Patents by Inventor Peng Hui Jiang

Peng Hui Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11874830
    Abstract: In a computer-implemented method for improving performance of a database, a processor receives batch jobs for a relational database. The batch jobs may include a first member with a first buffer pool, and a second member with a second buffer pool. The processor may also identify a first actual object and an isolation level for the batch jobs, generate related queries based on the first actual object and the isolation level, calculate a cost for the first member and the second member to run the batch jobs based on the related queries, and assign the batch jobs to the first member based on a lower calculated cost.
    Type: Grant
    Filed: March 9, 2022
    Date of Patent: January 16, 2024
    Assignee: International Business Machines Corporation
    Inventors: Sheng Yan Sun, Hong Mei Zhang, Meng Wan, Peng Hui Jiang
  • Publication number: 20240004723
    Abstract: Workflow optimization and re-distribution involves a target task set that is determined from a plurality of tasks in a workflow and based on a data flow of the workflow. The target task set is re-distributed to obtain at least one re-distributed task set. Each re-distributed task set indicates a respective data path different from a data path of the target task set and has a same function as the target task set. A simulated data flow for the at least one re-distributed task set is obtained by simulating data flowing in at least one data path indicated by the at least one re-distributed task set. An optimized task set for the target task set is determined based on the simulated data flow for the at least one re-distributed task set.
    Type: Application
    Filed: June 29, 2022
    Publication date: January 4, 2024
    Inventors: Peng Hui Jiang, ZHI LI GUAN, Jun Su, Kun Yang, Yun Diao, Shi Su
  • Publication number: 20240004902
    Abstract: A method, computer program product, and computer system are provided. Statistics for each columnar table are extracted from an online analytical processing (OLAP) database catalog. A transaction table map is created from transaction log records of an online transaction processing (OLTP) database. The transaction table map includes a counter of log records in a transaction and a timestamp indicating a longevity of the transaction. Based on the counter or the longevity exceeding a predefined threshold, the transaction is transformed, and sent to the OLAP database where it is replayed.
    Type: Application
    Filed: June 29, 2022
    Publication date: January 4, 2024
    Inventors: Xue Bo, Xiaobo Wang, He Fang Zhang, YU LIU, Peng Hui Jiang
  • Patent number: 11861023
    Abstract: Embodiments of the invention include a computer-implemented method that uses a processor to access cryptographic-function constraints associated with an encrypted message. Based on a determination that the cryptographic-function constraints do not include mandatory cryptographic computing resource requirements, first resource-scaling operations are performed that include an analysis of cryptographic metrics associated with a processor. The cryptographic metrics include information associated with the encrypted message, along with performance measurements of cryptographic functions performed by the processor.
    Type: Grant
    Filed: August 25, 2021
    Date of Patent: January 2, 2024
    Assignee: International Business Machines Corporation
    Inventors: Heng Wang, Wan Yue Chen, Chen Guang Liu, Jing Li, Xiao Ling Chen, Peng Hui Jiang
  • Publication number: 20230418598
    Abstract: A method, computer system, and a computer program product for application modernization is provided. The present invention may include receiving operation data related to an application. The present invention may include identifying a plurality of entities based on the operation data related to the application. The present invention may include identifying one or more interactions between each of the plurality of entities. The present invention may include determining an energy consumption pattern for the application by analyzing a consumption of energy related to workload. The present invention may include determining a modernization scope for the application based on the energy consumption pattern.
    Type: Application
    Filed: June 27, 2022
    Publication date: December 28, 2023
    Inventors: FAN JING Meng, Peng Hui Jiang, Cheng Fang Wang, Jun Su
  • Publication number: 20230409602
    Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for data management. According to the method, one or more processors divide data into a plurality of partitions. The one or more processors store the plurality of partitions in a plurality of nodes of a mixed distributed database system, wherein a first node of the mixed distributed database system comprises a plurality of databases, and wherein at least a part of the plurality of partitions are shared by the plurality of databases of the first node and being not shared by other of the plurality of nodes.
    Type: Application
    Filed: June 21, 2022
    Publication date: December 21, 2023
    Inventors: Hong Mei Zhang, Sheng Yan Sun, Meng Wan, Peng Hui Jiang
  • Publication number: 20230409593
    Abstract: An embodiment for analyzing and tracking data flow to determine proper schemas for unstructured data. The embodiment may automatically use a sidecar to collect schema discovery rules during conversion of raw data to unstructured data. The embodiment may automatically generate multiple schemas for different tenants using the collected schema discovery rules. The embodiment may automatically use ETL to export unstructured data to SQL databases with the generated multiple schemas for the different tenants. The embodiment may automatically monitor usage data of the SQL databases and collect the usage data. The embodiment may automatically optimize schema discovery using the collected usage data. The embodiment may automatically discover schemas with hot usage and apply the discovered schemas with hot usage to other tenants for consumption and further monitoring.
