Rong Yao Fu’s research while affiliated with IBM and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (6)


Method and system for securely installing patches for an operating system
  • Patent
  • Full-text available

January 2014

·

21 Reads

Rong Yao Fu

·

Yuan Quan

·

Xia Tian Zhang

·

Shi Wan Zhao

A method and a system for securely installing patches for an operating system, wherein the system comprises a personal firewall, for filtering inbound and outbound network traffic; an operating system update agent, for connecting to an update server via the personal firewall to download patches; a policy manager, for invoking respective policies according to respective stages of the operating system; a stage coordinator, for coordinating the policy manager and the operating system update agent for different stages; and a policy database, for storing respective policies for respective stages of the operating system. With the method and system, the possibility of being infected by malicious software is significantly reduced when downloading patches for the operating system from the Internet.

Download

Labeling a video, for modifying a video, and for video processing

January 2014

·

9 Reads

A computer program product for processing a video having a plurality of objects is provided. The computer program product includes a computer readable storage medium having computer readable program code embodied therewith. The computer readable program code is configured for labeling at least one object among the plurality of objects with a property selected from the group consisting of: whether the object can be modified; whether the object can be replaced; and at least one of: name, color, size, and content. The computer readable program code is configured for replacing the at least one object with another object having a property matching therewith if the object has been labeled as one that can be replaced. The computer readable program code is configured for modifying the at least one object to obtain a new object if the object has been labeled as one that can be modified.


Method and apparatus for resource transfer

July 2013

·

8 Reads

Rong Yao Fu

·

Chang Jie Guo

·

Yi Hui

·

[...]

·

Zhang Kuo

A method and apparatus for transferring resources from a server to a client, wherein the resources are for an object in an application. According to the present invention, resources needed by the object are determined. Resources which have usages that are less than a threshold according to statistics are removed from the determined resources. The remainder of the determined resources, which are needed by the object, is transferred to the client. According to the present invention, users do not have to wait for a long time before they can see a web page.


Method and system for user information processing and resource recommendation in a network environment

April 2013

·

10 Reads

A method and apparatus for user information processing in a network environment. The method performs an orthogonal transform on first and second vectors representing information related to first and second users respectively to obtain first and second transformed vectors. Then, the method splits the first and second transformed vectors into two parts respectively, such that first and second vectors cannot be derived from the first or second parts. The first and second user devices exchange the first part of the first transformed vector and the second part of the second transformed vector. The first and second user devices calculate the inner product of the first parts and the second parts respectively. Finally, the two inner products of the parts are summed to get an inner product of the first and second vectors. Also provided are a method and system for resource recommendation in a network environment.


Method and device for verification of code module in virtual machine

January 2013

·

5 Reads

A method for pre-verification of a code module when the code module is installed or updated in a virtual machine, comprising: loading codes in the installed or updated code module; performing code verification on the codes in the code module; if the code verification is passed, generating a certificate of the code module; and storing the code module passing the code verification and its certificate. The present invention also discloses a method for verification of a code module at runtime of the code module in a virtual machine, comprising loading codes in the code module; generating a certificate of the code module based on the loaded codes; if the generated certificate of the code module and a pre-stored certificate of the code module are identical, verifying the code module to be valid; otherwise performing a pre-verification on the code module.


Method and system for protecting cross-domain interaction of a web application on an unmodified browser

January 2013

·

3 Reads

A system and method for protecting cross-domain interaction of a web application on an unmodified browser. The system includes: a security framework, which is created by a browser. The security framework further includes: a component creator for creating components from a plurality of sources; and supervision module for supervising and controlling scripts/codes executed during the creation of components and invocation and interaction operations performed by various components after the creation of components.