Patents by Inventor Mai Zeng
Mai Zeng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240078050Abstract: Container data sharing is provided. A second container of a cluster of containers is started to process a service request in response to detecting a failure of a first container processing the service request. The service request and data generated by the first container that failed stored on a physical external memory device is accessed. The service request and the data generated by the first container that failed is loaded on the second container from the physical external memory device via a dedicated hardware link for high-speed container failure recovery.Type: ApplicationFiled: September 1, 2022Publication date: March 7, 2024Inventors: Hui Wang, Yue Wang, Mai Zeng, Wei Li, Yu Mei Dai, Xiao Chen Huang
-
Publication number: 20240054025Abstract: Embodiments include synchronization of automation files among different computing systems. Aspects include receiving a notification that an automation file on a first computing system has been updated, the notification including a first set of data including a timestamp corresponding to the update and comparing the timestamp to a second timestamp, wherein the second timestamp corresponds to the automation file stored on a second computing system. Based on determining a difference between the timestamps, aspects include transmitting a synchronization request to the second computing system. Based on receiving a notification that the second computing system successfully executed the synchronization request, aspects include updating a second set of data to match the first set of data. Based on receiving a notification that the second computing system failed to executed the synchronization request, aspects include notifying a user of a required update to the second computing system.Type: ApplicationFiled: August 10, 2022Publication date: February 15, 2024Inventors: Mai Zeng, Yu Mei Dai, HUI WANG, Wei Li, Xiao Chen Huang
-
Publication number: 20230394062Abstract: Embodiments of the invention are directed to data replication in an active-active databases having a source site and a target site. Aspects include creating a subscription activation message in a capture address space, the subscription activation message having a timestamp after a latest committed timestamp of the active-active databases and transmitting the subscription activation message to a subscription activation module of the target site of the active-active databases. Based on a determination that one or more tables associated with the subscription activation message are inactive, aspects also include repairing the one or more tables. Based on a determination that all tables associated with the subscription activation message are active, aspects include initiate replication of the capture address space from the source site to the target site with a timestamp of the latest committed timestamp.Type: ApplicationFiled: June 2, 2022Publication date: December 7, 2023Inventors: Xin Xin Dong, Mai Zeng, Xing Jun Zhou, Ming Qiao Shang Guan, Wei Song, Cheng Fang Wang
-
Publication number: 20230214265Abstract: Aspects include monitoring, by a controller, an operational status of a tracker system that is configured to track and record a current status of a job being executed and to report completion of the job to the controller. The recording includes storing two copies of the current status, where a first copy is stored in a shared memory location accessible by the controller. In response to determining, based on the monitoring, that the tracker system is operational, waiting to receive a job completion message for the job from the tracker system and performing a job completion action based on receiving the job completion message. In response to determining that the tracker system is not operational, obtaining the current status of the job from the shared memory location and performing the job completion action based on the current status indicating that the job has completed.Type: ApplicationFiled: January 5, 2022Publication date: July 6, 2023Inventors: Xin Xin Dong, Ming Qiao Shang Guan, Mai Zeng, Wei Song
-
Patent number: 11604807Abstract: In an embodiment, a computer-implemented method comprises deploying a dual-active database on a first active database site and a second active database site. The first active database site comprises a first group of disks including a first sub-group of disks and a second sub-group of disks respectively corresponding to a third sub-group of disks and a fourth sub-group of disks included in a second group of disks in the second active database site. The method further comprises storing a first set of database logs on the first sub-group of disks while a second set of database logs is being written on the second sub-group of disks. Contents of the second set of database logs are consistent with contents of the first set of database logs and function as a duplication of the first set of database logs.Type: GrantFiled: March 18, 2021Date of Patent: March 14, 2023Assignee: International Business Machines CorporationInventors: Xing Jun Zhou, Hong Tao Li, Wei Liu, Mai Zeng, Jing B J Ren, Xiao Chen Huang, Kang Yong Ying, Liang Xu
-
Publication number: 20220300529Abstract: In an embodiment, a computer-implemented method comprises deploying a dual-active database on a first active database site and a second active database site. The first active database site comprises a first group of disks including a first sub-group of disks and a second sub-group of disks respectively corresponding to a third sub-group of disks and a fourth sub-group of disks included in a second group of disks in the second active database site. The method further comprises storing a first set of database logs on the first sub-group of disks while a second set of database logs is being written on the second sub-group of disks. Contents of the second set of database logs are consistent with contents of the first set of database logs and function as a duplication of the first set of database logs.Type: ApplicationFiled: March 18, 2021Publication date: September 22, 2022Inventors: Xing Jun Zhou, Hong Tao Li, Wei Liu, Mai Zeng, Jing BJ Ren, Xiao Chen Huang, KANG YONG YING, LIANG XU
