-
公开(公告)号:US20200304839A1
公开(公告)日:2020-09-24
申请号:US16362678
申请日:2019-03-24
Applicant: International Business Machines Corporation
Inventor: Di Ling Chen , Shi Su , Wu Mi Zhong
IPC: H04N21/2187 , G06K9/00 , G06F17/27 , H04N21/442 , H04N21/258
Abstract: Embodiments of the invention provide a method, system and computer program product for personalized key object detection in a live video stream. The method includes streaming a live video stream in a window of a computing device and during the streaming, collecting biophysical data of an end user viewing the playing back and responding to ones of the collected biophysical data that indicate a positive reaction by associating a contemporaneously displayed frame of the live video stream with the positive reaction. Thereafter, each corresponding frame associated with positive feedback can be processed by identifying key words presented in text of the feedback to the corresponding frame, matching the identified key words to a tag of an object visually presented in the corresponding frame, and storing a reference to the object in connection with the end user as an object of interest for which targeted marketing may be presented.
-
公开(公告)号:US10691474B2
公开(公告)日:2020-06-23
申请号:US15396948
申请日:2017-01-03
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Shao Jun Ding , Zhi Li Guan , Yang Liang , Ting Yin , Wu Mi Zhong
Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.
-
公开(公告)号:US11632397B2
公开(公告)日:2023-04-18
申请号:US16514607
申请日:2019-07-17
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Wu Mi Zhong , Ting Yin , Zhi Li Guan , Yang Liang , Shao Jun Ding
Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.
-
公开(公告)号:US10691504B2
公开(公告)日:2020-06-23
申请号:US15675828
申请日:2017-08-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Xin Peng Liu , Ying Mao , Kun Yang , Jing You , Wu Mi Zhong
Abstract: A method, computer system, and a computer program product for migrating a service from one container to another container is provided. The present invention may include obtaining a first group of requests that are accessing a service launched in a first container instance and a second group of requests that are waiting for accessing the service. The present invention may also include generating a migrated service in a second container instance by migrating the service from the first container instance to the second container instance based on the obtained first and second groups of requests. The present invention may further include directing the second group of requests to the migrated service in the second container instance.
-
公开(公告)号:US20190356698A1
公开(公告)日:2019-11-21
申请号:US16514607
申请日:2019-07-17
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Wu Mi Zhong , Ting Yin , Zhi Li Guan , Yang Liang , Shao Jun Ding
Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.
-
公开(公告)号:US20180188914A1
公开(公告)日:2018-07-05
申请号:US15396948
申请日:2017-01-03
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Shao Jun Ding , Zhi Li Guan , Yang Liang , Ting Yin , Wu Mi Zhong
IPC: G06F3/0484 , G06F17/24 , G06F17/22
Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.
-
公开(公告)号:US20200241898A1
公开(公告)日:2020-07-30
申请号:US16849184
申请日:2020-04-15
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Shao Jun Ding , Zhi Li Guan , Yang Liang , Ting Yin , Wu Mi Zhong
Abstract: Embodiments of the present disclosure relate to text resources in an application. According to a method, an updated application is run, wherein information displayed on at least one text resource in the updated application is editable and the information displayed on at least one text resource in an original application of the updated application is not editable. Then, in response to a first piece of information displayed on a text resource of the at least one text resource being changed to a second piece of information, ID of the text resource of the at least one text resource in the updated application is obtained; and the second piece of information is mapped to the ID of the text resource in a file corresponding to the at least one text resource in the updated application.
-
公开(公告)号:US20190199750A1
公开(公告)日:2019-06-27
申请号:US15850215
申请日:2017-12-21
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Wu Mi Zhong , Ting Yin , Zhi Li Guan , Yang Liang , Shao Jun Ding
Abstract: A method, computer program product, and system includes a processor(s) obtaining an authorization failure from a target application because an access request was denied based on insufficient permissions of a user. The processor(s) institutes a mock interface with a visual appearance of the target application. The mock interface displays predefined data and the target application displays dynamic data, from the server(s) executing the target application. The processor(s) obtains, via the mock interface, a request to change the permissions of the user to the target application, which includes a selection, by the user, through the mock interface, of one or more individual permissions displayed in the mock interface. The processor(s) automatically generates a customized security policy comprising the selection, where based on applying the customized security policy, repeating the access request results in authorized access to the target application.
-
公开(公告)号:US20190050272A1
公开(公告)日:2019-02-14
申请号:US15675828
申请日:2017-08-14
Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
Inventor: Xin Peng Liu , Ying Mao , Kun Yang , Jing You , Wu Mi Zhong
Abstract: A method, computer system, and a computer program product for migrating a service from one container to another container is provided. The present invention may include obtaining a first group of requests that are accessing a service launched in a first container instance and a second group of requests that are waiting for accessing the service. The present invention may also include generating a migrated service in a second container instance by migrating the service from the first container instance to the second container instance based on the obtained first and second groups of requests. The present invention may further include directing the second group of requests to the migrated service in the second container instance.
-
公开(公告)号:US20180276057A1
公开(公告)日:2018-09-27
申请号:US15465785
申请日:2017-03-22
Applicant: International Business Machines Corporation
Inventor: Dong Chen , Shao Jun Ding , Zhi Li Guan , Yang Liang , Xin Peng Liu , Ting Yin , Wu Mi Zhong
IPC: G06F9/54
CPC classification number: G06F9/543
Abstract: An enhanced copy-and-paste function copies multiple logical and physical software objects from a source computing environment to a distinct target computing environment. A physical object can be any software-data entity, such as a document, a container, a database, or a disk image. A logical object contains a hierarchy of two or more physical or logical objects. Objects are copied to a logical copy clipboard, where they may be assembled into logical objects. Each physical object is then transferred one at a time to a conventional physical clipboard, transmitted to a corresponding physical clipboard in a corresponding target environment, and then forwarded to a logical paste clipboard, where the original logical objects are reconstructed and pasted into the target environment. Each logical object may be pasted into multiple target environments and may contain physical objects copied from multiple source environments. Multiple logical objects may contain the same physical object.
-
-
-
-
-
-
-
-
-