Patents by Inventor Tan Jiang
Tan Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240131145Abstract: The instant disclosure relates to pseudovirus nanoparticles (PVNPs) and compositions comprising PVNPs. The disclosed PVNPs may be comprised of fusion proteins that form an icosahedral structure and a nanoparticle shell. The disclosed fusion proteins may comprise a modified norovirus (NoV) S domain protein; a hemagglutinin I (HA1) antigen of the influenza hemagglutinin I (HA1) of influenza vims; and a peptide linker connecting the C-terminus of the NoV S domain to the HA1 antigen. The modified NoV S domain proteins form the interior nanoparticle shell of said PVNP composition and display the 60 HA1 antigens on the surface of the nanoparticle shell. Methods of making and using the PVNPs and compositions containing PVNPs are also disclosed.Type: ApplicationFiled: February 16, 2022Publication date: April 25, 2024Inventors: Ming TAN, Xi Jason JIANG
-
Patent number: 11954152Abstract: The present specification discloses video matching. In a computer-implemented method, a plurality of feature vectors of a target video is obtained. A candidate video similar to the target video is retrieved from a video database based on the plurality of feature vectors of the target video. A time domain similarity matrix feature map is constructed between the target video and the candidate video based on the target video and the candidate video. Using the time domain similarity matrix feature map as an input into a deep learning detection model, a video segment matching the target video in the candidate video and a corresponding similarity is output.Type: GrantFiled: January 3, 2023Date of Patent: April 9, 2024Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.Inventors: Chen Jiang, Wei Zhang, Qing Wang, Yuan Cheng, Furong Xu, Kaiming Huang, Xiaobo Zhang, Feng Qian, Xudong Yang, Tan Pan
-
Patent number: 11627124Abstract: An example method of logging in an automation user to a container image registry in a virtualized computing system is described, the container image registry managing container images for deploying containers in the virtualized computing system. The method includes: receiving, at a credential manager in the container image registry, a login request from a service executing in the virtualized computing system representing the automation user, the login request for image access to the container image registry and including an automation token; authenticating the automation token as credentials of a robot account in the container image registry corresponding to the automation user; and authorizing the automation user as identified in the automation token of the login request in response to the robot account having privilege for the image access.Type: GrantFiled: May 12, 2020Date of Patent: April 11, 2023Assignee: VMware, Inc.Inventors: Yanping Cao, Tan Jiang, Michal Adam Jankowski
-
Publication number: 20230100166Abstract: A device and method for treating urban domestic sewage based on a two-stage combined process of partial denitrification-anammox belong to the field of biological sewage treatment. The device includes a raw water tank, a sequencing batch biofilm reactor (SBBR), an intermediate water tank, an up-flow anaerobic sludge bed (UASB) and a water outlet tank. A part of urban domestic sewage enters the SBBR and is mixed with residual sewage in the last cycle, a partial denitrification-anammox reaction is carried out under a stirring condition to remove nitrate nitrogen and a part of ammonia nitrogen, followed by a nitrification under an aeration condition to completely convert ammonia nitrogen into nitrate nitrogen, and effluent enters the intermediate water tank; and the other part of the urban domestic sewage is mixed with the effluent of the SBBR and continuously enters the UASB, and nitrite nitrogen, which is generated by nitrate nitrogen reduction, and ammonia nitrogen, are removed by means of anammox.Type: ApplicationFiled: September 19, 2022Publication date: March 30, 2023Inventors: Bo Wang, YuQing Ma, XiaoDi Li, Shuo Wang, Wen Wang, Tan Jiang
-
Publication number: 20220249898Abstract: A weight adjustable dumbbell, which includes a connecting bar and a supporting base. Two sides of the supporting base are has a receiving groove, respectively. A plurality of dumbbell plates opposite to each other are located in the receiving grooves along an axial direction, a notch is located on each of the dumbbell plates for inserting the connecting bar, a slot opposite to the connecting bar is defined on an inner wall of the notch, fasteners opposite to the dumbbell plates are set on the connecting bar along the axial direction, the fasteners at an end of the connecting bar are arranged spirally along the axial direction at equal angles. The plurality of fasteners can connect to the slot of the dumbbell plates sequentially by rotating the connecting bar, and the dumbbell plates are detachably connected to limiting parts that can limit the rotation of the connecting bar.Type: ApplicationFiled: April 21, 2021Publication date: August 11, 2022Inventors: Tan JIANG, Fan ZHU
-
Patent number: 11275839Abstract: A method and system for code package. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant. The dataset includes general information related to security aspects of the image file. The image file includes two or more image layers. Generating the dataset according to the code package includes: exporting an image layer from the image file; and obtaining a configuration file of the exported image layer as the dataset. In response to the vulnerability having been identified, the image file is updated with a patch that fixes the identified vulnerability. The patch includes a new image layer added to the two or more image layers in the updated image file.Type: GrantFiled: July 11, 2019Date of Patent: March 15, 2022Assignee: International Business Machines CorporationInventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
-