    Type: Application
    Filed: June 21, 2022
    Publication date: December 21, 2023
    Inventors: Peng Hui Jiang, Jun Su, Sheng Yan Sun, Hong Mei Zhang, Meng Wan
  • Publication number: 20230409444
    Abstract: An approach for managing data set access based on data set relevance. The approach monitors data set access activities associated with a user. The approach detects access of a first data set by the user. The approach determines a group of data sets associated with the first data set based on a data set mapping associated with the user. The approach recalls one or more data sets of the group of data sets from a slower storage device to a faster storage device.
    Type: Application
    Filed: June 21, 2022
    Publication date: December 21, 2023
    Inventors: Jing Wen Chen, Zhao Yu Wang, Peng Hui Jiang, Jing BJ Ren, Yi Jie Ma, Wen Zhong Liu
  • Publication number: 20230409224
    Abstract: A system may include a memory and a processor in communication with the memory configured to perform operations. The may operations include obtaining transaction logs in blocks from nodes of a data storage system. The operations may include, for each transaction log, splitting the transaction log into log entries, grouping log entries into groups associated with a same data source, and writing the log entries of the groups to empty blocks such that log entries from different groups do not share a same block. The operations may include identifying a same sequence of log entries from the written transaction logs and uploading first blocks of a first transaction log, including the same sequence of log entries, to an object-based storage without uploading second blocks of a second transaction log including the same sequence of log entries to the object-based storage.
    Type: Application
    Filed: June 15, 2022
    Publication date: December 21, 2023
    Inventors: Peng Hui Jiang, FengLi Wang, Qi Feng Huo, Jun Su, Hong Qing Zhou, Yan Lin Ren, Li Zhang, Ling Ling SH Hu
  • Publication number: 20230409308
    Abstract: An approach for recommending an application of a software code update. The approach receives components of an executable program. The approach scans the components to divide the executable program into units. The approach creates a logical layer of entry lists, based on the units, for instantiations of the executable program. The approach loads the instantiations of the executable program based on the logical layers. The approach monitors the execution of the instantiations to increment counters based on executions of the units. The approach creates a heatmap of the executions based on the counters. The approach generates a recommendation to update the executable based on the heatmap.
    Type: Application
    Filed: June 17, 2022
    Publication date: December 21, 2023
    Inventors: Bo Chen Zhu, Peng Hui Jiang, Chu Yun Tong, Ai Ping Feng, Xinzhe Wang, Cheng Fang Wang
  • Publication number: 20230401328
    Abstract: A method and implementing system protects sensitive data dump information. The method comprises using a processor receiving a dump file (DF) associated with an application. The method further comprises allocating user classification profiles defining security access levels to different regions of the DF and encrypting a first encrypted region that is a proper subset of the different regions using a first encryption key associated with a first user classification profile of the user classification profiles to produce an encrypted DF (EDF). The method further comprises determining a first user to be a member of the first user classification profile, and providing access to the EDF and a first decryption key useable to decrypt the first encrypted region to the first user.
    Type: Application
    Filed: June 13, 2022
    Publication date: December 14, 2023
    Inventors: Xi Bo Zhu, Bo Chen Zhu, Peng Hui Jiang, Cheng Fang Wang
  • Patent number: 11842038
    Abstract: A method for sharing hidden information in a virtual meeting is disclosed. In one embodiment, such a method includes sharing, by way of a web-conference server, a source window presented on a source system with a target window presented on a target system. The method detects selection of a specific area on the target window and correlates the specific area on the target window with a corresponding area on the source window. The method determines whether the corresponding area on the source window links to hidden information, such as a hyperlink, on the source window. If the corresponding area links to hidden information, the method communicates one or more of the hidden information and a link to the hidden information to the target system. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: December 31, 2022
    Date of Patent: December 12, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jing Wen Chen, Zhao Yu Wang, Peng Hui Jiang, Xiao Yi Tian, Jing Ren, Yi Jie Ma, Xizhuo Zhang, Jing Zhang
  • Publication number: 20230396628
    Abstract: Authentication management by receiving a request to initiate an authentication from a computing device of a user, directing the request to a selected authentication service of a plurality of authentication services, wherein the selected authentication service is determined dynamically based on respective authentication metrics of the plurality of authentication services, receiving authentication information via the selected authentication service, and authenticating the user based on the received authentication information.
