Patents by Inventor Tianqing Wang

Tianqing Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150089309
    Abstract: The present disclosure relates to a method and apparatus for troubleshooting based on log similarity. In one embodiment, there is provided a method for troubleshooting based on log similarity, comprising: extracting log patterns from multiple log files in response to having collected the multiple log files from at least one system with troubles, the log pattern describing a regular expression to which a log message in a log file among the multiple log files conforms; building a pattern repository using the log patterns; mapping each of the multiple log files to an n-dimensional vector based on the pattern repository; and clustering multiple n-dimensional vectors to which each of the multiple log files is mapped into at least one group, wherein each of the at least one group indicates one trouble type of the at least one system. In another embodiment, there is provided a corresponding apparatus.
    Type: Application
    Filed: September 17, 2014
    Publication date: March 26, 2015
    Inventors: Yu Fu, Chao Chen, Tianqing Wang, Qianjie Zhong, Qiyan Chen
  • Publication number: 20140258987
    Abstract: The present invention provides a method for determining correctness of an application, comprising: obtaining a dataset and a reference running result for the application; and determining correctness of the application based on a comparison between the reference running result and an actual running result of the dataset on the application. Through the method, the users can connect to a standard task tool repository, thereby using a data-driven testing method as a complement to the existing quality assurance framework.
    Type: Application
    Filed: March 5, 2014
    Publication date: September 11, 2014
    Applicant: EMC Corporation
    Inventors: Baoyao Zhou, Tao Chen, Tianqing Wang, Jun Tao, Dong Xiang, Yu Cao
  • Publication number: 20140189857
    Abstract: The present invention provides a method, system and apparatus for securely operating a computer. The method comprises: obtaining presence status of an authenticated user, the presence status indicating whether the authenticated user is present in the vicinity of the computer; and triggering security operation in response to that the presence status indicates the authenticated user is absent in the vicinity of the computer. By means of the method, current status of an authenticated user who has logged in can be easily learned, and in turn, corresponding security operation is performed; in addition, when a user is performing sensitive operation, it can be confirmed in real time whether the user is an authenticated user who previously logged in, so that security of operating the computer is improved.
    Type: Application
    Filed: December 30, 2013
    Publication date: July 3, 2014
    Applicant: EMC Corporation
    Inventors: Feng Guo, Qiyan Chen, Tianqing Wang, Lintao Wan, Ziye Yang
  • Publication number: 20140181982
    Abstract: Embodiments of the present invention relate to a method and system for data protection. A data protection method comprises: receiving at least one event prediction message from at least one message source, the at least one event prediction message being associated with an event that is predicted to occur in a future period of time; analyzing information, which is relevant to the event, included in the at least one event prediction message, so as to determine a risk level of the event with respect to the data to be protected; and determining a data protection operation at least based on the risk level and a predetermined event handling policy. There is further disclosed a corresponding data protection system. According to the embodiments of the present invention, it is enabled to voluntarily, dynamically, and flexibly handle high-risk events potentially damaging data, thereby better guaranteeing data security.
    Type: Application
    Filed: December 17, 2013
    Publication date: June 26, 2014
    Applicant: EMC Corporation
    Inventors: Feng Guo, Qiyan Chen, Deming Shi, Jun Tao, Tianqing Wang
  • Publication number: 20140122637
    Abstract: A method and apparatus for providing caching service in network infrastructure. In an embodiment, there is provided a method for providing caching service in network infrastructure, comprising: in response to at least one application node accessing data in a storage node, caching a copy of the data in a cache server; in response to the at least one application node accessing the data in the storage node, obtaining an identifier indicating whether the data in the storage node is valid or not; and in response to the identifier indicating the data in the storage node is valid, returning the copy; wherein the at least one application node and the storage node are connected via the network infrastructure, and the cache server is coupled to a switch in the network infrastructure. In another embodiment of the present invention, there is provided an apparatus for providing caching service in network infrastructure.
    Type: Application
    Filed: October 25, 2013
    Publication date: May 1, 2014
    Applicant: EMC Corporation
    Inventors: Lintao Wan, Tianqing Wang, Feng Guo, Kai Yan
  • Publication number: 20140114613
    Abstract: Embodiments of the present invention relate to method and apparatus for system problem diagnosis and recovery. According to embodiments of the present invention, problem symptom information in a system can be automatically monitored and collected BY a monitoring apparatus (or referred as to “agent”) deployed at the system side. Upon after receiving such information, the diagnosis apparatus, for example, may automatically determine a root cause of the problem by querying a backend knowledge repository, and possibly generate an executable software package for recovering the problem. If the diagnosis apparatus determines that the currently available information is insufficient to determine a creditable enough root cause and/or is insufficient to generate the software package for recovering the problem, the diagnosis apparatus may interactively control the monitoring apparatus to collect desired additional information. In this way, the efficiency and accuracy of problem diagnosis and recovery may be improved.
    Type: Application
    Filed: October 21, 2013
    Publication date: April 24, 2014
    Applicant: EMC Corporation
    Inventors: Tianqing Wang, Feng Guo, Lintao Wan, Dong Xiang, Qiyan Chen, Tao Chen
  • Patent number: 8700678
    Abstract: Techniques are disclosed for generating data provenance associated with a computing system. For example, a method comprises the following steps. Information associated with the execution of a given process in a given computing environment in accordance with a given process data set is captured. A provenance data set is generated based on the captured information. The generated provenance data set comprises one or more states associated with one or more execution components of the given computing environment that existed during the execution of the given process. At least a portion of the generated provenance data set may be utilized to revert the computing environment back to the one or more states associated with the one or more execution components of the given computing environment that existed during the execution of the given process.
    Type: Grant
    Filed: December 21, 2011
    Date of Patent: April 15, 2014
    Assignee: EMC Corporation
    Inventors: Chenhui Fan, Lun Zhou, Stephen Todd, Qiyan Chen, Tianqing Wang