Patents by Inventor Yi-Min Wang

Yi-Min Wang has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9009226
    Abstract: A method described herein includes acts of receiving data from a social networking application, wherein the data is generated by a first individual, and executing an entity extraction algorithm to extract at least one entity from the received data. The method also includes automatically causing a hyperlink to be displayed on a computing device utilized by a second individual, wherein the hyperlink is based at least in part upon the at least one entity, wherein the hyperlink is configured to direct the first individual to a search engine and is further configured to cause the search engine to execute a search that pertains to the at least one entity.
    Type: Grant
    Filed: December 9, 2009
    Date of Patent: April 14, 2015
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Emre Mehmet Kiciman, Chun-Kai Wang, Yi-Min Wang
  • Patent number: 8970586
    Abstract: A clairvoyance method for 3D scene is disclosed, including the steps of acquiring parameters associated with a clairvoyance camera and parameters associated with a clairvoyance viewport; determining a 3D scene to be rendered according to the parameters associated with the clairvoyance camera; rendering the determined 3D scene to obtain a 2D image presented in the clairvoyance viewport; and composing the 2D image presented in the clairvoyance viewport and a 2D image presented in a general scene viewport. With the method of the present invention, the covered 3D scene can be made clairvoyant to be viewed in a user-controllable way, and further an object can be selected in the clairvoyant 3D scene for manipulation, without manipulating the covering object. Thus, one or more embodiments of the present invention have advantages of simple and easy operation and high efficiency.
    Type: Grant
    Filed: October 28, 2011
    Date of Patent: March 3, 2015
    Assignee: International Business Machines Corporation
    Inventors: Bao Hua Cao, Qi Cheng Li, Jian Wang, Yi Min Wang, Zi Yu Zhu
  • Patent number: 8972401
    Abstract: Defeating click-through cloaking includes retrieving a search results page to set a browser variable, inserting a link to a page into the search results page and clicking through to the page using the inserted link. Investigating cloaking includes providing script associated with a suspected spam URL, modifying the script to de-obfuscate the script and executing the modified script to reveal cloaking logic associated with the script.
    Type: Grant
    Filed: December 13, 2010
    Date of Patent: March 3, 2015
    Assignee: Microsoft Corporation
    Inventors: Yi-Min Wang, Ming Ma
  • Patent number: 8933939
    Abstract: A method and apparatus for evaluating attention degree in 3D virtual world are provided, the 3D virtual world comprising at least one virtual object and at least one avatar controlled by user, the at least one avatar having corresponding avatar view field. The method comprises: obtaining geometrical information about the avatar view field and geometrical information about the virtual object; determining the association between the avatar view field and the virtual object based on the geometrical information; evaluating attention degree of the virtual object based on the association; and providing evaluation result on attention degree of the virtual object. Corresponding apparatus is also provided. The above method and apparatus have provided attention degree related statistic collection and search feature for the virtual world.
    Type: Grant
    Filed: May 11, 2011
    Date of Patent: January 13, 2015
    Assignee: International Business Machines Corporation
    Inventors: Qi Cheng Li, Song Song, Jian Wang, Yi Min Wang, Zi Yu Zhu
  • Publication number: 20140338216
    Abstract: A nail polish curing device comprises: a lower part defining a lower recess; an upper part pivoted to the lower part and defining an upper recess; a circuit board mounted on the upper part; and at least one light emitting element connected to the circuit board. The upper part is rotatable relative to the lower part between a first angular position, in which the upper and lower recesses overlap along a vertical direction and cooperate with each other to define an accommodating space for receiving a user's finger therein, and a second angular position, in which the upper and lower recesses do not overlap along the vertical direction, thereby facilitating insertion of a user's toe into an irradiating space between a bottom surface of the upper part and a reference surface.
