Issued Patents All Time
Showing 25 most recent of 50 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12411756 | Determination of a prioritized subset of test cases to run after a source code change | Chun Ling Li, Heng Wang, Jing Wen Chen, Zhi Dan Hao, Wei Jiang +1 more | 2025-09-09 |
| 12388830 | Secure container use based on permission limitation of image layers | Si Yu Chen, Wen Ji Huang, Heng Wang, Yan Huang | 2025-08-12 |
| 12332847 | Dynamically removing duplicate container image layers | Si Yu Chen, Heng Wang, Bo Liu | 2025-06-17 |
| 12301583 | Access configuration in hybrid network environments | Qian Xia Song, Ai Ping Feng, Chun Li Jia, Jin Yang, Kui Zhang +1 more | 2025-05-13 |
| 12293166 | Enhanced exception handling for debugging | Lei Wang, Zheng Lei An, Yan Huang, Dong Chen | 2025-05-06 |
| 12287825 | On-demand image layer retrieval | Hao WU, Si Yu Chen, Lu Li, Min Cheng, Wen Qi WQ Ye +1 more | 2025-04-29 |
| 12222851 | Selectively capturing traffic in service mesh | Yue Wang, Xinpeng Liu, Wei Wu, Peng Hui Jiang | 2025-02-11 |
| 12186847 | Selective field-assisted machining system | Jianfeng Xu, Zhengding Zheng, Jianguo Zhang, Kai-Feng Huang, Mao-Nan Wang +1 more | 2025-01-07 |
| 12189515 | Identifying regression test failures | Xiao-Yu Li, Hua Wei Fan, Jiangang Deng, Hong Wei Sun, Wen Ji Huang | 2025-01-07 |
| 12182559 | Deployment of updated services or layers on demand through containers | Si Yu Chen, Juliet C. Candee, Yan Qin, Hao WU, Wen Bin Han | 2024-12-31 |
| 12124870 | Automatic selection of nodes on which to perform tasks | Xiao Zhen Zhu, Yang Cao, Yun Juan Yang | 2024-10-22 |
| 12074760 | Path management | Yan Huang, Heng Wang, Kai D. Feng, Zheng Lei An, Shuang Shuang Jia +2 more | 2024-08-27 |
| 12026122 | Method and device for processing file using at least two sub-files separately stored in at least two equipments | Xiaoyan Lou, Xuan Zhu, Yifei GUO | 2024-07-02 |
| 12020043 | Using containers to clean runtime resources when unloading a shared library | Heng Wang, Wan Yue Chen, Zhen Chen, Wen Ji Huang, Dong Chen | 2024-06-25 |
| 11983090 | Setting breakpoints for source code segments enclosed by macros | Wen Ji Huang, Heng Wang, Sheng Shuang Li, Wen Bin Han, Peng Hui Jiang | 2024-05-14 |
| 11966322 | Preloading debug information based on the increment of application | Xiao Xuan Fu, Jiang Yi Liu, Zhan Peng Huo, Wen Ji Huang, Qing Yu Pei +2 more | 2024-04-23 |
| 11954106 | Dynamic data aggregation | Bo Chen Zhu, Xi Bo Zhu, Cheng Fang Wang | 2024-04-09 |
| 11947966 | Identifying computer instructions enclosed by macros and conflicting macros at build time | Wen Ji Huang, Wen Bin Han, Sheng Shuang Li, Xiao Zhen Zhu | 2024-04-02 |
| 11861023 | Matching cryptographic computing resources to the predicted requirements for decrypting encrypted communications | Heng Wang, Wan Yue Chen, Chen Liu, Jing Li, Peng Hui Jiang | 2024-01-02 |
| 11856090 | Data protection optimization | Hong Qing Zhou, Yan Lin Ren, Zong Xiong ZX Wang, Zhang Li | 2023-12-26 |
| 11798001 | Progressively validating access tokens | Peng Hui Jiang, Xin Peng Liu, Wei Wu | 2023-10-24 |
| 11693759 | Providing for multi-process log debug without running on a production environment | Qi Ye, Wen Ji Huang, Heng Wang, Kui Zhang | 2023-07-04 |
| 11675575 | Checking source code validity at time of code update | Wen Ji Huang, Sheng Shuang Li, Wen Bin Han, Jun Su | 2023-06-13 |
| 11620394 | Allocating multiple database access tokens to a single user | Yuan Yuan, Xiao Yang Li, Qun Wei, Hong Liang Zhao, Yu Fang | 2023-04-04 |
| 11481200 | Checking source code validity at time of code update | Wen Ji Huang, Sheng Shuang Li, Wen Bin Han, Jun Su | 2022-10-25 |