Patents by Inventor Yuk L. Chan
Yuk L. Chan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12021885Abstract: Examples described herein provide a computer-implemented method that includes receiving a list of objects with anomaly detection results associated therewith. The method further includes generating a resource graph, wherein the resource graph comprises at least two nodes, each of the at least two nodes being associated with one of the objects. The method further includes determining a relationship between the at least two nodes. The method further includes assigning an anomaly score to at least one of the objects. The method further includes calculating for at least one of the nodes, an overall anomaly score for the at least one of the nodes based on the anomaly score for the at least one of the objects and based on the anomaly score for another node related to the at least one of the nodes.Type: GrantFiled: December 14, 2020Date of Patent: June 25, 2024Assignee: International Business Machines CorporationInventors: Yuk L. Chan, Anuja Deedwaniya, Robert M. Abrams
-
Patent number: 11995562Abstract: Aspects of the invention include computer systems, computer-implemented methods, and computer program products configured to integrate documentation knowledge with log mining data. A non-limiting example computer-implemented method includes determining a message-message relationship based on log message documentation and building a first subgraph based on the message-message relationship. The method further includes receiving a first message log entry having a message identifier and message field data. A second message log entry is correlated with the first message log entry based on at least one of the message identifier and the message field data. A second subgraph is built that includes the first message log entry and the second message log entry. The method includes building a graph that includes the first subgraph and the second subgraph.Type: GrantFiled: December 3, 2020Date of Patent: May 28, 2024Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yuk L. Chan, Lei Yu, Jia Qi Li, Zhi Shuai Han, Tian Wu, Hong Min, Fan Jing Meng
-
Patent number: 11947519Abstract: Examples described herein provide a computer-implemented method that includes defining a key performance indicator associated with a non-instrumented object of a processing system. The method further includes determining a current anomaly level of the key performance indicator for an instrumented object having a relationship with the non-instrumented object. The method further includes assigning an anomaly level to the non-instrumented object based on the current anomaly level.Type: GrantFiled: December 14, 2020Date of Patent: April 2, 2024Assignee: International Business Machines CorporationInventors: Yuk L. Chan, Anuja Deedwaniya, Robert M. Abrams
-
Patent number: 11797538Abstract: Aspects of the invention include computer systems, computer-implemented methods, and computer program products configured to perform message correlation extraction for mainframe operation. A non-limiting example computer-implemented method includes receiving a first message log entry having a message identifier and message field data. The first message log entry is pre-processed to determine the message identifier and to tokenize the message field data. A second message log entry is identified based on at least one of the message identifier and the tokenized message field data. The method further includes determining that the second message log entry is correlated with the first message log entry and providing an output comprising the message correlation between the first message log entry and the second message log entry.Type: GrantFiled: December 3, 2020Date of Patent: October 24, 2023Assignee: International Business Machines CorporationInventors: Yuk L. Chan, Jia Qi Li, Lin Yang, Tian Wu, Lei Yu, Hong Min, Fan Jing Meng
-
Patent number: 11775654Abstract: Examples described herein provide a computer-implemented method that includes detecting an anomaly associated with an object of a computer system and determining an importance classification of the object. An object relationship of the object is determined with respect to one or more other objects of the computer system. An impact score of the anomaly is determined based on the importance classification and the object relationship. An anomaly report is output with the impact score.Type: GrantFiled: December 14, 2020Date of Patent: October 3, 2023Assignee: International Business Machines CorporationInventors: Yuk L. Chan, Anuja Deedwaniya, Robert M. Abrams
-
Patent number: 11599404Abstract: According to an aspect, a method includes searching for a correlated log identifier in a correlation database based on detecting a metrics-based anomaly. The method also includes providing, in a problem diagnosis, related log information associated with the correlated log identifier based on locating one or more log entries including the correlated log identifier in a same time window as the metrics-based anomaly. The method further includes searching for a correlated metric in the correlation database based on detecting a log-based anomaly and providing, in the problem diagnosis, related metric information associated with the correlated metric based on locating one or more metrics records including the correlated metric in the same time window as the log-based anomaly.Type: GrantFiled: December 3, 2020Date of Patent: March 7, 2023Assignee: International Business Machines CorporationInventors: Yuk L. Chan, Tian Wu, Jia Qi Li, Zhi Shuai Han, Lei Yu, Hong Min, Fan Jing Meng, Abhishek Dokania
-
