Patents by Inventor HuyAnh Dinh Ngo

HuyAnh Dinh Ngo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11838400
    Abstract: An example operation may include one or more of receiving storage requests endorsed by blockchain peers of a blockchain, selecting a group of the endorsed storage requests to be stored together and ordering the group of endorsed storage requests with respect to each other based on timestamps, encoding the group of ordered and endorsed storage requests into an image, and storing the encoded image within a data section of a block of the blockchain.
    Type: Grant
    Filed: November 19, 2019
    Date of Patent: December 5, 2023
    Assignee: International Business Machines Corporation
    Inventors: Gary I. Givental, HuyAnh Dinh Ngo, Srinivas Babu Tummalapenta, Aankur Bhatia, Wesley Ali Khademi, Adam Lee Griffin
  • Publication number: 20230274289
    Abstract: A system and method for automatic remediation of non-compliance events are provided. In embodiments, a computer-implemented method includes: accessing a compliance profile and a remediation profile, wherein the compliance profile includes compliance data regarding rules for an enterprise and the remediation profile includes remediation data regarding remediation actions to address non-compliance with one or more of the rules; generating mapped data by mapping compliance data in the compliance profile to remediation data in the remediation profile; receiving non-compliance event data from a workload node in a network; extracting information from the non-compliance event data including the workload node associated with the event and a cause of event; determining a remediation action for the event based on the information and the mapped data; and invoking automatic performance of the remediation action at the workload node based on the determined remediation action.
    Type: Application
    Filed: April 20, 2023
    Publication date: August 31, 2023
    Inventors: John KURIAN, Hariharan N. VENKITACHALAM, HuyAnh Dinh NGO, Srinivas Babu TUMMALAPENTA
  • Patent number: 11676158
    Abstract: A system and method for automatic remediation of non-compliance events are provided. In embodiments, a computer-implemented method includes: accessing a compliance profile and a remediation profile, wherein the compliance profile includes compliance data regarding rules for an enterprise and the remediation profile includes remediation data regarding remediation actions to address non-compliance with one or more of the rules; generating mapped data by mapping compliance data in the compliance profile to remediation data in the remediation profile; receiving non-compliance event data from a workload node in a network; extracting information from the non-compliance event data including the workload node associated with the event and a cause of event; determining a remediation action for the event based on the information and the mapped data; and invoking automatic performance of the remediation action at the workload node based on the determined remediation action.
    Type: Grant
    Filed: June 2, 2020
    Date of Patent: June 13, 2023
    Assignee: KYNDRYL, INC.
    Inventors: John Kurian, Hariharan N. Venkitachalam, HuyAnh Dinh Ngo, Srinivas Babu Tummalapenta
  • Patent number: 11522905
    Abstract: A method, system, and computer program product for malicious virtual machine detection is provided. The method passes network traffic from a set of virtual machines to a set of network resources. The network traffic passes through a network monitor. The network monitor monitors a set of traffic characteristics for the network traffic. A change in a network traffic characteristic is identified. The change results in a modified traffic characteristic. The method identifies a first virtual machine of the set of virtual machines. The first virtual machine is associated with the modified traffic characteristics. An alert is then generated which identifies the first virtual machine and the modified traffic characteristic.
    Type: Grant
    Filed: September 11, 2019
    Date of Patent: December 6, 2022
    Assignee: International Business Machines Corporation
    Inventors: Seng Chai Gan, Stanley Bryan Hardter, Adam Lee Griffin, HuyAnh Dinh Ngo
  • Patent number: 11445369
    Abstract: A method, system and computer-usable medium are disclosed for providing a travel network infrastructure. A dedicated Li-F connection is provided for each physical space such as a seat, expected to accommodate a passenger in a travel network such as an airline. A passenger is authenticated according to a physical space occupied by the passenger. If authentication is successful, a secure Li-Fi channel is established for the passenger. The access point of the Li-Fi channel is only leveraged by the passenger and no other passengers.
    Type: Grant
    Filed: February 25, 2020
    Date of Patent: September 13, 2022
    Assignee: International Business Machines Corporation
    Inventors: Shikhar Kwatra, Adam Lee Griffin, Srinivas Babu Tummalapenta, Seng Chai Gan, HuyAnh Dinh Ngo
  • Publication number: 20220277176
    Abstract: Methods and a system of classifying unrecognized logs in an environment. The method includes inputting a log unrecognized during event collection into a machine learning model and predicting, by the machine learning model, a log source type of the log to allow for normalization of the log. The method also includes producing, by the machine learning model, a confidence score relating to the source type prediction, determining the confidence score exceeds a predetermined threshold, and submitting the log for normalization based on the log source type prediction. The method can also include predicting, by the machine learning model, an event name relating to the log, producing, by the machine learning model, a second confidence score relating to the event name prediction, determining the second confidence score exceeds another predetermined threshold, and submitting the log for normalization based on the identified log source type and the predicted event name.
