Patents by Inventor Xiao Yi Tian

Xiao Yi Tian has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11943221
    Abstract: Aspects of the invention include systems and methods configured to prevent masquerading service attacks. A non-limiting example computer-implemented method includes sending, from a first server in a cloud environment, a communication request comprising an application programming interface (API) key and a first server identifier to an identity and access management (IAM) server of the cloud environment. The API key can be uniquely assigned by the IAM server to a first component of the first server. The first server receives a credential that includes a token for the first component and sends the credential to a second server. The second server sends the credential, a second server identifier, and an identifier for a second component of the second server to the IAM server. The second server receives an acknowledgment from the IAM server and sends the acknowledgment to the first server.
    Type: Grant
    Filed: August 25, 2021
    Date of Patent: March 26, 2024
    Assignee: International Business Machines Corporation
    Inventors: Sen Wang, Mei Liu, Si Bo Niu, Wen Yi Gao, Zong Xiong Z X Wang, Guoxiang Zhang, Xiao Yi Tian, Xian Wei Zhang
  • Patent number: 11842038
    Abstract: A method for sharing hidden information in a virtual meeting is disclosed. In one embodiment, such a method includes sharing, by way of a web-conference server, a source window presented on a source system with a target window presented on a target system. The method detects selection of a specific area on the target window and correlates the specific area on the target window with a corresponding area on the source window. The method determines whether the corresponding area on the source window links to hidden information, such as a hyperlink, on the source window. If the corresponding area links to hidden information, the method communicates one or more of the hidden information and a link to the hidden information to the target system. A corresponding system and computer program product are also disclosed.
    Type: Grant
    Filed: December 31, 2022
    Date of Patent: December 12, 2023
    Assignee: International Business Machines Corporation
    Inventors: Jing Wen Chen, Zhao Yu Wang, Peng Hui Jiang, Xiao Yi Tian, Jing Ren, Yi Jie Ma, Xizhuo Zhang, Jing Zhang
  • Patent number: 11687560
    Abstract: Methods, computer program products, and/or systems are provided that perform the following operations: in a data replication environment, analyzing a database workload to generate a knowledge base of information related to compression; dividing a transfer data stream into different segments based, at least in part, on the knowledge base; obtaining candidate compression types for the transfer data stream based, at least in part, on the knowledge base; assigning respective compression types of the candidate compression types to the different segments; generating compressed segments based, at least in part, on the respective compression types assigned to the different segments; and providing the compressed segments to a replication target.
    Type: Grant
    Filed: July 16, 2021
    Date of Patent: June 27, 2023
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Xiao Yi Tian, Di Li Hu, XiangXing Shi, Xian Wei Zhang
  • Publication number: 20230069596
    Abstract: Aspects of the invention include systems and methods configured to prevent masquerading service attacks. A non-limiting example computer-implemented method includes sending, from a first server in a cloud environment, a communication request comprising an application programming interface (API) key and a first server identifier to an identity and access management (IAM) server of the cloud environment. The API key can be uniquely assigned by the IAM server to a first component of the first server. The first server receives a credential that includes a token for the first component and sends the credential to a second server. The second server sends the credential, a second server identifier, and an identifier for a second component of the second server to the IAM server. The second server receives an acknowledgment from the IAM server and sends the acknowledgment to the first server.
    Type: Application
    Filed: August 25, 2021
    Publication date: March 2, 2023
    Inventors: Sen Wang, Mei Liu, Si Bo Niu, WEN YI GAO, Zong Xiong ZX Wang, Guoxiang Zhang, Xiao Yi Tian, XIAN WEI ZHANG
  • Publication number: 20230022619
    Abstract: Methods, computer program products, and/or systems are provided that perform the following operations: in a data replication environment, analyzing a database workload to generate a knowledge base of information related to compression; dividing a transfer data stream into different segments based, at least in part, on the knowledge base; obtaining candidate compression types for the transfer data stream based, at least in part, on the knowledge base; assigning respective compression types of the candidate compression types to the different segments; generating compressed segments based, at least in part, on the respective compression types assigned to the different segments; and providing the compressed segments to a replication target.