Patent number: 11513930Abstract: Techniques include collecting current logs from distributed sources, selecting a group of the current logs that are from a related source of the distributed sources, and generating a feature vector using the group of the current logs. A current status model is created for the feature vector using the group of the current logs. One or more anomalies are determined in the group of the current logs based on a difference between the current status model and a reference status model, the reference status model being based on history logs.Type: GrantFiled: December 3, 2020Date of Patent: November 29, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Yuk L. Chan, Lin Yang, Tian Wu, Jia Qi Li, Lei Yu, Hong Min, Fan Jing Meng
-
Patent number: 11496602Abstract: Aspects include identifying an event associated with extraction and transmission of a dataset from a data center over a network to one or more network servers and identifying a plurality of tasks associated with a plurality of users and the event. A predicted availability time of the dataset is determined for the one or more network servers based on data extraction performance from a backend data storage system of the data center. Processing is clustered of a plurality of posting requests of two or more of the users through the one or more network servers to align with the predicted availability time of the dataset.Type: GrantFiled: June 26, 2018Date of Patent: November 8, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Al Chakra, Yuk L. Chan, Jonathan Dunne, Liam S. Harpur
-
Patent number: 11474892Abstract: Techniques include generating a log sequence for new logs that have been received, searching a log sequence database for the log sequence having been generated, and determining that the log sequence is anomalous in response to not finding an identical log sequence in the log sequence database. In response to the log sequence not being found in the log sequence database, the log sequence is compared to a graph of historical log sequences to find a closest sequence path to one or more historical log sequences. An anomaly of the log sequence is diagnosed based on an occurrence at which the log sequence deviates from the closest sequence path of the one or more historical log sequences.Type: GrantFiled: December 3, 2020Date of Patent: October 18, 2022Assignee: International Business Machines CorporationInventors: Yuk L. Chan, Jia Qi Li, Zhi Shuai Han, Tian Wu, Lei Yu, Hong Min, Fan Jing Meng
-
Patent number: 11403326Abstract: Aspects of the invention include determining whether a first log message written by an application during a first job is a message of interest based on a context of the first log message and a probability that the application writes the message for a same job as the first job. Calculating in response to determining that the first log message is a message of interest and by the processor, a correlation score based on intersecting tokens between the first log message and a second log message. Determining the first log message correlates to the second log message based on comparing the score to a threshold score. Modifying a system log of a mainframe to link the first log message to the second log message based on the correlation.Type: GrantFiled: December 3, 2020Date of Patent: August 2, 2022Assignee: International Business Machines CorporationInventors: Yuk L. Chan, Jia Qi Li, Lin Yang, Tian Wu, Lei Yu, Hong Min, Fan Jing Meng
-
Publication number: 20220191226Abstract: Examples described herein provide a computer-implemented method that includes receiving a list of objects with anomaly detection results associated therewith. The method further includes generating a resource graph, wherein the resource graph comprises at least two nodes, each of the at least two nodes being associated with one of the objects. The method further includes determining a relationship between the at least two nodes. The method further includes assigning an anomaly score to at least one of the objects. The method further includes calculating for at least one of the nodes, an overall anomaly score for the at least one of the nodes based on the anomaly score for the at least one of the objects and based on the anomaly score for another node related to the at least one of the nodes.Type: ApplicationFiled: December 14, 2020Publication date: June 16, 2022Inventors: Yuk L. Chan, Anuja Deedwaniya, Robert M. Abrams
-
Publication number: 20220188290Abstract: Examples described herein provide a computer-implemented method that includes defining a key performance indicator associated with a non-instrumented object of a processing system. The method further includes determining a current anomaly level of the key performance indicator for an instrumented object having a relationship with the non-instrumented object. The method further includes assigning an anomaly level to the non-instrumented object based on the current anomaly level.Type: ApplicationFiled: December 14, 2020Publication date: June 16, 2022Inventors: Yuk L. Chan, Anuja Deedwaniya, Robert M. Abrams
-
Publication number: 20220188424Abstract: Examples described herein provide a computer-implemented method that includes detecting an anomaly associated with an object of a computer system and determining an importance classification of the object. An object relationship of the object is determined with respect to one or more other objects of the computer system. An impact score of the anomaly is determined based on the importance classification and the object relationship. An anomaly report is output with the impact score.Type: ApplicationFiled: December 14, 2020Publication date: June 16, 2022Inventors: Yuk L. Chan, Anuja Deedwaniya, Robert M. Abrams
-
