Patents by Inventor Kai Mike Zhang
Kai Mike Zhang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9514201Abstract: A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.Type: GrantFiled: October 13, 2006Date of Patent: December 6, 2016Assignee: International Business Machines CorporationInventors: Atul R. Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 9274857Abstract: A computer program product is disclosed. The computer program product includes a computer useable medium that has a computer readable program. The computer readable program when executive on a computer causes the computer to receive a request from a component to invoke a function. Further, the computer readable program, when executed on a computer, causes the computer to asynchronously perform the function according to the request. In addition, the computer readable program, when executed on a computer, causes the computer to provide, to one or more programs, an indication that the function has completed work according to the request.Type: GrantFiled: October 13, 2006Date of Patent: March 1, 2016Assignee: International Business Machines CorporationInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 9047144Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.Type: GrantFiled: November 4, 2009Date of Patent: June 2, 2015Assignee: International Business Machines CorporationInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 8549144Abstract: Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.Type: GrantFiled: August 31, 2007Date of Patent: October 1, 2013Assignee: International Business Machines CorporationInventors: Manoj Khangaonkar, Wen Chao Li, Weixin Xu, Kai Mike Zhang
-
Patent number: 8392700Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: GrantFiled: July 2, 2008Date of Patent: March 5, 2013Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Patent number: 8352912Abstract: A computer program product is provided. The computer program product includes a computer useable medium having a computer readable program. The computer readable program when executed on a computer causes the computer to generate a topology role in a topology role tier that is included in a topology pattern. Further, the computer readable program when executed on a computer causes the computer to create a component in a component tier that is defined in the topology pattern such that the component corresponds to the topology role. In addition, the computer readable program when executed on a computer causes the computer to map the topology role to a deployment target.Type: GrantFiled: December 15, 2008Date of Patent: January 8, 2013Assignee: International Business Machines CorporationInventors: Mandar Ganesh Bhatkhande, Srikanth Bhattiprolu, Atul Ravindra Daherkar, Thomas Pollinger, Charles James Redlin, Chidanandan Theyancheri, Kai Mike Zhang
-
Publication number: 20110107354Abstract: A system and method for providing Quality-of-Service (QoS) functions to concurrent event-processing applications in a multi-processing database environment are described. The system includes an Event-Listener interface for determining the QoS functions applicable to the events being processed and an Event-Service interface for invoking the determined QoS functions. The Event-Service interface loads, initializes and activates the QoS functions. The QoS functions are based on service definitions. The Event-Service interface further initializes the service providers and sends the events that need QoS support to the respective service providers for processing. The QoS functions include the services commonly needed in a clustered event-processing database system like Event-Sequencing, Event-Isolation, High-Availability, Event-Filtering and Flow-Control. Other QoS functions might be added to the database system using the same interfaces provided by the invention.Type: ApplicationFiled: November 4, 2009Publication date: May 5, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Patent number: 7895602Abstract: Provided are a system and article of manufacture for duplicate message elimination during recovery when multiple threads are delivering messages from a message store to a destination queue. A plurality of message threads process operations to deliver messages from a message store to a destination queue, wherein one message thread processes one message. An in-doubt list is generated identifying messages that are in-progress of being delivered form the message store to the destination queue by the message threads. One message thread processing one message adds an entry including the message identifier and the thread identifier to a monitor queue. The message thread further adds the message to the destination queue. A recovery thread is generated in response to detecting a failure in the processing by the threads to deliver the messages from the message store to the destination queue.Type: GrantFiled: November 25, 2008Date of Patent: February 22, 2011Assignee: International Business Machines CorporationInventors: Kenneth L. Astl, Subramanyam Agraharam Gooty, Arul Sundaramurthy, Kai Mike Zhang
-
Publication number: 20100153164Abstract: A system and method for business calendar event modeling comprises receiving a plurality of events from a computerized calendar user wherein each event is classified as an OnTime, OffTime or OtherTime event. Wherein, an OnTime event is defined as a calendar period where the calendar user is available, an OffTime event is defined as a calendar period where the calendar user is unavailable; and an OtherTime event is defined as a calendar period unrelated to the calendar user's availability. Then, calculating the calendar user's net OnTime, wherein net OnTime is a sum of periods of a day wherein an OnTime event period does not overlap with an OffTime event period. Also, calculating user available days wherein a user available day is a day having net OnTime. Calculating the number of user available days, hours and minutes before an event.Type: ApplicationFiled: December 11, 2008Publication date: June 17, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul Ravindra DAHERKAR, Manoj KHANGAONKAR, Chidanandan THEYANCHERI, Kai Mike ZHANG
-
Publication number: 20100153916Abstract: A computer program product is provided. The computer program product includes a computer useable medium having a computer readable program. The computer readable program when executed on a computer causes the computer to generate a topology role in a topology role tier that is included in a topology pattern. Further, the computer readable program when executed on a computer causes the computer to create a component in a component tier that is defined in the topology pattern such that the component corresponds to the topology role. In addition, the computer readable program when executed on a computer causes the computer to map the topology role to a deployment target.Type: ApplicationFiled: December 15, 2008Publication date: June 17, 2010Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Mandar Ganesh Bhatkhande, Srikanth Bhattiprolu, Atul Ravindra Daherkar, Thomas Pollinger, Charles James Redlin, Chidanandan Theyancheri, Kai Mike Zhang
-