    Type: Application
    Filed: July 12, 2013
    Publication date: November 20, 2014
    Inventors: Yu-Jen Li, Yi-Min Wang, I-Chen Hsieh
  • Publication number: 20140338215
    Abstract: A nail polish curing device comprises: a lower part having a top surface and a reflective lower recess-defining surface that extends downwardly from the top surface and that defines a lower recess; an upper part disposed above the lower part and having a top wall, a bottom surface, and a reflective upper recess-defining surface that extends upwardly from the bottom surface and that defines an upper recess, the top wall being formed with a plurality of through-holes; a circuit board mounted on the top wall of the upper part; and a plurality of light emitting elements mounted on and electrically connected to the circuit board and extending respectively through the through-holes into the upper recess so as to emit light into the upper and lower recesses.
    Type: Application
    Filed: July 11, 2013
    Publication date: November 20, 2014
    Inventors: Yu-Jen Li, Yi-Min Wang, I-Chen Hsieh
  • Publication number: 20140331328
    Abstract: A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are capable of accomplishing exploits, including browser-based exploits, on a machine. Also, the accomplishment of exploits may be detected by tracing events occurring on a machine after visiting a network site and analyzing the traced events for illicit behavior. Alternatively, site redirections between and among uniform resource locators (URLs) may be explored to discover relationships between sites that are visited.
    Type: Application
    Filed: July 16, 2014
    Publication date: November 6, 2014
    Inventors: Yi-Min Wang, Douglas Beck
  • Patent number: 8854391
    Abstract: A method and systems for providing and processing images of a virtual world scene. The method includes: rendering the scene of the virtual world to generate a plurality of rendering results, generating at least one image stream based on at least part of the plurality of rendering results, and sending the at least one image stream to the client. The system for providing the images includes: rendering means to generate a plurality of rendering results; image stream generation means for generating at least one image stream; and sending means for sending said at least one image stream to a client. After providing the images, the images are processed by receiving means for receiving, at a client, two image streams and merging means for merging the two image streams into a single image stream for playing.
    Type: Grant
    Filed: March 17, 2011
    Date of Patent: October 7, 2014
    Assignee: International Business Machines Corporation
    Inventors: Dong Jun Lan, Qi Cheng Li, Jian Wang, Yi Min Wang, Zi Yu Zhu
  • Publication number: 20140245069
    Abstract: Managing software performance debugging based on a distributed VM system is provided. In response to determining a debugging state of a software system running on a VM, a timing of a system clock of the VM is controlled. A data packet sent to the VM from another VM is intercepted, and an added system time and reference time that indicate when the packet was sent by the other VM is extracted from the packet. Based on the system and reference times, as well as a reference time of when the packet is intercepted, a timing at which the packet is expected to be received by the VM is calculated. The packet is forwarded to the VM as a function of a comparison of the timing at which the packet is expected to be received and a system time of the VM when the packet is intercepted.
    Type: Application
    Filed: February 26, 2014
    Publication date: August 28, 2014
    Applicant: International Business Machines Corporation
    Inventors: Guoqiang Hu, Qi Cheng Li, Jian Wang, Yi Min Wang, Bo Yang
  • Patent number: 8812652
    Abstract: A network can be explored to investigate exploitive behavior. For example, network sites may be actively explored by a honey monkey system to detect if they are capable of accomplishing exploits, including browser-based exploits, on a machine Also, the accomplishment of exploits may be detected by tracing events occurring on a machine after visiting a network site and analyzing the traced events for illicit behavior. Alternatively, site redirections between and among uniform resource locators (URLs) may be explored to discover relationships between sites that are visited.
    Type: Grant
    Filed: June 17, 2010
    Date of Patent: August 19, 2014
    Assignee: Microsoft Corporation
    Inventors: Yi-Min Wang, Douglas R. Beck
  • Publication number: 20140067783
    Abstract: Technologies pertaining to automatically identifying sets of query attribute values that are highly correlative with user dissatisfaction with a search engine are described. Dissatisfied queries are automatically identified through analysis of search logs, wherein a dissatisfied query is a query submitted to a search engine by a user, wherein the user was dissatisfied with search results provided by the search engine responsive to receipt of the query. Sets of query attribute values that are highly correlated with dissatisfied queries, and thus user dissatisfaction, are automatically identified based at least in part upon the identifying of the dissatisfied queries. Subsequent to identifying a set of query attribute values, a segment-specific ranker is learned that is configured to rank search results responsive to receipt of a query with the set of query attribute values, wherein the segment-specific ranker outperforms a general purpose ranker for queries having the set of query attribute values.
