Patents by Inventor Xiao LING

Xiao LING has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12293166
    Abstract: A method, system, and computer program product for improving debugging efficiency through fallibility skip functionality are provided. The method initiates a fallibility skip mode within a programming environment. The method identifies a code module to be translated from a first coding language to a second coding language. The code module including a function statement. A modified function statement is generated based on the function statement and the initiation of the fallibility skip mode. One or more exception handling functions are added based on the modified function statement and the fallibility skip mode. The method generates a modified code module in the second coding language based on the fallibility skip mode.
    Type: Grant
    Filed: January 19, 2022
    Date of Patent: May 6, 2025
    Assignee: International Business Machines Corporation
    Inventors: Lei Wang, Xiao Ling Chen, Zheng Lei An, Yan Huang, Dong Chen
  • Patent number: 12287825
    Abstract: Embodiments of the present invention provide computer-implemented methods, computer program product, and computer systems. One or more processors assign an identifier that specifies a number of resources and a category associated with a respective image layer of a plurality of image layers. One or more processors, in response to receiving a user request, identify image layers of the plurality of image layers that match the identifier based on dependencies between the plurality of image layers. One or more processors can retrieve matched layers based on the functionality of respective image layers and the dependencies of those respective image layers.
    Type: Grant
    Filed: December 27, 2023
    Date of Patent: April 29, 2025
    Assignee: International Business Machines Corporation
    Inventors: Hao Wu, Xiao Ling Chen, Si Yu Chen, Lu Yan Li, Min Cheng, Wen Qi Wq Ye, Xiao Xuan Fu
  • Publication number: 20250068446
    Abstract: Mechanisms are provided for collecting telemetry data from an observability tool of a container executing on a host computing system. The mechanisms configure a shared memory to implement a telemetry data buffer. The telemetry data buffer is shared by observability tool instances of a plurality of containers on one or more host computing systems. Observability tool instance(s) collect telemetry data from a corresponding container in the plurality of containers. The collected telemetry data is written to a record in the telemetry data buffer. A backend computing system accesses the records in the telemetry data buffer to apply analytics to the telemetry data.
    Type: Application
    Filed: August 23, 2023
    Publication date: February 27, 2025
    Inventors: Ming Ran Liu, Naijie Li, Bao Zhang, Yuan Zhai, Xiao Ling Chen
  • Patent number: 12222851
    Abstract: A computer-implemented method for a service mesh to simulate and address a situation in which there are several transactions among services with an asynchronous relationship between the services is provided. The computer-implemented method includes identifying that the situation occurs with a response provided to a user upon a user invocation of one of the services, analyzing the situation to determine that the asynchronous relationship between the services caused an error in at least one of the several transactions, recording data of a next user invocation of the one of the services, modifying the data of the next user invocation of the one of the services to correct the error and to thereby generate modified data, simulating an execution of the next user invocation of the service using the modified data and confirming that the modified data corrects the error based on results of the simulating.
    Type: Grant
    Filed: May 10, 2023
    Date of Patent: February 11, 2025
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yue Wang, Xinpeng Liu, Wei Wu, Peng Hui Jiang, Xiao Ling Chen
  • Patent number: 12189515
    Abstract: Examples described herein provide a computer-implemented method for identifying regression test failures that includes comparing a base code to a new code to locate an updated aspect of a program. The method further includes inserting debug code into corresponding source files for each of the base code and the new code for the updated aspect. The method further includes building a first image for the base code and a second image for the new code, the first and second images running in respective first and second containers. The method further includes comparing debugging outputs from a regression test of the respective first and second containers to identify a regression test failure. The method further includes implementing a corrective action to correct the regression test failure.