Patent number: 11275838Abstract: A method and system. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant in a cloud environment. The dataset includes general information related to security aspects of the image file. The image file includes two or more image layers. A security indicator of the image file is extracted according to the dataset. A security level of the image file is determined by comparing the extracted security indicator of the image file with a security indicator of an authenticated image file. A vulnerability in the image file is identified based on the determined security level. In response to the vulnerability having been identified, the image file is updated with a patch that fixes the identified vulnerability. The patch includes a new image layer added to the two or more image layers in the updated image file.Type: GrantFiled: July 10, 2019Date of Patent: March 15, 2022Assignee: International Business Machines CorporationInventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
-
Publication number: 20210314310Abstract: An example method of logging in an automation user to a container image registry in a virtualized computing system is described, the container image registry managing container images for deploying containers in the virtualized computing system. The method includes: receiving, at a credential manager in the container image registry, a login request from a service executing in the virtualized computing system representing the automation user, the login request for image access to the container image registry and including an automation token; authenticating the automation token as credentials of a robot account in the container image registry corresponding to the automation user; and authorizing the automation user as identified in the automation token of the login request in response to the robot account having privilege for the image access.Type: ApplicationFiled: May 12, 2020Publication date: October 7, 2021Inventors: Yanping CAO, Tan JIANG, Michal Adam JANKOWSKI
-
Publication number: 20190332779Abstract: A method and system. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant in a cloud environment. The dataset includes general information related to security aspects of the image file. The image file includes two or more image layers. A security indicator of the image file is extracted according to the dataset. A security level of the image file is determined by comparing the extracted security indicator of the image file with a security indicator of an authenticated image file. A vulnerability in the image file is identified based on the determined security level. In response to the vulnerability having been identified, the image file is updated with a patch that fixes the identified vulnerability. The patch includes a new image layer added to the two or more image layers in the updated image file.Type: ApplicationFiled: July 10, 2019Publication date: October 31, 2019Inventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
-
Publication number: 20190332780Abstract: A method and system for code package. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant. The dataset includes general information related to security aspects of the image file. The image file includes two or more image layers. Generating the dataset according to the code package includes: exporting an image layer from the image file; and obtaining a configuration file of the exported image layer as the dataset. In response to the vulnerability having been identified, the image file is updated with a patch that fixes the identified vulnerability. The patch includes a new image layer added to the two or more image layers in the updated image file.Type: ApplicationFiled: July 11, 2019Publication date: October 31, 2019Inventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
-
Patent number: 10402569Abstract: A method and associated system. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant in a cloud environment. The dataset includes general information related to security aspects of the image file. A security level of the image file is determined according to the generated dataset. A vulnerability corresponding to the code package is identified based on the security level. In response to the vulnerability having been identified, the code package is updated with a patch associated with the identified vulnerability.Type: GrantFiled: October 20, 2016Date of Patent: September 3, 2019Assignee: International Business Machines CorporationInventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
-
Patent number: 10031798Abstract: One or more processors acquire dependency metadata, where the dependency metadata is used for representing dependency on data among at least two components of an application. The processor(s) acquire error information and data output, where the error information is used for describing errors that occur while running the application, and where the data output includes data output by the at least two components while running the application. The processor(s) analyze, based on the error information, dependency metadata and data output relevant to the error information, where the analyzing includes determining, based on a null pointer exception in the error information and dependency metadata corresponding to the null pointer exception, that corresponding data has not been output by a component corresponding to the null pointer exception. The processor(s) then use an analysis result to improve the operation of a computer that is running the application.Type: GrantFiled: August 2, 2016Date of Patent: July 24, 2018Assignee: International Business Machines CorporationInventors: Gang Huang, Tan Jiang, Ling Lan, Yong Yao, Li Yi, Liang Wang, Yu Zhang
-
Patent number: 10019307Abstract: One or more processors acquire dependency metadata, where the dependency metadata is used for representing dependency on data among at least two components of an application. The processor(s) acquire error information and data output, where the error information is used for describing errors that occur while running the application, and where the data output includes data output by the at least two components while running the application. The processor(s) analyze, based on the error information, dependency metadata and data output relevant to the error information, where the analyzing includes determining, based on a null pointer exception in the error information and data output of a component corresponding to the null pointer exception, that there is an error in dependency metadata corresponding to the null pointer exception. The processor(s) then provide an analysis result to improve the operation of a computer that is running the application.Type: GrantFiled: August 3, 2016Date of Patent: July 10, 2018Assignee: International Business Machines CoporationInventors: Gang Huang, Tan Jiang, Ling Lan, Yong Yao, Li Yi, Liang Wang, Yu Zhang