Publication number: 20220179866Abstract: Aspects of the invention include computer systems, computer-implemented methods, and computer program products configured to perform message correlation extraction for mainframe operation. A non-limiting example computer-implemented method includes receiving a first message log entry having a message identifier and message field data. The first message log entry is pre-processed to determine the message identifier and to tokenize the message field data. A second message log entry is identified based on at least one of the message identifier and the tokenized message field data. The method further includes determining that the second message log entry is correlated with the first message log entry and providing an output comprising the message correlation between the first message log entry and the second message log entry.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Yuk L. Chan, Jia Qi Li, LIN Yang, Tian Wu, Lei Yu, Hong Min, FAN JING Meng
-
Publication number: 20220179764Abstract: According to an aspect a computer-implemented method includes identifying a plurality of metrics and log identifiers that describe similar information as a plurality of documentation-based correlation data. One or more metric pair correlations are identified. One or more log frequency correlations are identified by temporal correlation. A plurality of correlated metric-log pairs is identified. A correlation database is populated with the documentation-based correlation data, the one or more metric pair correlations, the one or more log frequency correlations, and the correlated metric-log pairs to support anomaly detection in one or more monitored computer systems.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Yuk L. Chan, Tian Wu, Lei Yu, Jia Qi Li, Zhi Shuai Han, Hong Min, Fan Jing Meng, Abhishek Dokania
-
Publication number: 20220179763Abstract: Techniques include collecting current logs from distributed sources, selecting a group of the current logs that are from a related source of the distributed sources, and generating a feature vector using the group of the current logs. A current status model is created for the feature vector using the group of the current logs. One or more anomalies are determined in the group of the current logs based on a difference between the current status model and a reference status model, the reference status model being based on history logs.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Yuk L. Chan, Lin Yang, Tian Wu, Jia Qi Li, Lei Yu, Hong Min, Fan Jing Meng
-
Publication number: 20220179881Abstract: Aspects of the invention include determining whether a first log message written by an application during a first job is a message of interest based on a context of the first log message and a probability that the application writes the message for a same job as the first job. Calculating in response to determining that the first log message is a message of interest and by the processor, a correlation score based on intersecting tokens between the first log message and a second log message. Determining the first log message correlates to the second log message based on comparing the score to a threshold score. Modifying a system log of a mainframe to link the first log message to the second log message based on the correlation.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Yuk L. Chan, Jia Qi Li, LIN YANG, Tian Wu, Lei Yu, Hong Min, Fan Jing Meng
-
Publication number: 20220179729Abstract: According to an aspect, a method includes searching for a correlated log identifier in a correlation database based on detecting a metrics-based anomaly. The method also includes providing, in a problem diagnosis, related log information associated with the correlated log identifier based on locating one or more log entries including the correlated log identifier in a same time window as the metrics-based anomaly. The method further includes searching for a correlated metric in the correlation database based on detecting a log-based anomaly and providing, in the problem diagnosis, related metric information associated with the correlated metric based on locating one or more metrics records including the correlated metric in the same time window as the log-based anomaly.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Yuk L. Chan, Tian Wu, Jia Qi Li, Zhi Shuai Han, Lei Yu, Hong Min, Fan Jing Meng, Abhishek Dokania
-
Publication number: 20220180217Abstract: Aspects of the invention include computer systems, computer-implemented methods, and computer program products configured to integrate documentation knowledge with log mining data. A non-limiting example computer-implemented method includes determining a message-message relationship based on log message documentation and building a first subgraph based on the message-message relationship. The method further includes receiving a first message log entry having a message identifier and message field data. A second message log entry is correlated with the first message log entry based on at least one of the message identifier and the message field data. A second subgraph is built that includes the first message log entry and the second message log entry. The method includes building a graph that includes the first subgraph and the second subgraph.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Yuk L. Chan, Lei Yu, Jia Qi Li, Zhi Shuai Han, Tian Wu, Hong Min, FAN JING Meng
-
Publication number: 20220179730Abstract: Techniques include generating a log sequence for new logs that have been received, searching a log sequence database for the log sequence having been generated, and determining that the log sequence is anomalous in response to not finding an identical log sequence in the log sequence database. In response to the log sequence not being found in the log sequence database, the log sequence is compared to a graph of historical log sequences to find a closest sequence path to one or more historical log sequences. An anomaly of the log sequence is diagnosed based on an occurrence at which the log sequence deviates from the closest sequence path of the one or more historical log sequences.Type: ApplicationFiled: December 3, 2020Publication date: June 9, 2022Inventors: Yuk L. Chan, Jia Qi Li, Zhi Shuai Han, Tian Wu, Lei Yu, Hong Min, FAN JING Meng