Patents by Inventor Ming Zhe Jiang

Ming Zhe Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230361997
    Abstract: Computer technology for combining an encryption / decryption (e/d) key with additional information to obtain a specialized e/d key. The additional information one or more of the following types of additional information: client UUID (universally unique identifier), FQDN (fully qualified domain name), database hardware information, data physical position on the hard disk and/or stored data creation date. By combining the basic key with these kind(s) of operational information and/or software / hardware identifier information, the security of the underlying encrypted data can be meaningfully enhanced.
    Type: Application
    Filed: May 5, 2022
    Publication date: November 9, 2023
    Inventors: Peng Hui Jiang, XI QING ZHANG, Ming Zhe Jiang, Mu Chen, CHUN LING LI
  • Patent number: 11652623
    Abstract: Methods, systems, and computer program products for operating a secure conference system. A non-limiting example of the computer-implemented method includes transmitting an invitation for a conference to a plurality of participants and instructing a blockchain system to create a blockchain network at a start of the conference. The blockchain network includes a node corresponding to each of the plurality of participants and a node corresponding to a central conference device. The method also includes obtaining, from the node of the blockchain network corresponding to the central conference device, a secret key corresponding to the central conference device and receiving an media communication stream from each of the plurality of participants.
    Type: Grant
    Filed: June 29, 2021
    Date of Patent: May 16, 2023
    Assignee: International Business Machines Corporation
    Inventors: Ming Zhe Jiang, Yi Yuan, Xiao Hu He, Xiao Yan Wang, Xiao Tong Chi
  • Patent number: 11567789
    Abstract: A method, system and computer program product for user interface action recommendations. According to the method, a target segment in a target document is determined. Correlation degree between the target segment and at least one source segment in at least one source document is determined. At least one recommended source segment is provided from the at least one source segment based on the correlation degree for a user interface action, such as copying for pasting the target segment.
    Type: Grant
    Filed: November 27, 2020
    Date of Patent: January 31, 2023
    Assignee: International Business Machines Corporation
    Inventors: Ming Zhe Jiang, Jiao Li
  • Publication number: 20220417006
    Abstract: Methods, systems, and computer program products for operating a secure conference system. A non-limiting example of the computer-implemented method includes transmitting an invitation for a conference to a plurality of participants and instructing a blockchain system to create a blockchain network at a start of the conference. The blockchain network includes a node corresponding to each of the plurality of participants and a node corresponding to a central conference device. The method also includes obtaining, from the node of the blockchain network corresponding to the central conference device, a secret key corresponding to the central conference device and receiving an media communication stream from each of the plurality of participants.
    Type: Application
    Filed: June 29, 2021
    Publication date: December 29, 2022
    Inventors: Ming Zhe Jiang, Yi Yuan, Xiao Hu He, Xiao Yan Wang, Xiao Tong Chi
  • Publication number: 20220171640
    Abstract: A method, system and computer program product for user interface action recommendations. According to the method, a target segment in a target document is determined. Correlation degree between the target segment and at least one source segment in at least one source document is determined. At least one recommended source segment is provided from the at least one source segment based on the correlation degree for a user interface action, such as copying for pasting the target segment.
    Type: Application
    Filed: November 27, 2020
    Publication date: June 2, 2022
    Inventors: Ming Zhe Jiang, Jiao Li
  • Patent number: 11144668
    Abstract: A method for automatically detecting and concealing content associated with an incoming notification in response to receiving and presenting the incoming notification on a computing device is provided. The method may include receiving the incoming notification on a computing device. The method may further include extracting and categorizing different parts of the incoming notification, and identifying features associated with each of the different parts. The method may further include classifying different parts of the content within the incoming notification based on a class coding system and identifying instructions associated with each classification. The method may further include detecting user behavior with respect to similar notifications. The method may also include automatically determining whether to conceal, partially conceal, or display on the computing device the content within the notification.
    Type: Grant
    Filed: August 15, 2019
    Date of Patent: October 12, 2021
    Assignee: International Business Machines Corporation
    Inventors: Ming Zhe Jiang, Kai Huang, Dong Jun Zong, Wei Hua Wang, Wei Li, FengLi Wang
  • Publication number: 20210049297
    Abstract: A method for automatically detecting and concealing content associated with an incoming notification in response to receiving and presenting the incoming notification on a computing device is provided. The method may include receiving the incoming notification on a computing device. The method may further include extracting and categorizing different parts of the incoming notification, and identifying features associated with each of the different parts. The method may further include classifying different parts of the content within the incoming notification based on a class coding system and identifying instructions associated with each classification. The method may further include detecting user behavior with respect to similar notifications. The method may also include automatically determining whether to conceal, partially conceal, or display on the computing device the content within the notification.
