Patents by Inventor Qing Yu Pei
Qing Yu Pei has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250060960Abstract: A computer-implemented method, system, and computer program product for adapting scripts from a source platform to be utilized in a target platform when porting. Traces of system calls from the commands in the source and target platforms are analyzed to identify building blocks. A tree structure for each command of the source and target platforms is constructed with one or more building blocks from the identified building blocks. Commands of the target platform with a functionality within a threshold degree of similarity to the commands of the source platform are identified by analyzing the building blocks of the commands' tree structures. Alternative commands for the commands of the source platform, such as those commands that are not supported by the target platform, may be generated using such identified commands. The script from the source platform may then be adapted to be utilized in the target platform using such alternative commands.Type: ApplicationFiled: August 15, 2023Publication date: February 20, 2025Inventors: Yan Huang, Lei Wang, Shuang Shuang Jia, Wen Ya Zhou, Qing Yu Pei, Jiangang Deng, Qi Li, Peng Hui Jiang
-
Publication number: 20240411536Abstract: Techniques according to the present disclosure may include receiving, at a computer, a command for performing an action on a first image layer of a first container repository. A second container repository is determined which has a dependency on the first container repository, based on a dependency graph storing dependencies of a plurality of container repositories. The action is performed on the first image layer of the first container repository and a corresponding action on a second image layer of the second container repository based on the command.Type: ApplicationFiled: June 9, 2023Publication date: December 12, 2024Inventors: Le Yue, Xiao Ling Chen, Si Yu Chen, Han Wen Zhu, Qing Yu Pei, Ming Lei Zhang
-
Publication number: 20240364696Abstract: An example operation may include one or more of storing access requirements of a containerized environment, identifying a plurality of types of users of the containerized environment based on the access requirements, identifying a plurality of different restriction priorities for the plurality of types of users within the containerized environment, respectively, based on the access requirements, dynamically generating an access policy that satisfies the plurality of different restriction priorities for the plurality of types of users within the containerized environment, and transforming the access policy into a plugin.Type: ApplicationFiled: April 29, 2023Publication date: October 31, 2024Inventors: YAN HUANG, Zheng Lei An, Lei Wang, Shuang Shuang Jia, Heng Wang, Xiao Ling Chen, Wen Ya Zhou, Qing Yu Pei
-
Patent number: 11966322Abstract: A method, computer program product and system are provided for preloading debug information based on the presence of incremental source code files. Based on parsed input parameters to a source code debugger, a source code repository and a local storage area are searched for an incremental file. In response to the incremental file being located, a preload indicator in the incremental file, which is a source code file, is set. Based on the preload indicator being set, debug symbol data from the incremental file is merged to a preload symbol list. In response to receiving a command to examine the debug symbol data from the incremental file, the preload symbol list is searched for the requested debug symbol data.Type: GrantFiled: November 25, 2020Date of Patent: April 23, 2024Assignee: International Business Machines CorporationInventors: Xiao Ling Chen, Xiao Xuan Fu, Jiang Yi Liu, Zhan Peng Huo, Wen Ji Huang, Qing Yu Pei, Min Cheng, Yan Huang
-
Patent number: 11368459Abstract: Methods, computer program products, and/or systems are provided that can perform the following operations: receiving a connection request from a first user device; creating an authentication container for the first user device; authenticating the first user device using the authentication container; in response to authentication for the first user device being successful, creating a first user request processing container for the first user device; and processing user requests received from the first user device using the first user request processing container.Type: GrantFiled: September 30, 2020Date of Patent: June 21, 2022Assignee: International Business Machines CorporationInventors: Heng Wang, Xiao Ling Chen, Chen Guang Liu, Wen Qi WQ Ye, Fei Tan, Lu Lu, Jing Li, Qing Yu Pei
-
Publication number: 20220164276Abstract: A method, computer program product and system are provided for preloading debug information based on the presence of incremental source code files. Based on parsed input parameters to a source code debugger, a source code repository and a local storage area are searched for an incremental file. In response to the incremental file being located, a preload indicator in the incremental file, which is a source code file, is set. Based on the preload indicator being set, debug symbol data from the incremental file is merged to a preload symbol list. In response to receiving a command to examine the debug symbol data from the incremental file, the preload symbol list is searched for the requested debug symbol data.Type: ApplicationFiled: November 25, 2020Publication date: May 26, 2022Inventors: Xiao Ling Chen, Xiao Xuan Fu, Jiang Yi Liu, Zhan Peng Huo, Wen Ji Huang, Qing Yu Pei, Min Cheng, Yan Huang
-
