Patents by Inventor Xin Peng Liu

Xin Peng Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11953972
    Abstract: Selective privileged container augmentation is provided. A target group of edge devices is selected from a plurality of edge devices to run a plurality of child tasks comprising a pending task by mapping edge device tag attributes of the plurality of edge devices to child task tag attributes of the plurality of child tasks. A privileged container corresponding to the pending task is installed in each edge device of the target group to monitor execution of a child task by a given edge device of the target group. A privileged container installation tag that corresponds to the privileged container is added to an edge device tag attribute of each edge device of the target group having the privileged container installed. A child task of the plurality of child tasks comprising the pending task is sent to a selected edge device in the target group to run the child task.
    Type: Grant
    Filed: April 6, 2022
    Date of Patent: April 9, 2024
    Assignee: International Business Machines Corporation
    Inventors: Yue Wang, Xin Peng Liu, Wei Wu, Liang Wang, Biao Chai
  • Publication number: 20240111550
    Abstract: A computer-implemented process is disclosed. An application is loaded into a local address space. A request by the application to load a target shared library is intercepted by an interceptor. Using the interceptor and based upon the request being intercepted, a shared library correlation table is searched for a loading count and a loading policy associated with the target shared library. Based upon the loading count and the loading policy, a selection is made between loading the target shared library as a shared library container, and loading the target shared library into the local address space. The target shared library is loaded based upon the selecting. The loading count represents a number of times the target shared library was loaded, and the loading policy indicates how the target shared library is to be loaded.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Inventors: Heng Wang, Xiao Ling Chen, Xin Peng Liu, Tao Guan, Wei Wu
  • Publication number: 20240095072
    Abstract: A method includes, in response to receiving an incoming service request and establishing a call chain of pods of a service mesh network, setting a retry locker parameter to a locked state for each pod in the call chain. A locked retry locker parameter prevents the pod from initiating retries of a service request. The method includes, in response to determining that a pod in the call chain is unavailable, setting the retry locker parameter to an unlocked state for a previous pod just prior to the pod that is unavailable. The unlocked state allows a retry to the pod that is unavailable. In response to the previous pod reaching a retry limit, the method includes setting the retry locker parameter to unlocked for each pod in the call chain and sending a service termination message to a service requester.
    Type: Application
    Filed: September 21, 2022
    Publication date: March 21, 2024
    Inventors: Yue Wang, Wei Wu, Xin Peng Liu, Liang Wang, Biao Chai
  • Patent number: 11907176
    Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: receiving a request for a lock on a page from a virtual database amongst two or more virtual databases, the virtual database including a number of containers respectively corresponding to the same number of database components of the virtual database. A copy of the page is refreshed with a latest copy of the page in an overall cache prior to granting the lock based on ascertaining that the page is not locked by any other virtual database. The virtual database is granted with the lock and have an exclusive access to the page.
    Type: Grant
    Filed: May 10, 2019
    Date of Patent: February 20, 2024
    Assignee: International Business Machines Corporation
    Inventors: Xin Peng Liu, ShengYan Sun, Shuo Li, Xiaobo Wang
  • Publication number: 20240015213
    Abstract: A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations. The operations may include registering a custom resource definition for a tenant with a host and scaling a controller for the customer resource definition. The operations may include generating a replication using the customer resource definition, injecting information into the replication, and syncing a status of the custom resource definition between the host and the tenant.
    Type: Application
    Filed: July 6, 2022
    Publication date: January 11, 2024
    Inventors: Peng Li, Guangya Liu, Xun Pan, Hai Hui Wang, Xiang Zhen Gan, Xin Peng Liu
  • Patent number: 11860939
    Abstract: Embodiments of the disclosure provide methods, systems, computer program products for manipulating a table with an XML column in database. According to the method, a SQL statement for a table is received first, wherein the table comprises an XML column which is a representation of a plurality of logical columns of the table, there is at least one XML element in at least one row and in the XML column of the table, and each of the at least one XML element corresponds to a non-null value in a specific row and in a logical column of the plurality of logical columns of the table. Then the SQL statement is parsed. And then the SQL statement is transformed into a hybrid statement being able to process the XML column in response to the parsing result indicating that the SQL statement relates to at least one logical column of the plurality of logical columns. At last the hybrid statement is executed.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: January 2, 2024
    Assignee: International Business Machines Corporation
    Inventors: Xin Peng Liu, Shuo Li, Xiaobo Wang, ShengYan Sun, Kwai Hing Man
  • Patent number: 11853810
    Abstract: Edge device task management is provided. It is determined whether a subtask cancel and migrate plan exists when a request to run a higher priority subtask of a second plurality of subtasks corresponding to a second task is received while a first task comprised of a first plurality of subtasks is running on a first cluster of edge devices. In response to determining that the subtask cancel and migrate plan does exist, a lower priority subtask of the first plurality of subtasks is canceled from a designated edge device of the first cluster of edge devices based on the subtask cancel and migrate plan. The lower priority subtask is migrated to another edge device for running based on the subtask cancel and migrate plan. The higher priority subtask of the second plurality of subtasks is sent to the designated edge device of the first cluster of edge devices for running.