    Type: Grant
    Filed: January 18, 2022
    Date of Patent: January 7, 2025
    Assignee: International Business Machines Corporation
    Inventors: Xiao-Yu Li, Hua Wei Fan, Jiangang Deng, Hong Wei Sun, Xiao Ling Chen, Wen Ji Huang
  • Publication number: 20250004793
    Abstract: Converting shared libraries is provided. A shadow shared library is generated based on symbol information of each respective symbol of an original shared library. A symbol receiver that corresponds to the shadow shared library is generated. The symbol receiver corresponding to the shadow shared library and the original shared library are deployed as a microservice on a set of servers.
    Type: Application
    Filed: June 27, 2023
    Publication date: January 2, 2025
    Inventors: Heng Wang, Tao Guan, Zhan Peng Huo, Sandhya Venugopala, Xiao Ling Chen
  • Patent number: 12182559
    Abstract: Computer implemented method, systems, and computer program products include program code executing on a processor(s) obtain a first container comprising image layers, wherein the image layers include a base image layer and one or more image layers. The program code determines dependencies between the image layers. The program code obtains a request for an application where at least one image layer of the one or more image layers comprises features of the application. The program code identifies, based on the dependencies, at least one additional image layer related to the at least one image layer. The program code generates and deploys a second container, where image layers of the second container consist of the at least one image layer, the at least one additional image layer related to the at least one image layer, and the base layer.
    Type: Grant
    Filed: December 6, 2022
    Date of Patent: December 31, 2024
    Assignee: International Business Machines Corporation
    Inventors: Xiao Ling Chen, Si Yu Chen, Juliet Candee, Yan Fei Qin, Hao Wu, Wen Bin Han
  • Publication number: 20240430268
    Abstract: Secure container use is provided. The method generates respective user group permission identifications associated with image layer staging operations permissions assigned to different user groups as well as a list of the user group permission identifications. Responsive to a request from a user to perform an image layer staging operation, the method verifies whether the user has a user group permission identification in the list of the user group permission identifications. Responsive to verification that the user has a user group permission identification in the list of the user group permission identifications, the requested operation is executed. Responsive to determination that the user does not have a user group permission identification in the list of the user group permission identifications, the requested operation is denied.
    Type: Application
    Filed: June 22, 2023
    Publication date: December 26, 2024
    Inventors: Xiao Ling Chen, Si Yu Chen, Wen Ji Huang, Heng Wang, Yan Huang
  • Publication number: 20240419423
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: examining image layers of a container image and generating, in dependence on the examining, layer dependency relationship data that specifies layer dependency relationships of the container image; storing in a container repository the layer dependency relationship data that specifies layer dependency relationships of the container image; in response to receipt of a download request that specifies a targeted layer of the container image, analyzing relationship data of the layer dependency relationship data; in dependence on the analyzing, identifying a subset of image layers of the container image preceding the targeted layer; and establishing a deployment container image in dependence on the identified subset of image layers.
    Type: Application
    Filed: June 14, 2023
    Publication date: December 19, 2024
    Inventors: Si Yu CHEN, Xiao Ling Chen, Juliet CANDEE, Hao WU
  • Publication number: 20240411536
    Abstract: Techniques according to the present disclosure may include receiving, at a computer, a command for performing an action on a first image layer of a first container repository. A second container repository is determined which has a dependency on the first container repository, based on a dependency graph storing dependencies of a plurality of container repositories. The action is performed on the first image layer of the first container repository and a corresponding action on a second image layer of the second container repository based on the command.
    Type: Application
    Filed: June 9, 2023
    Publication date: December 12, 2024
    Inventors: Le Yue, Xiao Ling Chen, Si Yu Chen, Han Wen Zhu, Qing Yu Pei, Ming Lei Zhang
  • Publication number: 20240378140
    Abstract: A computer-implemented method for a service mesh to simulate and address a situation in which there are several transactions among services with an asynchronous relationship between the services is provided. The computer-implemented method includes identifying that the situation occurs with a response provided to a user upon a user invocation of one of the services, analyzing the situation to determine that the asynchronous relationship between the services caused an error in at least one of the several transactions, recording data of a next user invocation of the one of the services, modifying the data of the next user invocation of the one of the services to correct the error and to thereby generate modified data, simulating an execution of the next user invocation of the service using the modified data and confirming that the modified data corrects the error based on results of the simulating.
