Patents by Inventor Nhan Nguyen

Nhan Nguyen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11860907
    Abstract: A method for shuffle-less reclustering of clustered tables includes receiving a first and second group of clustered data blocks sorted by a clustering key value. A range of clustering key values of one or more the data blocks in the second group overlaps with the range of clustering key values of a data block in the first group. The method also includes generating split points for partitioning the first and second groups of clustered data blocks into a third group. The method also includes partitioning using the split points, the first and second groups into the third group. Each data block in the third group includes a range of clustering key values that do not overlap with any other data block in the third group. Each split point defines an upper limit or lower limit for the range of clustering key values a data block in the third group.
    Type: Grant
    Filed: August 3, 2022
    Date of Patent: January 2, 2024
    Assignee: Google LLC
    Inventors: Hua Zhang, Pavan Edara, Nhan Nguyen
  • Publication number: 20230368317
    Abstract: The present disclosure is generally directed to alphanumeric codes that can be used to display and retrieve information. Specifically disclosed herein is a method that includes displaying a visual display that has (i) a four-character alphanumeric code, where the first and third characters are alphabetical letters and the second and fourth characters are numerical digits, and (ii) one or more products or services associated with the code, generating, by at least one processor, a graphical user interface (GUI) that prompts a user to enter the code, transmitting, by the at least one processor, the GUI to the user, receiving, by the at least one processor, the code, retrieving, by the at least one processor, information from a database relating to the one or more products or services, and transmitting, by the at least one processor, the information to the user.
    Type: Application
    Filed: May 11, 2023
    Publication date: November 16, 2023
    Inventors: Daniyal Ghanbari, Duy Nhan Nguyen, Abdolkhaledgh Rahmani
  • Publication number: 20230339609
    Abstract: The present invention includes a drone system and kit with a modular hold. The drone, or its hold, can low-mount antennae such that the drone system lands on the antennae (or booms dimensioned to be similar thereto). Because the holds are dimensionally similar, multiple holds can be prepared, each with their own specific electronic payload, for a quick change that results in efficient utilization of proceeds.
    Type: Application
    Filed: April 26, 2022
    Publication date: October 26, 2023
    Applicant: Blue Cloak LLC
    Inventors: Vinson Cornejo, Nhan Nguyen
  • Publication number: 20230308286
    Abstract: A method for increasing validity of digital signatures comprising: receiving a request from a browser to have a user apply a digital signature to a document; verifying that the document complies with a predefined ruleset (e.g., prescribing font colors); presenting the user with the document on a user-computer interface in such a way that the document's entire content is completely reviewable by the user only if the document complies with the predefined ruleset; upon receiving instruction from the user to sign the document, generating a digital signature according to Advanced Encryption Standard (AES) public key infrastructure (PKI) that protects the document in its entirety, as presented to the user in the previous step; enabling the user to perform one or more of printing, sharing, and saving the digitally-signed document in a memory store; and sending the digitally-signed document with the newly-generated signature to the browser.
    Type: Application
    Filed: March 23, 2022
    Publication date: September 28, 2023
    Inventors: Matthew Galligan, John P. Waxler, Nhan Nguyen
  • Patent number: 11725388
    Abstract: Roofing granules having a color coating layer are covered with a clear, transparent or translucent outer coating composition including a functional material, such nanoparticles of anatase titanium dioxide.
    Type: Grant
    Filed: June 1, 2021
    Date of Patent: August 15, 2023
    Assignee: CertainTeed LLC
    Inventors: Keith C. Hong, Gregory F. Jacobs, Van Nhan Nguyen
  • Patent number: 11706239
    Abstract: Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting vulnerabilities in real-time during execution of a process or an application. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to obtain real-time process information associated with a process executing in an endpoint. The device can then determine package information for a package associated with the process based on the process information. The device can then identify at least one vulnerability associated with the package information using a database of vulnerabilities stored on a backend component of the network. The backend component may have a database of vulnerabilities for packages.
    Type: Grant
    Filed: August 26, 2020
    Date of Patent: July 18, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Hai Vu, Thanh Nhan Nguyen, Vaishali Palkar, Varun Malhotra, Shih-Chun Chang, Xin Liu
  • Patent number: 11627166
    Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for discovering policy scopes within an enterprise network and managing network policies for discovered policy scopes. In one aspect, a method includes identifying one or more communities of devices in an enterprise network; defining, from the one or more communities of devices, policy scopes in the enterprise network; generating a hierarchical representation of the policy scopes; identifying, based on the hierarchical representation of the policy scopes, one or more policies governing traffic flow between devices associated with each of the policy scopes; and managing application of the one or more policies at the devices.
    Type: Grant
    Filed: October 6, 2020
    Date of Patent: April 11, 2023
    Assignee: Cisco Technology, Inc.
