Patents by Inventor Shi Chong Ma
Shi Chong Ma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240104000Abstract: Determination and provision of improved representations of program flow control are provided by a method that monitors execution of binary code of a program on a computer system. The monitoring includes monitoring manipulation(s) of call stack(s) maintained by the computer system for the execution of the binary code. The method, based on the monitoring, determines function call pattern(s) and branch pattern(s) exhibited by the execution of the binary code. The method identifies, from the binary code and using the determined function call pattern(s) and branch pattern(s), function calls and branches, relations between the function calls and branches, and function and variable names. The method also provides a representation of program flow control of the program using the identified function calls and branches, relations, and function and variable names.Type: ApplicationFiled: September 28, 2022Publication date: March 28, 2024Inventors: Bao Zhang, Jin Hong Fu, Peng Hui Jiang, Shi Chong Ma, He Huang, Jia Yu
-
Patent number: 11940900Abstract: Determination and provision of improved representations of program flow control are provided by a method that monitors execution of binary code of a program on a computer system. The monitoring includes monitoring manipulation(s) of call stack(s) maintained by the computer system for the execution of the binary code. The method, based on the monitoring, determines function call pattern(s) and branch pattern(s) exhibited by the execution of the binary code. The method identifies, from the binary code and using the determined function call pattern(s) and branch pattern(s), function calls and branches, relations between the function calls and branches, and function and variable names. The method also provides a representation of program flow control of the program using the identified function calls and branches, relations, and function and variable names.Type: GrantFiled: September 28, 2022Date of Patent: March 26, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bao Zhang, Jin Hong Fu, Peng Hui Jiang, Shi Chong Ma, He Huang, Jia Yu
-
Publication number: 20240086333Abstract: A computer-implemented method, computer program product and computer system are provided. A processor receives an indication of sensitive data in one or more files. A processor updates at least one bit in the virtual address space for the one or more files indicated to have sensitive data. A processor, in response to a program accessing the one or more files, evaluates a respective virtual address for the one or more files. A processor, in response to the at least one bit in the respective virtual address for the one or more files, marks intermediate data generated by the program as sensitive data.Type: ApplicationFiled: September 8, 2022Publication date: March 14, 2024Inventors: He Huang, Jin Hong Fu, Shi Chong Ma, Bao Zhang, Jia Yu, Peng Hui Jiang
-
Patent number: 11928460Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for dynamic update of a computer program in memory. According to the method, one or more processors obtain incremental information, the incremental information specifying an incremental update to at least one section of at least one target function in a computer program. One or more processors identify, based on the incremental information, the at least one target function to be updated from the computer program. One or more processors generate at least one updated copy of the at least one target function by updating the at least one section of the at least one target function based on the incremental information. One or more processors update the computer program based on the at least one updated copy of the at least one target function while the computer program is running.Type: GrantFiled: April 20, 2022Date of Patent: March 12, 2024Assignee: International Business Machines CorporationInventors: Jin Hong Fu, Bao Zhang, Shi Chong Ma, He Huang, Naijie Li, Jia Yu
-
Publication number: 20230409568Abstract: A method, computer system, and a computer program for monitoring synchronization and aggregation are provided. The method may include receiving a plurality of metrics and identifying a plurality of metadata associated with the plurality of metrics. The method may further include calculating a hash value of the plurality of metadata based on the plurality of metrics. The method may further include detecting at least one modification to the plurality of metadata based on the hash value and updating the plurality of metrics based on the at least one modification in which the plurality of metrics are displayed in a self-adapting metric diagram.Type: ApplicationFiled: June 16, 2022Publication date: December 21, 2023Inventors: Bao Zhang, XI QING ZHANG, Jin Hong Fu, He Huang, Shi Chong Ma, Jia Yu, Mu Chen, HUI Zhang, Ran Ren, XING XING SHEN
-
Patent number: 11822910Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.Type: GrantFiled: October 14, 2021Date of Patent: November 21, 2023Assignee: International Business Machines CorporationInventors: Bao Zhang, Jin Hong Fu, Shi Chong Ma, He Huang, Yong Yin, Jia Tian Zhong, Xing Xing Shen, Jia Yu
-