    Type: Grant
    Filed: January 7, 2021
    Date of Patent: December 26, 2023
    Assignee: International Business Machines Corporation
    Inventors: Yue Wang, Xin Peng Liu, Wei Wu, Zheng Li
  • Patent number: 11809880
    Abstract: Dynamically verifying ingress configuration changes is provided. A temporary ingress controller configuration is generated for an ingress configuration change set contained in an ingress configuration change set dispatcher queue of an ingress controller pod. The temporary ingress controller configuration corresponding to the ingress configuration change set is loaded into a temporary ingress controller located in a temporary ingress controller pod of the computer. A health check is performed on the temporary ingress controller pod running the temporary ingress controller with the temporary ingress controller configuration corresponding to the ingress configuration change set.
    Type: Grant
    Filed: October 8, 2021
    Date of Patent: November 7, 2023
    Assignee: International Business Machines Corporation
    Inventors: Wei Wu, Xin Peng Liu, Yue Wang, Liang Wang, Zheng Li, Biao Chai
  • Patent number: 11798001
    Abstract: Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.
    Type: Grant
    Filed: September 20, 2021
    Date of Patent: October 24, 2023
    Assignee: International Business Machines Corporation
    Inventors: Peng Hui Jiang, Xin Peng Liu, Wei Wu, Xiao Ling Chen
  • Patent number: 11792066
    Abstract: In an approach for building file server arrays with stable and unstable nodes for enhanced pipeline transmission, a processor builds an array from a plurality of stable nodes, wherein each stable node of the plurality of stable nodes is linked to two other stable nodes of the plurality of stable nodes forming a line. A processor divides a plurality of unstable nodes into one or more groups of unstable nodes. A processor links each group of unstable nodes to two neighboring stable nodes within the array. A processor sends data through the array and the one or more groups of unstable nodes in two opposite directions. A processor monitors a node status for each node of the plurality of stable nodes and the plurality of unstable nodes.
    Type: Grant
    Filed: June 28, 2021
    Date of Patent: October 17, 2023
    Assignee: International Business Machines Corporation
    Inventors: Guang Han Sui, Zhi Gang Sun, Yu Jing, Xin Peng Liu
  • Publication number: 20230325267
    Abstract: Selective privileged container augmentation is provided. A target group of edge devices is selected from a plurality of edge devices to run a plurality of child tasks comprising a pending task by mapping edge device tag attributes of the plurality of edge devices to child task tag attributes of the plurality of child tasks. A privileged container corresponding to the pending task is installed in each edge device of the target group to monitor execution of a child task by a given edge device of the target group. A privileged container installation tag that corresponds to the privileged container is added to an edge device tag attribute of each edge device of the target group having the privileged container installed. A child task of the plurality of child tasks comprising the pending task is sent to a selected edge device in the target group to run the child task.
    Type: Application
    Filed: April 6, 2022
    Publication date: October 12, 2023
    Inventors: Yue Wang, Xin Peng Liu, Wei Wu, Liang Wang, Biao Chai
  • Patent number: 11784942
    Abstract: An embodiment includes determining, based on historical data associated with a specific task, a baseline bandwidth recommendation for completing the specific task. The embodiment assigns, for a first time period, the specific task to a first computing device on a network. The embodiment allocates, for the first time period based on the baseline bandwidth recommendation, a first baseline bandwidth to the first computing device. The embodiment allocates, for the first time period, a portion of a shared buffer bandwidth as a first buffer bandwidth to the first computing device based on a weight value assigned to the specific task. The first buffer bandwidth combines with the first baseline bandwidth as a first total bandwidth for the specific task. The embodiment throttles, during the first time period, data packets associated with the specific task based on the first total bandwidth for the specific task.
    Type: Grant
    Filed: April 11, 2022
    Date of Patent: October 10, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yue Wang, Gang Tang, Xin Peng Liu, Wei Wu, Zheng Li
  • Publication number: 20230269298
    Abstract: A method, system, and computer program product for protecting API KEYs for accessing services in a cloud environment are disclosed. A first request for generating a virtual key for a user in an organization to access a service in a cloud environment is received. The first request includes information of the organization, an identity of the user, and information of the service. A first authentication request is sent to an identity provider of the organization based on the information of the organization and the identity of the user. In response to the first authentication being successful, an API key for the organization to access the service is determined. The virtual key for the user to access the service is generated based on the API key, the information of the organization, and the identity of the user. The virtual key is returned as a response of the first request.