    Type: Application
    Filed: August 15, 2019
    Publication date: February 18, 2021
    Inventors: Ming Zhe Jiang, Kai Huang, Dong Jun Zong, Wei Hua Wang, Wei Li, FengLi Wang
  • Patent number: 10796443
    Abstract: An image depth decoder includes an NIR image buffer, a reference image ring buffer and a pattern matching engine. The NIR image buffer stores an NIR image inputted by a stream. The reference image ring buffer stores a reference image inputted by a stream. The pattern matching engine is coupled to the NIR image buffer and the reference image ring buffer, and performs a depth computation according to the NIR image and the reference image to output at least one depth value.
    Type: Grant
    Filed: October 17, 2018
    Date of Patent: October 6, 2020
    Assignee: Kneron, Inc.
    Inventors: Ming-Zhe Jiang, Yuan Du, Li Du, Jie Wu, Jun-Jie Su
  • Publication number: 20200126245
    Abstract: An image depth decoder includes an NIR image buffer, a reference image ring buffer and a pattern matching engine. The NIR image buffer stores an NIR image inputted by a stream. The reference image ring buffer stores a reference image inputted by a stream. The pattern matching engine is coupled to the NIR image buffer and the reference image ring buffer, and performs a depth computation according to the NIR image and the reference image to output at least one depth value.
    Type: Application
    Filed: October 17, 2018
    Publication date: April 23, 2020
    Inventors: Ming-Zhe JIANG, Yuan DU, Li DU, Jie WU, Jun-Jie SU
  • Patent number: 10516415
    Abstract: A method for compressing multiple original convolution parameters into a convolution operation chip includes steps of: determining a range of the original convolution parameters; setting an effective bit number for the range; setting a representative value, wherein the representative value is within the range; calculating differential values between the original convolution parameters and the representative value; quantifying the differential values to a minimum effective bit to obtain a plurality of compressed convolution parameters; and transmitting the effective bit number, the representative value and the compressed convolution parameters to the convolution operation chip.
    Type: Grant
    Filed: February 9, 2018
    Date of Patent: December 24, 2019
    Assignee: KNERON, INC.
    Inventors: Li Du, Yuan Du, Jun-Jie Su, Ming-Zhe Jiang
  • Publication number: 20190253071
    Abstract: A method for compressing multiple original convolution parameters into a convolution operation chip includes steps of: determining a range of the original convolution parameters; setting an effective bit number for the range; setting a representative value, wherein the representative value is within the range; calculating differential values between the original convolution parameters and the representative value; quantifying the differential values to a minimum effective bit to obtain a plurality of compressed convolution parameters; and transmitting the effective bit number, the representative value and the compressed convolution parameters to the convolution operation chip.
    Type: Application
    Filed: February 9, 2018
    Publication date: August 15, 2019
    Inventors: Li DU, Yuan DU, Jun-Jie SU, Ming-Zhe JIANG
  • Publication number: 20190251429
    Abstract: A convolution operation device includes a convolution operation module, a memory, a scale control module and a scaling unit. The convolution operation module outputs a plurality of convolution operation results containing fractional parts. The memory is coupled to the convolution operation module for receiving and storing the convolution operation results containing the fractional parts, and outputs a plurality of convolution operation input values containing fractional parts. The scale control module is coupled to the convolution operation module and generates a scaling signal according to a total scale of the convolution operation results containing the fractional parts.
    Type: Application
    Filed: February 12, 2018
    Publication date: August 15, 2019
    Inventors: Li DU, Yuan DU, Jun-Jie SU, Ming-Zhe JIANG
  • Patent number: 10268833
    Abstract: A method, a computer program product, and a computer system for conditional permission control in a digital data sheet based on permission formulas. A computer checks permission formulas of data cells in the data sheet, in response that a user opens the data sheet. The computer sets cell permissions for the data cells based on the permission formulas. The computer rechecks the cell permissions, in response to that the user edits one or more of the data cells. The computer resets the cell permissions based on the permission formulas.
    Type: Grant
    Filed: April 7, 2016
    Date of Patent: April 23, 2019
    Assignee: International Business Machines Corporation
    Inventors: Bo Jiang, Ming Zhe Jiang, Zi Ying Li, Hua Shao, Dong Jun Zong
  • Patent number: 9921797
    Abstract: A computer-implemented method includes identifying a document that is operated upon by a real-time collaborative editing system. The document includes a first active region and additional active regions. The method identifies a first node and one or more additional nodes, all accessing the document via the real-time collaborative editing system. The method identifies a second node that is one of the one or more additional nodes. The method identifies a second active region, which is one of the additional active regions. The method identifies a first node view, which displays the first active region via the first node. The method identifies a second node view. The second node view displays the second active region via the second node. The method responds to input from the first node by creating a third node view that is displayed via the second active region and presented via the first node.
