Patents by Inventor Xiao Xi Liu
Xiao Xi Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190377807Abstract: Embodiments generally relate transforming data for a target schema. In some embodiments, a method includes receiving input data, where the input data includes a plurality of segments, and where the segments include a plurality of source fields containing target data. The method further includes characterizing the input data based at least in part on a plurality of predetermined metrics, where the predetermined metrics determine a structure of the input data. The method further includes mapping the target data in the source fields of the segments to a plurality of target fields of a target schema based at least in part on the characterizing. The method further includes populating the target fields of the target schema with the target data from the source fields based at least in part on the mapping.Type: ApplicationFiled: June 11, 2018Publication date: December 12, 2019Inventors: Daniel DEAN, Checed A. RODGERS, Dingcheng LI, Pei Ni LIU, Xiao Xi LIU, Hui LEI, Yu GU, Jing Min XU, Yaoping RUAN
-
Patent number: 10447560Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: GrantFiled: June 26, 2017Date of Patent: October 15, 2019Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: He Yuan Huang, Xiao Xi Liu, Qi Hu, Guan Qun Zhang
-
Publication number: 20190258942Abstract: Performing an operation comprising transforming an input dataset to a predefined format, extracting, from the transformed dataset, a plurality of features describing the transformed dataset, and generating, by a machine learning (ML) algorithm executing on a processor and based on an ML model, a plurality of rules for modifying the transformed dataset to conform with a first data model.Type: ApplicationFiled: February 21, 2018Publication date: August 22, 2019Inventors: Yu GU, Dingcheng LIL, Pei Ni LIU, Xiao Xi LIU, Daniel DEAN, Yaoping RUAN, Jing Min XU
-
Publication number: 20180364985Abstract: A service running on a server for developing software collaboratively. The service includes accessing at least one repository of code for software applications. A code tree structure is extracted from the repository which represents a plurality of preexisting pipeline requirements to be used with a tree kernel similarity algorithm. At least one development repository of code is accessed. A code tree structure is extracted from the development repository of code which represents a new pipeline requirement to be used with a tree kernel similarity algorithm. A tree kernel similarity algorithm is used that includes a specified similarity function to create feature map between the new pipeline requirements with the preexisting pipeline requirements. One or more features of the new pipe line requirements are clustered. Different requirements are extracted to different definitions based upon the features that have been clustered. A preexisting pipeline requirement is selected for a highest similarity.Type: ApplicationFiled: June 14, 2017Publication date: December 20, 2018Inventors: Xiao Xi LIU, Jing Min XU, Yuan WANG, Jian Ming ZHANG
-
Patent number: 10067692Abstract: The present invention discloses a method and apparatus. The method comprises: a method for backing up an application, the application running across multiple virtual machines, the method comprising: in response to a need of backing up the application, executing a first set of scripts that are used for, prior to the backup, coordinating the multiple virtual machines to enter into a preparation state; in response to the first set of scripts being executed completely, triggering a backup operation of at least one backup agent that manages the multiple virtual machines, the backup operation comprising the backup agent locating data related to the application on the respective virtual machines managed thereby; in response to completion of the backup operation, executing a second set of scripts that are used for restoring running of the multiple virtual machines.Type: GrantFiled: April 11, 2014Date of Patent: September 4, 2018Assignee: International Business Machines CorporationInventors: Xiao Xi Liu, Yuan Wang, Jing Min Xu, Jian Ming Zhang
-
Publication number: 20180006909Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: ApplicationFiled: June 26, 2017Publication date: January 4, 2018Inventors: HE YUAN HUANG, XIAO XI LIU, QI HU, GUAN QUN ZHANG
-
Patent number: 9705759Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: GrantFiled: February 23, 2012Date of Patent: July 11, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: He Yuan Huang, Xiao Xi Liu, Qi Hu, Guan Qun Zhang
-
Patent number: 9576125Abstract: A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties.Type: GrantFiled: August 13, 2015Date of Patent: February 21, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: He Yuan Huang, Liu Jian, Min Li, Xiao Xi Liu
-