    Type: Application
    Filed: February 22, 2022
    Publication date: August 24, 2023
    Inventors: CHUN LI JIA, Zhi Gang Sun, Yue Lin, Xin Peng Liu
  • Patent number: 11714638
    Abstract: Embodiments of the present disclosure relate to availability level-based service management. In an embodiment, a computer-implemented method is disclosed. According to the method, it is detected initiation of a request from a first microservice to a second microservice. The first and second microservices are comprised in a plurality of microservices of an application. The request comprises an expected availability level for the application. In response to a current availability level of the application being higher than or equal to the expected availability level and in response to determining that the execution of the second microservice is unavailable, the request is caused to be routed to a simulated microservice of the second microservice. The simulated microservice is configured to return to the first microservice a dummy response to the request. In other embodiments, a system and a computer program product are disclosed.
    Type: Grant
    Filed: September 18, 2019
    Date of Patent: August 1, 2023
    Assignee: International Business Machines Corporation
    Inventors: Xiao Bin Chen, Tianxiang Lu, Xin Peng Liu, Xiao Jing Fu, Jian Huang
  • Patent number: 11656864
    Abstract: Automatic application of software patches to software associated with container images based upon image relationships in a dependency tree. The computing device determines whether software associated with a base container image requires software patches. The computing device accesses dependency trees maintaining image relationships between the base container image and dependent container images. The computing device determines based upon the accessed one or more dependency trees whether the base container image has dependent container images derived from the base container image. The computing device applies software patches to the software associated with the base container image. The computing device rebuilds the base container image with the applied software patches. The computing device then rebuilds the dependent container images dependent upon the rebuilt base container image.
    Type: Grant
    Filed: September 22, 2021
    Date of Patent: May 23, 2023
    Assignee: International Business Machines Corporation
    Inventors: Qin Yue Chen, Xin Peng Liu, Han Su, Fei Fei Li
  • Patent number: 11645283
    Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: receiving an incoming query statement, wherein the incoming query statement comprises a query statement expression that includes an input variable; predicting an input variable value associated to the input variable; selecting an access path for runtime execution of the query statement in dependence on the predicted input variable value; and performing runtime execution of the query statement using the selected access path.
    Type: Grant
    Filed: April 26, 2021
    Date of Patent: May 9, 2023
    Assignee: International Business Machined Corporation
    Inventors: Li Cao, Shuo Li, Xiaobo Wang, Xin Peng Liu, Sheng Yan Sun
  • Patent number: 11645111
    Abstract: The present disclosure provides a computer-implemented method, computer system and computer program product for managing a task flow. According to the computer-implemented method, a definer module may receive a request for executing a task flow. The definer module may determine a cluster of edge devices to execute the task flow from a set of edge devices. The definer module may retrieve metadata information for the task flow and edge devices in the cluster, wherein the metadata information is used to schedule the task flow in the cluster. Then the edge devices in the cluster may execute the task flow according to the metadata information.
    Type: Grant
    Filed: October 23, 2020
    Date of Patent: May 9, 2023
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Yue Wang, Xin Peng Liu, Liang Wang, Zheng Li, Wei Wu
  • Patent number: 11645109
    Abstract: A computer-implemented method, computer system and computer program product dynamically manage failure in an edge computing environment. According to the method, a request for executing a task may be sent to a first edge device according to a defined process, where the defined process is used to schedule tasks to be executed on edge devices. In response to the first edge device failing to execute the task, the defined process may be suspended. Then, a request for executing the task may be sent to a second edge device. A task result that is received first may be taken as the task result for the task, where the task result is from either the first edge device or the second edge device. And, continuing the rest of the defined process.
    Type: Grant
    Filed: October 25, 2020
    Date of Patent: May 9, 2023
    Assignee: International Business Machines Corporation
    Inventors: Yue Wang, Xin Peng Liu, Liang Wang, Zheng Li, Wei Wu
  • Publication number: 20230111430
    Abstract: Dynamically verifying ingress configuration changes is provided. A temporary ingress controller configuration is generated for an ingress configuration change set contained in an ingress configuration change set dispatcher queue of an ingress controller pod. The temporary ingress controller configuration corresponding to the ingress configuration change set is loaded into a temporary ingress controller located in a temporary ingress controller pod of the computer. A health check is performed on the temporary ingress controller pod running the temporary ingress controller with the temporary ingress controller configuration corresponding to the ingress configuration change set.
    Type: Application
    Filed: October 8, 2021
    Publication date: April 13, 2023
    Inventors: Wei Wu, Xin Peng Liu, Yue Wang, Liang Wang, Zheng Li, Biao Chai
  • Publication number: 20230092902
    Abstract: Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.
    Type: Application
    Filed: September 20, 2021
    Publication date: March 23, 2023
    Inventors: Peng Hui Jiang, Xin Peng Liu, Wei Wu, Xiao Ling Chen