    Inventors: Weifei Zeng, Sai Ankith Averineni, Omid Madani, Paul Mach, Yash Vipul Doshi, Sasidhar Evuru, Sayeed Mohammed Tasnim, Sameer Salim Mahomed Ali Ladiwala, Chakradhar Reddy Vangeti, Thanh Nhan Nguyen, Varun Malhotra, Shashidhar Gandham, Navindra Yadav, Thanh Trung Ngo, Maxwell Aaron Mechanic
  • Publication number: 20220374455
    Abstract: A method for shuffle-less reclustering of clustered tables includes receiving a first and second group of clustered data blocks sorted by a clustering key value. A range of clustering key values of one or more the data blocks in the second group overlaps with the range of clustering key values of a data block in the first group. The method also includes generating split points for partitioning the first and second groups of clustered data blocks into a third group. The method also includes partitioning using the split points, the first and second groups into the third group. Each data block in the third group includes a range of clustering key values that do not overlap with any other data block in the third group. Each split point defines an upper limit or lower limit for the range of clustering key values a data block in the third group.
    Type: Application
    Filed: August 3, 2022
    Publication date: November 24, 2022
    Applicant: Google LLC
    Inventors: Hua Zhang, Pavan Edara, Nhan Nguyen
  • Patent number: 11436261
    Abstract: A method for shuffle-less reclustering of clustered tables includes receiving a first and second group of clustered data blocks sorted by a clustering key value. A range of clustering key values of one or more the data blocks in the second group overlaps with the range of clustering key values of a data block in the first group. The method also includes generating split points for partitioning the first and second groups of clustered data blocks into a third group. The method also includes partitioning using the split points, the first and second groups into the third group. Each data block in the third group includes a range of clustering key values that do not overlap with any other data block in the third group. Each split point defines an upper limit or lower limit for the range of clustering key values a data block in the third group.
    Type: Grant
    Filed: April 14, 2020
    Date of Patent: September 6, 2022
    Assignee: Google LLC
    Inventors: Hua Zhang, Pavan Edara, Nhan Nguyen
  • Patent number: 11415003
    Abstract: A method for producing a metal bladed element of a turbine engine, in particular of an aircraft, includes steps of producing the bladed element, depositing a coating made of wear-proof material on at least one portion of the bladed element and verifying, preferably visually, the conformity of the bladed element. Verifying the conformity of the bladed element includes implementing a verification element on the bladed element. The bladed element is configured according to a conformity threshold value to conceal a non-conformity of the coating, if the non-conformity has at least one dimension less than the threshold value, and to show at least one portion of this non-conformity if the at least one dimension is greater than the threshold value.
    Type: Grant
    Filed: April 8, 2019
    Date of Patent: August 16, 2022
    Assignee: SAFRAN AIRCRAFT ENGINES
    Inventors: Bruno Marc-Etienne Loisel, Guillaume Sylvain Frédéric Evrard, Alexandre Thanh Nhan Nguyen, Carine Thuy-Huong Pragassam
  • Publication number: 20220109701
    Abstract: The present disclosure relates to methods, systems, and non-transitory computer readable media for discovering policy scopes within an enterprise network and managing network policies for discovered policy scopes. In one aspect, a method includes identifying one or more communities of devices in an enterprise network; defining, from the one or more communities of devices, policy scopes in the enterprise network; generating a hierarchical representation of the policy scopes; identifying, based on the hierarchical representation of the policy scopes, one or more policies governing traffic flow between devices associated with each of the policy scopes; and managing application of the one or more policies at the devices.
    Type: Application
    Filed: October 6, 2020
    Publication date: April 7, 2022
    Inventors: Weifei Zeng, Sai Ankith Averineni, Omid Madani, Paul Mach, Yash Vipul Doshi, Sasidhar Evuru, Sayeed Mohammed Tasnim, Sameer Salim Mahomed Ali Ladiwala, Chakradhar Reddy Vangeti, Thanh Nhan Nguyen, Varun Malhotra, Shashidhar Gandham, Navindra Yadav, Thanh Trung Ngo, Maxwell Aaron Mechanic
  • Publication number: 20220084111
    Abstract: A processor-implemented is disclosed.
    Type: Application
    Filed: September 11, 2020
    Publication date: March 17, 2022
    Applicant: The Toronto-Dominion Bank
    Inventors: Matthew Renold LADZIK, Daniel Scott BROTHERSTON, Harrison Michael James REILLY, Kyryll ODOBETSKIY, Estelle CHUNG, Tri Nhan NGUYEN, Frank John Eldridge FLITTON
  • Publication number: 20220070197
    Abstract: Systems, methods, and non-transitory computer-readable storage media are disclosed for detecting vulnerabilities in real-time during execution of a process or an application. In one example, a device may have one or more memories storing computer-readable instructions and one or more processors configured to execute the computer-readable instructions to obtain real-time process information associated with a process executing in an endpoint. The device can then determine package information for a package associated with the process based on the process information. The device can then identify at least one vulnerability associated with the package information using a database of vulnerabilities stored on a backend component of the network. The backend component may have a database of vulnerabilities for packages.
