Patents by Inventor Mai Zeng
Mai Zeng has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20220164682Abstract: A method and system for predicting a response time for a workload prior to making a hardware upgrade to a computing system. Data related to operation of the system is collected. Then a workload model of a plurality of workloads and CPU utilization for the plurality of workloads and a transaction model for each transaction within a workload of the plurality of workloads are built. Next the process determines that a characteristic of at least one workload in the plurality of workloads will change due to the hardware upgrade. As a result of the change, a new workload model for the changed workload is built based on the changed characteristic, and the response time for the workload based on the new workload model is calculated.Type: ApplicationFiled: November 24, 2020Publication date: May 26, 2022Inventors: Al Chakra, MING QIAO SHANG GUAN, Hong Tao Li, Mai Zeng, Grant S. Mericle, Jing BJ Ren, Xiao Chen Huang, Yu Mei Dai
-
Publication number: 20220091898Abstract: A job is received. The job indicates moving one or more data to a pool storage group (PSG). The job includes resource requirements and the resource requirements include a size requirement to store the one or more data and a volume requirement to store the one or more data. A resource availability of the PSG is received. The resource availability of the PSG includes an available space on the PSG and one or more available volume on the PSG. Whether the resource availability of the PSG meets the resource requirements of the job is determined. Whether the PSG has a dynamic pool storage group (DPSG) flag indication on is determined.Type: ApplicationFiled: September 20, 2020Publication date: March 24, 2022Inventors: Ming Qiao Shang Guan, Jing BJ Ren, Mai Zeng, Yu Mei Dai, Xiao Chen Huang
-
Patent number: 11182873Abstract: A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.Type: GrantFiled: April 18, 2019Date of Patent: November 23, 2021Assignee: International Business Machines CorporationInventors: Yu Mei Dai, Hui Wang, Wei Ying Yu, Mai Zeng
-
Patent number: 11080379Abstract: A method, system and computer program product for processing data are provided. In the method, a request is received to perform an access-controlled operation in a user device. A biometric feature input from an input module of the user device is received for the request. It is determined whether the received biometric feature matching with a primary biometric feature, the primary biometric feature being identified from a plurality of biometric features stored in the user device and being used to authenticate a user for the access-controlled operation. The access-controlled operation is enabled in response to determining the received biometric feature matching with a primary biometric feature.Type: GrantFiled: February 13, 2019Date of Patent: August 3, 2021Assignee: International Business Machines CorporationInventors: Wei Li, Yi Jie Ma, Zhi Dan Hao, Yu Mei Dai, Mai Zeng, Xue Yong Zhang, Wen Zhong Liu
-
Patent number: 10956403Abstract: A method for verifying data consistency between update-in-place data structures and append-only data structures containing change histories associated with the update-in-place data structures is provided. The method includes loading data from an update-in-place data structure to a first set of hash buckets in a processing platform, loading data from append-only data structures to a second set of hash buckets in the processing platform, performing a bucket-level comparison between the data in the first set of hash buckets and the data in the second set of has buckets, and generating a report based on the bucket-level comparison.Type: GrantFiled: November 15, 2018Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Serge Bourbonnais, Si Bin Fan, Xiao Li, Jonathan W. Wierenga, Mai Zeng
-
Patent number: 10949416Abstract: Systems, methods, and computer-readable media are described for implementing an active-active transaction protocol according to which multiple sites can each provide active services such as executing update transactions that insert, modify, or delete data records. An active-active transaction protocol utilizes affinity records corresponding to both transactions that have been received as well as the data records those transactions are updating to determine which site should handle execution of an incoming update transaction. An affinity record defines a relationship between a data record and a site that determines whether and where a transaction seeking to update that data record will be routed for processing. Conflict handling mechanisms are also provided by the active-active transaction protocol to ensure data consistency between the multiple sites.Type: GrantFiled: July 13, 2018Date of Patent: March 16, 2021Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Si Bin Fan, Wei Liu, Mai Zeng, Wen Z. Liu, Wei Li, Yi J. Yj, Zhi D. Hao, Hong Tao Li, Jiong Fan, Wei H. Liu
-
