Patents by Inventor HuyAnh Dinh Ngo
HuyAnh Dinh Ngo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11838400Abstract: An example operation may include one or more of receiving storage requests endorsed by blockchain peers of a blockchain, selecting a group of the endorsed storage requests to be stored together and ordering the group of endorsed storage requests with respect to each other based on timestamps, encoding the group of ordered and endorsed storage requests into an image, and storing the encoded image within a data section of a block of the blockchain.Type: GrantFiled: November 19, 2019Date of Patent: December 5, 2023Assignee: International Business Machines CorporationInventors: Gary I. Givental, HuyAnh Dinh Ngo, Srinivas Babu Tummalapenta, Aankur Bhatia, Wesley Ali Khademi, Adam Lee Griffin
-
Publication number: 20230274289Abstract: A system and method for automatic remediation of non-compliance events are provided. In embodiments, a computer-implemented method includes: accessing a compliance profile and a remediation profile, wherein the compliance profile includes compliance data regarding rules for an enterprise and the remediation profile includes remediation data regarding remediation actions to address non-compliance with one or more of the rules; generating mapped data by mapping compliance data in the compliance profile to remediation data in the remediation profile; receiving non-compliance event data from a workload node in a network; extracting information from the non-compliance event data including the workload node associated with the event and a cause of event; determining a remediation action for the event based on the information and the mapped data; and invoking automatic performance of the remediation action at the workload node based on the determined remediation action.Type: ApplicationFiled: April 20, 2023Publication date: August 31, 2023Inventors: John KURIAN, Hariharan N. VENKITACHALAM, HuyAnh Dinh NGO, Srinivas Babu TUMMALAPENTA
-
Patent number: 11676158Abstract: A system and method for automatic remediation of non-compliance events are provided. In embodiments, a computer-implemented method includes: accessing a compliance profile and a remediation profile, wherein the compliance profile includes compliance data regarding rules for an enterprise and the remediation profile includes remediation data regarding remediation actions to address non-compliance with one or more of the rules; generating mapped data by mapping compliance data in the compliance profile to remediation data in the remediation profile; receiving non-compliance event data from a workload node in a network; extracting information from the non-compliance event data including the workload node associated with the event and a cause of event; determining a remediation action for the event based on the information and the mapped data; and invoking automatic performance of the remediation action at the workload node based on the determined remediation action.Type: GrantFiled: June 2, 2020Date of Patent: June 13, 2023Assignee: KYNDRYL, INC.Inventors: John Kurian, Hariharan N. Venkitachalam, HuyAnh Dinh Ngo, Srinivas Babu Tummalapenta
-
Patent number: 11522905Abstract: A method, system, and computer program product for malicious virtual machine detection is provided. The method passes network traffic from a set of virtual machines to a set of network resources. The network traffic passes through a network monitor. The network monitor monitors a set of traffic characteristics for the network traffic. A change in a network traffic characteristic is identified. The change results in a modified traffic characteristic. The method identifies a first virtual machine of the set of virtual machines. The first virtual machine is associated with the modified traffic characteristics. An alert is then generated which identifies the first virtual machine and the modified traffic characteristic.Type: GrantFiled: September 11, 2019Date of Patent: December 6, 2022Assignee: International Business Machines CorporationInventors: Seng Chai Gan, Stanley Bryan Hardter, Adam Lee Griffin, HuyAnh Dinh Ngo
-
Patent number: 11445369Abstract: A method, system and computer-usable medium are disclosed for providing a travel network infrastructure. A dedicated Li-F connection is provided for each physical space such as a seat, expected to accommodate a passenger in a travel network such as an airline. A passenger is authenticated according to a physical space occupied by the passenger. If authentication is successful, a secure Li-Fi channel is established for the passenger. The access point of the Li-Fi channel is only leveraged by the passenger and no other passengers.Type: GrantFiled: February 25, 2020Date of Patent: September 13, 2022Assignee: International Business Machines CorporationInventors: Shikhar Kwatra, Adam Lee Griffin, Srinivas Babu Tummalapenta, Seng Chai Gan, HuyAnh Dinh Ngo
-
Publication number: 20220277176Abstract: Methods and a system of classifying unrecognized logs in an environment. The method includes inputting a log unrecognized during event collection into a machine learning model and predicting, by the machine learning model, a log source type of the log to allow for normalization of the log. The method also includes producing, by the machine learning model, a confidence score relating to the source type prediction, determining the confidence score exceeds a predetermined threshold, and submitting the log for normalization based on the log source type prediction. The method can also include predicting, by the machine learning model, an event name relating to the log, producing, by the machine learning model, a second confidence score relating to the event name prediction, determining the second confidence score exceeds another predetermined threshold, and submitting the log for normalization based on the identified log source type and the predicted event name.Type: ApplicationFiled: February 26, 2021Publication date: September 1, 2022Inventors: Aankur Bhatia, HuyAnh Dinh Ngo, Srinivas Babu Tummalapenta, Mahbod Tavallaee
-
