Patents by Inventor Trieu C. Chieu
Trieu C. Chieu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11265229Abstract: Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.Type: GrantFiled: November 18, 2019Date of Patent: March 1, 2022Assignee: Kyndryl, Inc.Inventors: Trieu C. Chieu, Ashu Gupta, Manas R. K. Singh, Xiao Yi Tian
-
Patent number: 10896247Abstract: Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.Type: GrantFiled: January 24, 2018Date of Patent: January 19, 2021Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh H. Lam, Thao N. Nguyen, Kakan Roy, Amit J. Shah
-
Publication number: 20200092179Abstract: Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.Type: ApplicationFiled: November 18, 2019Publication date: March 19, 2020Inventors: Trieu C. Chieu, Ashu Gupta, Manas R.K. Singh, Xiao Yi Tian
-
Patent number: 10560347Abstract: Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.Type: GrantFiled: July 13, 2015Date of Patent: February 11, 2020Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Ashu Gupta, Manas R. K. Singh, Xiao Yi Tian
-
Publication number: 20180150442Abstract: Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.Type: ApplicationFiled: January 24, 2018Publication date: May 31, 2018Inventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh H. Lam, Thao N. Nguyen, Kakan Roy, Amit J. Shah
-
Patent number: 9971750Abstract: Illustrative embodiments disclose a computer process controlling access to one or more documents by one or more parties, the parties organized over one or more organizations. In response to a party associated with a first organization attempting to access documents, determining an access level associated with the party as a first access level, a second access level, a third access level, or a fourth access level. The first, second, third and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. In response to determining the access level associated with the party, permitting the party to access the documents, or preventing the party from accessing the documents, according to the access level associated with the party.Type: GrantFiled: April 10, 2012Date of Patent: May 15, 2018Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh Hue Lam, Thao Ngoc Nguyen, Kakan Roy, Amit Jaysukhial Shah
-
Patent number: 9552389Abstract: A correlation-based service mediator consists of Semantic Query Generator, Service Query Manager, Service Invocation Flow Generator, Service Invocation Manager, Expression Interpreter and Service Invocation Result Cache. The Semantic Query Generator converts service request to Semantic Query based on input/output parameters in the service request. The Service Query Manager interfaces with an Ontology Engine, passing query results to Service Invocation Flow Generator, which creates service invocation flow definition based on passed query results. The Service Invocation Manager executes flow definitions. It also manages a service invocation result cache, so that invocation results can be saved and reused for later service request. When the execution results are not available in cache, the Service Invocation Manager invokes service according to flow definition. When attribute dependent functions are invoked Expression Interpreter compute the execution results.Type: GrantFiled: July 26, 2013Date of Patent: January 24, 2017Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Hui Lei, Guo Tong Xie, Liangzhao Zeng
-
Publication number: 20170019314Abstract: Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.Type: ApplicationFiled: July 13, 2015Publication date: January 19, 2017Inventors: Trieu C. Chieu, Ashu Gupta, Manas R.K. Singh, Xiao Yi Tian
-
Patent number: 9450985Abstract: Systems and methods for computer automated validation of server configurations are provided. A method for validation of a target environment, comprises assembling a validation script from a plurality of script fragments, inserting the assembled validation script into the target environment, executing the validation script in the target environment, gathering results of the executing, and reporting the results to at least one user.Type: GrantFiled: August 4, 2014Date of Patent: September 20, 2016Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Robert Filepp, Brian L. Peterson, Ratnasagar M. Ramaratnam
-
Patent number: 9323751Abstract: Access to documents by parties can be controlled as follows. First, access can be controlled in accordance with access counters associated with the parties, where the documents have one or more versions. Second, access can be controlled in accordance with access levels associated with the parties. The access level of each party is one of a first access level, a second access level, a third access level, or a fourth access level. The first, second, third, and fourth access levels are ordered from the first access level to the fourth access level such that the first access level provides a greatest degree of access to the documents and the fourth access level provides a least degree of access to the documents. Third, access can be controlled in accordance with placement of organizations within a hierarchy of organizations, where the parties are organized over the organizations.Type: GrantFiled: March 5, 2008Date of Patent: April 26, 2016Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Manikandan Dharamarajan, Thomas Yu-Kiu Kwok, Linh Hue Lam, Thao Ngoc Nguyen, Kakan Roy, Amit Jaysukhlal Shah
