Patents by Inventor Zhi Li Guan
Zhi Li Guan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10671379Abstract: Embodiments of the present invention provide a method, system and computer program product for software globalization management. In an embodiment of the invention, a method for software globalization management incudes loading markup in a browser for rendering in the browser and parsing the markup to identify different markup language tags disposed in the markup. Thereafter, on condition that during the parsing a globalization tag is detected, an internationalization key associated with a textual resource is extracted in connection with the globalization tag, a locale setting is retrieved for the browser, the key is submitted to remote repository with the locale setting in order to retrieve therefrom a translated form of the textual resource in accordance with the locale setting, the translated form of the textual resource is received in response to the requesting and the markup is rendered with the translated form of the textual resource.Type: GrantFiled: March 27, 2018Date of Patent: June 2, 2020Assignee: International Business Machines CorporationInventors: Dong Chen, Zhi Li Guan, Yang Liang, Kun Yang, Ting Yin
-
Publication number: 20200167153Abstract: According to one or more embodiments of the present invention a computer-implemented method includes determining a link between a user interface element and a portion of a source code. The method further includes detecting a change in the portion of source code in response to a code-check in. The method further includes highlighting the user interface element during a subsequent execution of the source code.Type: ApplicationFiled: November 26, 2018Publication date: May 28, 2020Inventors: Cheng Fang Wang, Jin Zhang, Zhi Li Guan, Qin Qiong Zhang, Shuang Men
-
Publication number: 20200127952Abstract: A computer-implemented method is presented for enabling instant and automatic photo sharing between computing devices. The method includes allowing a first user to operate a first computing device to create a plurality of images, the plurality of images including physical characteristics of a second user, transmitting a broadcast message to a plurality of second computing devices, determining whether a match occurs between the first computing device and one or more of the plurality of second computing devices, and establishing a local area network between the first computing device and matched second computing devices. The method further includes automatically and instantly transmitting the plurality of images to the matched second computing devices by priority and sequence determinations, and, upon completion of the transmittal of the plurality of images to the matched second computing devices, terminating the local area network.Type: ApplicationFiled: October 23, 2018Publication date: April 23, 2020Inventors: Kun Yang, Zhi Li Guan, Huai Ying Xia, Xue Yong Zhang, Jin Zhang, Xi Mei Kong
-
Publication number: 20200117669Abstract: A method and system for determining causes. The method includes generating a set of cause indices. Each cause index includes a cause, at least one pattern, and a probability of the cause for the pattern. The method also includes receiving a data set, and determining that one or more indexed patterns match a pattern in the data set. Further, the method includes retrieving causes for the indexed patterns that match the pattern in the data set, as well as determining probabilities of the retrieved causes for the pattern in the data set.Type: ApplicationFiled: July 10, 2019Publication date: April 16, 2020Inventors: Jia Yu, Jia Tian Zhong, Xing Xing Shen, Zhan Peng Huo, Zhi Li Guan, Peng Hui Jiang
-
Publication number: 20200117720Abstract: A method and system for determining causes. The method includes generating a set of cause indices. Each cause index includes a cause, at least one pattern, and a probability of the cause for the pattern. The method also includes receiving a data set, and determining that one or more indexed patterns match a pattern in the data set. Further, the method includes retrieving causes for the indexed patterns that match the pattern in the data set, as well as determining probabilities of the retrieved causes for the pattern in the data set.Type: ApplicationFiled: October 11, 2018Publication date: April 16, 2020Inventors: Jia Yu, Jia Tian Zhong, Xing Xing Shen, Zhan Peng Huo, Zhi Li Guan, Peng Hui Jiang
-
Publication number: 20200028918Abstract: A computer-implemented method according to one embodiment includes receiving, at a server device, characteristics of a plurality of historical events from a plurality of client devices, receiving, at the server device, historical data sharing behavior associated with the plurality of historical events from the plurality of client devices, saving, by the server device, the characteristics of the plurality of historical events in association with the historical data sharing behavior, and automatically implementing, by the server device, one or more data sharing actions in response to an initialization of an event, utilizing the characteristics of the plurality of historical events and the historical data sharing behavior.Type: ApplicationFiled: September 26, 2019Publication date: January 23, 2020Inventors: Jeffrey A. Calcaterra, Romelia H. Flores, Zhi Li Guan, Su Liu
-
Publication number: 20190356698Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.Type: ApplicationFiled: July 17, 2019Publication date: November 21, 2019Inventors: Dong Chen, Wu Mi Zhong, Ting Yin, Zhi Li Guan, Yang Liang, Shao Jun Ding
-
Patent number: 10484480Abstract: A computer-implemented method according to one embodiment includes receiving, at a server device, characteristics of a plurality of historical events from a plurality of client devices, receiving, at the server device, historical data sharing behavior associated with the plurality of historical events from the plurality of client devices, saving, by the server device, the characteristics of the plurality of historical events in association with the historical data sharing behavior, and automatically implementing, by the server device, one or more data sharing actions in response to an initialization of an event, utilizing the characteristics of the plurality of historical events and the historical data sharing behavior.Type: GrantFiled: January 27, 2017Date of Patent: November 19, 2019Assignee: International Business Machines CorporationInventors: Jeffrey A. Calcaterra, Romelia H. Flores, Zhi Li Guan, Su Liu
-
