Patents by Inventor Lin Luo

Lin Luo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110191855
    Abstract: In-development vulnerability response management, in one aspect, may detect a code instance that matches a vulnerability pattern; generate one or more hints associated with the code instance in response to the detecting; retrieve an action response to the code instance that matches a vulnerability pattern; and associate the retrieved action response with the code instance.
    Type: Application
    Filed: May 26, 2010
    Publication date: August 4, 2011
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Frederik De Keukelaere, Lin Luo, Peter K. Malkin, Masayoshi Teraguchi, Naohiko Uramoto, Shun X. Yang, Sachiko Yoshihama, Yu Zhang
  • Publication number: 20110099482
    Abstract: A computer implemented method, information processing system, and computer program product manage web application firewall rule configuration. A web application is analyzed. A set of data elements within the web application is identified. Each data element in the set of data elements stores information that is sent from a web client to a web server. Each data element in the set of data elements is analyzed. A data type is associated with each data element in the set of data element. The data type describes a type of data stored by the data element. A web application firewall rule recommendation is automatically generated for each data element based at least on the data type associated therewith.
    Type: Application
    Filed: October 22, 2009
    Publication date: April 28, 2011
    Applicant: International Business Machines Corporation
    Inventors: Lawrence Koved, Lin Luo
  • Publication number: 20110020354
    Abstract: The present invention relates to RF-amide peptides and their use for treating, preventing and curing neurological and metabolic medical disorders. The invention also relates to methods for modulating a G-protein coupled receptor and for identifying substances which modulate the receptor.
    Type: Application
    Filed: October 1, 2010
    Publication date: January 27, 2011
    Inventors: Ying Jiang, Fang Liang Zhang, Nicholas J. Murgolo, Lin Luo, Jason S. Simon
  • Patent number: 7873183
    Abstract: A watermark embedding method for embedding a secret message sequence in a document. The techniques include obtaining layout information of the document, extracting a digest of the document by using a Hash function, calculating embedded positions where the secret message sequence is embedded in the document, and dispersedly hiding the secret message sequence in each of the calculated embedded positions by altering the layout of the document. Also provided is a watermark embedding apparatus, a corresponding watermark detecting method and apparatus, and a method and system for detecting document integrity. The integrity of documents in various forms can be detected, and secret information to be hidden can be embedded therein and extracted therefrom. The techniques described are not limited to the document either in soft copy or in hard copy and have good robustness.
    Type: Grant
    Filed: October 21, 2009
    Date of Patent: January 18, 2011
    Assignee: International Business Machines Corporation
    Inventors: Yuan He, Lin Luo, Ming Su, Ling Shao, Zhe Xiang
  • Publication number: 20100333167
    Abstract: Mechanisms are provided for handling client computing device requests with adaptive rule loading and session control. The mechanisms partition a set of rules, into a plurality of filter sets with each filter set having a different subset of the set of rules and being directed to identifying a different type of attack on a backend application or service. A subset of filter sets is selected to be used to validate client computing device requests received from client computing devices. The selected filter sets are applied to requests and/or responses to requests. The mechanisms dynamically modify which filter sets are included in the subset of filter sets based on an adaptive reinforcement learning operation on results of applying the selected filter sets to the requests and/or responses to requests.
    Type: Application
    Filed: June 29, 2009
    Publication date: December 30, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Lin Luo, Vugranam C. Sreedhar, Shun X. Yang, Yu Zhang
  • Publication number: 20100322141
    Abstract: A method and apparatus are described including collecting network information, determining an association, bandwidth allocation and routing scheme based on the collected network information, notifying a mesh access point of the association, the bandwidth allocation and the routing scheme and notifying a client node of its association information. Also described are a method and apparatus including measuring link quality and channel conditions, reporting results of the measuring act to a controller, receiving a routing decision and data forwarding instructions from the controller and forwarding the routing decision and the data forwarding instructions to a client node. Further described are a method and apparatus including measuring link quality and channel conditions, reporting results of the measuring act to a controller, receiving association instructions from the centralized controller and updating previously stored association instructions with the received association instructions.
    Type: Application
    Filed: March 11, 2008
    Publication date: December 23, 2010
    Inventors: Hang Liu, Lin Luo, Mingquan Wu, Dekai Li
  • Publication number: 20100281311
    Abstract: A computer-implemented method and system for reconstructing a response message to an improper accessing request in a web application environment. The method includes: obtaining the URL of a web application to be accessed by the improper accessing request and the error parameter information of the improper accessing request; obtaining a response template based on the obtained URL of the web application to be accessed; and merging the obtained error parameter information of the improper accessing request with the obtained response template to generate a reconstructed response message for the improper accessing request. The system includes: a message obtaining device; a response message template obtaining device; and a response message merging device.
    Type: Application
    Filed: April 29, 2010
    Publication date: November 4, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Bo Gao, Chang Jie Guo, Lin Luo, Shun Xiang Yang, Yu Zhang
  • Patent number: 7807390
    Abstract: The present invention relates to RF-amide peptides and their use for treating, preventing and curing neurological and metabolic medical disorders. The invention also relates to methods for modulating a G-protein coupled receptor and for identifying substances which modulate the receptor.