    Type: Application
    Filed: February 26, 2021
    Publication date: September 1, 2022
    Inventors: Aankur Bhatia, HuyAnh Dinh Ngo, Srinivas Babu Tummalapenta, Mahbod Tavallaee
  • Patent number: 11317424
    Abstract: A system for prioritizing network resource dispatch may include receiving a request for a network resource from a mobile device associated with a user, the request comprising mobile device and user characteristics, and location information. A request priority may be determined based on some combination of a mobile device score and user score. The request priority is assigned to the request. A highest ranked mobile device request priority is determined, and the network resource is dispatched to a location corresponding to the highest ranked request priority. A heatmap may be generated to illustrate a geographical representation of each mobile device data usage rate at each mobile device respective location. The request priorities may change based on any combination of the mobile device characteristics, user characteristics, location information and the usage characteristics. Therefore, the priority of dispatching the network resource may be determined dynamically and updated as the inputs change.
    Type: Grant
    Filed: August 12, 2020
    Date of Patent: April 26, 2022
    Assignee: International Business Machines Corporation
    Inventors: Aaron T. Wodrich, Vinod A. Valecha, HuyAnh Dinh Ngo, John Blackman
  • Publication number: 20220053504
    Abstract: A system for prioritizing network resource dispatch may include receiving a request for a network resource from a mobile device associated with a user, the request comprising mobile device and user characteristics, and location information. A request priority may be determined based on some combination of a mobile device score and user score. The request priority is assigned to the request. A highest ranked mobile device request priority is determined, and the network resource is dispatched to a location corresponding to the highest ranked request priority. A heatmap may be generated to illustrate a geographical representation of each mobile device data usage rate at each mobile device respective location. The request priorities may change based on any combination of the mobile device characteristics, user characteristics, location information and the usage characteristics. Therefore, the priority of dispatching the network resource may be determined dynamically and updated as the inputs change.
    Type: Application
    Filed: August 12, 2020
    Publication date: February 17, 2022
    Inventors: Aaron T. Wodrich, Vinod A. Valecha, HuyAnh Dinh Ngo, John Blackman
  • Publication number: 20210374767
    Abstract: A system and method for automatic remediation of non-compliance events are provided. In embodiments, a computer-implemented method includes: accessing a compliance profile and a remediation profile, wherein the compliance profile includes compliance data regarding rules for an enterprise and the remediation profile includes remediation data regarding remediation actions to address non-compliance with one or more of the rules; generating mapped data by mapping compliance data in the compliance profile to remediation data in the remediation profile; receiving non-compliance event data from a workload node in a network; extracting information from the non-compliance event data including the workload node associated with the event and a cause of event; determining a remediation action for the event based on the information and the mapped data; and invoking automatic performance of the remediation action at the workload node based on the determined remediation action.
    Type: Application
    Filed: June 2, 2020
    Publication date: December 2, 2021
    Inventors: John KURIAN, Hariharan N. VENKITACHALAM, HuyAnh Dinh NGO, Srinivas Babu TUMMALAPENTA
  • Publication number: 20210345101
    Abstract: An approach is disclosed that receives location data from a location based device via a Light Fidelity (LiFi) wireless communication adapter. A LiFi receiver at the receiving system is within a direct line-of-sight to a LiFi transmitter of the location based device. The received location data is then provided to a bootable network asset, such as a virtual machine (VM) or application container running on the system. The bootable network asset then determines whether to operate based on the received location data.
    Type: Application
    Filed: April 29, 2020
    Publication date: November 4, 2021
    Inventors: Stanley Bryan Hardter, HuyAnh Dinh Ngo, Seng Chai Gan, Adam Lee Griffin
  • Publication number: 20210266741
    Abstract: A method, system and computer-usable medium are disclosed for providing a travel network infrastructure. A dedicated Li-F connection is provided for each physical space such as a seat, expected to accommodate a passenger in a travel network such as an airline. A passenger is authenticated according to a physical space occupied by the passenger. If authentication is successful, a secure Li-Fi channel is established for the passenger. The access point of the Li-Fi channel is only leveraged by the passenger and no other passengers.
    Type: Application
    Filed: February 25, 2020
    Publication date: August 26, 2021
    Inventors: Shikhar Kwatra, Adam Lee Griffin, Srinivas Babu Tummalapenta, Seng Chai Gan, HuyAnh Dinh Ngo
  • Publication number: 20210152327
    Abstract: An example operation may include one or more of receiving storage requests endorsed by blockchain peers of a blockchain, selecting a group of the endorsed storage requests to be stored together and ordering the group of endorsed storage requests with respect to each other based on timestamps, encoding the group of ordered and endorsed storage requests into an image, and storing the encoded image within a data section of a block of the blockchain.
    Type: Application
    Filed: November 19, 2019
    Publication date: May 20, 2021
    Inventors: Gary I. Givental, HuyAnh Dinh Ngo, Srinivas Babu Tummalapenta, Aankur Bhatia, Wesley Ali Khademi, Adam Lee Griffin
  • Patent number: 11012869
    Abstract: Provided are techniques for dynamic LIFI extenders routing. One or more geographic locations of a physical region are identified based on historical crowd density, historical network traffic, current crowd density, and current network traffic. For each of the one or more geographic locations and a plurality of mobile bots, a mobile bot of the plurality of mobile bots is sent to that geographic location at a specified time, where the mobile bot provides a dynamic Light Fidelity (LIFI) extender router that acts as a network access point, and users at that geographic location are associated with the mobile bot, where each of the users has a LIFI enabled mobile device that communicates with a network of devices by sending data to the dynamic LIFI extender router via LIFI.
