Patents by Inventor Nhan Nguyen
Nhan Nguyen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11860907Abstract: A method for shuffle-less reclustering of clustered tables includes receiving a first and second group of clustered data blocks sorted by a clustering key value. A range of clustering key values of one or more the data blocks in the second group overlaps with the range of clustering key values of a data block in the first group. The method also includes generating split points for partitioning the first and second groups of clustered data blocks into a third group. The method also includes partitioning using the split points, the first and second groups into the third group. Each data block in the third group includes a range of clustering key values that do not overlap with any other data block in the third group. Each split point defines an upper limit or lower limit for the range of clustering key values a data block in the third group.Type: GrantFiled: August 3, 2022Date of Patent: January 2, 2024Assignee: Google LLCInventors: Hua Zhang, Pavan Edara, Nhan Nguyen
-
Publication number: 20230368317Abstract: The present disclosure is generally directed to alphanumeric codes that can be used to display and retrieve information. Specifically disclosed herein is a method that includes displaying a visual display that has (i) a four-character alphanumeric code, where the first and third characters are alphabetical letters and the second and fourth characters are numerical digits, and (ii) one or more products or services associated with the code, generating, by at least one processor, a graphical user interface (GUI) that prompts a user to enter the code, transmitting, by the at least one processor, the GUI to the user, receiving, by the at least one processor, the code, retrieving, by the at least one processor, information from a database relating to the one or more products or services, and transmitting, by the at least one processor, the information to the user.Type: ApplicationFiled: May 11, 2023Publication date: November 16, 2023Inventors: Daniyal Ghanbari, Duy Nhan Nguyen, Abdolkhaledgh Rahmani
-
Publication number: 20230339609Abstract: The present invention includes a drone system and kit with a modular hold. The drone, or its hold, can low-mount antennae such that the drone system lands on the antennae (or booms dimensioned to be similar thereto). Because the holds are dimensionally similar, multiple holds can be prepared, each with their own specific electronic payload, for a quick change that results in efficient utilization of proceeds.Type: ApplicationFiled: April 26, 2022Publication date: October 26, 2023Applicant: Blue Cloak LLCInventors: Vinson Cornejo, Nhan Nguyen
-
Publication number: 20230308286Abstract: A method for increasing validity of digital signatures comprising: receiving a request from a browser to have a user apply a digital signature to a document; verifying that the document complies with a predefined ruleset (e.g., prescribing font colors); presenting the user with the document on a user-computer interface in such a way that the document's entire content is completely reviewable by the user only if the document complies with the predefined ruleset; upon receiving instruction from the user to sign the document, generating a digital signature according to Advanced Encryption Standard (AES) public key infrastructure (PKI) that protects the document in its entirety, as presented to the user in the previous step; enabling the user to perform one or more of printing, sharing, and saving the digitally-signed document in a memory store; and sending the digitally-signed document with the newly-generated signature to the browser.Type: ApplicationFiled: March 23, 2022Publication date: September 28, 2023Inventors: Matthew Galligan, John P. Waxler, Nhan Nguyen
-
Patent number: 11725388Abstract: Roofing granules having a color coating layer are covered with a clear, transparent or translucent outer coating composition including a functional material, such nanoparticles of anatase titanium dioxide.Type: GrantFiled: June 1, 2021Date of Patent: August 15, 2023Assignee: CertainTeed LLCInventors: Keith C. Hong, Gregory F. Jacobs, Van Nhan Nguyen
-
Patent number: 11706239Abstract: Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting vulnerabilities in real-time during execution of a process or an application. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to obtain real-time process information associated with a process executing in an endpoint. The device can then determine package information for a package associated with the process based on the process information. The device can then identify at least one vulnerability associated with the package information using a database of vulnerabilities stored on a backend component of the network. The backend component may have a database of vulnerabilities for packages.Type: GrantFiled: August 26, 2020Date of Patent: July 18, 2023Assignee: Cisco Technology, Inc.Inventors: Hai Vu, Thanh Nhan Nguyen, Vaishali Palkar, Varun Malhotra, Shih-Chun Chang, Xin Liu
-