    Type: Application
    Filed: September 6, 2012
    Publication date: March 6, 2014
    Applicant: MICROSOFT CORPORATION
    Inventors: Ahmed Hassan Awadallah, Yi-Min Wang, Ryen William White
  • Patent number: 8667117
    Abstract: An exemplary method for protecting web browsers from spam includes providing a multi-layer model that includes a doorway layer, a redirection domain layer, an aggregator layer, a syndicator layer and an advertiser layer; identifying domains as being associated with at least one of the layers; and, based at least in part on the identifying, taking one or more corrective actions to protect web browsers from search spam. An exemplary method for identifying a bottleneck layer in a multi-layer spam model includes providing a multi-layer spam model, collecting spam advertisements, associating a block of IP addresses with the collected spam advertisements and identifying a bottleneck layer based on the block of IP addresses. Other methods, systems, etc., are also disclosed.
    Type: Grant
    Filed: May 31, 2007
    Date of Patent: March 4, 2014
    Assignee: Microsoft Corporation
    Inventors: Yi-Min Wang, Ming Ma
  • Patent number: 8661541
    Abstract: A method and system for determining whether resources of a computer system are being hidden is provided. The security system invokes a high-level function of user mode that is intercepted and filtered by the malware to identify resources. The security system also directly invokes a low-level function of kernel mode that is not intercepted and filtered by the malware to identify resources. After invoking the high-level function and the low-level function, the security system compares the identified resources. If the low-level function identified a resource that was not identified by the high-level function, then the security system may consider the resource to be hidden.
    Type: Grant
    Filed: January 3, 2011
    Date of Patent: February 25, 2014
    Assignee: Microsoft Corporation
    Inventors: Douglas Reed Beck, Yi-Min Wang
  • Patent number: 8621495
    Abstract: A method includes placing an accent in a frame, and only letting frames with the same accent communicate with each other. This accenting is removed using an accent key immediately prior to a compilation operation. The accenting can be performed by performing an XOR operation on a data stream using a key. In one exemplary non-limiting embodiment a computing system is provided. The computing system includes a memory, and a processor coupled to the memory, the processor configured to introduce domain specificity to at least one of a script and an HTML object name. In another exemplary non-limiting embodiment, means are provided for introducing domain specificity to at least one of a script and an HTML object name and means are provided for removing the introduced domain specificity prior to a compiling operation.
    Type: Grant
    Filed: January 18, 2008
    Date of Patent: December 31, 2013
    Assignee: Microsoft Corporation
    Inventors: Shuo Chen, David A. Ross, Yi-Min Wang
  • Publication number: 20130339336
    Abstract: The claimed subject matter provides a system or method for web crawling hidden files. An exemplary method comprises loading a web page with a browser agent, and executing any dynamic elements hosted on the web page using the browser agent to insert pre-determined values. A list of form controls may be retrieved from the web page using the browser agent, and the controls may be analyzed using a driver component. Form control values may be sent from the driver component to the browser agent, and an event may be submitted to the web page by the browser agent or scripted content may be run to trigger operations on the web page corresponding to the form control values. A URL may be generated for various form control values using a generalizer.
    Type: Application
    Filed: August 19, 2013
    Publication date: December 19, 2013
    Applicant: Microsoft Corporation
    Inventors: Chao Liu, Chao Zhou, Yi-Min Wang
  • Publication number: 20130304442
    Abstract: The present invention provides a method, apparatus, and non-transitory article of manufacture embodying computer readable instructions for scheduling discrete event simulation. One embodiment of the present invention is a method for scheduling discrete event simulation. The method includes: extracting two or more event types in the discrete event simulation in response to having loaded the discrete event simulation; constructing a correlation graph used for the discrete event simulation based on the two or more event types; and scheduling events that are classified into the two or more event types according to the correlation graph wherein each node in the correlation graph describes one of the two or more event types, and an edge in the correlation graph describes the creation or dependency relationship between the two or more event types. Other embodiments of the present invention provide an apparatus and computer program product for scheduling discrete event simulation.