    Type: Application
    Filed: May 10, 2023
    Publication date: November 14, 2024
    Inventors: Yue Wang, Xinpeng Liu, Wei Wu, Peng Hui Jiang, Xiao Ling Chen
  • Publication number: 20240364696
    Abstract: An example operation may include one or more of storing access requirements of a containerized environment, identifying a plurality of types of users of the containerized environment based on the access requirements, identifying a plurality of different restriction priorities for the plurality of types of users within the containerized environment, respectively, based on the access requirements, dynamically generating an access policy that satisfies the plurality of different restriction priorities for the plurality of types of users within the containerized environment, and transforming the access policy into a plugin.
    Type: Application
    Filed: April 29, 2023
    Publication date: October 31, 2024
    Inventors: YAN HUANG, Zheng Lei An, Lei Wang, Shuang Shuang Jia, Heng Wang, Xiao Ling Chen, Wen Ya Zhou, Qing Yu Pei
  • Patent number: 12124870
    Abstract: A method, computer program product, and computer system for implementing tasks on managed nodes. A specified task to be performed by an Ansible module on one or more managed nodes of two or more managed nodes is received. The one or more managed nodes are determined based on an attribute value of a hostDecision attribute of the Ansible module. The attribute value may be primaryNode, allNodes, or Dynamic, where: primary Node requires the one or more managed nodes to be a primary node, allNodes requires the one or more managed nodes to be the two or more managed nodes, and Dynamic requires the one or more managed nodes to be determined dynamically based on runtime information. The Ansible module is sent to the one or more managed nodes to perform the task on the one or more managed nodes.
    Type: Grant
    Filed: September 30, 2021
    Date of Patent: October 22, 2024
    Assignee: International Business Machines Corporation
    Inventors: Xiao Zhen Zhu, Xiao Ling Chen, Yang Cao, Yun Juan Yang
  • Publication number: 20240330152
    Abstract: A method, system, and computer program product are configured to: create a link tracing data structure in response to receiving a request from a user interface (UI), wherein the link tracing data structure includes a synchronization identifier and information about user actions in the UI; handle the request by calling plural microservices; add respective synchronization content for each one of the plural microservices to the link tracing data structure, wherein the respective synchronization content for a respective one of the plural microservices comprises: the synchronization identifier; a respective step identifier that identifies the respective one of the plural microservices; and a respective synchronization message that describes an execution status of the respective one of the plural microservices; store the link tracing data structure; and provide the link tracing data structure to a requesting user.
    Type: Application
    Filed: March 30, 2023
    Publication date: October 3, 2024
    Inventors: Jin Jin YANG, Chun Li JIA, Xiao Ling CHEN, Qian Xia SONG, Ai Ping FENG, Kui ZHANG
  • Publication number: 20240311172
    Abstract: Managing execution of eBPF program capabilities is provided. A comparison of a currently in use helper-id list with an allowable helper-id list of an eBPF program is performed. It is determined whether a set of unallowable helper-ids exists that is included in the currently in use helper-id list but not in the allowable helper-id list based on the comparison. A blocked helper-id list of the eBPF program that includes the set of unallowable helper-ids and a corresponding unallowable capability of each respective unallowable helper-id is generated in response to determining that the set of unallowable helper-ids does exist. The set of unallowable helper-ids and the corresponding unallowable capability of each respective unallowable helper-id is removed from bytecode of the eBPF program in order to have only allowable helper-ids remain in the bytecode along with corresponding allowable capabilities of the eBPF program.