-
Publication number: 20160036858Abstract: Systems and methods for computer automated validation of server configurations are provided. A method for validation of a target environment, comprises assembling a validation script from a plurality of script fragments, inserting the assembled validation script into the target environment, executing the validation script in the target environment, gathering results of the executing, and reporting the results to at least one user.Type: ApplicationFiled: August 4, 2014Publication date: February 4, 2016Inventors: Trieu C. Chieu, Robert Filepp, Brian L. Peterson, Ratnasagar M. Ramaratnam
-
Patent number: 9052940Abstract: A method for customizing virtual machines includes retrieving a virtual machine image file from a library of virtual machine image files. A target virtual machine image file is created by making a copy of the retrieved virtual machine image file. A file size of the target virtual machine image file is increased. A partition size of a primary partition of the target virtual machine image file is increases. The target virtual machine image file is booted after the partition size of the primary partition thereof has been increased.Type: GrantFiled: March 1, 2012Date of Patent: June 9, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Trieu C. Chieu, David Cohn, Ajay Mohindra
-
Patent number: 9015164Abstract: A high availability system in a cloud computing environment includes a snapshot manager disposed in a mirror environment having at least one computer server and a plurality of virtual machines disposed in a production environment. Each of the plurality of virtual machines includes a snapshot agent configured to perform a method. The method includes periodically taking snapshots of the virtual machine associated with the snapshot agent, determining a delta image based on a change between a current snapshot and a previous snapshot, removing previous snapshots in the virtual machine and transmitting the delta image to the snapshot manager. The snapshot manager is configured to store a recovery image for each of the plurality of virtual machines and to merge the received delta image with the recovery image to update the recovery image.Type: GrantFiled: August 13, 2013Date of Patent: April 21, 2015Assignee: International Business Machines CorporationInventors: Hoi Y. Chan, Trieu C. Chieu
-
Patent number: 8983961Abstract: A high availability system in a cloud computing environment includes a snapshot manager disposed in a mirror environment having at least one computer server and a plurality of virtual machines disposed in a production environment. Each of the plurality of virtual machines includes a snapshot agent configured to perform a method. The method includes periodically taking snapshots of the virtual machine associated with the snapshot agent, determining a delta image based on a change between a current snapshot and a previous snapshot, removing previous snapshots in the virtual machine and transmitting the delta image to the snapshot manager. The snapshot manager is configured to store a recovery image for each of the plurality of virtual machines and to merge the received delta image with the recovery image to update the recovery image.Type: GrantFiled: November 29, 2012Date of Patent: March 17, 2015Assignee: International Business Machines CorporationInventors: Hoi Y. Chan, Trieu C. Chieu
-
Publication number: 20140149354Abstract: A high availability system in a cloud computing environment includes a snapshot manager disposed in a mirror environment having at least one computer server and a plurality of virtual machines disposed in a production environment. Each of the plurality of virtual machines includes a snapshot agent configured to perform a method. The method includes periodically taking snapshots of the virtual machine associated with the snapshot agent, determining a delta image based on a change between a current snapshot and a previous snapshot, removing previous snapshots in the virtual machine and transmitting the delta image to the snapshot manager. The snapshot manager is configured to store a recovery image for each of the plurality of virtual machines and to merge the received delta image with the recovery image to update the recovery image.Type: ApplicationFiled: August 13, 2013Publication date: May 29, 2014Applicant: International Business Machines CorporationInventors: Hoi Y. Chan, Trieu C. Chieu
-
