Patents by Inventor Xin Peng Liu
Xin Peng Liu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11953972Abstract: Selective privileged container augmentation is provided. A target group of edge devices is selected from a plurality of edge devices to run a plurality of child tasks comprising a pending task by mapping edge device tag attributes of the plurality of edge devices to child task tag attributes of the plurality of child tasks. A privileged container corresponding to the pending task is installed in each edge device of the target group to monitor execution of a child task by a given edge device of the target group. A privileged container installation tag that corresponds to the privileged container is added to an edge device tag attribute of each edge device of the target group having the privileged container installed. A child task of the plurality of child tasks comprising the pending task is sent to a selected edge device in the target group to run the child task.Type: GrantFiled: April 6, 2022Date of Patent: April 9, 2024Assignee: International Business Machines CorporationInventors: Yue Wang, Xin Peng Liu, Wei Wu, Liang Wang, Biao Chai
-
Publication number: 20240111550Abstract: A computer-implemented process is disclosed. An application is loaded into a local address space. A request by the application to load a target shared library is intercepted by an interceptor. Using the interceptor and based upon the request being intercepted, a shared library correlation table is searched for a loading count and a loading policy associated with the target shared library. Based upon the loading count and the loading policy, a selection is made between loading the target shared library as a shared library container, and loading the target shared library into the local address space. The target shared library is loaded based upon the selecting. The loading count represents a number of times the target shared library was loaded, and the loading policy indicates how the target shared library is to be loaded.Type: ApplicationFiled: September 29, 2022Publication date: April 4, 2024Inventors: Heng Wang, Xiao Ling Chen, Xin Peng Liu, Tao Guan, Wei Wu
-
Publication number: 20240095072Abstract: A method includes, in response to receiving an incoming service request and establishing a call chain of pods of a service mesh network, setting a retry locker parameter to a locked state for each pod in the call chain. A locked retry locker parameter prevents the pod from initiating retries of a service request. The method includes, in response to determining that a pod in the call chain is unavailable, setting the retry locker parameter to an unlocked state for a previous pod just prior to the pod that is unavailable. The unlocked state allows a retry to the pod that is unavailable. In response to the previous pod reaching a retry limit, the method includes setting the retry locker parameter to unlocked for each pod in the call chain and sending a service termination message to a service requester.Type: ApplicationFiled: September 21, 2022Publication date: March 21, 2024Inventors: Yue Wang, Wei Wu, Xin Peng Liu, Liang Wang, Biao Chai
-
Patent number: 11907176Abstract: Methods, computer program products, and systems are presented. The methods include, for instance: receiving a request for a lock on a page from a virtual database amongst two or more virtual databases, the virtual database including a number of containers respectively corresponding to the same number of database components of the virtual database. A copy of the page is refreshed with a latest copy of the page in an overall cache prior to granting the lock based on ascertaining that the page is not locked by any other virtual database. The virtual database is granted with the lock and have an exclusive access to the page.Type: GrantFiled: May 10, 2019Date of Patent: February 20, 2024Assignee: International Business Machines CorporationInventors: Xin Peng Liu, ShengYan Sun, Shuo Li, Xiaobo Wang
-
Publication number: 20240015213Abstract: A system may include a memory and a processor in communication with the memory. The processor may be configured to perform operations. The operations may include registering a custom resource definition for a tenant with a host and scaling a controller for the customer resource definition. The operations may include generating a replication using the customer resource definition, injecting information into the replication, and syncing a status of the custom resource definition between the host and the tenant.Type: ApplicationFiled: July 6, 2022Publication date: January 11, 2024Inventors: Peng Li, Guangya Liu, Xun Pan, Hai Hui Wang, Xiang Zhen Gan, Xin Peng Liu
-
Patent number: 11860939Abstract: Embodiments of the disclosure provide methods, systems, computer program products for manipulating a table with an XML column in database. According to the method, a SQL statement for a table is received first, wherein the table comprises an XML column which is a representation of a plurality of logical columns of the table, there is at least one XML element in at least one row and in the XML column of the table, and each of the at least one XML element corresponds to a non-null value in a specific row and in a logical column of the plurality of logical columns of the table. Then the SQL statement is parsed. And then the SQL statement is transformed into a hybrid statement being able to process the XML column in response to the parsing result indicating that the SQL statement relates to at least one logical column of the plurality of logical columns. At last the hybrid statement is executed.Type: GrantFiled: May 9, 2019Date of Patent: January 2, 2024Assignee: International Business Machines CorporationInventors: Xin Peng Liu, Shuo Li, Xiaobo Wang, ShengYan Sun, Kwai Hing Man
-
