Patents by Inventor YONG QUAN TIAN

YONG QUAN TIAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250103365
    Abstract: In several aspects for detecting a computing system resource schedule, a computing device performs a pre-analysis process utilizing a collected log from multiple sources. The pre-analysis process including a data formatter that identifies data based on a metric, and a dimensionality reduction process that distributes the data into an n-dimensional space. Key patterns are extracted to separate a normal status and an abnormal status for the extracted key patterns. A post-analysis process is performed on the extracted key patterns utilizing a threshold formatter to identify a threshold for a health check.
    Type: Application
    Filed: September 21, 2023
    Publication date: March 27, 2025
    Inventors: Ming Xia Guo, Bo Chen Zhu, Yong Quan Tian, Mai Zeng, Meng Jie Min, Yan An, Min Cheng
  • Publication number: 20250053277
    Abstract: A computational device detects an emotion of a reader while reading a printed version of a book via a virtual reality device. A determination is made of notes made by other readers of the book with a similar emotion to the reader, where the notes have been stored in association with an electronic version of the book. The notes are displayed on a virtual reality interface of the virtual reality device to the reader.
    Type: Application
    Filed: August 9, 2023
    Publication date: February 13, 2025
    Inventors: Peng Hui Jiang, YONG QUAN TIAN, XI QING ZHANG, Jun SU
  • Publication number: 20240311172
    Abstract: Managing execution of eBPF program capabilities is provided. A comparison of a currently in use helper-id list with an allowable helper-id list of an eBPF program is performed. It is determined whether a set of unallowable helper-ids exists that is included in the currently in use helper-id list but not in the allowable helper-id list based on the comparison. A blocked helper-id list of the eBPF program that includes the set of unallowable helper-ids and a corresponding unallowable capability of each respective unallowable helper-id is generated in response to determining that the set of unallowable helper-ids does exist. The set of unallowable helper-ids and the corresponding unallowable capability of each respective unallowable helper-id is removed from bytecode of the eBPF program in order to have only allowable helper-ids remain in the bytecode along with corresponding allowable capabilities of the eBPF program.
    Type: Application
    Filed: March 17, 2023
    Publication date: September 19, 2024
    Inventors: Xiaojing Liu, Qi Feng Huo, Qi Li, Yong Quan Tian, Xiao Ling Chen
  • Patent number: 11652825
    Abstract: Embodiments of the present disclosure relate to methods, systems, and computer program products for event management. In a method, a token is obtained at a first agent device that is included in a network system, the token is for authenticating a first packet that is transmitted in the network system, and the first packet is generated according to a first network format. A second packet is generated based on the first packet and the token according to a second network format. The second packet is transmitted to a second agent device that is included in the network system, here both of the first and second agent devices support the first and second network formats. With these embodiments, the packet may be authenticated in a more effective way.
    Type: Grant
    Filed: August 9, 2021
    Date of Patent: May 16, 2023
    Assignee: International Business Machines Corporation
    Inventors: Na Fei Yang, Xiaojing Liu, Yong Quan Tian, Ming Xia Guo, Qi Li, Da Li Liu
  • Publication number: 20230040723
    Abstract: Embodiments of the present disclosure relate to methods, systems, and computer program products for event management. In a method, a token is obtained at a first agent device that is included in a network system, the token is for authenticating a first packet that is transmitted in the network system, and the first packet is generated according to a first network format. A second packet is generated based on the first packet and the token according to a second network format. The second packet is transmitted to a second agent device that is included in the network system, here both of the first and second agent devices support the first and second network formats. With these embodiments, the packet may be authenticated in a more effective way.
    Type: Application
    Filed: August 9, 2021
    Publication date: February 9, 2023
    Inventors: Na Fei Yang, XIAOJING LIU, YONG QUAN TIAN, Ming Xia Guo, Qi Li, Da Li Liu