-
Publication number: 20220164682Abstract: A method and system for predicting a response time for a workload prior to making a hardware upgrade to a computing system. Data related to operation of the system is collected. Then a workload model of a plurality of workloads and CPU utilization for the plurality of workloads and a transaction model for each transaction within a workload of the plurality of workloads are built. Next the process determines that a characteristic of at least one workload in the plurality of workloads will change due to the hardware upgrade. As a result of the change, a new workload model for the changed workload is built based on the changed characteristic, and the response time for the workload based on the new workload model is calculated.Type: ApplicationFiled: November 24, 2020Publication date: May 26, 2022Inventors: Al Chakra, MING QIAO SHANG GUAN, Hong Tao Li, Mai Zeng, Grant S. Mericle, Jing BJ Ren, Xiao Chen Huang, Yu Mei Dai
-
Publication number: 20220091898Abstract: A job is received. The job indicates moving one or more data to a pool storage group (PSG). The job includes resource requirements and the resource requirements include a size requirement to store the one or more data and a volume requirement to store the one or more data. A resource availability of the PSG is received. The resource availability of the PSG includes an available space on the PSG and one or more available volume on the PSG. Whether the resource availability of the PSG meets the resource requirements of the job is determined. Whether the PSG has a dynamic pool storage group (DPSG) flag indication on is determined.Type: ApplicationFiled: September 20, 2020Publication date: March 24, 2022Inventors: Ming Qiao Shang Guan, Jing BJ Ren, Mai Zeng, Yu Mei Dai, Xiao Chen Huang
-
Patent number: 11182873Abstract: A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.Type: GrantFiled: April 18, 2019Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Yu Mei Dai, Hui Wang, Wei Ying Yu, Mai Zeng
-
Patent number: 11080379Abstract: A method, system and computer program product for processing data are provided. In the method, a request is received to perform an access-controlled operation in a user device. A biometric feature input from an input module of the user device is received for the request. It is determined whether the received biometric feature matching with a primary biometric feature, the primary biometric feature being identified from a plurality of biometric features stored in the user device and being used to authenticate a user for the access-controlled operation. The access-controlled operation is enabled in response to determining the received biometric feature matching with a primary biometric feature.Type: GrantFiled: February 13, 2019Date of Patent: August 3, 2021Assignee: International Business Machines CorporationInventors: Wei Li, Yi Jie Ma, Zhi Dan Hao, Yu Mei Dai, Mai Zeng, Xue Yong Zhang, Wen Zhong Liu
-
Patent number: 10956403Abstract: A method for verifying data consistency between update-in-place data structures and append-only data structures containing change histories associated with the update-in-place data structures is provided. The method includes loading data from an update-in-place data structure to a first set of hash buckets in a processing platform, loading data from append-only data structures to a second set of hash buckets in the processing platform, performing a bucket-level comparison between the data in the first set of hash buckets and the data in the second set of has buckets, and generating a report based on the bucket-level comparison.Type: GrantFiled: November 15, 2018Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Serge Bourbonnais, Si Bin Fan, Xiao Li, Jonathan W. Wierenga, Mai Zeng
-
Patent number: 10949416Abstract: Systems, methods, and computer-readable media are described for implementing an active-active transaction protocol according to which multiple sites can each provide active services such as executing update transactions that insert, modify, or delete data records. An active-active transaction protocol utilizes affinity records corresponding to both transactions that have been received as well as the data records those transactions are updating to determine which site should handle execution of an incoming update transaction. An affinity record defines a relationship between a data record and a site that determines whether and where a transaction seeking to update that data record will be routed for processing. Conflict handling mechanisms are also provided by the active-active transaction protocol to ensure data consistency between the multiple sites.Type: GrantFiled: July 13, 2018Date of Patent: March 16, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Si Bin Fan, Wei Liu, Mai Zeng, Wen Z. Liu, Wei Li, Yi J. Yj, Zhi D. Hao, Hong Tao Li, Jiong Fan, Wei H. Liu
-
Patent number: 10911434Abstract: This disclosure provides a method and system for protecting phone numbers from being exposed to third parties. The method comprises receiving a request, from a caller smart phone, for establishing telephone communication with a callee smart phone, wherein the request contains a code to designate the smart phone of the callee. The method further comprises checking whether the code is formally provided to the callee. The method further comprises: in response to determining that the code is formally provided to the caller, retrieving the phone number of the caller and the phone number of the callee based on the request and establishing a phone call connection via a cellular network with the phone number of the caller and the phone number of the callee.Type: GrantFiled: November 15, 2017Date of Patent: February 2, 2021Assignee: International Business Machines CorporationInventors: Hui Wang, Mai Zeng, Yu Mei Dai, Xin Xin Lv, Yong Wu, Si Jun Gz Zhou, De Ting Hu, Zhi Jun Wang