Patent number: 11627166Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for discovering policy scopes within an enterprise network and managing network policies for discovered policy scopes. In one aspect, a method includes identifying one or more communities of devices in an enterprise network; defining, from the one or more communities of devices, policy scopes in the enterprise network; generating a hierarchical representation of the policy scopes; identifying, based on the hierarchical representation of the policy scopes, one or more policies governing traffic flow between devices associated with each of the policy scopes; and managing application of the one or more policies at the devices.Type: GrantFiled: October 6, 2020Date of Patent: April 11, 2023Assignee: Cisco Technology, Inc.Inventors: Weifei Zeng, Sai Ankith Averineni, Omid Madani, Paul Mach, Yash Vipul Doshi, Sasidhar Evuru, Sayeed Mohammed Tasnim, Sameer Salim Mahomed Ali Ladiwala, Chakradhar Reddy Vangeti, Thanh Nhan Nguyen, Varun Malhotra, Shashidhar Gandham, Navindra Yadav, Thanh Trung Ngo, Maxwell Aaron Mechanic
-
Publication number: 20220374455Abstract: A method for shuffle-less reclustering of clustered tables includes receiving a first and second group of clustered data blocks sorted by a clustering key value. A range of clustering key values of one or more the data blocks in the second group overlaps with the range of clustering key values of a data block in the first group. The method also includes generating split points for partitioning the first and second groups of clustered data blocks into a third group. The method also includes partitioning using the split points, the first and second groups into the third group. Each data block in the third group includes a range of clustering key values that do not overlap with any other data block in the third group. Each split point defines an upper limit or lower limit for the range of clustering key values a data block in the third group.Type: ApplicationFiled: August 3, 2022Publication date: November 24, 2022Applicant: Google LLCInventors: Hua Zhang, Pavan Edara, Nhan Nguyen
-
Patent number: 11436261Abstract: A method for shuffle-less reclustering of clustered tables includes receiving a first and second group of clustered data blocks sorted by a clustering key value. A range of clustering key values of one or more the data blocks in the second group overlaps with the range of clustering key values of a data block in the first group. The method also includes generating split points for partitioning the first and second groups of clustered data blocks into a third group. The method also includes partitioning using the split points, the first and second groups into the third group. Each data block in the third group includes a range of clustering key values that do not overlap with any other data block in the third group. Each split point defines an upper limit or lower limit for the range of clustering key values a data block in the third group.Type: GrantFiled: April 14, 2020Date of Patent: September 6, 2022Assignee: Google LLCInventors: Hua Zhang, Pavan Edara, Nhan Nguyen
-
Patent number: 11415003Abstract: A method for producing a metal bladed element of a turbine engine, in particular of an aircraft, includes steps of producing the bladed element, depositing a coating made of wear-proof material on at least one portion of the bladed element and verifying, preferably visually, the conformity of the bladed element. Verifying the conformity of the bladed element includes implementing a verification element on the bladed element. The bladed element is configured according to a conformity threshold value to conceal a non-conformity of the coating, if the non-conformity has at least one dimension less than the threshold value, and to show at least one portion of this non-conformity if the at least one dimension is greater than the threshold value.Type: GrantFiled: April 8, 2019Date of Patent: August 16, 2022Assignee: SAFRAN AIRCRAFT ENGINESInventors: Bruno Marc-Etienne Loisel, Guillaume Sylvain Frédéric Evrard, Alexandre Thanh Nhan Nguyen, Carine Thuy-Huong Pragassam
-
Publication number: 20220109701Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for discovering policy scopes within an enterprise network and managing network policies for discovered policy scopes. In one aspect, a method includes identifying one or more communities of devices in an enterprise network; defining, from the one or more communities of devices, policy scopes in the enterprise network; generating a hierarchical representation of the policy scopes; identifying, based on the hierarchical representation of the policy scopes, one or more policies governing traffic flow between devices associated with each of the policy scopes; and managing application of the one or more policies at the devices.Type: ApplicationFiled: October 6, 2020Publication date: April 7, 2022Inventors: Weifei Zeng, Sai Ankith Averineni, Omid Madani, Paul Mach, Yash Vipul Doshi, Sasidhar Evuru, Sayeed Mohammed Tasnim, Sameer Salim Mahomed Ali Ladiwala, Chakradhar Reddy Vangeti, Thanh Nhan Nguyen, Varun Malhotra, Shashidhar Gandham, Navindra Yadav, Thanh Trung Ngo, Maxwell Aaron Mechanic
-
Publication number: 20220084111Abstract: A processor-implemented is disclosed.Type: ApplicationFiled: September 11, 2020Publication date: March 17, 2022Applicant: The Toronto-Dominion BankInventors: Matthew Renold LADZIK, Daniel Scott BROTHERSTON, Harrison Michael James REILLY, Kyryll ODOBETSKIY, Estelle CHUNG, Tri Nhan NGUYEN, Frank John Eldridge FLITTON
-