Publication number: 20140149352Abstract: A high availability system in a cloud computing environment includes a snapshot manager disposed in a mirror environment having at least one computer server and a plurality of virtual machines disposed in a production environment. Each of the plurality of virtual machines includes a snapshot agent configured to perform a method. The method includes periodically taking snapshots of the virtual machine associated with the snapshot agent, determining a delta image based on a change between a current snapshot and a previous snapshot, removing previous snapshots in the virtual machine and transmitting the delta image to the snapshot manager. The snapshot manager is configured to store a recovery image for each of the plurality of virtual machines and to merge the received delta image with the recovery image to update the recovery image.Type: ApplicationFiled: November 29, 2012Publication date: May 29, 2014Applicant: International Business Machines CorporationInventors: Hoi Y. Chan, Trieu C. Chieu
-
Publication number: 20130332448Abstract: A correlation-based service mediator consists of Semantic Query Generator, Service Query Manager, Service Invocation Flow Generator, Service Invocation Manager, Expression Interpreter and Service Invocation Result Cache. The Semantic Query Generator converts service request to Semantic Query based on input/output parameters in the service request. The Service Query Manager interfaces with an Ontology Engine, passing query results to Service Invocation Flow Generator, which creates service invocation flow definition based on passed query results. The Service Invocation Manager executes flow definitions. It also manages a service invocation result cache, so that invocation results can be saved and reused for later service request. When the execution results are not available in cache, the Service Invocation Manager invokes service according to flow definition. When attribute dependent functions are invoked Expression Interpreter compute the execution results.Type: ApplicationFiled: July 26, 2013Publication date: December 12, 2013Applicant: International Business Machines CorporationInventors: Trieu C. Chieu, Hui Lei, Guo Tong Xie, Liangzhao Zeng
-
Patent number: 8560563Abstract: A correlation-based service mediator consists of Semantic Query Generator, Service Query Manager, Service Invocation Flow Generator, Service Invocation Manager, Expression Interpreter and Service Invocation Result Cache. The Semantic Query Generator handles service requests. It generates Semantic Query statements. Basically, the generator converts service request to Semantic Query based on input/output parameters in the service request. The Service Query Manager interfaces with an Ontology Engine, in order to execute the semantic queries. It will pass the query results to Service Invocation Flow Generator. The Service Invocation Flow Generator creates service invocation flow definition based on query results passed from Service Query Manager. The Service Invocation Manager executes the flow definitions. It also manages a service invocation result cache, so that invocation results can be saved and reused for later service request.Type: GrantFiled: July 9, 2008Date of Patent: October 15, 2013Assignee: International Business Machines CorporationInventors: Trieu C. Chieu, Hui Lei, Guo Tong Xie, Liangzhao Zeng
-
Publication number: 20130247136Abstract: A method, an apparatus and an article of manufacture for automated validation of compliance in a cloud server. The method includes remotely accessing a target cloud server to discover at least one configuration setting of the target cloud server, integrating the at least one configuration setting from the target cloud server with information from at least one back-end tool to produce compliance evidence, and automatically answering a set of at least one checklist question for activation compliance validation of the target cloud server based on the compliance evidence.Type: ApplicationFiled: March 14, 2012Publication date: September 19, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Trieu C. Chieu, Shantanu Dutta, Ashu Gupta, Angela McKay, Bob Prysock, Ratnasagar Ramaratnam, Anees A. Shaikh, Manas Singh, Chunqiang Tang, Mahesh Viswanathan
-
Publication number: 20130232484Abstract: A method for customizing virtual machines includes retrieving a virtual machine image file from a library of virtual machine image files. A target virtual machine image file is created by making a copy of the retrieved virtual machine image file. A file size of the target virtual machine image file is increased. A partition size of a primary partition of the target virtual machine image file is increases. The target virtual machine image file is booted after the partition size of the primary partition thereof has been increased.Type: ApplicationFiled: March 1, 2012Publication date: September 5, 2013Applicant: International Business Machines CorporationInventors: Trieu C. Chieu, David Cohn, Ajay Mohindra