Patent number: 11317424Abstract: A system for prioritizing network resource dispatch may include receiving a request for a network resource from a mobile device associated with a user, the request comprising mobile device and user characteristics, and location information. A request priority may be determined based on some combination of a mobile device score and user score. The request priority is assigned to the request. A highest ranked mobile device request priority is determined, and the network resource is dispatched to a location corresponding to the highest ranked request priority. A heatmap may be generated to illustrate a geographical representation of each mobile device data usage rate at each mobile device respective location. The request priorities may change based on any combination of the mobile device characteristics, user characteristics, location information and the usage characteristics. Therefore, the priority of dispatching the network resource may be determined dynamically and updated as the inputs change.Type: GrantFiled: August 12, 2020Date of Patent: April 26, 2022Assignee: International Business Machines CorporationInventors: Aaron T. Wodrich, Vinod A. Valecha, HuyAnh Dinh Ngo, John Blackman
-
Publication number: 20220053504Abstract: A system for prioritizing network resource dispatch may include receiving a request for a network resource from a mobile device associated with a user, the request comprising mobile device and user characteristics, and location information. A request priority may be determined based on some combination of a mobile device score and user score. The request priority is assigned to the request. A highest ranked mobile device request priority is determined, and the network resource is dispatched to a location corresponding to the highest ranked request priority. A heatmap may be generated to illustrate a geographical representation of each mobile device data usage rate at each mobile device respective location. The request priorities may change based on any combination of the mobile device characteristics, user characteristics, location information and the usage characteristics. Therefore, the priority of dispatching the network resource may be determined dynamically and updated as the inputs change.Type: ApplicationFiled: August 12, 2020Publication date: February 17, 2022Inventors: Aaron T. Wodrich, Vinod A. Valecha, HuyAnh Dinh Ngo, John Blackman
-
Publication number: 20210374767Abstract: A system and method for automatic remediation of non-compliance events are provided. In embodiments, a computer-implemented method includes: accessing a compliance profile and a remediation profile, wherein the compliance profile includes compliance data regarding rules for an enterprise and the remediation profile includes remediation data regarding remediation actions to address non-compliance with one or more of the rules; generating mapped data by mapping compliance data in the compliance profile to remediation data in the remediation profile; receiving non-compliance event data from a workload node in a network; extracting information from the non-compliance event data including the workload node associated with the event and a cause of event; determining a remediation action for the event based on the information and the mapped data; and invoking automatic performance of the remediation action at the workload node based on the determined remediation action.Type: ApplicationFiled: June 2, 2020Publication date: December 2, 2021Inventors: John KURIAN, Hariharan N. VENKITACHALAM, HuyAnh Dinh NGO, Srinivas Babu TUMMALAPENTA
-
Publication number: 20210345101Abstract: An approach is disclosed that receives location data from a location based device via a Light Fidelity (LiFi) wireless communication adapter. A LiFi receiver at the receiving system is within a direct line-of-sight to a LiFi transmitter of the location based device. The received location data is then provided to a bootable network asset, such as a virtual machine (VM) or application container running on the system. The bootable network asset then determines whether to operate based on the received location data.Type: ApplicationFiled: April 29, 2020Publication date: November 4, 2021Inventors: Stanley Bryan Hardter, HuyAnh Dinh Ngo, Seng Chai Gan, Adam Lee Griffin
-
Publication number: 20210266741Abstract: A method, system and computer-usable medium are disclosed for providing a travel network infrastructure. A dedicated Li-F connection is provided for each physical space such as a seat, expected to accommodate a passenger in a travel network such as an airline. A passenger is authenticated according to a physical space occupied by the passenger. If authentication is successful, a secure Li-Fi channel is established for the passenger. The access point of the Li-Fi channel is only leveraged by the passenger and no other passengers.Type: ApplicationFiled: February 25, 2020Publication date: August 26, 2021Inventors: Shikhar Kwatra, Adam Lee Griffin, Srinivas Babu Tummalapenta, Seng Chai Gan, HuyAnh Dinh Ngo
-
Publication number: 20210152327Abstract: An example operation may include one or more of receiving storage requests endorsed by blockchain peers of a blockchain, selecting a group of the endorsed storage requests to be stored together and ordering the group of endorsed storage requests with respect to each other based on timestamps, encoding the group of ordered and endorsed storage requests into an image, and storing the encoded image within a data section of a block of the blockchain.Type: ApplicationFiled: November 19, 2019Publication date: May 20, 2021Inventors: Gary I. Givental, HuyAnh Dinh Ngo, Srinivas Babu Tummalapenta, Aankur Bhatia, Wesley Ali Khademi, Adam Lee Griffin
-