Publication number: 20160202923Abstract: The present invention discloses a method and apparatus. The method comprises: a method for backing up an application, the application running across multiple virtual machines, the method comprising: in response to a need of backing up the application, executing a first set of scripts that are used for, prior to the backup, coordinating the multiple virtual machines to enter into a preparation state; in response to the first set of scripts being executed completely, triggering a backup operation of at least one backup agent that manages the multiple virtual machines, the backup operation comprising the backup agent locating data related to the application on the respective virtual machines managed thereby; in response to completion of the backup operation, executing a second set of scripts that are used for restoring running of the multiple virtual machines.Type: ApplicationFiled: April 11, 2014Publication date: July 14, 2016Inventors: Xiao Xi Liu, Yuan Wang, Jing Min Xu, Jian Ming Zhang
-
Publication number: 20150378849Abstract: A method for backing up or restoring a virtual machine is provided. The backup method includes creating a virtual machine having a first and a second union file system directory. The first directory read only stores a virtual machine base operating system file. The second directory is readable and writable and stores modifications to the base operating system file, and new files generated during running of the virtual machine. The virtual machine preferentially reads and writes the second directory. When a request to back up the virtual machine is received, the data in the second directory is backed up. The restore method includes preparing a virtual machine for restoring data. When a request to restore the virtual machine is received, the backup data of the second directory is obtained and restored to the second directory of the prepared virtual machine.Type: ApplicationFiled: June 12, 2015Publication date: December 31, 2015Inventors: Xiao Xi Liu, Jian Qiu, Yuan Wang, Jian Ming Zhang
-
Publication number: 20150347742Abstract: A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties.Type: ApplicationFiled: August 13, 2015Publication date: December 3, 2015Inventors: He Yuan Huang, Liu Jian, Min Li, Xiao Xi Liu
-
Patent number: 9122863Abstract: A method and apparatus for configuring identity federation configuration. The method includes: acquiring a set of identity federation configuration properties of a first computing system and a set of identity federation configuration properties of a second computing system; identifying one or more pairs of associated properties in the first and the second sets, where the pairs of associated properties include one property from each set of identity federation configuration; displaying, properties that need to be configured manually from the each sets of identity federation configuration properties, where the properties that need to be configured manually do not include the property in any pair of associated properties for which the value can be derived from the value of another property in the pair; automatically assigning a property that can be derived from the value of another property; and providing each computing systems with each set of identity federation properties.Type: GrantFiled: December 19, 2012Date of Patent: September 1, 2015Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: He Yuan Huang, Liu Jian, Min Li, Xiao Xi Liu
-
Patent number: 8543813Abstract: Computer-implemented methods and apparatus to perform a valid transfer of an electronic mobile ticket on a mobile device by a ticketing application system of a ticket processing center. One method includes: receiving a first electronic message from a first user, where the first message includes an encrypted electronic mobile ticket and a mobile device number of a second user, and where the electronic mobile ticket is encrypted with a key shared between the first user and the ticketing application system; decrypting the encrypted electronic mobile ticket; generating an electronic mobile ticket encrypted with a key shared by the ticketing application system and the second user; and transmitting a second electronic message that includes the electronic mobile ticket encrypted with the key shared between the ticketing application system and the second user to a mobile device of the second user.Type: GrantFiled: September 29, 2010Date of Patent: September 24, 2013Assignee: International Business Machines CorporationInventors: Chen Hua Feng, He Yuan Huang, Xiao Xi Liu, Bin Wang
-
Publication number: 20120222110Abstract: A computer-implemented method for data leakage protection is disclosed. A monitoring template corresponding to the cloud application is selected based upon communication between a user and a cloud application and from a plurality of monitoring templates. A monitor is generated using the selected monitoring template. Identifying information of content shared between the user and the cloud application is obtained using the generated monitor. Data about the shared content for security analysis is obtained according to the identifying information of the shared content.Type: ApplicationFiled: February 23, 2012Publication date: August 30, 2012Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: HE YUAN HUANG, XIAO XI LIU, QI HU, GUAN QUN ZHANG
-
