the plurality of metrics based on the at least one modification in which the plurality of metrics are displayed in a self-adapting metric diagram.
    Type: Application
    Filed: June 16, 2022
    Publication date: December 21, 2023
    Inventors: Bao Zhang, XI QING ZHANG, Jin Hong Fu, He Huang, Shi Chong Ma, Jia Yu, Mu Chen, HUI Zhang, Ran Ren, XING XING SHEN
  • Patent number: 11822910
    Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.
    Type: Grant
    Filed: October 14, 2021
    Date of Patent: November 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Bao Zhang, Jin Hong Fu, Shi Chong Ma, He Huang, Yong Yin, Jia Tian Zhong, Xing Xing Shen, Jia Yu
  • Publication number: 20230342142
    Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for dynamic update of a computer program in memory. According to the method, one or more processors obtain incremental information, the incremental information specifying an incremental update to at least one section of at least one target function in a computer program. One or more processors identify, based on the incremental information, the at least one target function to be updated from the computer program. One or more processors generate at least one updated copy of the at least one target function by updating the at least one section of the at least one target function based on the incremental information. One or more processors update the computer program based on the at least one updated copy of the at least one target function while the computer program is running.
    Type: Application
    Filed: April 20, 2022
    Publication date: October 26, 2023
    Inventors: Jin Hong Fu, Bao Zhang, Shi Chong Ma, He Huang, NAIJIE LI, Jia Yu
  • Patent number: 11675651
    Abstract: Methods, apparatus, computer program products for handling critical problem exceptions during an execution of an application are provided. The method comprises: detecting, by one or more processing units, an occurrence of a certain type of critical problem exception during an execution of an application, the critical problem exception resulting in a termination of the application; instructing, by one or more processing units, to call a Super Handling Routine (SHR) corresponding to the type of the critical problem exception at a pre-configured address based on a pre-determined context registered by the application, the SHR being configured to handle critical problem exceptions; and handing, by one or more processing units, control to the SHR to handle the type of the critical problem exception.
    Type: Grant
    Filed: March 11, 2021
    Date of Patent: June 13, 2023
    Assignee: International Business Machines Corporation
    Inventors: Naijie Li, Bao Zhang, Jin Hong Fu, Jing Lu, Xiang Zu
  • Publication number: 20230118695
    Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.
    Type: Application
    Filed: October 14, 2021
    Publication date: April 20, 2023
    Inventors: Bao Zhang, Jin Hong Fu, Shi Chong Ma, He Huang, Yong Yin, Jia Tian Zhong, XING XING SHEN, Jia Yu
  • Publication number: 20220291988
    Abstract: Methods, apparatus, computer program products for handling critical problem exceptions during an execution of an application are provided. The method comprises: detecting, by one or more processing units, an occurrence of a certain type of critical problem exception during an execution of an application, the critical problem exception resulting in a termination of the application; instructing, by one or more processing units, to call a Super Handling Routine (SHR) corresponding to the type of the critical problem exception at a pre-configured address based on a pre-determined context registered by the application, the SHR being configured to handle critical problem exceptions; and handing, by one or more processing units, control to the SHR to handle the type of the critical problem exception.
    Type: Application
    Filed: March 11, 2021
    Publication date: September 15, 2022
    Inventors: Naijie Li, Bao Zhang, Jin Hong Fu, Jing Lu, Xiang Zu
  • Patent number: 11379468
    Abstract: Aspects of the invention include computer-implemented method that includes generating a preliminary control flow graph from memory dump data and compiler listing data in response to an exception event at a computing program. Code segments associated with each block of the preliminary control flow graph are translated to Boolean statements. Each Boolean statement is determined to be either satisfied or unsatisfied based on input values retrieved from the memory dump data. An edge property value of a first edge and a second edge of a plurality of edges of the preliminary control flow graph based are calculated based on a satisfaction of the Boolean statements. The edge property value of the first edge is compared to the edge property value of the second edge. The preliminary control flow graph is refined by deleting the first edge of the plurality of edges based at least in part on the comparison.
    Type: Grant
    Filed: May 12, 2021
    Date of Patent: July 5, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bao Zhang, Shi Chong Ma, Jin Hong Fu, He Huang, Jia Tian Zhong, Xing Xing Shen, Xiang Zu, Jia Yu
  • Patent number: 11249760
    Abstract: Methods, systems, and computer program products for parameter management between programs with different addressing modes are described. A request may be received from a first program with a first addressing mode in a first runtime environment for calling a second program with a second addressing mode different from the first addressing mode, where at least one parameter included in the request is for calling the second program. A parameter area may be allocated in the first runtime environment for the at least one parameter. The at least one parameter may be stored in the allocated parameter area. The second program may be invoked based at least in part on the at least one parameter in the allocated parameter area. In this manner, parameter(s) may be communicated between the first program and the second program in an easy and effective way.