Publication number: 20190303136Abstract: Embodiments of the present invention provide a method, system and computer program product for software globalization management. In an embodiment of the invention, a method for software globalization management incudes loading markup in a browser for rendering in the browser and parsing the markup to identify different markup language tags disposed in the markup. Thereafter, on condition that during the parsing a globalization tag is detected, an internationalization key associated with a textual resource is extracted in connection with the globalization tag, a locale setting is retrieved for the browser, the key is submitted to remote repository with the locale setting in order to retrieve therefrom a translated form of the textual resource in accordance with the locale setting, the translated form of the textual resource is received in response to the requesting and the markup is rendered with the translated form of the textual resource.Type: ApplicationFiled: March 27, 2018Publication date: October 3, 2019Inventors: Dong Chen, Zhi Li Guan, Yang Liang, Kun Yang, Ting Yin
-
Publication number: 20190199750Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.Type: ApplicationFiled: December 21, 2017Publication date: June 27, 2019Inventors: Dong Chen, Wu Mi Zhong, Ting Yin, Zhi Li Guan, Yang Liang, Shao Jun Ding
-
Publication number: 20190129921Abstract: A mechanism is provided for enhancing crossing copying and pasting operations. A user selected area in a source document is captured as an image. A set of MIOUs within the image are identified and, for each MIOU, a set of coordinates is determined. A set of relationships between the MIOUs is generated. Optical character recognition (OCR) is performed on an object within each MIOU. Responsive to the OCR on the object within the MIOU identifying text within the MIOU, the object is converted to text thereby forming a converted MIOU. Responsive to the OCR on the object within the MIOU failing to identifying text within the MIOU, the object is marked as an image thereby forming an unconverted MIOU. One or more properties are determined for each MIOU, which are then assigned to the MIOU. Each converted MIOU and each unconverted MIOU are then rendered in a target document.Type: ApplicationFiled: November 1, 2017Publication date: May 2, 2019Inventors: Jeffrey A. Calcaterra, Zhi Li Guan, Su Liu, Fang Wang
-
Publication number: 20180276057Abstract: An enhanced copy-and-paste function copies multiple logical and physical software objects from a source computing environment to a distinct target computing environment. A physical object can be any software-data entity, such as a document, a container, a database, or a disk image. A logical object contains a hierarchy of two or more physical or logical objects. Objects are copied to a logical copy clipboard, where they may be assembled into logical objects. Each physical object is then transferred one at a time to a conventional physical clipboard, transmitted to a corresponding physical clipboard in a corresponding target environment, and then forwarded to a logical paste clipboard, where the original logical objects are reconstructed and pasted into the target environment. Each logical object may be pasted into multiple target environments and may contain physical objects copied from multiple source environments. Multiple logical objects may contain the same physical object.Type: ApplicationFiled: March 22, 2017Publication date: September 27, 2018Inventors: Dong Chen, Shao Jun Ding, Zhi Li Guan, Yang Liang, Xin Peng Liu, Ting Yin, Wu Mi Zhong
-
Publication number: 20180219938Abstract: A computer-implemented method according to one embodiment includes identifying an event, utilizing a server device, determining a match between the event and an historical event, utilizing the server device, identifying historical data sharing behavior associated with the historical event, utilizing the server device, determining, by the server device, one or more data sharing actions to be performed during the event, utilizing the historical data sharing behavior, and automatically implementing the one or more data sharing actions in response to an initialization of the event, utilizing the server device.Type: ApplicationFiled: January 27, 2017Publication date: August 2, 2018Inventors: Jeffrey A. Calcaterra, Romelia H. Flores, Zhi Li Guan, Su Liu
-
Publication number: 20180219691Abstract: A computer-implemented method according to one embodiment includes receiving, at a server device, characteristics of a plurality of historical events from a plurality of client devices, receiving, at the server device, historical data sharing behavior associated with the plurality of historical events from the plurality of client devices, saving, by the server device, the characteristics of the plurality of historical events in association with the historical data sharing behavior, and automatically implementing, by the server device, one or more data sharing actions in response to an initialization of an event, utilizing the characteristics of the plurality of historical events and the historical data sharing behavior.Type: ApplicationFiled: January 27, 2017Publication date: August 2, 2018Inventors: Jeffrey A. Calcaterra, Romelia H. Flores, Zhi Li Guan, Su Liu
-
Publication number: 20180198831Abstract: In one embodiment, a system includes a processing circuit and logic integrated with the processing circuit, executable by the processing circuit, or integrated with and executable by the processing circuit. The logic is configured to cause the processing circuit to determine whether overlap of a first context status of a first user and a second context status of a second user exceeds a predetermined threshold. The first user and the second user belong to a plurality of users in a network. The logic is also configured to cause the processing circuit to create a group chat session in response to a determination that the overlap of the first and second context statuses exceeds the predetermined threshold. Moreover, the logic is configured to cause the processing circuit to add the first user and the second user to the group chat session in response to creation of the group chat session.Type: ApplicationFiled: January 11, 2017Publication date: July 12, 2018Inventors: Jeffrey A. Calcaterra, Romelia H. Flores, Zhi Li Guan, Su Liu
-
Publication number: 20180188914Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.Type: ApplicationFiled: January 3, 2017Publication date: July 5, 2018Inventors: Dong Chen, Shao Jun Ding, Zhi Li Guan, Yang Liang, Ting Yin, Wu Mi Zhong