Patent number: 11853810Abstract: Edge device task management is provided. It is determined whether a subtask cancel and migrate plan exists when a request to run a higher priority subtask of a second plurality of subtasks corresponding to a second task is received while a first task comprised of a first plurality of subtasks is running on a first cluster of edge devices. In response to determining that the subtask cancel and migrate plan does exist, a lower priority subtask of the first plurality of subtasks is canceled from a designated edge device of the first cluster of edge devices based on the subtask cancel and migrate plan. The lower priority subtask is migrated to another edge device for running based on the subtask cancel and migrate plan. The higher priority subtask of the second plurality of subtasks is sent to the designated edge device of the first cluster of edge devices for running.Type: GrantFiled: January 7, 2021Date of Patent: December 26, 2023Assignee: International Business Machines CorporationInventors: Yue Wang, Xin Peng Liu, Wei Wu, Zheng Li
-
Patent number: 11809880Abstract: Dynamically verifying ingress configuration changes is provided. A temporary ingress controller configuration is generated for an ingress configuration change set contained in an ingress configuration change set dispatcher queue of an ingress controller pod. The temporary ingress controller configuration corresponding to the ingress configuration change set is loaded into a temporary ingress controller located in a temporary ingress controller pod of the computer. A health check is performed on the temporary ingress controller pod running the temporary ingress controller with the temporary ingress controller configuration corresponding to the ingress configuration change set.Type: GrantFiled: October 8, 2021Date of Patent: November 7, 2023Assignee: International Business Machines CorporationInventors: Wei Wu, Xin Peng Liu, Yue Wang, Liang Wang, Zheng Li, Biao Chai
-
Patent number: 11798001Abstract: Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.Type: GrantFiled: September 20, 2021Date of Patent: October 24, 2023Assignee: International Business Machines CorporationInventors: Peng Hui Jiang, Xin Peng Liu, Wei Wu, Xiao Ling Chen
-
Patent number: 11792066Abstract: In an approach for building file server arrays with stable and unstable nodes for enhanced pipeline transmission, a processor builds an array from a plurality of stable nodes, wherein each stable node of the plurality of stable nodes is linked to two other stable nodes of the plurality of stable nodes forming a line. A processor divides a plurality of unstable nodes into one or more groups of unstable nodes. A processor links each group of unstable nodes to two neighboring stable nodes within the array. A processor sends data through the array and the one or more groups of unstable nodes in two opposite directions. A processor monitors a node status for each node of the plurality of stable nodes and the plurality of unstable nodes.Type: GrantFiled: June 28, 2021Date of Patent: October 17, 2023Assignee: International Business Machines CorporationInventors: Guang Han Sui, Zhi Gang Sun, Yu Jing, Xin Peng Liu
-
Publication number: 20230325267Abstract: Selective privileged container augmentation is provided. A target group of edge devices is selected from a plurality of edge devices to run a plurality of child tasks comprising a pending task by mapping edge device tag attributes of the plurality of edge devices to child task tag attributes of the plurality of child tasks. A privileged container corresponding to the pending task is installed in each edge device of the target group to monitor execution of a child task by a given edge device of the target group. A privileged container installation tag that corresponds to the privileged container is added to an edge device tag attribute of each edge device of the target group having the privileged container installed. A child task of the plurality of child tasks comprising the pending task is sent to a selected edge device in the target group to run the child task.Type: ApplicationFiled: April 6, 2022Publication date: October 12, 2023Inventors: Yue Wang, Xin Peng Liu, Wei Wu, Liang Wang, Biao Chai
-
Patent number: 11784942Abstract: An embodiment includes determining, based on historical data associated with a specific task, a baseline bandwidth recommendation for completing the specific task. The embodiment assigns, for a first time period, the specific task to a first computing device on a network. The embodiment allocates, for the first time period based on the baseline bandwidth recommendation, a first baseline bandwidth to the first computing device. The embodiment allocates, for the first time period, a portion of a shared buffer bandwidth as a first buffer bandwidth to the first computing device based on a weight value assigned to the specific task. The first buffer bandwidth combines with the first baseline bandwidth as a first total bandwidth for the specific task. The embodiment throttles, during the first time period, data packets associated with the specific task based on the first total bandwidth for the specific task.Type: GrantFiled: April 11, 2022Date of Patent: October 10, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yue Wang, Gang Tang, Xin Peng Liu, Wei Wu, Zheng Li
-
Publication number: 20230269298Abstract: A method, system, and computer program product for protecting API KEYs for accessing services in a cloud environment are disclosed. A first request for generating a virtual key for a user in an organization to access a service in a cloud environment is received. The first request includes information of the organization, an identity of the user, and information of the service. A first authentication request is sent to an identity provider of the organization based on the information of the organization and the identity of the user. In response to the first authentication being successful, an API key for the organization to access the service is determined. The virtual key for the user to access the service is generated based on the API key, the information of the organization, and the identity of the user. The virtual key is returned as a response of the first request.Type: ApplicationFiled: February 22, 2022Publication date: August 24, 2023Inventors: CHUN LI JIA, Zhi Gang Sun, Yue Lin, Xin Peng Liu
-