    Type: Grant
    Filed: February 18, 2020
    Date of Patent: May 18, 2021
    Assignee: International Business Machines Corporation
    Inventors: Shikhar Kwatra, Srinivas Babu Tummalapenta, Adam Lee Griffin, HuyAnh Dinh Ngo, Seng Chai Gan
  • Publication number: 20210075797
    Abstract: A method, system, and computer program product for malicious virtual machine detection is provided. The method passes network traffic from a set of virtual machines to a set of network resources. The network traffic passes through a network monitor. The network monitor monitors a set of traffic characteristics for the network traffic. A change in a network traffic characteristic is identified. The change results in a modified traffic characteristic. The method identifies a first virtual machine of the set of virtual machines. The first virtual machine is associated with the modified traffic characteristics. An alert is then generated which identifies the first virtual machine and the modified traffic characteristic.
    Type: Application
    Filed: September 11, 2019
    Publication date: March 11, 2021
    Inventors: SENG CHAI GAN, Stanley Bryan Hardter, Adam Lee Griffin, HuyAnh Dinh Ngo
  • Publication number: 20200399929
    Abstract: Ensuring physical access control of a lockbox according to a contract. Parties to the contract interact with the lockbox according to contractual requirements recorded to a ledger accessible over a network. The ledger linking access activity of the parities using cryptography. The lockbox is opened with a credential provided over the network and secured automatically upon closing of the lockbox such that the credential no longer opens the lockbox.
    Type: Application
    Filed: June 24, 2019
    Publication date: December 24, 2020
    Inventors: Stanley Bryan Hardter, HuyAnh Dinh Ngo, Adam Lee Griffin, Seng Chai Gan
  • Patent number: 9430645
    Abstract: An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. Rules for analyzing the event data can be retrieved based on the device. The event data is analyzed based on the rules to determine recordable events. Recordable events are organized into categories representing a type or severity of attack. Current event counts are calculated by summing the recordable events for each category. A normal profile is retrieved for the device and compared to the current event count. A percentage change trigger can be retrieved from a threshold matrix based on the current event count. The percentage increase of the current event count over the normal profile is calculated and compared to the percentage change trigger to determine if an alert is triggered by the analysis system.
    Type: Grant
    Filed: September 10, 2015
    Date of Patent: August 30, 2016
    Assignee: International Business Machines Corporation
    Inventors: Gary Israel Givental, HuyAnh Dinh Ngo, Michael John Suzio
  • Patent number: 9256740
    Abstract: An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. Rules for analyzing the event data can be retrieved based on the device. The event data is analyzed based on the rules to determine recordable events. Recordable events are organized into categories representing a type or severity of attack. Current event counts are calculated by summing the recordable events for each category. A normal profile is retrieved for the device and compared to the current event count. A percentage change trigger can be retrieved from a threshold matrix based on the current event count. The percentage increase of the current event count over the normal profile is calculated and compared to the percentage change trigger to determine if an alert is triggered by the analysis system.
    Type: Grant
    Filed: March 27, 2014
    Date of Patent: February 9, 2016
    Assignee: International Business Machines Corporation
    Inventors: Michael John Suzio, Gary Israel Givental, HuyAnh Dinh Ngo
  • Publication number: 20150381635
    Abstract: An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. Rules for analyzing the event data can be retrieved based on the device. The event data is analyzed based on the rules to determine recordable events. Recordable events are organized into categories representing a type or severity of attack. Current event counts are calculated by summing the recordable events for each category. A normal profile is retrieved for the device and compared to the current event count. A percentage change trigger can be retrieved from a threshold matrix based on the current event count. The percentage increase of the current event count over the normal profile is calculated and compared to the percentage change trigger to determine if an alert is triggered by the analysis system.
    Type: Application
    Filed: September 10, 2015
    Publication date: December 31, 2015
    Inventors: Gary Israel Givental, HuyAnh Dinh Ngo, Michael John Suzio
  • Publication number: 20140215624
    Abstract: An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. Rules for analyzing the event data can be retrieved based on the device. The event data is analyzed based on the rules to determine recordable events. Recordable events are organized into categories representing a type or severity of attack. Current event counts are calculated by summing the recordable events for each category. A normal profile is retrieved for the device and compared to the current event count. A percentage change trigger can be retrieved from a threshold matrix based on the current event count. The percentage increase of the current event count over the normal profile is calculated and compared to the percentage change trigger to determine if an alert is triggered by the analysis system.
    Type: Application
    Filed: March 27, 2014
    Publication date: July 31, 2014
    Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Michael John Suzio, Gary Israel Givental, HuyAnh Dinh Ngo