Patents by Inventor Xinya Wang
Xinya Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11907405Abstract: A return address of a caller of a software function within an access control component is determined, the caller comprising a software component seeking access to a protected resource protected by the access control component. From the return address, a filename of the caller is determined. Responsive to determining that the filename is included in a set of filenames of components allowed to access the protected resource, the caller is allowed to access the protected resource.Type: GrantFiled: October 14, 2020Date of Patent: February 20, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Xiaohan Qin, Pedro V. Torres, Xinya Wang, Amit Agarwal
-
Patent number: 11539521Abstract: By analyzing a content of a first message, a confidentiality level of the first message is determined. An encryption rule for a first computational complexity level corresponding to the confidentiality level of the first message is selected. The first message is encoded according to the encryption rule. The encoded first message and the confidentiality level of the first message are caused to be sent to a recipient.Type: GrantFiled: December 15, 2020Date of Patent: December 27, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Su Liu, Yin Xia, Cheng Xu, Xinya Wang
-
Patent number: 11410002Abstract: Disclosed is a ship identity recognition method based on the fusion of AIS data and video data, comprising: collecting a ship sample to train a ship target classifier; performing, using the ship target classifier, ship target detection on a video frame collected by a gimbal camera; performing a comparison with a recognized ship library to filter a recognized ship; acquiring AIS data and filtering same across time and spatial scales; predicting the current position of an AIS target using a linear extrapolation method and converting the current position to an image coordinate system; performing position matching between a target to be matched and the converted AIS target; and performing feature extraction on the successfully matched target and storing the extracted feature, together with ship identity information, into the recognized ship library.Type: GrantFiled: November 13, 2020Date of Patent: August 9, 2022Assignee: SHANGHAI ADVANCED AVIONICS CO., LTD.Inventors: Min Yuan, Shulin Peng, Wei Qian, Kanjun Ni, Xinya Wang
-
Patent number: 11405404Abstract: In an embodiment, a method for allocating privileges on a computer network includes calculating a permission level based at least in part on a login context associated with a login request for connection to a network from a user via a client device, adjusting the calculated permission level such that a resulting first adjusted permission level does not exceed a previous permission level assigned to the client device, assigning the first adjusted permission level to the client device, collecting activity data representative of network activity by the user while logged in to the network, and classifying, using a classifier model, at least a portion of the activity data to generate a second adjusted permission level for the client device.Type: GrantFiled: September 6, 2019Date of Patent: August 2, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Su Liu, Xinya Wang
-
Publication number: 20220191024Abstract: By analyzing a content of a first message, a confidentiality level of the first message is determined. An encryption rule for a first computational complexity level corresponding to the confidentiality level of the first message is selected. The first message is encoded according to the encryption rule. The encoded first message and the confidentiality level of the first message are caused to be sent to a recipient.Type: ApplicationFiled: December 15, 2020Publication date: June 16, 2022Applicant: International Business Machines CorporationInventors: Su Liu, Yin Xia, Cheng Xu, Xinya Wang
-
Publication number: 20220114271Abstract: A return address of a caller of a software function within an access control component is determined, the caller comprising a software component seeking access to a protected resource protected by the access control component. From the return address, a filename of the caller is determined. Responsive to determining that the filename is included in a set of filenames of components allowed to access the protected resource, the caller is allowed to access the protected resource.Type: ApplicationFiled: October 14, 2020Publication date: April 14, 2022Applicant: International Business Machines CorporationInventors: Xiaohan Qin, Pedro V. Torres, Xinya Wang, Amit Agarwal
-
Publication number: 20210075795Abstract: In an embodiment, a method for allocating privileges on a computer network includes calculating a permission level based at least in part on a login context associated with a login request for connection to a network from a user via a client device, adjusting the calculated permission level such that a resulting first adjusted permission level does not exceed a previous permission level assigned to the client device, assigning the first adjusted permission level to the client device, collecting activity data representative of network activity by the user while logged in to the network, and classifying, using a classifier model, at least a portion of the activity data to generate a second adjusted permission level for the client device.Type: ApplicationFiled: September 6, 2019Publication date: March 11, 2021Applicant: International Business Machines CorporationInventors: Su Liu, Xinya Wang
-
Publication number: 20210073573Abstract: Disclosed is a ship identity recognition method based on the fusion of AIS data and video data, comprising: collecting a ship sample to train a ship target classifier; performing, using the ship target classifier, ship target detection on a video frame collected by a gimbal camera; performing a comparison with a recognized ship library to filter a recognized ship; acquiring AIS data and filtering same across time and spatial scales; predicting the current position of an AIS target using a linear extrapolation method and converting the current position to an image coordinate system; performing position matching between a target to be matched and the converted AIS target; and performing feature extraction on the successfully matched target and storing the extracted feature, together with ship identity information, into the recognized ship library.Type: ApplicationFiled: November 13, 2020Publication date: March 11, 2021Inventors: Min YUAN, Shulin PENG, Wei QIAN, Kanjun NI, Xinya WANG
-