Patent number: 10911434Abstract: This disclosure provides a method and system for protecting phone numbers from being exposed to third parties. The method comprises receiving a request, from a caller smart phone, for establishing telephone communication with a callee smart phone, wherein the request contains a code to designate the smart phone of the callee. The method further comprises checking whether the code is formally provided to the callee. The method further comprises: in response to determining that the code is formally provided to the caller, retrieving the phone number of the caller and the phone number of the callee based on the request and establishing a phone call connection via a cellular network with the phone number of the caller and the phone number of the callee.Type: GrantFiled: November 15, 2017Date of Patent: February 2, 2021Assignee: International Business Machines CorporationInventors: Hui Wang, Mai Zeng, Yu Mei Dai, Xin Xin Lv, Yong Wu, Si Jun Gz Zhou, De Ting Hu, Zhi Jun Wang
-
Patent number: 10893039Abstract: This disclosure provides a method and system for protecting phone numbers from being exposed to third parties. The method comprises receiving a request, from a caller smart phone, for establishing telephone communication with a callee smart phone, wherein the request contains a code to designate the smart phone of the callee. The method further comprises checking whether the code is formally provided to the callee. The method further comprises: in response to determining that the code is formally provided to the caller, retrieving the phone number of the caller and the phone number of the callee based on the request and establishing a phone call connection via a cellular network with the phone number of the caller and the phone number of the callee.Type: GrantFiled: September 27, 2017Date of Patent: January 12, 2021Assignee: International Business Machines CorporationInventors: Hui Wang, Mai Zeng, Yu Mei Dai, Xin Xin Lv, Yong Wu, Si Jun Gz Zhou, De Ting Hu, Zhi Jun Wang
-
Publication number: 20200257785Abstract: A method, system and computer program product for processing data are provided. In the method, a request is received to perform an access-controlled operation in a user device. A biometric feature input from an input module of the user device is received for the request. It is determined whether the received biometric feature matching with a primary biometric feature, the primary biometric feature being identified from a plurality of biometric features stored in the user device and being used to authenticate a user for the access-controlled operation. The access-controlled operation is enabled in response to determining the received biometric feature matching with a primary biometric feature.Type: ApplicationFiled: February 13, 2019Publication date: August 13, 2020Inventors: Wei Li, Yi Jie Ma, Zhi Dan Hao, Yu Mei Dai, Mai Zeng, Xue Yong Zhang, Wen Zhong Liu
-
Patent number: 10705754Abstract: A computing system includes a first storage unit at a first computing site. The first storage unit stores units of work data and data synchronously replicated from a first server cluster of a second computing site. The system further includes a second server cluster at the first computing site, the second server cluster is a proxy node of the first server cluster. The system further includes a second storage unit at the first computing site, the second storage unit stores the units of work data and data from the first storage unit asynchronously into the second storage unit. The system further includes a third server cluster at the first computing site, the third server cluster processes the units of work data asynchronously replicated into the second storage unit.Type: GrantFiled: June 22, 2018Date of Patent: July 7, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jing Cheng, Wei Liu, Xing Jun Zhou, Mai Zeng, Wen Z. Liu, Si Bin Fan, Hong Tao Li, Wei H. Liu, Jiong Fan
-
Publication number: 20200019631Abstract: Systems, methods, and computer-readable media are described for implementing an active-active transaction protocol according to which multiple sites can each provide active services such as executing update transactions that insert, modify, or delete data records. An active-active transaction protocol utilizes affinity records corresponding to both transactions that have been received as well as the data records those transactions are updating to determine which site should handle execution of an incoming update transaction. An affinity record defines a relationship between a data record and a site that determines whether and where a transaction seeking to update that data record will be routed for processing. Conflict handling mechanisms are also provided by the active-active transaction protocol to ensure data consistency between the multiple sites.Type: ApplicationFiled: July 13, 2018Publication date: January 16, 2020Inventors: Si Bin FAN, Wei LIU, Mai ZENG, Wen Z. LIU, Wei LI, Yi J. YJ, Zhi D. HAO, Hong Tao LI, Jiong FAN, Wei H. LIU
-
Publication number: 20190391740Abstract: According to one or more embodiments of the technical solutions described herein, a computing system includes a first storage unit at a first computing site. The first storage unit stores units of work data and data synchronously replicated from a first server cluster of a second computing site. The computing system further includes a second server cluster at the first computing site, the second server cluster is a proxy node of the first server cluster. The computing system further includes a second storage unit at the first computing site, the second storage unit stores the units of work data and data from the first storage unit asynchronously into the second storage unit. The computing system further includes a third server cluster at the first computing site, the third server cluster processes the units of work data asynchronously replicated into the second storage unit.Type: ApplicationFiled: June 22, 2018Publication date: December 26, 2019Inventors: Jing CHENG, Wei Liu, Xing Jun Zhou, Mai Zeng, Wen Z. Liu, SI BIN FAN, HONG TAO Li, Wei H. Liu, JIONG FAN