    Type: Application
    Filed: August 22, 2023
    Publication date: December 7, 2023
    Inventors: Feng Zhang, Peng Hui Jiang, TING YIN, Jun Su, Zhe Hua Peng
  • Patent number: 11829394
    Abstract: An embodiment includes receiving a request to delete a specified document from a primary shard of a sharded database. The embodiment also includes inserting a soft-deletion document to a soft-deletion shard, wherein the soft-deletion document identifies the specified document, which remains in the primary shard. The embodiment also includes receiving a query from a client application, wherein the specified document satisfies the query. The embodiment also includes blocking the specified document from being returned in response to the query while the soft-deletion document associated with the specified document remains in the soft-deletion shard.
    Type: Grant
    Filed: March 11, 2021
    Date of Patent: November 28, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peng Hui Jiang, Jun Su, Dong Chen, Huai Ying Hy Xia, Su Liu
  • Patent number: 11824836
    Abstract: Validating microservice calls is provided. It is determined whether a microservice call to a microservice hosted by a computer is valid based on a policy in a proactive condition map of a validation proxy that matches the microservice call. In response to determining that the microservice call is invalid based on the policy in the proactive condition map that matches the microservice call, the microservice call is blocked to the microservice. It is determined whether the microservice call needs to be redirected to another microservice based on the policy. In response to determining that the microservice call does need to be redirected to another microservice based on the policy, the microservice call is redirected to the other microservice with a callback to the microservice.
    Type: Grant
    Filed: November 8, 2021
    Date of Patent: November 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Meng Wang, Kun Yang, Jun Su
  • Patent number: 11822547
    Abstract: Shared materialized views are maintained during data changes to the primary data and during creation of new materialized views. Shared data stored for use by shared materialized views is distinguished from data stored by an independent materialized view. A view selector manages data updates to shared materialized views and corresponding mapping table. The view selector directs movement of data between a shared materialized view and an independent materialized view through the lifecycle of the materialized views.
    Type: Grant
    Filed: July 15, 2021
    Date of Patent: November 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Jun Su, Yan Lin Ren, Zhang Li, Hong Qing Zhou
  • Publication number: 20230367745
    Abstract: Methods, systems, and computer program products for de-duplicating data in executable files in a container image are disclosed. The method may include receiving a request to read a file in a first layer in a container image including a plurality of layers, wherein the file is a delta file which is from an updated executable file based on a base executable file, the base executable file is in a lower layer than the first layer in the container image, and the delta file includes block mappings between the updated executable file and the base executable file and different data between the two files, and blocks included in the two files are based on respective file structure. The method may also include restoring the updated executable file based on the delta file and the base executable file. The method may further include returning data in the updated executable file.
    Type: Application
    Filed: May 12, 2022
    Publication date: November 16, 2023
    Inventors: Dong Hui Liu, Peng Hui Jiang, Jing Lu, Xiao Yan Tang, Jun Su, Jia Yu, Yong Yin
  • Publication number: 20230361997
    Abstract: Computer technology for combining an encryption / decryption (e/d) key with additional information to obtain a specialized e/d key. The additional information one or more of the following types of additional information: client UUID (universally unique identifier), FQDN (fully qualified domain name), database hardware information, data physical position on the hard disk and/or stored data creation date. By combining the basic key with these kind(s) of operational information and/or software / hardware identifier information, the security of the underlying encrypted data can be meaningfully enhanced.
    Type: Application
    Filed: May 5, 2022
    Publication date: November 9, 2023
    Inventors: Peng Hui Jiang, XI QING ZHANG, Ming Zhe Jiang, Mu Chen, CHUN LING LI
  • Patent number: 11811599
    Abstract: A connection request from one computing entity is obtained. The connection request is a request to connect to another computing entity and includes a requested connectivity protocol configuration. A determination is made as to whether the requested connectivity protocol configuration is a match to a particular connectivity protocol configuration of the other computing entity. Based on determining that the requested connectivity protocol configuration is not a match to the particular connectivity protocol configuration of the other computing entity, a selected configuration file that is a match to the requested connectivity protocol configuration is selected from a plurality of configuration files. Based on selecting the selected configuration file, routing of the connection request to a connectivity protocol service corresponding to the selected configuration file is initiated to facilitate establishing a connection between the one computing entity and the other computing entity.
    Type: Grant
    Filed: January 23, 2023
    Date of Patent: November 7, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Jiu Chang Du, Kui Zhang, Zhan Peng Huo, Yong Qing Xu, Peng Hui Jiang
  • Patent number: 11798001
    Abstract: Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.
    Type: Grant
    Filed: September 20, 2021
    Date of Patent: October 24, 2023
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Xin Peng Liu, Wei Wu, Xiao Ling Chen