Patents by Inventor Tan Jiang

Tan Jiang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240131145
    Abstract: The instant disclosure relates to pseudovirus nanoparticles (PVNPs) and compositions comprising PVNPs. The disclosed PVNPs may be comprised of fusion proteins that form an icosahedral structure and a nanoparticle shell. The disclosed fusion proteins may comprise a modified norovirus (NoV) S domain protein; a hemagglutinin I (HA1) antigen of the influenza hemagglutinin I (HA1) of influenza vims; and a peptide linker connecting the C-terminus of the NoV S domain to the HA1 antigen. The modified NoV S domain proteins form the interior nanoparticle shell of said PVNP composition and display the 60 HA1 antigens on the surface of the nanoparticle shell. Methods of making and using the PVNPs and compositions containing PVNPs are also disclosed.
    Type: Application
    Filed: February 16, 2022
    Publication date: April 25, 2024
    Inventors: Ming TAN, Xi Jason JIANG
  • Patent number: 11954152
    Abstract: The present specification discloses video matching. In a computer-implemented method, a plurality of feature vectors of a target video is obtained. A candidate video similar to the target video is retrieved from a video database based on the plurality of feature vectors of the target video. A time domain similarity matrix feature map is constructed between the target video and the candidate video based on the target video and the candidate video. Using the time domain similarity matrix feature map as an input into a deep learning detection model, a video segment matching the target video in the candidate video and a corresponding similarity is output.
    Type: Grant
    Filed: January 3, 2023
    Date of Patent: April 9, 2024
    Assignee: Alipay (Hangzhou) Information Technology Co., Ltd.
    Inventors: Chen Jiang, Wei Zhang, Qing Wang, Yuan Cheng, Furong Xu, Kaiming Huang, Xiaobo Zhang, Feng Qian, Xudong Yang, Tan Pan
  • Patent number: 11627124
    Abstract: An example method of logging in an automation user to a container image registry in a virtualized computing system is described, the container image registry managing container images for deploying containers in the virtualized computing system. The method includes: receiving, at a credential manager in the container image registry, a login request from a service executing in the virtualized computing system representing the automation user, the login request for image access to the container image registry and including an automation token; authenticating the automation token as credentials of a robot account in the container image registry corresponding to the automation user; and authorizing the automation user as identified in the automation token of the login request in response to the robot account having privilege for the image access.
    Type: Grant
    Filed: May 12, 2020
    Date of Patent: April 11, 2023
    Assignee: VMware, Inc.
    Inventors: Yanping Cao, Tan Jiang, Michal Adam Jankowski
  • Publication number: 20230100166
    Abstract: A device and method for treating urban domestic sewage based on a two-stage combined process of partial denitrification-anammox belong to the field of biological sewage treatment. The device includes a raw water tank, a sequencing batch biofilm reactor (SBBR), an intermediate water tank, an up-flow anaerobic sludge bed (UASB) and a water outlet tank. A part of urban domestic sewage enters the SBBR and is mixed with residual sewage in the last cycle, a partial denitrification-anammox reaction is carried out under a stirring condition to remove nitrate nitrogen and a part of ammonia nitrogen, followed by a nitrification under an aeration condition to completely convert ammonia nitrogen into nitrate nitrogen, and effluent enters the intermediate water tank; and the other part of the urban domestic sewage is mixed with the effluent of the SBBR and continuously enters the UASB, and nitrite nitrogen, which is generated by nitrate nitrogen reduction, and ammonia nitrogen, are removed by means of anammox.
    Type: Application
    Filed: September 19, 2022
    Publication date: March 30, 2023
    Inventors: Bo Wang, YuQing Ma, XiaoDi Li, Shuo Wang, Wen Wang, Tan Jiang
  • Publication number: 20220249898
    Abstract: A weight adjustable dumbbell, which includes a connecting bar and a supporting base. Two sides of the supporting base are has a receiving groove, respectively. A plurality of dumbbell plates opposite to each other are located in the receiving grooves along an axial direction, a notch is located on each of the dumbbell plates for inserting the connecting bar, a slot opposite to the connecting bar is defined on an inner wall of the notch, fasteners opposite to the dumbbell plates are set on the connecting bar along the axial direction, the fasteners at an end of the connecting bar are arranged spirally along the axial direction at equal angles. The plurality of fasteners can connect to the slot of the dumbbell plates sequentially by rotating the connecting bar, and the dumbbell plates are detachably connected to limiting parts that can limit the rotation of the connecting bar.
    Type: Application
    Filed: April 21, 2021
    Publication date: August 11, 2022
    Inventors: Tan JIANG, Fan ZHU
  • Patent number: 11275839
    Abstract: A method and system for code package. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant. The dataset includes general information related to security aspects of the image file. The image file includes two or more image layers. Generating the dataset according to the code package includes: exporting an image layer from the image file; and obtaining a configuration file of the exported image layer as the dataset. In response to the vulnerability having been identified, the image file is updated with a patch that fixes the identified vulnerability. The patch includes a new image layer added to the two or more image layers in the updated image file.
