Patents by Inventor Lei Ni

Lei Ni has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9811807
    Abstract: A method of sharing recruiting data between business units of an organization is disclosed. It is determined that a first business unit has a contract to use a first set of resources of a social-networking system to manage a first set of profiles. It is determined that a second business unit has a contract to use a second set of resources to manage a second set of profiles. It is determined that the first entity used the first set of resources to create a private data item and to associate the private data item with a profile of the first set of profiles. It is determined that the profile of the first set of profiles and a profile of the second set of profiles correspond to the same person. The second entity is provided with access to the private data item, but not control of the first set of resources.
    Type: Grant
    Filed: November 21, 2014
    Date of Patent: November 7, 2017
    Assignee: LinkedIn Corporation
    Inventors: Prasad Kamalakar Gune, Annabel Fang Liu, Pierre Yannick Monestie, Lei Ni
  • Publication number: 20170177264
    Abstract: Embodiments of the present disclosure provide methods and apparatus for path selection in a storage system. The storage system includes a plurality of storage devices, each storage device being connected to a plurality of different HBA ports of a server via a plurality of paths; the method comprises: monitoring a system-wide performance metric of the storage system to obtain dynamic performance statistics; detecting a performance-related event based on the dynamic performance statistics; and selecting, from the plurality of paths, an active path for a storage device of the plurality of storage devices based on the dynamic performance statistics and a result of the detecting. With the methods or apparatus according to the embodiments of the present disclosure, performance bottleneck can be avoided or timely eliminated, load balance can be achieved, and system resources can be utilized more effectively.
    Type: Application
    Filed: December 16, 2016
    Publication date: June 22, 2017
    Inventors: Bing Liu, Man Lv, James Lei Ni, Martin Chaojun Mei
  • Publication number: 20160371368
    Abstract: In an embodiment, search parameters in a series of search queries directed to a target node of a semi-structured database are categorized as frequently recurring parameters. A partial search query template is populated with shortcut information related to the search parameters, and then used to facilitate execution of a new search query that includes the same search parameters. In another embodiment, an index is generated that links search parameters that return intermediate search result values to search result values that are configured to be obtained when a search is conducted on the intermediate search result values. The index can be generated based upon monitoring of actual searches within the semi-structured database, or alternatively based upon an inspection of the semi-structured database itself.
    Type: Application
    Filed: September 24, 2015
    Publication date: December 22, 2016
    Inventors: Craig Matthew BROWN, Michael William PADDON, Matthew Christian DUGGAN, Kento TARUI, Xavier Claude FRANC, Lei NI, Louis PAN, Joel Timothy BEACH
  • Patent number: 9485242
    Abstract: In order to prevent unauthorized access to information, a system may analyze and may selectively store the information provided based on requests from users that are not unauthorized to access the information. In particular, the system may receive a request for information associated with a document (such as a web page) from an authorized user, either in real-time (i.e., during live or online operation of the system) or offline (in which case the system may operate as a proxy for a live feed of requests). In response, the system may provide or replay the request, but may include the credentials of an unauthorized user. Then, the system may analyze the response to the request to determine if the response is substantive (i.e., includes information). If yes, the system may store the response for use in subsequent analysis and to guide remedial action.
    Type: Grant
    Filed: January 16, 2015
    Date of Patent: November 1, 2016
  • Publication number: 20160212111
    Abstract: In order to prevent unauthorized access to information, a system may analyze and may selectively store the information provided based on requests from users that are not unauthorized to access the information. In particular, the system may receive a request for information associated with a document (such as a web page) from an authorized user, either in real-time (i.e., during live or online operation of the system) or offline (in which case the system may operate as a proxy for a live feed of requests). In response, the system may provide or replay the request, but may include the credentials of an unauthorized user. Then, the system may analyze the response to the request to determine if the response is substantive (i.e., includes information). If yes, the system may store the response for use in subsequent analysis and to guide remedial action.
    Type: Application
    Filed: January 16, 2015
    Publication date: July 21, 2016
  • Publication number: 20150278766
    Abstract: A method of sharing recruiting data between business units of an organization is disclosed. It is determined that a first business unit has a contract to use a first set of resources of a social-networking system to manage a first set of profiles. It is determined that a second business unit has a contract to use a second set of resources to manage a second set of profiles. It is determined that the first entity used the first set of resources to create a private data item and to associate the private data item with a profile of the first set of profiles. It is determined that the profile of the first set of profiles and a profile of the second set of profiles correspond to the same person. The second entity is provided with access to the private data item, but not control of the first set of resources.
    Type: Application
    Filed: November 21, 2014
    Publication date: October 1, 2015
    Inventors: Prasad Kamalakar Gune, Annabel Fang Liu, Pierre Yannick Monestie, Lei Ni