-
Publication number: 20190244321Abstract: A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.Type: ApplicationFiled: April 18, 2019Publication date: August 8, 2019Inventors: Yu Mei Dai, Hui Wang, Wei Ying Yu, Mai Zeng
-
Patent number: 10332227Abstract: A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.Type: GrantFiled: December 26, 2018Date of Patent: June 25, 2019Assignee: International Business Machines CorporationInventors: Yu Mei Dai, Hui Wang, Wei Ying Yu, Mai Zeng
-
Publication number: 20190130518Abstract: A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.Type: ApplicationFiled: December 26, 2018Publication date: May 2, 2019Inventors: Yu Mei Dai, Hui Wang, Wei Ying Yu, Mai Zeng
-
Publication number: 20190097998Abstract: This disclosure provides a method and system for protecting phone number from being exposed to third parties. The method comprises receiving a request, from a caller smart phone, for establishing telephone communication with a callee smart phone, wherein the request contains a code to designate the smart phone of the callee. The method further comprises checking whether the code is formally provided to the callee. The method further comprises: in response to determining that the code is formally provided to the caller, retrieving the phone number of the caller and the phone number of the callee based on the request and establishing a phone call connection via a cellular network with the phone number of the caller and the phone number of the callee.Type: ApplicationFiled: November 15, 2017Publication date: March 28, 2019Inventors: Hui Wang, Mai Zeng, Yu Mei Dai, Xin Xin Lv, Yong Wu, Si Jun GZ Zhou, De Ting Hu, Zhi Jun Wang
-
Publication number: 20190097997Abstract: This disclosure provides a method and system for protecting phone number from being exposed to third parties. The method comprises receiving a request, from a caller smart phone, for establishing telephone communication with a callee smart phone, wherein the request contains a code to designate the smart phone of the callee. The method further comprises checking whether the code is formally provided to the callee. The method further comprises: in response to determining that the code is formally provided to the caller, retrieving the phone number of the caller and the phone number of the callee based on the request and establishing a phone call connection via a cellular network with the phone number of the caller and the phone number of the callee.Type: ApplicationFiled: September 27, 2017Publication date: March 28, 2019Inventors: Hui Wang, Mai Zeng, Yu Mei Dai, Xin Xin Lv, Yong Wu, Si Jun GZ Zhou, De Ting Hu, Zhi Jun Wang
-
Publication number: 20190087450Abstract: A method for verifying data consistency between update-in-place data structures and append-only data structures containing change histories associated with the update-in-place data structures is provided. The method includes loading data from an update-in-place data structure to a first set of hash buckets in a processing platform, loading data from append-only data structures to a second set of hash buckets in the processing platform, performing a bucket-level comparison between the data in the first set of hash buckets and the data in the second set of has buckets, and generating a report based on the bucket-level comparison.Type: ApplicationFiled: November 15, 2018Publication date: March 21, 2019Inventors: Serge Bourbonnais, SI BIN FAN, Xiao Li, Jonathan W. Wierenga, Mai Zeng
-
Patent number: 10176216Abstract: A method for verifying data consistency between update-in-place data structures and append-only data structures containing change histories associated with the update-in-place data structures is provided. The method includes loading data from an update-in-place data structure to a first set of hash buckets in a processing platform, loading data from append-only data structures to a second set of hash buckets in the processing platform, performing a bucket-level comparison between the data in the first set of hash buckets and the data in the second set of has buckets, and generating a report based on the bucket-level comparison.Type: GrantFiled: February 1, 2016Date of Patent: January 8, 2019Assignee: International Business Machines CorporationInventors: Serge Bourbonnais, Si Bin Fan, Xiao Li, Jonathan W. Wierenga, Mai Zeng
-
Patent number: 10169838Abstract: A method, computer program product, and system for generating and embedding a watermark in digital video frame include a processor obtaining a request to generate a watermark and embed the watermark in a digital video frame captured by a first monitor. Based on obtaining the request, the processor fetches from one or more pre-defined regions of a memory resource, digital video data captured by at least two monitors, where a timestamp of the digital video data is equal to a timestamp of the digital video frame. The processor generates a watermark from the digital video data by calculating a binary result of the digital video data. The processor embeds the watermark (binary result) in the digital video frame.Type: GrantFiled: August 1, 2016Date of Patent: January 1, 2019Assignee: International Business Machines CorporationInventors: Yu Mei Dai, Hui Wang, Wei Ying Yu, Mai Zeng