Patents by Inventor Jing Jing Wen

Jing Jing Wen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11263115
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: December 18, 2019
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20200142973
    Abstract: A computer-implemented method, computer system, and computer program product for recommending a target location for relocating a file are disclosed. In the method, a source path of a file is obtained. Then, a target starting directory in a target directory system to which the file is to be relocated is determined based on the source path. A directory model representing a subordinated directory system of the target directory system is determined. The directory model comprises at least one path starting with the target starting directory. Then, a similarity of the at least one path in the directory model with respect to the source path is determined. Next, at least one candidate path from the at least one path is recommended based on the similarity.
    Type: Application
    Filed: November 5, 2018
    Publication date: May 7, 2020
    Inventors: Ya Peng Dong, Chen Jiang, Jian Hua Zhang, Jing Jing Wen, Sheng Ping Zhang, Ai Lian Mi
  • Publication number: 20200117572
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: December 18, 2019
    Publication date: April 16, 2020
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10540261
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: April 7, 2017
    Date of Patent: January 21, 2020
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10534694
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: December 14, 2017
    Date of Patent: January 14, 2020
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10387638
    Abstract: A system, method, and computer product for managing a password includes receiving a new password set by a user via a key input interface, generating a diagram based on key positions, on the key input interface, of a plurality of characters associated with said new password, storing a diagram into a memory device coupled to the processing device, and providing said diagram stored in the memory device to the user as a password hint.
    Type: Grant
    Filed: February 28, 2017
    Date of Patent: August 20, 2019
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ailian Mi, Jing Jing Wen, Bei Chun Zhou
  • Patent number: 10346286
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Grant
    Filed: February 22, 2018
    Date of Patent: July 9, 2019
    Assignee: International Business Machines Corporation
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20180293149
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: December 14, 2017
    Publication date: October 11, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20180293148
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: April 7, 2017
    Publication date: October 11, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, BEI CHUN ZHOU
  • Publication number: 20180293150
    Abstract: According to one embodiment, a method, computer system, and computer program product for memory corruption diagnosis is provided. The present invention may include generating a pattern expression (PE) header file, wherein a plurality of common datatypes associated with a software program are pre-defined. The invention may further include generating a PE for each of the plurality of common datatypes, and generating a PE table by merging the generated PEs for each of the plurality of common datatypes. Upon discovery that memory corruption has occurred, the invention may include transmitting a recorded state of the software program as a core dump file to a server, and using a dump utility to identify overlay content of the core dump file. Lastly, the invention may include identifying a possible source program of the memory corruption by matching the PE tables against the illegally-written overlay content.
    Type: Application
    Filed: February 22, 2018
    Publication date: October 11, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ai Lian Mi, Jing Jing Wen, Bei Chun Zhou
  • Publication number: 20180247044
    Abstract: A system, method, and computer product for managing a password includes receiving a new password set by a user via a key input interface, generating a diagram based on key positions, on the key input interface, of a plurality of characters associated with said new password, storing a diagram into a memory device coupled to the processing device, and providing said diagram stored in the memory device to the user as a password hint.
    Type: Application
    Filed: February 28, 2017
    Publication date: August 30, 2018
    Inventors: Guan Jun Liu, Niao Qing Liu, Ailian Mi, Jing Jing Wen, Bei Chun Zhou