Patents by Inventor Peng Ji

Peng Ji has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20120304275
    Abstract: At least one of an HTTP request message and an HTTP response message is intercepted. A corresponding HTTP message model is identified. The HTTP message model includes a plurality of message model sections. Additional steps include parsing a representation of the at least one of an HTTP request message and an HTTP response message into message sections in accordance with the message model sections of the HTTP message model; and binding a plurality of security rules to the message model sections. The plurality of security rules each specify at least one action to be taken in response to a given condition. The given condition is based, at least in part, on a corresponding given one of the message sections. A further step includes processing the at least one of an HTTP request message and an HTTP response message in accordance with the plurality of security rules. Techniques for developing rules for a web application server firewall are also provided.
    Type: Application
    Filed: May 24, 2011
    Publication date: November 29, 2012
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peng Ji, Lin Luo, Vugranam C. Sreedhar, Shun Xiang Yang, Yu Zhang
  • Patent number: 8285778
    Abstract: A method, system and an article of manufacture tangibly embodying a computer readable program for protecting Web application data between a server and a client. A response created by the Web application for the client is backed up and modified by adding capturing code for capturing a user action, user data of the client, or combination thereof. The modified response is sent to the client and a request submitted by the client and the user action and/or user data captured by the capturing code is received. A verifying request is generated according to the received user action and/user data captured by the capturing code and the backup of the response. The request submitted by the client is verified according to the verifying request and the verified request is sent to the Web application of the server.
    Type: Grant
    Filed: June 25, 2009
    Date of Patent: October 9, 2012
    Assignee: International Business Machines Corporation
    Inventors: Ya Bin Dang, Da Ming Hao, Peng Ji, Lin Luo, Yu Zhang
  • Patent number: 8173604
    Abstract: Methods of killing a cancer cell are provided. Also provided are methods of treating a subject having a cancer. Additionally, compounds are provided that comprise a peptide from about 18 to about 100 amino acids or peptidomimetics comprising the sequence of SEQ ID NO:1. Additionally provided are methods of screening an agent for the ability to kill a cancer cell.
    Type: Grant
    Filed: May 23, 2007
    Date of Patent: May 8, 2012
    Assignee: Albert Einstein College of Medicine of Yeshiva University
    Inventors: Liang Zhu, Peng Ji
  • Publication number: 20110254021
    Abstract: A light emitting diode includes a substrate, a first semiconductor layer, an active layer, a second semiconductor layer, a first electrode, a transparent conductive layer, a second electrode and a metal grating. The first semiconductor layer, the active layer, and the second semiconductor layer are orderly stacked on the substrate. The first electrode is electrically connected to the first semiconductor layer. The transparent conductive layer is located on a surface of the second semiconductor layer away from the substrate. The second electrode is electrically connected to the transparent conductive layer. The metal grating is located on a surface of the transparent conductive layer away from the substrate. The metal grating is a two-dimensional array of a plurality of metal micro-structures.
    Type: Application
    Filed: October 26, 2010
    Publication date: October 20, 2011
    Applicants: HON HAI PRECISION INDUSTRY CO., LTD., TSINGHUA UNIVERSITY
    Inventors: JUN ZHU, PENG JI, FENG-LEI YANG, GUO-FAN JIN
  • Publication number: 20100180194
    Abstract: A method and apparatus for solving UI style conflicts in web application composition. The method includes the steps of: detecting, in the runtime environment of a web browser, a page element referring to duplicate UI style definitions in a web composite page; determining the UI style definition referred to by the page element in an imported widget or a local page from which it originates; and relating the page element and the determined corresponding UI style definition in the web composite page, so as to solve the UI style conflict.
    Type: Application
    Filed: January 11, 2010
    Publication date: July 15, 2010
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Peng Ji, Shun Xiang Yang, Guan Qun Zhang
  • Publication number: 20100075892
    Abstract: Methods of killing a cancer cell are provided. Also provided are methods of treating a subject having a cancer. Additionally, compounds are provided that comprise a peptide from about 18 to about 100 amino acids or peptidomimetics comprising the sequence of SEQ ID NO:1. Additionally provided are methods of screening an agent for the ability to kill a cancer cell.
    Type: Application
    Filed: May 23, 2007
    Publication date: March 25, 2010
    Inventors: Liang Zhu, Peng Ji
  • Publication number: 20090327411
    Abstract: A method, system and an article of manufacture tangibly embodying a computer readable program for protecting Web application data between a server and a client. A response created by the Web application for the client is backed up and modified by adding capturing code for capturing a user action, user data of the client, or combination thereof. The modified response is sent to the client and a request submitted by the client and the user action and/or user data captured by the capturing code is received. A verifying request is generated according to the received user action and/user data captured by the capturing code and the backup of the response. The request submitted by the client is verified according to the verifying request and the verified request is sent to the Web application of the server.
    Type: Application
    Filed: June 25, 2009
    Publication date: December 31, 2009
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Ya Bin Dang, Da Ming Hao, Peng Ji, Lin Luo, Yu Zhang