    Type: Application
    Filed: April 23, 2013
    Publication date: November 14, 2013
    Inventors: Guoqiang Hu, Qi Cheng Li, Li Jun Mei, Fan Jing Meng, HuaFang Tan, Jian Wang, Yi Min Wang, Zi Yu Zhu
  • Patent number: 8539585
    Abstract: To achieve end-to-end security, traditional machine-to-machine security measures are insufficient if the integrity of the graphical user interface (GUI) is compromised. GUI logic flaws are a category of software vulnerabilities that result from logic flaws in GUI implementation. The invention described here is a technology for uncovering these flaws using a systematic reasoning approach. Major steps in the technology include: (1) mapping a visual invariant to a program invariant; (2) formally modeling the program logic, the user actions and the execution context, and systematically exploring the possibilities of violations of the program invariant; (3) finding real spoofing attacks based on the exploration.
    Type: Grant
    Filed: June 25, 2007
    Date of Patent: September 17, 2013
    Assignee: Microsoft Corporation
    Inventors: Shuo Chen, Ralf Sasse, Jiahe Helen Wang, Yi-Min Wang
  • Patent number: 8538949
    Abstract: The claimed subject matter provides a system or method for web crawling hidden files. An exemplary method includes loading a web page with a browser agent, and executing any dynamic elements hosted on the web page using the browser agent to insert pre-determined values. A list of form controls may be retrieved from the web page using the browser agent, and the controls may be analyzed using a driver component. Form control values may be sent from the driver component to the browser agent, and an event may be submitted to the web page by the browser agent or scripted content may be run to trigger operations on the web page corresponding to the form control values. A URL may be generated for various form control values using a generalizer.
    Type: Grant
    Filed: June 17, 2011
    Date of Patent: September 17, 2013
    Assignee: Microsoft Corporation
    Inventors: Chao Liu, Chao Zhaou, Yi-Min Wang
  • Publication number: 20130055381
    Abstract: A method and system for utilizing the biometric factors reflected in the typing as a kind of physiological password, to create a rhythmic password specific to the user, and to authenticate based on the rhythmic password. The method includes providing an original training text to a user, receiving an input training text provided by the user according to the original training text, extracting rhythmic characteristic values between adjacent text units of the input training text, and generating a rhythmic password of the user based on the extracted rhythmic characteristic values between adjacent text units. The invention utilizes the rhythm of a user inputting text can bring multiple advantages, including enhanced security of the password, and saving the user's cost of memorizing the password.
    Type: Application
    Filed: August 30, 2012
    Publication date: February 28, 2013
    Applicant: International Business Machines Corporation
    Inventors: Chen Hao, Guoqiang Hu, Qi Cheng Li, Li Jun Mei, Jian Wang, Yi Min Wang, Zi Yu Zhu
  • Patent number: 8356086
    Abstract: Architecture that scales up the non-negative matrix factorization (NMF) technique to a distributed NMF (denoted DNMF) to handle large matrices, for example, on a web scale that can include millions and billions of data points. To analyze web-scale data, DNMF is applied through parallelism on distributed computer clusters, for example, with thousands of machines. In order to maximize the parallelism and data locality, matrices are partitioned in the short dimension. The probabilistic DNMF can employ not only Gaussian and Poisson NMF techniques, but also exponential NMF for modeling web dyadic data (e.g., dwell time of a user on browsed web pages).
    Type: Grant
    Filed: March 31, 2010
    Date of Patent: January 15, 2013
    Assignee: Microsoft Corporation
    Inventors: Chao Liu, Hung-chih Yang, Jinliang Fan, Li-wei He, Yi-Min Wang