    Type: Application
    Filed: March 17, 2023
    Publication date: September 19, 2024
    Inventors: Xiaojing Liu, Qi Feng Huo, Qi Li, Yong Quan Tian, Xiao Ling Chen
  • Patent number: 12074760
    Abstract: Embodiments relate to methods, systems, and computer program products for path management in a processing system. In a method, in response to receiving a request for adding a target controlling unit into a processing system, a plurality of network nodes in the processing system are divided into a group of subnets based on a topology of the plurality of network nodes, the plurality of network nodes being connected to at least one controlling unit in the processing system. A workload estimation is determined, the workload estimation representing a workload to be caused by the target controlling unit to the processing system. A target subnet is selected from the group of subnets for connecting the target controlling unit into the processing system based on the workload estimation. With these embodiments, the target subnet may be selected in an automatic way such that the performance of the processing system may be increased.
    Type: Grant
    Filed: September 16, 2021
    Date of Patent: August 27, 2024
    Assignee: International Business Machines Corporation
    Inventors: Yan Huang, Heng Wang, Kai Feng, Zheng Lei An, Shuang Shuang Jia, Xiao Ling Chen, Guang Han Sui, Lei Wang
  • Patent number: 12020043
    Abstract: Embodiments of the invention include a computer-implemented method that includes accessing, using a processor, a loader library; using the processor to generate a mock library comprising a mock version of the loader library; using the processor to containerize the loader library; and using the processor to unload the loader library.
    Type: Grant
    Filed: September 22, 2021
    Date of Patent: June 25, 2024
    Assignee: International Business Machines Corporation
    Inventors: Heng Wang, Wan Yue Chen, Zhen Chen, Wen Ji Huang, Xiao Ling Chen, Dong Chen
  • Publication number: 20240202036
    Abstract: Unloading shared resources is described. A shared library correlation table (SLCT) is generated in a mock resource. During a close function, selecting an entry in the SLCT is selected for reducing a reference count of the selected entry in the SLCT, a status of the selected entry based on the reference count is verified, and an associated container of the selected entry is removed from memory when the status of the selected entry indicates the associated container is not a shared resource, thereby avoiding segmentation faults.
    Type: Application
    Filed: December 15, 2022
    Publication date: June 20, 2024
    Inventors: Heng WANG, Xiao Ling CHEN, Yan HUANG, Xin Peng LIU, Zi Yun KANG
  • Publication number: 20240204986
    Abstract: Data protection using portable data structures includes packaging ciphertext blocks into portable data structures, the ciphertext blocks being produced based on encryption of plaintext blocks according to a block encryption mode that includes dependencies between cryptographic processing of the plaintext blocks, the dependencies including decryption of a first ciphertext block being dependent on a second ciphertext block or decryption processing of the second ciphertext block, the packaging including providing, for each ciphertext block that has a dependency on another ciphertext block, an associated dependency label in the portable data structure in which the ciphertext block is packaged, and distributing the portable data structures to nodes such that portable data structures, of the portable data structures, that package ciphertext blocks between which at least one dependency exists are distributed to different nodes of the nodes.
    Type: Application
    Filed: December 16, 2022
    Publication date: June 20, 2024
    Inventors: Heng Wang, Ming Zhe Jiang, Jun Long Xiang, Jian Guo Liu, Qi Ye, Xiao Ling Chen
  • Publication number: 20240184558
    Abstract: Computer implemented method, systems, and computer program products include program code executing on a processor(s) obtain a first container comprising image layers, wherein the image layers include a base image layer and one or more image layers. The program code determines dependencies between the image layers. The program code obtains a request for an application where at least one image layer of the one or more image layers comprises features of the application. The program code identifies, based on the dependencies, at least one additional image layer related to the at least one image layer. The program code generates and deploys a second container, where image layers of the second container consist of the at least one image layer, the at least one additional image layer related to the at least one image layer, and the base layer.
    Type: Application
    Filed: December 6, 2022
    Publication date: June 6, 2024
    Inventors: Xiao Ling CHEN, Si Yu CHEN, Juliet CANDEE, Yan Fei QIN, Hao WU, Wen Bin HAN