Patent number: 7644266Abstract: An apparatus, system, and method are disclosed for selective, end-to-end message level security. The apparatus includes a message class definition module, a security module, and a messaging module. The message class definition module identifies a predetermined message class of an internode message. The security module applies security to the message at an application layer. The security that is applied to the message corresponds to a security level, which depends on the message class of the message. The security may include encryption, authentication, and/or other security features. The messaging module communicates the message between a first node and a second node. A third node, such as a broker, may be interposed between the first and second nodes, in which case the security of the message is preserved at the third node.Type: GrantFiled: September 23, 2004Date of Patent: January 5, 2010Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Patent number: 7607006Abstract: A method is disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The method includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: GrantFiled: September 23, 2004Date of Patent: October 20, 2009Assignee: International Business Machines CorporationInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Publication number: 20090119680Abstract: Provided are a system and article of manufacture for duplicate message elimination during recovery when multiple threads are delivering messages from a message store to a destination queue. A plurality of message threads process operations to deliver messages from a message store to a destination queue, wherein one message thread processes one message. An in-doubt list is generated identifying messages that are in-progress of being delivered form the message store to the destination queue by the message threads. One message thread processing one message adds an entry including the message identifier and the thread identifier to a monitor queue. The message thread further adds the message to the destination queue. A recovery thread is generated in response to detecting a failure in the processing by the threads to deliver the messages from the message store to the destination queue.Type: ApplicationFiled: November 25, 2008Publication date: May 7, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Kenneth L. ASTL, Subramanyam Agraharam GOOTY, Arul SUNDARAMURTHY, Kai Mike ZHANG
-
Publication number: 20090063563Abstract: Provided are a method, system, and article of manufacture for a common configuration framework for applications to configure database objects and resources. Configuration interfaces are maintained for a plurality of different database types, wherein each configuration interface implements a database configuration operation with respect to a database of one database type. A configuration request is received from an application indicating a database type, database name, and a database configuration operation. A determination is made of one of the configuration interfaces for the requested database type to implement the requested configuration operation with respect to the database having the database name. The determined configuration interface is invoked with the requested database name to perform the requested configuration operation with respect to the database name.Type: ApplicationFiled: August 31, 2007Publication date: March 5, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Manoj Khangaonkar, Wen Chao Li, Weixin Xu, Kai Mike Zhang
-
Patent number: 7480918Abstract: Provided is a method for duplicate message elimination A plurality of message threads process operations to deliver messages from a message store to a destination queue. An in-doubt list is generated identifying messages that are in-progress of being delivered from the message store to the destination queue by the message threads. One message thread processing one message adds an entry including the message identifier to a monitor queue. The message thread further adds the message to the destination queue. A recovery thread is generated in response to detecting a failure in the processing by the threads to deliver the messages from the message store to the destination queue. The recovery thread processes the messages indicated in the in-doubt list and compares with message identifiers in the monitor queue to prevent duplicate delivery of messages to the destination queue.Type: GrantFiled: February 18, 2005Date of Patent: January 20, 2009Assignee: International Business Machines CorporationInventors: Kenneth L. Astl, Subramanyam Agraharam Gooty, Arul Sundaramurthy, Kai Mike Zhang
-
Publication number: 20080285752Abstract: An apparatus and system are disclosed for asymmetric security in data communications between two or more nodes. Asymmetric security within data communications refers to sending and receiving messages at different security levels. The apparatus includes a receiving module, a transmission module, and a communication module. The receiving module receives a first message at a first security level from a first node. A security level may be defined by implementation of one or more security features, including encryption, digital signatures, and/or other security features. The transmission module transmits a second message at a second security level to the first node in response to receiving the first message. The first and second messages may be communicated during a single communication session. The communication module communicates the second security level to the first node. The communication may be directly between two nodes or may occur via a broker or other intermediate node.Type: ApplicationFiled: July 2, 2008Publication date: November 20, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Pratima Ahuja, Manoj Khangaonkar, Kai Mike Zhang
-
Publication number: 20080148299Abstract: A computer program product is disclosed. The computer program product includes a computer useable medium that has a computer readable program. The computer readable program when executive on a computer causes the computer to receive a request from a component to invoke a function. Further, the computer readable program, when executed on a computer, causes the computer to asynchronously perform the function according to the request. In addition, the computer readable program, when executed on a computer, causes the computer to provide, to one or more programs, an indication that the function has completed work according to the request.Type: ApplicationFiled: October 13, 2006Publication date: June 19, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul Ravindra Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Publication number: 20080091712Abstract: A system has a repository that stores a plurality of events. Each event requests to utilize one or more functions in a component. An event sequencing module analyzes an event sequencing key of the event if the event requests a function having a component definition that includes an event sequence qualifier. The event sequencing module grants a lock to the event for the function if no other event having the same value for the event sequencing key has the lock for the function. The event sequencing module prevents the event from being processed if another event having the same value for the event sequencing key has the lock for the function. The event sequencing key is composed of one or more object attributes. The system has a worker server that receives the event, if the event obtains the lock, and processes the function requested by the event.Type: ApplicationFiled: October 13, 2006Publication date: April 17, 2008Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Atul R. Daherkar, Manoj Khangaonkar, Hong Sun, Kai Mike Zhang, Chendong Zou
-
Publication number: 20040205770Abstract: A method for preventing the delivery of duplicate messages in a message system, wherein each message comprises a unique message identifier that identifies itself from adjacent messages, comprises the steps of polling a message store for messages directed to a specified receiver; receiving from the message store at least one message directed to the specified receiver; processing the at least one message; receiving, from a monitor queue, a message identifier for the last message successfully delivered to the specified receiver; and comparing the message identifier received from the monitor queue to the message identifier of the message received from the message store.Type: ApplicationFiled: February 11, 2003Publication date: October 14, 2004Applicant: International Business Machines CorporationInventors: Kai Mike Zhang, Kenneth L. Astl, Subramanyam Agraharam Gooty, Arul Prabhu Sundaramurthy