Patent number: 10049087Abstract: For one-touch user-defined context-aware text selection for touchscreen devices, an apparatus includes a processor and a memory storing code that is executable by the processor to determine a text selection context for a touchscreen device. The apparatus ascertains whether a text selection override policy is satisfied. The apparatus replaces application text selection rules with one-touch user-defined context-aware text selection rules for the determined text selection context in response to ascertaining that the text selection override policy is satisfied.Type: GrantFiled: July 19, 2016Date of Patent: August 14, 2018Assignee: International Business Machines CorporationInventors: Karteeka Gosukonda, Su Liu, Kara Schrader, Xinya Wang
-
Publication number: 20180024972Abstract: For one-touch user-defined context-aware text selection for touchscreen devices, an apparatus includes a processor and a memory storing code that is executable by the processor to determine a text selection context for a touchscreen device. The apparatus ascertains whether a text selection override policy is satisfied. The apparatus replaces application text selection rules with one-touch user-defined context-aware text selection rules for the determined text selection context in response to ascertaining that the text selection override policy is satisfied.Type: ApplicationFiled: July 19, 2016Publication date: January 25, 2018Inventors: Karteeka Gosukonda, Su Liu, Kara Schrader, Xinya Wang
-
Patent number: 9009777Abstract: A method, apparatus, and computer usable program product for automatic activation of roles is provided. When a user initiates an action, a set of roles needed for the action is identified. A set of roles assigned to the user is also identified. From the two sets of roles, all roles that are common to both sets are identified in a subset of roles. Roles in this subset are assigned to the user and are sufficient for the action. One or more roles from this subset of roles is selected for activation depending on system policies in effect. Selected roles are automatically activated without requiring any intervention from the user. Once the selected roles are activated, they can become inactive upon completion of the current action, or remain active for subsequent actions by the user during all or part of a user session. System policies can decide how the roles are selected for activation, and the duration of which the roles remain active once activated.Type: GrantFiled: November 30, 2006Date of Patent: April 14, 2015Assignee: International Business Machines CorporationInventors: Saurabh Desai, Niteesh Kumar Dubey, Yantian Tom Lu, Ravi A. Shankar, Murali Vaddagiri, Drew Thomas Walters, Xinya Wang
-
Patent number: 7996893Abstract: A computer implemented method, apparatus, and computer program product for performing an automated task in a role-based access control environment. A set of roles is assigned to a user to form assigned roles, wherein the role-based access control environment allows the user to assume a subset of the assigned roles at a given time. Responsive to receiving a request to execute an automated task, an identity of the user creating the automated task is identified. Responsive to determining that the user creating the automated task is not logged in, a set of session roles are identified based on the identity of the user. A session is created for the automated task. The automated task is performed in the session using the set of session roles.Type: GrantFiled: June 11, 2007Date of Patent: August 9, 2011Assignee: International Business Machines CorporationInventors: Shiva Persaud-Deolall, Xinya Wang
-
Publication number: 20080307505Abstract: A computer implemented method, apparatus, and computer program product for performing an automated task in a role-based access control environment. A set of roles is assigned to a user to form assigned roles, wherein the role-based access control environment allows the user to assume a subset of the assigned roles at a given time. Responsive to receiving a request to execute an automated task, an identity of the user creating the automated task is identified. Responsive to determining that the user creating the automated task is not logged in, a set of session roles are identified based on the identity of the user. A session is created for the automated task. The automated task is performed in the session using the set of session roles.Type: ApplicationFiled: June 11, 2007Publication date: December 11, 2008Inventors: Shiva Persaud-Deolall, Xinya Wang
-
Publication number: 20080134320Abstract: A method, apparatus, and computer usable program product for automatic activation of roles is provided. When a user initiates an action, a set of roles needed for the action is identified. A set of roles assigned to the user is also identified. From the two sets of roles, all roles that are common to both sets are identified in a subset of roles. Roles in this subset are assigned to the user and are sufficient for the action. One or more roles from this subset of roles is selected for activation depending on system policies in effect. Selected roles are automatically activated without requiring any intervention from the user. Once the selected roles are activated, they can become inactive upon completion of the current action, or remain active for subsequent actions by the user during all or part of a user session. System policies can decide how the roles are selected for activation, and the duration of which the roles remain active once activated.Type: ApplicationFiled: November 30, 2006Publication date: June 5, 2008Inventors: Saurabh Desai, Niteesh Kumar Dubey, Yantian Tom Lu, Ravi A. Shankar, Murali Vaddagiri, Drew Thomas Walters, Xinya Wang
-
Patent number: 6076168Abstract: A method of securing data traffic between a local and remote host systems is provided. The method includes autogenerating a filter having rules associated with a defined tunnel. The filter rules are used to permit or deny acceptance of transmitted data by the host system and to direct traffic to the tunnel. The tunnel, on the other hand, is used to keep data confidential. The method further includes autogeneration of a counterpart tunnel and associated filter to be used by the remote host when in communication with the local host. The method further autogenerates a new filter to reflect changes to any one of the tunnels and autodeactivates the filter associated with a deleted tunnel.Type: GrantFiled: October 3, 1997Date of Patent: June 13, 2000Assignee: International Business Machines CorporationInventors: William Alton Fiveash, Xinya Wang, Christiaan Blake Wenzel, Jacqueline Hegedus Wilson, Opral Vanan Wisham