Patent number: 8077853Abstract: A VoIP adapter for POTS a phone comprises: a POTS phone connector, an IP network interface, two sets of signaling senders, signaling receivers, media senders and media receivers for the POTS phone and the IP network respectively, and a controller for controlling the operations of above components. The VoIP adapter enables the user to carry out VoIP communications using a normal POTS phone and further enables use of advanced VoIP functions via the normal POTS phone, such as Call Hold, Call Transfer, Ad Hoc Conference, etc.Type: GrantFiled: October 12, 2005Date of Patent: December 13, 2011Assignee: International Business Machines CorporationInventors: Xiao Xi Liu, Wei Lu, Qing Bo Wang, Bo Yang, Chun Ying
-
Patent number: 8065317Abstract: Provides a service providing device and method enabling a user to accept the service by utilizing the capabilities of several various devices. At least one physical device is selected for the user based on the service requirement. The user accepts the service via the selected physical device or devices. The invention “hides” the physical devices by using a virtual device to provide the service for users. Furthermore, the invention provides a “tailored” virtual device based on the environment around the user, the favorite of user and the requirements of the service, and may provide to the user the “tailored” information suitable for the user. The operating environment of the virtual device according to the invention is dynamically changeable according to the environment around the user, the favorite of user and the requirements of the service. Thus, a seamless service may be provided to the user.Type: GrantFiled: December 15, 2003Date of Patent: November 22, 2011Assignee: International Business Machines CorporationInventors: Hao Wang, Shih-Gong Li, Li Wei, Song Song, Chun Ying, Xiao Xi Liu, Yao Fu Rong
-
Publication number: 20110214076Abstract: An apparatus and method which enable re-developers to perform complicated user interface development in a simple manner by setting extensible elements and loading thereto add-on application programs. In the apparatus and method of the invention, one or more extensible elements are set in a host user interface application. Then, one or more add-on user interface applications are loaded to one or more of the set extensible elements. The apparatus and method according to the invention can adjust the user interface dynamically, in real-time and finely without the need to close and reboot the application program.Type: ApplicationFiled: February 25, 2011Publication date: September 1, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Jie Cui, Xiao Xi Liu, Bin Wang, Jing Min Xu
-
Publication number: 20110078440Abstract: Computer-implemented methods and apparatus to perform a valid transfer of an electronic mobile ticket on a mobile device by a ticketing application system of a ticket processing center. One method includes: receiving a first electronic message from a first user, where the first message includes an encrypted electronic mobile ticket and a mobile device number of a second user, and where the electronic mobile ticket is encrypted with a key shared between the first user and the ticketing application system; decrypting the encrypted electronic mobile ticket; generating an electronic mobile ticket encrypted with a key shared by the ticketing application system and the second user; and transmitting a second electronic message that includes the electronic mobile ticket encrypted with the key shared between the ticketing application system and the second user to a mobile device of the second user.Type: ApplicationFiled: September 29, 2010Publication date: March 31, 2011Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Chen Hua Feng, He Yuan Huang, Xiao Xi Liu, Bin Wang
-
Publication number: 20090122785Abstract: A VoIP adapter for POTS a phone comprises: a POTS phone connector, an IP network interface, two sets of signaling senders, signaling receivers, media senders and media receivers for the POTS phone and the IP network respectively, and a controller for controlling the operations of above components. The VoIP adapter enables the user to carry out VoIP communications using a normal POTS phone and further enables use of advanced VoIP functions via the normal POTS phone, such as Call Hold, Call Transfer, Ad Hoc Conference, etc.Type: ApplicationFiled: October 12, 2005Publication date: May 14, 2009Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xiao Xi Liu, Wei Lu, Qing Bo Wang, Bo Yang, Chun Ying
-
Patent number: RE44534Abstract: Disclosed are techniques for effective wireless device access and management via device capability integration. A method for constructing a machine using a plurality of devices selected from a group of devices, wherein each device in the group is configurable for providing short-range wireless communication, includes the steps of: starting an application template in response to an instruction from a user; analyzing the template to determine one or more capabilities required for the machine; searching in the group for devices substantially matching at least one of the capabilities; and integrating the matching devices into the machine.Type: GrantFiled: January 30, 2008Date of Patent: October 8, 2013Assignee: Wistron CorporationInventors: Wei Li, Rong Yao Fu, Jun Shen, Xiao Xi Liu, Song Song