Publication number: 20230342142Abstract: Embodiments of the present disclosure relate to a method, system, and computer program product for dynamic update of a computer program in memory. According to the method, one or more processors obtain incremental information, the incremental information specifying an incremental update to at least one section of at least one target function in a computer program. One or more processors identify, based on the incremental information, the at least one target function to be updated from the computer program. One or more processors generate at least one updated copy of the at least one target function by updating the at least one section of the at least one target function based on the incremental information. One or more processors update the computer program based on the at least one updated copy of the at least one target function while the computer program is running.Type: ApplicationFiled: April 20, 2022Publication date: October 26, 2023Inventors: Jin Hong Fu, Bao Zhang, Shi Chong Ma, He Huang, NAIJIE LI, Jia Yu
-
Publication number: 20230118695Abstract: Aspects of the invention include includes detecting a change in a code section of a source code in relation to a reference code section. An incremental section is created in object code, the incremental section includes an object code section describing the change in the code section and a symbol section describing a change to a symbol associated with the changed code section. The incremental section is attached to a software update. The software update to a target computer system.Type: ApplicationFiled: October 14, 2021Publication date: April 20, 2023Inventors: Bao Zhang, Jin Hong Fu, Shi Chong Ma, He Huang, Yong Yin, Jia Tian Zhong, XING XING SHEN, Jia Yu
-
Patent number: 11379468Abstract: Aspects of the invention include computer-implemented method that includes generating a preliminary control flow graph from memory dump data and compiler listing data in response to an exception event at a computing program. Code segments associated with each block of the preliminary control flow graph are translated to Boolean statements. Each Boolean statement is determined to be either satisfied or unsatisfied based on input values retrieved from the memory dump data. An edge property value of a first edge and a second edge of a plurality of edges of the preliminary control flow graph based are calculated based on a satisfaction of the Boolean statements. The edge property value of the first edge is compared to the edge property value of the second edge. The preliminary control flow graph is refined by deleting the first edge of the plurality of edges based at least in part on the comparison.Type: GrantFiled: May 12, 2021Date of Patent: July 5, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Bao Zhang, Shi Chong Ma, Jin Hong Fu, He Huang, Jia Tian Zhong, Xing Xing Shen, Xiang Zu, Jia Yu
-
Patent number: 11200070Abstract: Aspects of the present disclosure are directed to methods, systems, and computer program products for using dynamic-link library based on memory size. In the method, a request for calling a first function in a Dynamic-link library (DLL) at runtime is received first. A size of a memory allocated to the DLL is then determined. Then call relationship of functions in the DLL is obtained. At last, functions related to the first function in the DLL are loaded into the memory allocated to the DLL based on the size of the memory allocated to the DLL and call relationship of functions in the DLL.Type: GrantFiled: August 3, 2018Date of Patent: December 14, 2021Assignee: International Business Machines CorporationInventors: Bao Zhang, Jing Lu, Jin Hong Fu, Shi Chong Ma, Xiao Ling Chen, Yuk L. Chan
-
Patent number: 10885163Abstract: The present disclosure provides a computer-implemented method, computer system and computer program product for user authentication. According to the method, identity information can be received from a user, and a plurality of questions can be presented to the user, the plurality of questions comprising one or more valid questions generated based on a password related to the identity information and one or more invalid questions. Then, an input can be received from the user, and in response to the input corresponding to the one or more valid questions, the user can be authenticated based on the input.Type: GrantFiled: July 19, 2018Date of Patent: January 5, 2021Assignee: International Business Machines CorporationInventors: He Huang, Shi Peng Li, Jin Hong Fu, Shi Chong Ma
-
Publication number: 20200042331Abstract: Aspects of the present disclosure are directed to methods, systems, and computer program products for using dynamic-link library based on memory size. In the method, a request for calling a first function in a Dynamic-link library (DLL) at runtime is received first. A size of a memory allocated to the DLL is then determined. Then call relationship of functions in the DLL is obtained. At last, functions related to the first function in the DLL are loaded into the memory allocated to the DLL based on the size of the memory allocated to the DLL and call relationship of functions in the DLL.Type: ApplicationFiled: August 3, 2018Publication date: February 6, 2020Inventors: Bao Zhang, Jing Lu, Jin Hong Fu, Shi Chong Ma, Xiao Ling Chen, Yuk L. Chan
-
Publication number: 20200026827Abstract: The present disclosure provides a computer-implemented method, computer system and computer program product for user authentication. According to the method, identity information can be received from a user, and a plurality of questions can be presented to the user, the plurality of questions comprising one or more valid questions generated based on a password related to the identity information and one or more invalid questions. Then, an input can be received from the user, and in response to the input corresponding to the one or more valid questions, the user can be authenticated based on the input.Type: ApplicationFiled: July 19, 2018Publication date: January 23, 2020Inventors: He Huang, Shi Peng Li, Jin Hong Fu, Shi Chong Ma