Patents by Inventor Xiao Yan Tian

Xiao Yan Tian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240232191
    Abstract: An example operation may include one or more of storing an index that comprises identifiers of role-based access privileges for a plurality of users with respect to a database, receiving a database query associated with a user from a software program, identifying data records within the database that the user has permission to access based on database accessibility rights of the user stored within the index, prior to execution of the database query, loading the identified data records into the memory and filtering out other data records from the database which the user does not have permission to access, and executing the database query on the identified data records loaded from the database and returning query results from the execution to the software program.
    Type: Application
    Filed: October 21, 2022
    Publication date: July 11, 2024
    Inventors: Jia Tian Zhong, Peng Hui Jiang, Ming Lei Zhang, Ting Ting Zhan, Le Chang, Zhen Liu, Xiao Yan Tian
  • Publication number: 20240134852
    Abstract: An example operation may include one or more of storing an index that comprises identifiers of role-based access privileges for a plurality of users with respect to a database, receiving a database query associated with a user from a software program, identifying data records within the database that the user has permission to access based on database accessibility rights of the user stored within the index, prior to execution of the database query, loading the identified data records into the memory and filtering out other data records from the database which the user does not have permission to access, and executing the database query on the identified data records loaded from the database and returning query results from the execution to the software program.
    Type: Application
    Filed: October 20, 2022
    Publication date: April 25, 2024
    Inventors: Jia Tian Zhong, Peng Hui Jiang, Ming Lei Zhang, Ting Ting Zhan, Le Chang, Zhen Liu, Xiao Yan Tian
  • Patent number: 11748236
    Abstract: Examples described herein provide a computer-implemented method for multi-user debugging of a program. The method includes receiving a first request from a first developer to initiate a debug of the program and receiving a second request from a second developer to initiate the debug of the program. The method further includes, responsive to receiving the first request and the second request, initiating the debug of the program. The method further includes sending first source code for the program to the first developer, wherein the first source code is associated with the first developer. The method further includes sending second source code for the program to the second developer, wherein the second source code is associated with the second developer. The method further includes updating the program responsive to receiving a change to at least one of the first source code or the second source code.
    Type: Grant
    Filed: September 7, 2021
    Date of Patent: September 5, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Zhen Liu, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
  • Patent number: 11645045
    Abstract: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.
    Type: Grant
    Filed: February 7, 2022
    Date of Patent: May 9, 2023
    Assignee: International Business Machines Corporation
    Inventors: Zhen Liu, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
  • Publication number: 20230071020
    Abstract: Examples described herein provide a computer-implemented method for multi-user debugging of a program. The method includes receiving a first request from a first developer to initiate a debug of the program and receiving a second request from a second developer to initiate the debug of the program. The method further includes, responsive to receiving the first request and the second request, initiating the debug of the program. The method further includes sending first source code for the program to the first developer, wherein the first source code is associated with the first developer. The method further includes sending second source code for the program to the second developer, wherein the second source code is associated with the second developer. The method further includes updating the program responsive to receiving a change to at least one of the first source code or the second source code.
    Type: Application
    Filed: September 7, 2021
    Publication date: March 9, 2023
    Inventors: Zhen Liu, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
  • Patent number: 11392473
    Abstract: Provided is a method for determining data storage is insufficient for a program. A processor may receive a set of marked data associated with a set of source code. The processor may identify a scope of the code associated with the marked data. The processor may generate a first set of instructions for taking a first snapshot of a variable storage space associated with the marked data when entering the scope and a second snapshot of the variable storage space when exiting the scope. The processor may generate a second set of instructions for comparing the first and second snapshots to determine a usage amount of the variable storage. The processor may generate a third set of instructions for performing an action in response to the usage amount of the variable storage space exceeding a threshold. The processor may compile the code into an executable.
    Type: Grant
    Filed: December 10, 2020
    Date of Patent: July 19, 2022
    Assignee: International Business Machines Corporation
    Inventors: Zhen Liu, Ming Lei Zhang, Jia Tian Zhong, Le Chang, Ting Ting Zhan, Xiao Yan Tian
  • Publication number: 20220188206
    Abstract: Provided is a method for determining data storage is insufficient for a program. A processor may receive a set of marked data associated with a set of source code. The processor may identify a scope of the code associated with the marked data. The processor may generate a first set of instructions for taking a first snapshot of a variable storage space associated with the marked data when entering the scope and a second snapshot of the variable storage space when exiting the scope. The processor may generate a second set of instructions for comparing the first and second snapshots to determine a usage amount of the variable storage. The processor may generate a third set of instructions for performing an action in response to the usage amount of the variable storage space exceeding a threshold. The processor may compile the code into an executable.
    Type: Application
    Filed: December 10, 2020
    Publication date: June 16, 2022
    Inventors: Zhen Liu, Ming Lei Zhang, Jia Tian Zhong, Le Chang, Ting Ting Zhan, Xiao Yan Tian
  • Publication number: 20220179623
    Abstract: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.
    Type: Application
    Filed: February 7, 2022
    Publication date: June 9, 2022
    Inventors: ZHEN LIU, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian
  • Patent number: 11288041
    Abstract: Source code of a golden version and a next version of a program is received in which procedure calls are modified to call from an entry point table (EPT) with index numbers corresponding to procedure memory addresses. An executable defect-free golden version program and next version program with a defect are received. A first entry point table (first EPT) for the new version program and a second EPT for the golden version program are generated. A series of substitutions of procedures from the second EPT to the first EPT is performed and an order of substitutions includes: a module set, a module of the module set, a procedure set of the module, and a procedure of the procedure set. The defect producing procedure is identified by substituting in order until the defect is absent and proceeding to the next substitution in order.
    Type: Grant
    Filed: December 3, 2020
    Date of Patent: March 29, 2022
    Assignee: International Business Machines Corporation
    Inventors: Zhen Liu, Jia Tian Zhong, Le Chang, Ming Lei Zhang, Ting Ting Zhan, Xiao Yan Tian