Patents by Inventor Jiong Qiu
Jiong Qiu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9906542Abstract: Various implementations provide an approach to control testing frequency based on behavior change detection. Behavior change detection is utilized, instead of a pre-defined patterns approach, to look at a system's behavior and detect any variances from what would otherwise be normal operating behavior. In at least some implementations, a behavior change detection system collects behavior from a service, such as an online service, and detects behavior changes, either permanent or transient, in the service. In this way, the changes may be used to compute a volatility score, which the system uses to control testing frequency of one or more services, such as URLs that are part of a particular service.Type: GrantFiled: March 30, 2015Date of Patent: February 27, 2018Assignee: Microsoft Technology Licensing, LLCInventors: Dragos D. Boia, Donald J. Ankney, Barry Markey, Jiong Qiu, Alisson A. S. Sol, Viresh Ramdatmisier, Eugene V. Bobukh
-
Publication number: 20180007077Abstract: Vulnerability testing tasks can be received and distributed, via a work scheduler, to computer test environments. Each of the test environments can have a detector computing component running in the environment. Each detector component can respond to receiving one of the tasks from the work scheduler by conducting a vulnerability test on an endpoint of a target, detecting results of the vulnerability test, generating output indicating the results of the vulnerability test, and sending the output to an output processor. The work scheduler can initiate dynamic scaling of the test environments by activating and deactivating test environments in response to determining that the test environments are overloaded or underloaded, respectively. Also an overall time-based limit on testing for a target can be enforced via the work scheduler.Type: ApplicationFiled: June 29, 2016Publication date: January 4, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Dragos Boia, Alisson Sol, Jiong Qiu, Erik Tayler, Johnathan Irwin, Leena Sheth
-
Patent number: 9720814Abstract: Template identification techniques for control of testing are described. In one or more implementations, a method is described to control testing of one or more services by one or more computing devices using inferred template identification. Templates are inferred, by the one or more computing devices, that are likely used for documents for respective services of a service provider that are available via corresponding universal resource locators (URLs) to form an inferred dataset. Overlaps are identified by the one or computing devices in the inferred dataset to cluster services together that have likely used corresponding templates. Testing is controlled by the one or more computing devices of the one or more services based at least in part on the clusters.Type: GrantFiled: May 22, 2015Date of Patent: August 1, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Dragos D. Boia, Viresh Ramdatmisier, Jiong Qiu, Barry Markey, Alisson A. S. Sol, Donald J. Ankney, Eugene V. Bobukh, Robert D. Fish
-
Patent number: 9548969Abstract: An encryption/decryption method are described, which includes that a terminal performs an encryption operation according to information of an encryption sub-node of an Encrypt And Decrypt Management Object (EADMO) node of a local Device Management (DM) tree and reports to a DM server encrypted data state information generated after the encryption succeeds; and the terminal performs a decryption operation according to the encrypted data state information sent from the DM server. An encryption/decryption system and device are also described. By means of technical solutions of embodiments of the disclosure, operations are simple without causing data loss, and a problem that data of a non-local terminal cannot be encrypted is solved.Type: GrantFiled: August 12, 2013Date of Patent: January 17, 2017Assignee: ZTE CORPORATIONInventor: Jiong Qiu
-
Publication number: 20160342500Abstract: Template identification techniques for control of testing are described. In one or more implementations, a method is described to control testing of one or more services by one or more computing devices using inferred template identification. Templates are inferred, by the one or more computing devices, that are likely used for documents for respective services of a service provider that are available via corresponding universal resource locators (URLs) to form an inferred dataset. Overlaps are identified by the one or computing devices in the inferred dataset to cluster services together that have likely used corresponding templates. Testing is controlled by the one or more computing devices of the one or more services based at least in part on the clusters.Type: ApplicationFiled: May 22, 2015Publication date: November 24, 2016Inventors: Dragos D. Boia, Viresh Ramdatmisier, Jiong Qiu, Barry Markey, Alisson A. S. Sol, Donald J. Ankney, Eugene V. Bobukh, Robert D. Fish
-
Publication number: 20160294856Abstract: Various implementations provide an approach to control of testing frequency based on the concept of behavior change detection or “volatility.” Behavior change detection is utilized, in place of a pre-defined patterns approach, to look at a system's behavior and detect any variances from what would otherwise be normal operating behavior. In at least some implementations, a behavior change detection system collects behavior from a service, such as an online service, and detects behavior changes, either permanent or transient, in the service. In this way, the changes may be used to compute a volatility score that describes an amount of change in the behaviors. The changes in behavior as reflected by the volatility scores are then usable to control a testing frequency of the services, such as URLs that are part of the service. This may be performed dynamically to reflect ongoing changes in volatility.Type: ApplicationFiled: March 30, 2015Publication date: October 6, 2016Inventors: Dragos D. Boia, Donald J. Ankney, Barry Markey, Jiong Qiu, Alisson A. S. Sol, Viresh Ramdatmisier, Eugene V. Bobukh
-
Publication number: 20150319140Abstract: An encryption/decryption method are described, which includes that a terminal performs an encryption operation according to information of an encryption sub-node of an Encrypt And Decrypt Management Object (EADMO) node of a local Device Management (DM) tree and reports to a DM server encrypted data state information generated after the encryption succeeds; and the terminal performs a decryption operation according to the encrypted data state information sent from the DM server. An encryption/decryption system and device are also described. By means of technical solutions of embodiments of the disclosure, operations are simple without causing data loss, and a problem that data of a non-local terminal cannot be encrypted is solved.Type: ApplicationFiled: August 12, 2013Publication date: November 5, 2015Inventor: Jiong Qiu