    Type: Application
    Filed: July 16, 2021
    Publication date: January 26, 2023
    Inventors: Peng Hui Jiang, Xiao Yi Tian, Di Li Hu, XiangXing Shi, Xian Wei Zhang
  • Patent number: 11550818
    Abstract: In an approach to improve asynchronous replication in database clusters embodiments retain committed transactions during database cluster replication. Embodiments build and run asynchronous replication logic using database nodes running as one or more standalone nodes, wherein the asynchronous replication logic is responsible for data replication from a primary database node to one or more secondary database nodes. Embodiments register a replication reader to a sender node to replicate journal logs and replay the journal logs on the one or more secondary database nodes. Further, embodiments monitor replication lag metrics from the sender node and notify a replication source and a replication target of a generated replication plan, wherein the cluster controller instructs the replication source and the replication target to be ready to initiate the replication plan. Additionally, embodiments adjust a replication plan to allow the asynchronous replication logic to catch up and complete uncommitted transactions.
    Type: Grant
    Filed: March 11, 2021
    Date of Patent: January 10, 2023
    Assignee: International Business Machines Corporation
    Inventors: Xiao Yi Tian, Guoxiang Zhang, Xian Wei Zhang, XiangXing Shi, Peng Hui Jiang, Zhang Li
  • Publication number: 20220292112
    Abstract: In an approach to improve asynchronous replication in database clusters embodiments retain committed transactions during database cluster replication. Embodiments build and run asynchronous replication logic using database nodes running as one or more standalone nodes, wherein the asynchronous replication logic is responsible for data replication from a primary database node to one or more secondary database nodes. Embodiments register a replication reader to a sender node to replicate journal logs and replay the journal logs on the one or more secondary database nodes. Further, embodiments monitor replication lag metrics from the sender node and notify a replication source and a replication target of a generated replication plan, wherein the cluster controller instructs the replication source and the replication target to be ready to initiate the replication plan. Additionally, embodiments adjust a replication plan to allow the asynchronous replication logic to catch up and complete uncommitted transactions.
    Type: Application
    Filed: March 11, 2021
    Publication date: September 15, 2022
    Inventors: Xiao Yi Tian, Guoxiang Zhang, XIAN WEI ZHANG, XiangXing Shi, Peng Hui Jiang, Zhang Li
  • Patent number: 11265229
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.
    Type: Grant
    Filed: November 18, 2019
    Date of Patent: March 1, 2022
    Assignee: Kyndryl, Inc.
    Inventors: Trieu C. Chieu, Ashu Gupta, Manas R. K. Singh, Xiao Yi Tian
  • Publication number: 20200092179
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.
    Type: Application
    Filed: November 18, 2019
    Publication date: March 19, 2020
    Inventors: Trieu C. Chieu, Ashu Gupta, Manas R.K. Singh, Xiao Yi Tian
  • Patent number: 10560347
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.
    Type: Grant
    Filed: July 13, 2015
    Date of Patent: February 11, 2020
    Assignee: International Business Machines Corporation
    Inventors: Trieu C. Chieu, Ashu Gupta, Manas R. K. Singh, Xiao Yi Tian
  • Publication number: 20170019314
    Abstract: Aspects of the present invention disclose a method, computer program product, and system for validation of services. The method includes one or more processors receiving a request of a service. The method further includes one or more processors parsing the received request of the service to identify information included in the received request of the service. The method further includes one or more processors generating a checklist that corresponds to the received request of the service based on the identified information, wherein the generated checklist includes configuration and security checks that are associated with the received request of the service. The method further includes one or more processors determining a validation result utilizing the generated checklist, wherein the validation result indicates whether the requested service is deployed on a corresponding endpoint according to the configuration and security checks in the generated checklist.
    Type: Application
    Filed: July 13, 2015
    Publication date: January 19, 2017
    Inventors: Trieu C. Chieu, Ashu Gupta, Manas R.K. Singh, Xiao Yi Tian