-
Patent number: 10013301Abstract: One or more processors acquire dependency metadata, where the dependency metadata is used for representing dependency on data among at least two components of an application. The processor(s) acquire error information and data output, where the error information is used for describing errors that occur while running the application, and where the data output includes data output by the at least two components while running the application. The processor(s) analyze, based on the error information, dependency metadata and data output relevant to the error information, where the analyzing includes determining, based on a null pointer exception in the error information and data output of a component corresponding to the null pointer exception, correct dependency metadata corresponding to the null pointer exception. The processor(s) then provide an analysis result to improve the operation of a computer that is running the application.Type: GrantFiled: August 4, 2016Date of Patent: July 3, 2018Assignee: International Business Machines CorporationInventors: Gang Huang, Tan Jiang, Ling Lan, Yong Yao, Li Yi, Liang Wang, Yu Zhang
-
Patent number: 10013302Abstract: A method, apparatus, and/or computer program product analyzes data processing. Dependency metadata, which is used for representing dependency on data among at least two components of an application, is acquired. Error information, which is used for describing errors that occurred while running the application, and data output, which includes data output by components used to run the application, are acquired. Based on the error information, dependency metadata and data output relevant to the error information are analyzed to provide an analysis result. The analysis result includes at least one of: a prompt for an error correction method, a relevant dependency metadata leading to an occurrence of an error, and relevant data output leading to an occurrence of an error.Type: GrantFiled: August 16, 2016Date of Patent: July 3, 2018Assignee: International Business Machines CorporationInventors: Gang Huang, Tan Jiang, Ling Lan, Yong Yao, Li Yi, Liang Wang, Yu Zhang
-
Publication number: 20180114025Abstract: A method and associated system. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant in a cloud environment. The dataset includes general information related to security aspects of the image file. A security level of the image file is determined according to the generated dataset. A vulnerability corresponding to the code package is identified based on the security level. In response to the vulnerability having been identified, the code package is updated with a patch associated with the identified vulnerability.Type: ApplicationFiled: October 20, 2016Publication date: April 26, 2018Inventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
-
Patent number: 9912759Abstract: Embodiments of the present disclosure dynamically generate solution stacks. In one embodiment, a request to deploy a service in a cloud computing environment is received. A service repository is queried for data that describes one or more requirements of the service. One or more prerequisite services are identified based, at least in part, on the requirements of the service. A solution stack model is dynamically generated from (i) a stack service model of the service and (ii) the one or more prerequisite services, wherein the solution stack model is based, at least in part, on the requirements of the service.Type: GrantFiled: June 24, 2015Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Ajay A. Apte, Ran R. Jiang, Tan Jiang, Lin Sun, Shu Chao Wan, Li Yi, Yu Zhang
-
Patent number: 9912760Abstract: Embodiments of the present disclosure dynamically generate solution stacks. In one embodiment, a request to deploy a service in a cloud computing environment is received. A service repository is queried for data that describes one or more requirements of the service. One or more prerequisite services are identified based, at least in part, on the requirements of the service. A solution stack model is dynamically generated from (i) a stack service model of the service and (ii) the one or more prerequisite services, wherein the solution stack model is based, at least in part, on the requirements of the service.Type: GrantFiled: September 14, 2015Date of Patent: March 6, 2018Assignee: International Business Machines CorporationInventors: Ajay A. Apte, Ran R. Jiang, Tan Jiang, Lin Sun, Shu Chao Wan, Li Yi, Yu Zhang
-
Patent number: 9665390Abstract: In one embodiment, a method includes a processor deploying one or more scripts in a first deployment instance, where the first deployment instance is deployed from a first shared computing environment. The processor determines a difference between the first deployment instance at deployment and the first deployment instance at runtime and based on this determination, selects a first script from the one or more scripts. The processor captures a representation of the first deployment instance and selects a second script, where second script sets up relationships between resources of the first deployment instance in a subsequently deployed deployment instance. The processor utilizes the representation, the first script, and the second script to deploy a second deployment instance from a second shared computing environment.Type: GrantFiled: October 26, 2015Date of Patent: May 30, 2017Assignee: International Business Machines CorporationInventors: Hong Chen, Xue Xiang Cui, Tan Jiang, Zhen Xin Jiao, Xin Li, Xin Peng Liu, Yong Yao, Yu Zhang
-
Patent number: D986992Type: GrantFiled: July 28, 2022Date of Patent: May 23, 2023Inventor: Tan Jiang