Patent number: 11714638Abstract: Embodiments of the present disclosure relate to availability level-based service management. In an embodiment, a computer-implemented method is disclosed. According to the method, it is detected initiation of a request from a first microservice to a second microservice. The first and second microservices are comprised in a plurality of microservices of an application. The request comprises an expected availability level for the application. In response to a current availability level of the application being higher than or equal to the expected availability level and in response to determining that the execution of the second microservice is unavailable, the request is caused to be routed to a simulated microservice of the second microservice. The simulated microservice is configured to return to the first microservice a dummy response to the request. In other embodiments, a system and a computer program product are disclosed.Type: GrantFiled: September 18, 2019Date of Patent: August 1, 2023Assignee: International Business Machines CorporationInventors: Xiao Bin Chen, Tianxiang Lu, Xin Peng Liu, Xiao Jing Fu, Jian Huang
-
Patent number: 11656864Abstract: Automatic application of software patches to software associated with container images based upon image relationships in a dependency tree. The computing device determines whether software associated with a base container image requires software patches. The computing device accesses dependency trees maintaining image relationships between the base container image and dependent container images. The computing device determines based upon the accessed one or more dependency trees whether the base container image has dependent container images derived from the base container image. The computing device applies software patches to the software associated with the base container image. The computing device rebuilds the base container image with the applied software patches. The computing device then rebuilds the dependent container images dependent upon the rebuilt base container image.Type: GrantFiled: September 22, 2021Date of Patent: May 23, 2023Assignee: International Business Machines CorporationInventors: Qin Yue Chen, Xin Peng Liu, Han Su, Fei Fei Li
-
Patent number: 11645283Abstract: Methods, computer program products, and systems are presented. The method computer program products, and systems can include, for instance: receiving an incoming query statement, wherein the incoming query statement comprises a query statement expression that includes an input variable; predicting an input variable value associated to the input variable; selecting an access path for runtime execution of the query statement in dependence on the predicted input variable value; and performing runtime execution of the query statement using the selected access path.Type: GrantFiled: April 26, 2021Date of Patent: May 9, 2023Assignee: International Business Machined CorporationInventors: Li Cao, Shuo Li, Xiaobo Wang, Xin Peng Liu, Sheng Yan Sun
-
Patent number: 11645111Abstract: The present disclosure provides a computer-implemented method, computer system and computer program product for managing a task flow. According to the computer-implemented method, a definer module may receive a request for executing a task flow. The definer module may determine a cluster of edge devices to execute the task flow from a set of edge devices. The definer module may retrieve metadata information for the task flow and edge devices in the cluster, wherein the metadata information is used to schedule the task flow in the cluster. Then the edge devices in the cluster may execute the task flow according to the metadata information.Type: GrantFiled: October 23, 2020Date of Patent: May 9, 2023Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yue Wang, Xin Peng Liu, Liang Wang, Zheng Li, Wei Wu
-
Patent number: 11645109Abstract: A computer-implemented method, computer system and computer program product dynamically manage failure in an edge computing environment. According to the method, a request for executing a task may be sent to a first edge device according to a defined process, where the defined process is used to schedule tasks to be executed on edge devices. In response to the first edge device failing to execute the task, the defined process may be suspended. Then, a request for executing the task may be sent to a second edge device. A task result that is received first may be taken as the task result for the task, where the task result is from either the first edge device or the second edge device. And, continuing the rest of the defined process.Type: GrantFiled: October 25, 2020Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Yue Wang, Xin Peng Liu, Liang Wang, Zheng Li, Wei Wu
-
Publication number: 20230111430Abstract: Dynamically verifying ingress configuration changes is provided. A temporary ingress controller configuration is generated for an ingress configuration change set contained in an ingress configuration change set dispatcher queue of an ingress controller pod. The temporary ingress controller configuration corresponding to the ingress configuration change set is loaded into a temporary ingress controller located in a temporary ingress controller pod of the computer. A health check is performed on the temporary ingress controller pod running the temporary ingress controller with the temporary ingress controller configuration corresponding to the ingress configuration change set.Type: ApplicationFiled: October 8, 2021Publication date: April 13, 2023Inventors: Wei Wu, Xin Peng Liu, Yue Wang, Liang Wang, Zheng Li, Biao Chai
-
Publication number: 20230092902Abstract: Embodiments relate to progressively validating access token. In response to intercepting an initial call for a transaction for a service from a client, a token is validated for the initial call of the transaction for the service, the validating including contacting an authentication sever and locally storing a time to live received for the token. In response to intercepting at least one successive call for the transaction for the service from the client, it is determined that the token for the at least one successive call is valid based on the time to live locally saved. The at least one successive call for the transaction for the service is permitted to pass without contacting the authentication sever.Type: ApplicationFiled: September 20, 2021Publication date: March 23, 2023Inventors: Peng Hui Jiang, Xin Peng Liu, Wei Wu, Xiao Ling Chen