Patent number: 11341121Abstract: An example operation may include one or more of connecting, by a service discovery node, to a blockchain configured to store workloads and stakes of a plurality of endorser nodes, receiving, by the service discovery node, a discovery query that contains an endorsement policy from a user node, generating, by the service discovery node, cryptographic sortition parameters based on the endorsement policy, sending, by the service discovery node, the cryptographic sortition parameters to the plurality of the endorser nodes, collecting, by the service discovery node, sortition labels from the plurality of the endorser nodes, the sortition labels generated based on the sortition parameters, determining, based on the sortition labels, a set of the endorser nodes from the plurality of the endorser nodes that qualify the endorsement policy, and providing, by the service discovery node, identifiers of the set of the endorser nodes to the user node for an endorsement of a user transaction proposal.Type: GrantFiled: January 22, 2019Date of Patent: May 24, 2022Assignee: International Business Machines CorporationInventors: Zhi Guo Deng, Qi Li, Huan Wu, Shun Xian Wu, Xiao Ling Chen, Qing Yu Pei
-
Publication number: 20220103550Abstract: Methods, computer program products, and/or systems are provided that can perform the following operations: receiving a connection request from a first user device; creating an authentication container for the first user device; authenticating the first user device using the authentication container; in response to authentication for the first user device being successful, creating a first user request processing container for the first user device; and processing user requests received from the first user device using the first user request processing container.Type: ApplicationFiled: September 30, 2020Publication date: March 31, 2022Inventors: Heng Wang, Xiao Ling Chen, Chen Guang Liu, Wen Qi WQ Ye, Fei Tan, Lu Lu, Jing Li, Qing Yu Pei
-
Publication number: 20200233858Abstract: An example operation may include one or more of connecting, by a service discovery node, to a blockchain configured to store workloads and stakes of a plurality of endorser nodes, receiving, by the service discovery node, a discovery query that contains an endorsement policy from a user node, generating, by the service discovery node, cryptographic sortition parameters based on the endorsement policy, sending, by the service discovery node, the cryptographic sortition parameters to the plurality of the endorser nodes, collecting, by the service discovery node, sortition labels from the plurality of the endorser nodes, the sortition labels generated based on the sortition parameters, determining, based on the sortition labels, a set of the endorser nodes from the plurality of the endorser nodes that qualify the endorsement policy, and providing, by the service discovery node, identifiers of the set of the endorser nodes to the user node for an endorsement of a user transaction proposal.Type: ApplicationFiled: January 22, 2019Publication date: July 23, 2020Inventors: Zhi Guo Deng, Qi Li, Huan Wu, Shun Xian Wu, Xiao Ling Chen, Qing Yu Pei
-
Patent number: 10257352Abstract: A method, computer program product, and system is disclosed for generating an Interactive Voice Response (IVR) system tree. A plurality of IVR system options from the IVR system are received. A first set of selections of the IVR system options are received from the user. A second set of selections of the IVR system are received, comprising at least a second set of subtrees. In response to identifying a plurality of subtrees of the second set of subtrees that are associated with the root node, the identified plurality of subtrees are mapped to the option tree. An IVR combination tree is generated. A visualization IVR combination tree is generated for display, in response to receiving a second user request for access to the IVR system. A target service associated with a user input selection of at least one end node of the visualized IVR combination tree is accessed.Type: GrantFiled: March 1, 2017Date of Patent: April 9, 2019Assignee: International Business Machines CorporationInventors: Jiangang Deng, Chao Li, He Lei Liu, Qing Yu Pei, Heng Wang
-
Publication number: 20180255179Abstract: A method, computer program product, and system is disclosed for generating an Interactive Voice Response (IVR) system tree. A plurality of IVR system options from the IVR system are received. A first set of selections of the IVR system options are received from the user. A second set of selections of the IVR system are received, comprising at least a second set of subtrees. In response to identifying a plurality of subtrees of the second set of subtrees that are associated with the root node, the identified plurality of subtrees are mapped to the option tree. An IVR combination tree is generated. A visualization IVR combination tree is generated for display, in response to receiving a second user request for access to the IVR system. A target service associated with a user input selection of at least one end node of the visualized IVR combination tree is accessed.Type: ApplicationFiled: October 3, 2017Publication date: September 6, 2018Inventors: JIANGANG DENG, Chao Li, He Lei Liu, Qing Yu Pei, Heng Wang
-
Publication number: 20180255178Abstract: A method, computer program product, and system is disclosed for generating an Interactive Voice Response (IVR) system tree. A plurality of IVR system options from the IVR system are received. A first set of selections of the IVR system options are received from the user. A second set of selections of the IVR system are received, comprising at least a second set of subtrees. In response to identifying a plurality of subtrees of the second set of subtrees that are associated with the root node, the identified plurality of subtrees are mapped to the option tree. An IVR combination tree is generated. A visualization IVR combination tree is generated for display, in response to receiving a second user request for access to the IVR system. A target service associated with a user input selection of at least one end node of the visualized IVR combination tree is accessed.Type: ApplicationFiled: March 1, 2017Publication date: September 6, 2018Inventors: JIANGANG DENG, Chao Li, He Lei Liu, Qing Yu Pei, Heng Wang