    Type: Grant
    Filed: January 7, 2008
    Date of Patent: October 5, 2010
    Assignee: Schering Corporation
    Inventors: Ying Jiang, Fang Liang Zhang, Nicholas J. Murgolo, Lin Luo, Jason S. Simon
  • Publication number: 20100236985
    Abstract: A supported catalyst and process for dehydrogenating a hydrocarbon, the catalyst comprising a first component selected from the group consisting of tin, germanium, lead, indium, gallium, thallium, and compounds thereof; a second component selected from the group consisting of metals of Group 8 of the Periodic Table of the Elements and compounds thereof, and a support comprising alumina in the gamma crystalline form. The catalysts are especially active and efficient when employed in concurrent flow in a dehydrogenation reactor having an average contact time between the hydrocarbon and catalyst of from 0.
    Type: Application
    Filed: March 4, 2010
    Publication date: September 23, 2010
    Inventors: Lin Luo, Susan Domke, Howard W. Clark, Richard A. Pierce, Michael M. Olken
  • Patent number: 7769787
    Abstract: A method and system for maintaining originality-related information about elements in an editable object. It is determined that an element has been edited in the editable object. The originality-related information about the element, including the element's creator, is identified and recorded by embedding the originality-related information in the editable object, storing the originality-related information in an attached file, or storing the originality-related information in association with the element in a repository configured to be shared by different editable objects and further configured to be queried for elements of the different editable objects in association with originality-related information pertaining to the elements of the different editable objects.
    Type: Grant
    Filed: July 20, 2007
    Date of Patent: August 3, 2010
    Assignee: International Business Machines Corporation
    Inventors: Brent Tzion Hailpern, Da Ming Hao, Lin Luo, Peter Kenneth Malkin, Harold Ossher, Lawrence Scott Rich, Dave Thomson, Zhong Tian, John Wiegand, Hang Jun Ye
  • Publication number: 20100104129
    Abstract: A watermark embedding method for embedding a secret message sequence in a document. The techniques include obtaining layout information of the document, extracting a digest of the document by using a Hash function, calculating embedded positions where the secret message sequence is embedded in the document, and dispersedly hiding the secret message sequence in each of the calculated embedded positions by altering the layout of the document. Also provided is a watermark embedding apparatus, a corresponding watermark detecting method and apparatus, and a method and system for detecting document integrity. The integrity of documents in various forms can be detected, and secret information to be hidden can be embedded therein and extracted therefrom. The techniques described are not limited to the document either in soft copy or in hard copy and have good robustness.
    Type: Application
    Filed: October 21, 2009
    Publication date: April 29, 2010
    Applicant: International Business Machines Corporation
    Inventors: Yuan He, Lin Luo, Ming Su, Ling Shao, Zhe Xiang
  • Publication number: 20100091669
    Abstract: A method and apparatus are described for selecting an access point in a wireless network, including initializing a channel index, recording a received signal power and information contained in one of a beacon message and a probe request response message, calculating an access link metric for each candidate access point, the access link metric being between an end device and each candidate access point on the channel indexed by the channel index responsive to the received signal power and information receiving a path metric between each candidate access point and a gateway, estimating a function using the access link metric and the path metric, selecting one of the candidate access points based on the function and establishing a connection with the selected access point. Also described is a method and apparatus for maintaining a connection with an access point.
    Type: Application
    Filed: March 1, 2007
    Publication date: April 15, 2010
    Inventors: Hang Liu, Lin Luo, Mingquan Wu, Dekai Li
  • Publication number: 20100095277
    Abstract: A method and system for detecting a source-related risk and generating an alert concerning the source-related risk are disclosed. Criteria of the source-related risk are defined. Thresholds associated with the source-related risk are defined. Every operation on an object is detected. If an operation on an object satisfies a criterion among the criteria or if the operation causes to exceed a threshold among the thresholds, an alert is generated for the operation.
    Type: Application
    Filed: October 10, 2008
    Publication date: April 15, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ping Cheng, Ya Bin Dang, Lin Luo, Peter K. Malkin, Vadakkedathu T. Rajan, Yuan Yuan
  • Publication number: 20100074194
    Abstract: A method and system are described for establishing an end-to-end route for data to traverse a wireless network, including calculating a link cost function, calculating a quantized link cost function using the calculated link cost, function, calculating a quantized cost of each of a plurality, of end-to-end routes for data to traverse the wireless network, wherein the plurality of end-to-end routes include routes between a same set of nodes in the wireless network, wherein, the quantized cost of each of the plurality of end-to-end routes for data to traverse the wireless network is performed using the quantized link cost function and selecting one of the plurality of end-to-end routes, for data to traverse the wireless network based on the quantized cost of each of the plurality of end-to-end routes. Also described is a node in a wireless network configured to participate in the establishment of a bi-directional end-to-end route for data to traverse the wireless network.