    Type: Grant
    Filed: January 13, 2017
    Date of Patent: March 20, 2018
    Assignee: International Business Machines Corporation
    Inventors: Jonathan Dunne, Ming Zhe Jiang, Hua Shao, Zhi Yong Xue
  • Publication number: 20170293770
    Abstract: A method, a computer program product, and a computer system for conditional permission control in a digital data sheet based on permission formulas. A computer checks permission formulas of data cells in the data sheet, in response that a user opens the data sheet. The computer sets cell permissions for the data cells based on the permission formulas. The computer rechecks the cell permissions, in response to that the user edits one or more of the data cells. The computer resets the cell permissions based on the permission formulas.
    Type: Application
    Filed: April 7, 2016
    Publication date: October 12, 2017
    Inventors: Bo Jiang, Ming Zhe Jiang, Zi Ying Li, Hua Shao, Dong Jun Zong
  • Patent number: 9710129
    Abstract: A computer-implemented method includes identifying a document that is operated upon by a real-time collaborative editing system. The document includes a first active region and additional active regions. The method identifies a first node and one or more additional nodes, all accessing the document via the real-time collaborative editing system. The method identifies a second node that is one of the one or more additional nodes. The method identifies a second active region, which is one of the additional active regions. The method identifies a first node view, which displays the first active region via the first node. The method identifies a second node view. The second node view displays the second active region via the second node. The method responds to input from the first node by creating a third node view that is displayed via the second active region and presented via the first node.
    Type: Grant
    Filed: August 4, 2016
    Date of Patent: July 18, 2017
    Assignee: International Business Machines Corporation
    Inventors: Jonathan Dunne, Ming Zhe Jiang, Hua Shao, Zhi Yong Xue
  • Publication number: 20170115950
    Abstract: A computer-implemented method includes identifying a document that is operated upon by a real-time collaborative editing system. The document includes a first active region and additional active regions. The method identifies a first node and one or more additional nodes, all accessing the document via the real-time collaborative editing system. The method identifies a second node that is one of the one or more additional nodes. The method identifies a second active region, which is one of the additional active regions. The method identifies a first node view, which displays the first active region via the first node. The method identifies a second node view. The second node view displays the second active region via the second node. The method responds to input from the first node by creating a third node view that is displayed via the second active region and presented via the first node.
    Type: Application
    Filed: January 13, 2017
    Publication date: April 27, 2017
    Inventors: Jonathan Dunne, Ming Zhe Jiang, Hua Shao, Zhi Yong Xue
  • Publication number: 20170075507
    Abstract: A computer-implemented method includes identifying a document that is operated upon by a real-time collaborative editing system. The document includes a first active region and additional active regions. The method identifies a first node and one or more additional nodes, all accessing the document via the real-time collaborative editing system. The method identifies a second node that is one of the one or more additional nodes. The method identifies a second active region, which is one of the additional active regions. The method identifies a first node view, which displays the first active region via the first node. The method identifies a second node view. The second node view displays the second active region via the second node. The method responds to input from the first node by creating a third node view that is displayed via the second active region and presented via the first node.
    Type: Application
    Filed: September 16, 2015
    Publication date: March 16, 2017
    Inventors: Jonathan Dunne, Ming Zhe Jiang, Hua Shao, Zhi Yong Xue
  • Publication number: 20170075509
    Abstract: A computer-implemented method includes identifying a document that is operated upon by a real-time collaborative editing system. The document includes a first active region and additional active regions. The method identifies a first node and one or more additional nodes, all accessing the document via the real-time collaborative editing system. The method identifies a second node that is one of the one or more additional nodes. The method identifies a second active region, which is one of the additional active regions. The method identifies a first node view, which displays the first active region via the first node. The method identifies a second node view. The second node view displays the second active region via the second node. The method responds to input from the first node by creating a third node view that is displayed via the second active region and presented via the first node.
    Type: Application
    Filed: August 4, 2016
    Publication date: March 16, 2017
    Inventors: Jonathan Dunne, Ming Zhe Jiang, Hua Shao, Zhi Yong Xue
  • Patent number: 9471897
    Abstract: A computer-implemented method includes identifying a document that is operated upon by a real-time collaborative editing system. The document includes a first active region and additional active regions. The method identifies a first node and one or more additional nodes, all accessing the document via the real-time collaborative editing system. The method identifies a second node that is one of the one or more additional nodes. The method identifies a second active region, which is one of the additional active regions. The method identifies a first node view, which displays the first active region via the first node. The method identifies a second node view. The second node view displays the second active region via the second node. The method responds to input from the first node by creating a third node view that is displayed via the second active region and presented via the first node.
    Type: Grant
    Filed: December 17, 2015
    Date of Patent: October 18, 2016
    Assignee: International Business Machines Corporation
    Inventors: Jonathan Dunne, Ming Zhe Jiang, Hua Shao, Zhi Yong Xue