-
Patent number: 9164870Abstract: Integrated fuzzing techniques are described. A fuzzing system may employ a container configured as a separate component that can host different target pages to implement fuzzing for an application. A hosted target file is loaded as a subcomponent of the container and parsed to recognize functionality of the application invoked by the file. In at least some embodiments, this involves building a document object model (DOM) for a browser page and determining DOM interfaces of a browser to call based on the page DOM. The container then operates to systematically invoke the recognized functionality to cause and detect failures. Additionally, the container may operate to perform iterative fuzzing with multiple test files in an automation mode. Log files may be created to describe the testing and enable both self-contained replaying of failures and coverage analysis for multiple test runs.Type: GrantFiled: October 13, 2014Date of Patent: October 20, 2015Assignee: Microsoft Technology Licensing, LLCInventors: Jiong Qiu, Michael Allan Friedman, Charles Patrick Mann, Kwan-Leung Chan, Jeremy Lynn Reed
-
Publication number: 20150033079Abstract: Integrated fuzzing techniques are described. A fuzzing system may employ a container configured as a separate component that can host different target pages to implement fuzzing for an application. A hosted target file is loaded as a subcomponent of the container and parsed to recognize functionality of the application invoked by the file. In at least some embodiments, this involves building a document object model (DOM) for a browser page and determining DOM interfaces of a browser to call based on the page DOM. The container then operates to systematically invoke the recognized functionality to cause and detect failures. Additionally, the container may operate to perform iterative fuzzing with multiple test files in an automation mode. Log files may be created to describe the testing and enable both self-contained replaying of failures and coverage analysis for multiple test runs.Type: ApplicationFiled: October 13, 2014Publication date: January 29, 2015Inventors: Jiong Qiu, Michael Allan Friedman, Charles Patrick Mann, Kwan-Leung Chan, Jeremy Lynn Reed
-
Patent number: 8862940Abstract: Integrated fuzzing techniques are described. A fuzzing system may employ a container configured as a separate component that can host different target pages to implement fuzzing for an application. A hosted target file is loaded as a subcomponent of the container and parsed to recognize functionality of the application invoked by the file. In at least some embodiments, this involves building a document object model (DOM) for a browser page and determining DOM interfaces of a browser to call based on the page DOM. The container then operates to systematically invoke the recognized functionality to cause and detect failures. Additionally, the container may operate to perform iterative fuzzing with multiple test files in an automation mode. Log files may be created to describe the testing and enable both self-contained replaying of failures and coverage analysis for multiple test runs.Type: GrantFiled: February 14, 2012Date of Patent: October 14, 2014Assignee: Microsoft CorporationInventors: Jiong Qiu, Michael Allan Friedman, Charles Patrick Mann, Kwan-Leung Chan, Jeremy Lynn Reed
-
Publication number: 20130212435Abstract: Integrated fuzzing techniques are described. A fuzzing system may employ a container configured as a separate component that can host different target pages to implement fuzzing for an application. A hosted target file is loaded as a subcomponent of the container and parsed to recognize functionality of the application invoked by the file. In at least some embodiments, this involves building a document object model (DOM) for a browser page and determining DOM interfaces of a browser to call based on the page DOM. The container then operates to systematically invoke the recognized functionality to cause and detect failures. Additionally, the container may operate to perform iterative fuzzing with multiple test files in an automation mode. Log files may be created to describe the testing and enable both self-contained replaying of failures and coverage analysis for multiple test runs.Type: ApplicationFiled: February 14, 2012Publication date: August 15, 2013Applicant: MICROSOFT CORPORATIONInventors: Jiong Qiu, Michael Allan Friedman, Charles Patrick Mann, Kwan-Leung Chan, Jeremy Lynn Reed
-
Patent number: 8316370Abstract: A method of accessing a shared data structure in parallel by multiple threads in a parallel application program is disclosed. A lock of the shared data structure is granted to one thread of the multiple threads, an operation of the thread which acquires the lock is performed on the shared data structure, an operation of each thread of the multiple threads which does not acquire the lock is buffered, and the buffered operations are performed on the shared data structure when another thread of the multiple threads subsequently acquires the lock. A corresponding apparatus and program product are also disclosed.Type: GrantFiled: September 24, 2009Date of Patent: November 20, 2012Assignee: International Business Machines CorporationInventors: Xiao Jun Dai, Zhi Gan, Yao Qi, Mo Jiong Qiu
-
Publication number: 20100083266Abstract: A method of accessing a shared data structure in parallel by multiple threads in a parallel application program is disclosed, in which a lock of the shared data structure is granted to one thread of the multiple threads, an operation of the thread which acquires the lock is performed on the shared data structure, then an operation of each thread of the multiple threads which does not acquire the lock is buffered, and finally the buffered operations are performed on the shared data structure when another thread of the multiple threads subsequently acquires the lock. By using this method, the operations of other threads which do not acquire the lock of the shared data structure can be buffered automatically when the shared data structure is locked by one thread, and all the buffered operations can be performed when another thread acquires the lock.Type: ApplicationFiled: September 24, 2009Publication date: April 1, 2010Applicant: International Business MachinesInventors: Xiao Jun Dai, Zhi Gan, Yao Qi, Mo Jiong Qiu