-
Patent number: 10893039Abstract: This disclosure provides a method and system for protecting phone numbers from being exposed to third parties. The method comprises receiving a request, from a caller smart phone, for establishing telephone communication with a callee smart phone, wherein the request contains a code to designate the smart phone of the callee. The method further comprises checking whether the code is formally provided to the callee. The method further comprises: in response to determining that the code is formally provided to the caller, retrieving the phone number of the caller and the phone number of the callee based on the request and establishing a phone call connection via a cellular network with the phone number of the caller and the phone number of the callee.Type: GrantFiled: September 27, 2017Date of Patent: January 12, 2021Assignee: International Business Machines CorporationInventors: Hui Wang, Mai Zeng, Yu Mei Dai, Xin Xin Lv, Yong Wu, Si Jun Gz Zhou, De Ting Hu, Zhi Jun Wang
-
Publication number: 20200257785Abstract: A method, system and computer program product for processing data are provided. In the method, a request is received to perform an access-controlled operation in a user device. A biometric feature input from an input module of the user device is received for the request. It is determined whether the received biometric feature matching with a primary biometric feature, the primary biometric feature being identified from a plurality of biometric features stored in the user device and being used to authenticate a user for the access-controlled operation. The access-controlled operation is enabled in response to determining the received biometric feature matching with a primary biometric feature.Type: ApplicationFiled: February 13, 2019Publication date: August 13, 2020Inventors: Wei Li, Yi Jie Ma, Zhi Dan Hao, Yu Mei Dai, Mai Zeng, Xue Yong Zhang, Wen Zhong Liu
-
Patent number: 10705754Abstract: A computing system includes a first storage unit at a first computing site. The first storage unit stores units of work data and data synchronously replicated from a first server cluster of a second computing site. The system further includes a second server cluster at the first computing site, the second server cluster is a proxy node of the first server cluster. The system further includes a second storage unit at the first computing site, the second storage unit stores the units of work data and data from the first storage unit asynchronously into the second storage unit. The system further includes a third server cluster at the first computing site, the third server cluster processes the units of work data asynchronously replicated into the second storage unit.Type: GrantFiled: June 22, 2018Date of Patent: July 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jing Cheng, Wei Liu, Xing Jun Zhou, Mai Zeng, Wen Z. Liu, Si Bin Fan, Hong Tao Li, Wei H. Liu, Jiong Fan
-
Publication number: 20200019631Abstract: Systems, methods, and computer-readable media are described for implementing an active-active transaction protocol according to which multiple sites can each provide active services such as executing update transactions that insert, modify, or delete data records. An active-active transaction protocol utilizes affinity records corresponding to both transactions that have been received as well as the data records those transactions are updating to determine which site should handle execution of an incoming update transaction. An affinity record defines a relationship between a data record and a site that determines whether and where a transaction seeking to update that data record will be routed for processing. Conflict handling mechanisms are also provided by the active-active transaction protocol to ensure data consistency between the multiple sites.Type: ApplicationFiled: July 13, 2018Publication date: January 16, 2020Inventors: Si Bin FAN, Wei LIU, Mai ZENG, Wen Z. LIU, Wei LI, Yi J. YJ, Zhi D. HAO, Hong Tao LI, Jiong FAN, Wei H. LIU
-
Publication number: 20190391740Abstract: According to one or more embodiments of the technical solutions described herein, a computing system includes a first storage unit at a first computing site. The first storage unit stores units of work data and data synchronously replicated from a first server cluster of a second computing site. The computing system further includes a second server cluster at the first computing site, the second server cluster is a proxy node of the first server cluster. The computing system further includes a second storage unit at the first computing site, the second storage unit stores the units of work data and data from the first storage unit asynchronously into the second storage unit. The computing system further includes a third server cluster at the first computing site, the third server cluster processes the units of work data asynchronously replicated into the second storage unit.Type: ApplicationFiled: June 22, 2018Publication date: December 26, 2019Inventors: Jing CHENG, Wei Liu, Xing Jun Zhou, Mai Zeng, Wen Z. Liu, SI BIN FAN, HONG TAO Li, Wei H. Liu, JIONG FAN
-
Publication number: 20190244321Abstract: A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.Type: ApplicationFiled: April 18, 2019Publication date: August 8, 2019Inventors: Yu Mei Dai, Hui Wang, Wei Ying Yu, Mai Zeng
-
Patent number: 10332227Abstract: A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.Type: GrantFiled: December 26, 2018Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Yu Mei Dai, Hui Wang, Wei Ying Yu, Mai Zeng