    Type: Grant
    Filed: April 10, 2019
    Date of Patent: February 15, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jing Lu, Bao Zhang, Naijie Li, Jin Hong Fu, Kershaw Mehta
  • Patent number: 11200070
    Abstract: Aspects of the present disclosure are directed to methods, systems, and computer program products for using dynamic-link library based on memory size. In the method, a request for calling a first function in a Dynamic-link library (DLL) at runtime is received first. A size of a memory allocated to the DLL is then determined. Then call relationship of functions in the DLL is obtained. At last, functions related to the first function in the DLL are loaded into the memory allocated to the DLL based on the size of the memory allocated to the DLL and call relationship of functions in the DLL.
    Type: Grant
    Filed: August 3, 2018
    Date of Patent: December 14, 2021
    Assignee: International Business Machines Corporation
    Inventors: Bao Zhang, Jing Lu, Jin Hong Fu, Shi Chong Ma, Xiao Ling Chen, Yuk L. Chan
  • Patent number: 10977101
    Abstract: Systems, methods, and computer-readable media are described for interoperability between programs associated with different addressing modes. A caller program associated with a first addressing mode (e.g., a 32-bit program or a 64-bit program) that is executing within a parent runtime environment makes a call to an external interface to execute a target callee program that is associated with a second addressing mode different from the first addressing mode. The target callee program is then executed in a pre-initialized secondary runtime environment that executes on the same task or thread as the parent runtime environment.
    Type: Grant
    Filed: December 12, 2018
    Date of Patent: April 13, 2021
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Naijie Li, Bao Zhang, Jing Lu, Jin Hong Fu, Kershaw Mehta
  • Patent number: 10885163
    Abstract: The present disclosure provides a computer-implemented method, computer system and computer program product for user authentication. According to the method, identity information can be received from a user, and a plurality of questions can be presented to the user, the plurality of questions comprising one or more valid questions generated based on a password related to the identity information and one or more invalid questions. Then, an input can be received from the user, and in response to the input corresponding to the one or more valid questions, the user can be authenticated based on the input.
    Type: Grant
    Filed: July 19, 2018
    Date of Patent: January 5, 2021
    Assignee: International Business Machines Corporation
    Inventors: He Huang, Shi Peng Li, Jin Hong Fu, Shi Chong Ma
  • Publication number: 20200326942
    Abstract: Methods, systems, and computer program products for parameter management between programs with different addressing modes are described. A request may be received from a first program with a first addressing mode in a first runtime environment for calling a second program with a second addressing mode different from the first addressing mode, where at least one parameter included in the request is for calling the second program. A parameter area may be allocated in the first runtime environment for the at least one parameter. The at least one parameter may be stored in the allocated parameter area. The second program may be invoked based at least in part on the at least one parameter in the allocated parameter area. In this manner, parameter(s) may be communicated between the first program and the second program in an easy and effective way.
    Type: Application
    Filed: April 10, 2019
    Publication date: October 15, 2020
    Inventors: Jing LU, Bao ZHANG, Naijie LI, Jin Hong FU, Kershaw MEHTA
  • Publication number: 20200192730
    Abstract: Systems, methods, and computer-readable media are described for interoperability between programs associated with different addressing modes. A caller program associated with a first addressing mode (e.g., a 32-bit program or a 64-bit program) that is executing within a parent runtime environment makes a call to an external interface to execute a target callee program that is associated with a second addressing mode different from the first addressing mode. The target callee program is then executed in a pre-initialized secondary runtime environment that executes on the same task or thread as the parent runtime environment.
    Type: Application
    Filed: December 12, 2018
    Publication date: June 18, 2020
    Inventors: Naijie LI, Bao ZHANG, Jing LU, Jin Hong FU, Kershaw MEHTA
  • Publication number: 20200042331
    Abstract: Aspects of the present disclosure are directed to methods, systems, and computer program products for using dynamic-link library based on memory size. In the method, a request for calling a first function in a Dynamic-link library (DLL) at runtime is received first. A size of a memory allocated to the DLL is then determined. Then call relationship of functions in the DLL is obtained. At last, functions related to the first function in the DLL are loaded into the memory allocated to the DLL based on the size of the memory allocated to the DLL and call relationship of functions in the DLL.
    Type: Application
    Filed: August 3, 2018
    Publication date: February 6, 2020
    Inventors: Bao Zhang, Jing Lu, Jin Hong Fu, Shi Chong Ma, Xiao Ling Chen, Yuk L. Chan
  • Publication number: 20200026827
    Abstract: The present disclosure provides a computer-implemented method, computer system and computer program product for user authentication. According to the method, identity information can be received from a user, and a plurality of questions can be presented to the user, the plurality of questions comprising one or more valid questions generated based on a password related to the identity information and one or more invalid questions. Then, an input can be received from the user, and in response to the input corresponding to the one or more valid questions, the user can be authenticated based on the input.
    Type: Application
    Filed: July 19, 2018
    Publication date: January 23, 2020
    Inventors: He Huang, Shi Peng Li, Jin Hong Fu, Shi Chong Ma