    Type: Application
    Filed: August 26, 2020
    Publication date: March 3, 2022
    Inventors: Hai Vu, Thanh Nhan Nguyen, Vaishali Palkar, Varun Malhotra, Shih-Chun Chang, Xin Liu
  • Publication number: 20220021691
    Abstract: Techniques to facilitate protection of web application components are disclosed herein. In at least one implementation, a plurality of web resources associated with a web applications is received. The plurality of web resources is processed to generate individual generalized code templates for each of the web resources by removing data constants and code formatting elements from the web resources. A set of the individual generalized code templates for each of the web resources is stored in a probabilistic data structure. A security web module comprising the probabilistic data structure having the set of the individual generalized code templates for each of the web resources stored therein is deployed to protect the web application.
    Type: Application
    Filed: July 14, 2021
    Publication date: January 20, 2022
    Applicant: Tala Security, Inc.
    Inventors: Sandeep Bhatkar, Nicholas Maxwell, Aditya Kumar, Siddhesh Yawalkar, Nhan Nguyen, Ravi Bajpai, Swapnil Bhalode, Hemant Puri
  • Publication number: 20210319044
    Abstract: A method for shuffle-less reclustering of clustered tables includes receiving a first and second group of clustered data blocks sorted by a clustering key value. A range of clustering key values of one or more the data blocks in the second group overlaps with the range of clustering key values of a data block in the first group. The method also includes generating split points for partitioning the first and second groups of clustered data blocks into a third group. The method also includes partitioning using the split points, the first and second groups into the third group. Each data block in the third group includes a range of clustering key values that do not overlap with any other data block in the third group. Each split point defines an upper limit or lower limit for the range of clustering key values a data block in the third group.
    Type: Application
    Filed: April 14, 2020
    Publication date: October 14, 2021
    Applicant: Google LLC
    Inventors: Hua Zhang, Pavan Edara, Nhan Nguyen
  • Patent number: 11146388
    Abstract: A method of encrypting a data file includes: opening the data file; selecting, via a first user interface, a portion of the data file; encrypting, via an encryption component, the selected portion of the data file as one of a first level of encryption associated with a first authorized user and a second level of encryption associated with a second authorized user so as to create an encrypted data file; and saving the encrypted data file. The encryption component includes an out-of-band encryption key component having stored therein, a first encryption key associated with the first level of encryption and a second encryption key associated with the second level of encryption.
    Type: Grant
    Filed: October 28, 2019
    Date of Patent: October 12, 2021
    Assignee: United States of America as represented by the Secretary of the Navy
    Inventors: Matthew Galligan, Nhan Nguyen, John P. Waxler, William Dennis Bressler
  • Publication number: 20210285220
    Abstract: Roofing granules having a color coating layer are covered with a clear, transparent or translucent outer coating composition including a functional material, such nanoparticles of anatase titanium dioxide.
    Type: Application
    Filed: June 1, 2021
    Publication date: September 16, 2021
    Inventors: Keith C. Hong, Gregory F. Jacobs, Van Nhan Nguyen
  • Patent number: 11021877
    Abstract: Roofing granules having a color coating layer are covered with a clear, transparent or translucent outer coating composition including a functional material, such nanoparticles of anatase titanium dioxide.
    Type: Grant
    Filed: April 25, 2019
    Date of Patent: June 1, 2021
    Assignee: CertainTeed LLC
    Inventors: Keith C. Hong, Gregory F. Jacobs, Van Nhan Nguyen
  • Publication number: 20210126774
    Abstract: A method of encrypting a data file includes: opening the data file; selecting, via a first user interface, a portion of the data file; encrypting, via an encryption component, the selected portion of the data file as one of a first level of encryption associated with a first authorized user and a second level of encryption associated with a second authorized user so as to create an encrypted data file; and saving the encrypted data file. The encryption component includes an out-of-band encryption key component having stored therein, a first encryption key associated with the first level of encryption and a second encryption key associated with the second level of encryption.
    Type: Application
    Filed: October 28, 2019
    Publication date: April 29, 2021
    Inventors: Matthew Galligan, Nhan Nguyen, John P. Waxler, William Dennis Bressler
  • Patent number: D905347
    Type: Grant
    Filed: April 4, 2019
    Date of Patent: December 15, 2020
    Inventor: Nhan Nguyen