    Type: Application
    Filed: February 7, 2007
    Publication date: March 25, 2010
    Inventors: Hang Liu, Lin Luo
  • Publication number: 20100049792
    Abstract: A runtime vulnerability defense method, system, and computer readable article of manufacture tangibly embodying computer readable instructions for executing the method for cross domain interactions for a Web application. The method includes: creating a first and second iFrame object by the Web application which belong to a lower domain; creating an object ? by the first iFrame object; sharing the created object ? by the second iFrame object; promoting the domain of the second iFrame object to an upper domain; creating in the shared object ? a source accessing function for submitting to a third party server a request to access the content of the third party server; and creating in the shared object ? a sanitization function for sanitizing the response received from the server.
    Type: Application
    Filed: August 25, 2009
    Publication date: February 25, 2010
    Applicant: International Business Machines Corporation
    Inventors: Da Ming Hao, Lin Luo, Ye Wang, Yu Zhang
  • Publication number: 20100020882
    Abstract: A method for encoding motion-compensated video data includes generating, for a current frame, a high-pass wavelet coefficient based on a function of pixels in a temporally adjacent frame. The operations are repeated for multiple pixels in an array of pixels in the current frame to form an array of high-pass wavelet coefficients. A low-pass wavelet coefficient is generated based on a function of the high-pass wavelet coefficients. A system for coding video data includes a temporal wavelet decomposition module decomposing a pixel into a high-pass coefficient by performing a discrete wavelet transform on the pixel, a function of pixels in a previous frame, and/or a function of pixels in a subsequent frame. The system includes a motion estimation module generating motion vectors associated with the pixels in the previous frame and in the subsequent frame.
    Type: Application
    Filed: July 15, 2009
    Publication date: January 28, 2010
    Applicant: Microsoft Corporation
    Inventors: Shipeng Li, Ruiqin Xiong, Lin Luo, Jizheng Xu, Feng Wu
  • Patent number: 7653940
    Abstract: Provides methods for tracing and identifying a piracy in a wireless rights management system, wherein the content provider allow the protected digital content to be super-distributed, when unauthorized holding a pirated copy of the protected digital content is detected, based on the gateway controlling ability of the wireless operator within the wireless digital rights management system, a specific fingerprint is embedded in or removed from the protected digital content so as to trace the suspected persons and further identify the pirate. The fingerprint is related to information of a suspected person holding the protected digital content without authorization. A process of screening singles out highly suspected persons. Therefore the operator can determine whether the suspected person is a real pirate by comparing the similarity of the pirated version of content and the version held by the suspected person, and the exact tracing and identifying is achieved.
    Type: Grant
    Filed: August 25, 2005
    Date of Patent: January 26, 2010
    Assignee: International Business Machines Corporation
    Inventors: Lin Luo, Jian Zhang, Rong Yan, Ling Shao
  • Publication number: 20100017868
    Abstract: A method, a system, and a computer program product embodying computer readable code for configuring a rule file for a Web application firewall. The method includes: blocking a response created by a Web application; modifying the response by adding capturing code for capturing a regular expression and an associated parameter value embedded in the response while being executed; sending the modified response to the browser; receiving a request submitted by the browser and at least one regular expression and an associated parameter value captured by the capturing code; determining a parameter name and a regular expression associated with the same parameter value, and configuring the rule file of the firewall by use of the determined parameter name and regular expression associated with one another as a filtering rule.
    Type: Application
    Filed: July 10, 2009
    Publication date: January 21, 2010
    Inventors: Da Ming Hao, Lin Luo, Ye Wang, Yu Zhang
  • Publication number: 20090327745
    Abstract: Provided is a secure apparatus for protecting the integrity of a software system and a method thereof. The apparatus comprises: a template repository for storing templates required for generating an agent template; a template generator for randomly selecting one template from said template repository and generating a new agent template according to the selected template; and a transceiver for sending said new agent module to an external apparatus communicating with said secure apparatus to update a current agent module which is running in said external apparatus, wherein said current agent module is used to verify the integrity of said software system running in said external apparatus. The secure apparatus can protect software in an insecure environment with a high software protection level to prevent the software from being tampered or bypassed.
    Type: Application
    Filed: June 27, 2008
    Publication date: December 31, 2009
    Applicant: International Business Machines Corporation
    Inventors: Ya Bin Dang, Da Ming Hao, Shih-Gong Li, Lin Luo, Shun Xiang Yang
  • Publication number: 20090327411
    Abstract: A method, system and an article of manufacture tangibly embodying a computer readable program for protecting Web application data between a server and a client. A response created by the Web application for the client is backed up and modified by adding capturing code for capturing a user action, user data of the client, or combination thereof. The modified response is sent to the client and a request submitted by the client and the user action and/or user data captured by the capturing code is received. A verifying request is generated according to the received user action and/user data captured by the capturing code and the backup of the response. The request submitted by the client is verified according to the verifying request and the verified request is sent to the Web application of the server.
    Type: Application
    Filed: June 25, 2009
    Publication date: December 31, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ya Bin Dang, Da Ming Hao, Peng Ji, Lin Luo, Yu Zhang