    Type: Grant
    Filed: July 11, 2019
    Date of Patent: March 15, 2022
    Assignee: International Business Machines Corporation
    Inventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
  • Patent number: 11275838
    Abstract: A method and system. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant in a cloud environment. The dataset includes general information related to security aspects of the image file. The image file includes two or more image layers. A security indicator of the image file is extracted according to the dataset. A security level of the image file is determined by comparing the extracted security indicator of the image file with a security indicator of an authenticated image file. A vulnerability in the image file is identified based on the determined security level. In response to the vulnerability having been identified, the image file is updated with a patch that fixes the identified vulnerability. The patch includes a new image layer added to the two or more image layers in the updated image file.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: March 15, 2022
    Assignee: International Business Machines Corporation
    Inventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
  • Publication number: 20210314310
    Abstract: An example method of logging in an automation user to a container image registry in a virtualized computing system is described, the container image registry managing container images for deploying containers in the virtualized computing system. The method includes: receiving, at a credential manager in the container image registry, a login request from a service executing in the virtualized computing system representing the automation user, the login request for image access to the container image registry and including an automation token; authenticating the automation token as credentials of a robot account in the container image registry corresponding to the automation user; and authorizing the automation user as identified in the automation token of the login request in response to the robot account having privilege for the image access.
    Type: Application
    Filed: May 12, 2020
    Publication date: October 7, 2021
    Inventors: Yanping CAO, Tan JIANG, Michal Adam JANKOWSKI
  • Publication number: 20190332779
    Abstract: A method and system. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant in a cloud environment. The dataset includes general information related to security aspects of the image file. The image file includes two or more image layers. A security indicator of the image file is extracted according to the dataset. A security level of the image file is determined by comparing the extracted security indicator of the image file with a security indicator of an authenticated image file. A vulnerability in the image file is identified based on the determined security level. In response to the vulnerability having been identified, the image file is updated with a patch that fixes the identified vulnerability. The patch includes a new image layer added to the two or more image layers in the updated image file.
    Type: Application
    Filed: July 10, 2019
    Publication date: October 31, 2019
    Inventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
  • Publication number: 20190332780
    Abstract: A method and system for code package. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant. The dataset includes general information related to security aspects of the image file. The image file includes two or more image layers. Generating the dataset according to the code package includes: exporting an image layer from the image file; and obtaining a configuration file of the exported image layer as the dataset. In response to the vulnerability having been identified, the image file is updated with a patch that fixes the identified vulnerability. The patch includes a new image layer added to the two or more image layers in the updated image file.
    Type: Application
    Filed: July 11, 2019
    Publication date: October 31, 2019
    Inventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
  • Patent number: 10402569
    Abstract: A method and associated system. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant in a cloud environment. The dataset includes general information related to security aspects of the image file. A security level of the image file is determined according to the generated dataset. A vulnerability corresponding to the code package is identified based on the security level. In response to the vulnerability having been identified, the code package is updated with a patch associated with the identified vulnerability.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: September 3, 2019
    Assignee: International Business Machines Corporation
    Inventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
  • Patent number: 10031798
    Abstract: One or more processors acquire dependency metadata, where the dependency metadata is used for representing dependency on data among at least two components of an application. The processor(s) acquire error information and data output, where the error information is used for describing errors that occur while running the application, and where the data output includes data output by the at least two components while running the application. The processor(s) analyze, based on the error information, dependency metadata and data output relevant to the error information, where the analyzing includes determining, based on a null pointer exception in the error information and dependency metadata corresponding to the null pointer exception, that corresponding data has not been output by a component corresponding to the null pointer exception. The processor(s) then use an analysis result to improve the operation of a computer that is running the application.
    Type: Grant
    Filed: August 2, 2016
    Date of Patent: July 24, 2018
    Assignee: International Business Machines Corporation
    Inventors: Gang Huang, Tan Jiang, Ling Lan, Yong Yao, Li Yi, Liang Wang, Yu Zhang
  • Patent number: 10019307
    Abstract: One or more processors acquire dependency metadata, where the dependency metadata is used for representing dependency on data among at least two components of an application. The processor(s) acquire error information and data output, where the error information is used for describing errors that occur while running the application, and where the data output includes data output by the at least two components while running the application. The processor(s) analyze, based on the error information, dependency metadata and data output relevant to the error information, where the analyzing includes determining, based on a null pointer exception in the error information and data output of a component corresponding to the null pointer exception, that there is an error in dependency metadata corresponding to the null pointer exception. The processor(s) then provide an analysis result to improve the operation of a computer that is running the application.