Patent number: 11012869Abstract: Provided are techniques for dynamic LIFI extenders routing. One or more geographic locations of a physical region are identified based on historical crowd density, historical network traffic, current crowd density, and current network traffic. For each of the one or more geographic locations and a plurality of mobile bots, a mobile bot of the plurality of mobile bots is sent to that geographic location at a specified time, where the mobile bot provides a dynamic Light Fidelity (LIFI) extender router that acts as a network access point, and users at that geographic location are associated with the mobile bot, where each of the users has a LIFI enabled mobile device that communicates with a network of devices by sending data to the dynamic LIFI extender router via LIFI.Type: GrantFiled: February 18, 2020Date of Patent: May 18, 2021Assignee: International Business Machines CorporationInventors: Shikhar Kwatra, Srinivas Babu Tummalapenta, Adam Lee Griffin, HuyAnh Dinh Ngo, Seng Chai Gan
-
Publication number: 20210075797Abstract: A method, system, and computer program product for malicious virtual machine detection is provided. The method passes network traffic from a set of virtual machines to a set of network resources. The network traffic passes through a network monitor. The network monitor monitors a set of traffic characteristics for the network traffic. A change in a network traffic characteristic is identified. The change results in a modified traffic characteristic. The method identifies a first virtual machine of the set of virtual machines. The first virtual machine is associated with the modified traffic characteristics. An alert is then generated which identifies the first virtual machine and the modified traffic characteristic.Type: ApplicationFiled: September 11, 2019Publication date: March 11, 2021Inventors: SENG CHAI GAN, Stanley Bryan Hardter, Adam Lee Griffin, HuyAnh Dinh Ngo
-
Publication number: 20200399929Abstract: Ensuring physical access control of a lockbox according to a contract. Parties to the contract interact with the lockbox according to contractual requirements recorded to a ledger accessible over a network. The ledger linking access activity of the parities using cryptography. The lockbox is opened with a credential provided over the network and secured automatically upon closing of the lockbox such that the credential no longer opens the lockbox.Type: ApplicationFiled: June 24, 2019Publication date: December 24, 2020Inventors: Stanley Bryan Hardter, HuyAnh Dinh Ngo, Adam Lee Griffin, Seng Chai Gan
-
Patent number: 9430645Abstract: An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. Rules for analyzing the event data can be retrieved based on the device. The event data is analyzed based on the rules to determine recordable events. Recordable events are organized into categories representing a type or severity of attack. Current event counts are calculated by summing the recordable events for each category. A normal profile is retrieved for the device and compared to the current event count. A percentage change trigger can be retrieved from a threshold matrix based on the current event count. The percentage increase of the current event count over the normal profile is calculated and compared to the percentage change trigger to determine if an alert is triggered by the analysis system.Type: GrantFiled: September 10, 2015Date of Patent: August 30, 2016Assignee: International Business Machines CorporationInventors: Gary Israel Givental, HuyAnh Dinh Ngo, Michael John Suzio
-
Patent number: 9256740Abstract: An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. Rules for analyzing the event data can be retrieved based on the device. The event data is analyzed based on the rules to determine recordable events. Recordable events are organized into categories representing a type or severity of attack. Current event counts are calculated by summing the recordable events for each category. A normal profile is retrieved for the device and compared to the current event count. A percentage change trigger can be retrieved from a threshold matrix based on the current event count. The percentage increase of the current event count over the normal profile is calculated and compared to the percentage change trigger to determine if an alert is triggered by the analysis system.Type: GrantFiled: March 27, 2014Date of Patent: February 9, 2016Assignee: International Business Machines CorporationInventors: Michael John Suzio, Gary Israel Givental, HuyAnh Dinh Ngo
-
Publication number: 20150381635Abstract: An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. Rules for analyzing the event data can be retrieved based on the device. The event data is analyzed based on the rules to determine recordable events. Recordable events are organized into categories representing a type or severity of attack. Current event counts are calculated by summing the recordable events for each category. A normal profile is retrieved for the device and compared to the current event count. A percentage change trigger can be retrieved from a threshold matrix based on the current event count. The percentage increase of the current event count over the normal profile is calculated and compared to the percentage change trigger to determine if an alert is triggered by the analysis system.Type: ApplicationFiled: September 10, 2015Publication date: December 31, 2015Inventors: Gary Israel Givental, HuyAnh Dinh Ngo, Michael John Suzio
-
Publication number: 20140215624Abstract: An event retrieval and analysis system compares counts of event data for a device to stored profile counts to determine if alerts should be triggered. Event data can be retrieved by a sensor. Rules for analyzing the event data can be retrieved based on the device. The event data is analyzed based on the rules to determine recordable events. Recordable events are organized into categories representing a type or severity of attack. Current event counts are calculated by summing the recordable events for each category. A normal profile is retrieved for the device and compared to the current event count. A percentage change trigger can be retrieved from a threshold matrix based on the current event count. The percentage increase of the current event count over the normal profile is calculated and compared to the percentage change trigger to determine if an alert is triggered by the analysis system.Type: ApplicationFiled: March 27, 2014Publication date: July 31, 2014Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Michael John Suzio, Gary Israel Givental, HuyAnh Dinh Ngo