Publication number: 20220070197Abstract: Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting vulnerabilities in real-time during execution of a process or an application. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to obtain real-time process information associated with a process executing in an endpoint. The device can then determine package information for a package associated with the process based on the process information. The device can then identify at least one vulnerability associated with the package information using a database of vulnerabilities stored on a backend component of the network. The backend component may have a database of vulnerabilities for packages.Type: ApplicationFiled: August 26, 2020Publication date: March 3, 2022Inventors: Hai Vu, Thanh Nhan Nguyen, Vaishali Palkar, Varun Malhotra, Shih-Chun Chang, Xin Liu
-
Publication number: 20220021691Abstract: Techniques to facilitate protection of web application components are disclosed herein. In at least one implementation, a plurality of web resources associated with a web applications is received. The plurality of web resources is processed to generate individual generalized code templates for each of the web resources by removing data constants and code formatting elements from the web resources. A set of the individual generalized code templates for each of the web resources is stored in a probabilistic data structure. A security web module comprising the probabilistic data structure having the set of the individual generalized code templates for each of the web resources stored therein is deployed to protect the web application.Type: ApplicationFiled: July 14, 2021Publication date: January 20, 2022Applicant: Tala Security, Inc.Inventors: Sandeep Bhatkar, Nicholas Maxwell, Aditya Kumar, Siddhesh Yawalkar, Nhan Nguyen, Ravi Bajpai, Swapnil Bhalode, Hemant Puri
-
Publication number: 20210319044Abstract: A method for shuffle-less reclustering of clustered tables includes receiving a first and second group of clustered data blocks sorted by a clustering key value. A range of clustering key values of one or more the data blocks in the second group overlaps with the range of clustering key values of a data block in the first group. The method also includes generating split points for partitioning the first and second groups of clustered data blocks into a third group. The method also includes partitioning using the split points, the first and second groups into the third group. Each data block in the third group includes a range of clustering key values that do not overlap with any other data block in the third group. Each split point defines an upper limit or lower limit for the range of clustering key values a data block in the third group.Type: ApplicationFiled: April 14, 2020Publication date: October 14, 2021Applicant: Google LLCInventors: Hua Zhang, Pavan Edara, Nhan Nguyen
-
Patent number: 11146388Abstract: A method of encrypting a data file includes: opening the data file; selecting, via a first user interface, a portion of the data file; encrypting, via an encryption component, the selected portion of the data file as one of a first level of encryption associated with a first authorized user and a second level of encryption associated with a second authorized user so as to create an encrypted data file; and saving the encrypted data file. The encryption component includes an out-of-band encryption key component having stored therein, a first encryption key associated with the first level of encryption and a second encryption key associated with the second level of encryption.Type: GrantFiled: October 28, 2019Date of Patent: October 12, 2021Assignee: United States of America as represented by the Secretary of the NavyInventors: Matthew Galligan, Nhan Nguyen, John P. Waxler, William Dennis Bressler
-
Publication number: 20210285220Abstract: Roofing granules having a color coating layer are covered with a clear, transparent or translucent outer coating composition including a functional material, such nanoparticles of anatase titanium dioxide.Type: ApplicationFiled: June 1, 2021Publication date: September 16, 2021Inventors: Keith C. Hong, Gregory F. Jacobs, Van Nhan Nguyen
-
Patent number: 11021877Abstract: Roofing granules having a color coating layer are covered with a clear, transparent or translucent outer coating composition including a functional material, such nanoparticles of anatase titanium dioxide.Type: GrantFiled: April 25, 2019Date of Patent: June 1, 2021Assignee: CertainTeed LLCInventors: Keith C. Hong, Gregory F. Jacobs, Van Nhan Nguyen
-
Publication number: 20210126774Abstract: A method of encrypting a data file includes: opening the data file; selecting, via a first user interface, a portion of the data file; encrypting, via an encryption component, the selected portion of the data file as one of a first level of encryption associated with a first authorized user and a second level of encryption associated with a second authorized user so as to create an encrypted data file; and saving the encrypted data file. The encryption component includes an out-of-band encryption key component having stored therein, a first encryption key associated with the first level of encryption and a second encryption key associated with the second level of encryption.Type: ApplicationFiled: October 28, 2019Publication date: April 29, 2021Inventors: Matthew Galligan, Nhan Nguyen, John P. Waxler, William Dennis Bressler
-
Patent number: D905347Type: GrantFiled: April 4, 2019Date of Patent: December 15, 2020Inventor: Nhan Nguyen