    Type: Grant
    Filed: August 3, 2016
    Date of Patent: July 10, 2018
    Assignee: International Business Machines Coporation
    Inventors: Gang Huang, Tan Jiang, Ling Lan, Yong Yao, Li Yi, Liang Wang, Yu Zhang
  • Patent number: 10013301
    Abstract: One or more processors acquire dependency metadata, where the dependency metadata is used for representing dependency on data among at least two components of an application. The processor(s) acquire error information and data output, where the error information is used for describing errors that occur while running the application, and where the data output includes data output by the at least two components while running the application. The processor(s) analyze, based on the error information, dependency metadata and data output relevant to the error information, where the analyzing includes determining, based on a null pointer exception in the error information and data output of a component corresponding to the null pointer exception, correct dependency metadata corresponding to the null pointer exception. The processor(s) then provide an analysis result to improve the operation of a computer that is running the application.
    Type: Grant
    Filed: August 4, 2016
    Date of Patent: July 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Gang Huang, Tan Jiang, Ling Lan, Yong Yao, Li Yi, Liang Wang, Yu Zhang
  • Patent number: 10013302
    Abstract: A method, apparatus, and/or computer program product analyzes data processing. Dependency metadata, which is used for representing dependency on data among at least two components of an application, is acquired. Error information, which is used for describing errors that occurred while running the application, and data output, which includes data output by components used to run the application, are acquired. Based on the error information, dependency metadata and data output relevant to the error information are analyzed to provide an analysis result. The analysis result includes at least one of: a prompt for an error correction method, a relevant dependency metadata leading to an occurrence of an error, and relevant data output leading to an occurrence of an error.
    Type: Grant
    Filed: August 16, 2016
    Date of Patent: July 3, 2018
    Assignee: International Business Machines Corporation
    Inventors: Gang Huang, Tan Jiang, Ling Lan, Yong Yao, Li Yi, Liang Wang, Yu Zhang
  • Publication number: 20180114025
    Abstract: A method and associated system. A dataset is generated according to a code package. The code package includes an image file associated with a container for a tenant in a cloud environment. The dataset includes general information related to security aspects of the image file. A security level of the image file is determined according to the generated dataset. A vulnerability corresponding to the code package is identified based on the security level. In response to the vulnerability having been identified, the code package is updated with a patch associated with the identified vulnerability.
    Type: Application
    Filed: October 20, 2016
    Publication date: April 26, 2018
    Inventors: Peng Cui, Dong Xiao Hui, Tan Jiang, Da Hu Kuang, Lan Ling, Xu Peng, Liang Wang, Chun Xiao Zhang, Yu Zhang
  • Patent number: 9912759
    Abstract: Embodiments of the present disclosure dynamically generate solution stacks. In one embodiment, a request to deploy a service in a cloud computing environment is received. A service repository is queried for data that describes one or more requirements of the service. One or more prerequisite services are identified based, at least in part, on the requirements of the service. A solution stack model is dynamically generated from (i) a stack service model of the service and (ii) the one or more prerequisite services, wherein the solution stack model is based, at least in part, on the requirements of the service.
    Type: Grant
    Filed: June 24, 2015
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Ajay A. Apte, Ran R. Jiang, Tan Jiang, Lin Sun, Shu Chao Wan, Li Yi, Yu Zhang
  • Patent number: 9912760
    Abstract: Embodiments of the present disclosure dynamically generate solution stacks. In one embodiment, a request to deploy a service in a cloud computing environment is received. A service repository is queried for data that describes one or more requirements of the service. One or more prerequisite services are identified based, at least in part, on the requirements of the service. A solution stack model is dynamically generated from (i) a stack service model of the service and (ii) the one or more prerequisite services, wherein the solution stack model is based, at least in part, on the requirements of the service.
    Type: Grant
    Filed: September 14, 2015
    Date of Patent: March 6, 2018
    Assignee: International Business Machines Corporation
    Inventors: Ajay A. Apte, Ran R. Jiang, Tan Jiang, Lin Sun, Shu Chao Wan, Li Yi, Yu Zhang
  • Patent number: 9665390
    Abstract: In one embodiment, a method includes a processor deploying one or more scripts in a first deployment instance, where the first deployment instance is deployed from a first shared computing environment. The processor determines a difference between the first deployment instance at deployment and the first deployment instance at runtime and based on this determination, selects a first script from the one or more scripts. The processor captures a representation of the first deployment instance and selects a second script, where second script sets up relationships between resources of the first deployment instance in a subsequently deployed deployment instance. The processor utilizes the representation, the first script, and the second script to deploy a second deployment instance from a second shared computing environment.
    Type: Grant
    Filed: October 26, 2015
    Date of Patent: May 30, 2017
    Assignee: International Business Machines Corporation
    Inventors: Hong Chen, Xue Xiang Cui, Tan Jiang, Zhen Xin Jiao, Xin Li, Xin Peng Liu, Yong Yao, Yu Zhang
  • Patent number: D986992
    Type: Grant
    Filed: July 28, 2022
    Date of Patent: May 23, 2023
    Inventor: Tan Jiang