Patents by Inventor Vu Le

Vu Le has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240133718
    Abstract: The disclosure is directed to apparatus and methods for detection of out of position (OOP) components in a carrier tape forming machine. An apparatus includes cross track sensors coupled to the bus interface circuitry, the cross track sensors configured to detect OOP components prior to overlaying the components on the carrier tape with cover tape, optical sensors to detect the OOP components on the carrier tape after overlaying with cover tape and prior to sealing and to detect reflections from OOP components seated on the carrier tape, an amplifier coupled to the optical sensors to amplify signals generated by the optical sensors and set a range for determining whether the components are OOP, and relays to receive indications of detected OOP components, and a controller coupled to the relays to stop the carrier tape forming machine as a function of signals received by the relays.
    Type: Application
    Filed: October 19, 2022
    Publication date: April 25, 2024
    Applicant: Intel Corporation
    Inventors: Ngoc Duy VU, Nguyen Hoang Tan LE, Minh Anh Khoa NGUYEN
  • Publication number: 20240104221
    Abstract: A method to test an OS kernel interface, such as an eBPF helper function. The interface has a grammar that defines the kernel interface. Testing is carried out using eBPF code that invokes and tests the interface using a fuzzing engine. To facilitate the process, additional user space code is configured to generate at least one kernel event that triggers the eBPF code to run, and to transform inputs from the fuzzing engine according to the grammar that defines the kernel interface. After loading the eBPF code into the OS kernel, the user space code issues the kernel event that causes the eBPF code to run. In response, and as the fuzzing engine executes, the eBPF code records arguments sent to the OS kernel through the kernel interface. The arguments are passed through a data structure shared by the eBPF code and the user space code. By recording the arguments and other diagnostic information, the security of the kernel interface is evaluated.
    Type: Application
    Filed: September 23, 2022
    Publication date: March 28, 2024
    Applicant: International Business Machines Corporation
    Inventors: Anthony Saieva, Frederico Araujo, Sanjeev Das, Michael Vu Le, Jiyong Jang
  • Patent number: 11921885
    Abstract: A method, apparatus and computer program product for scheduling placement of containers in association with a set of hosts. The technique utilizes metrics that characterize container-specific risks. A first metric is a host interface risk for a container that quantifies how similar or dissimilar the container is relative to other containers running on a host. Preferably, host interface risk is derived with respect to a system call interface comprising a set of system calls, and the metric is based at least in part on a measure of dissimilarity among system calls. A second metric is a data sensitivity score that quantifies a degree to which sensitive data accesses are associated to the container. Based at least in part on the host interface risk scores and the data sensitivity scores, one or more containers are automatically scheduled for placement on the set of hosts to minimize security risk for the set of hosts.
    Type: Grant
    Filed: June 7, 2021
    Date of Patent: March 5, 2024
    Assignee: International Business Machines Corporation
    Inventors: Michael Vu Le, Md Salman Ahmed, Hani Talal Jamjoom
  • Publication number: 20240020389
    Abstract: Described are techniques for application hardening. The techniques include generating application traces using fuzzing for an application with a known security vulnerability, where the application traces include good traces that do not result in exploitation of the known security vulnerability and bad traces that result in exploitation of the known security vulnerability. The techniques further include identifying code segments that are executed by the bad traces and not executed by the good traces. The techniques further include modifying the identified code segments using binary rewriting.
    Type: Application
    Filed: July 13, 2022
    Publication date: January 18, 2024
    Inventors: Michael Vu Le, Sanjeev Das
  • Publication number: 20230418859
    Abstract: A method, computer system, and a computer program product for data processing, comprising obtaining a plurality of files from a data source. These files are analyzed the files for information about the content and in order to determine structural information of each file. Once the files have been analyzed, information in each file may be sorted and categorized by common content. Sensitive information may also be extracted and categorized separately. Information may then be then merged using the categories to create a single unified file.
    Type: Application
    Filed: June 27, 2022
    Publication date: December 28, 2023
    Inventors: Youngja Park, MOHAMMED FAHD ALHAMID, Stefano Braghin, Jing Xin Duan, Mokhtar Kandil, Michael Vu Le, Killian Levacher, Micha Gideon Moffie, Ian Michael Molloy, Walid Rjaibi, ARIEL FARKASH
  • Patent number: 11709937
    Abstract: An approach is provided that, after receiving a request to execute a computer program, determines an active set of metadata that corresponds to the requested computer program and then loads basic blocks of the requested computer program into memory. One of the loaded basic blocks is a starting block of the requested computer program. The memory also stores basic blocks corresponding to some previously loaded computer programs. The approach also inactivates basic blocks that are currently stored in the memory, with the inactivated basic blocks being identified based on a comparison of the active set of metadata to the sets of metadata that corresponding to the basic blocks of previously loaded computer programs. After inactivating some basic blocks, the approach executes the starting block of the requested computer program.
    Type: Grant
    Filed: August 25, 2021
    Date of Patent: July 25, 2023
    Assignee: International Business Machines Corporation
    Inventors: Michael Vu Le, Hani Talal Jamjoom
  • Patent number: 11701778
    Abstract: Systems and methods for robotic path planning are disclosed. In some implementations of the present disclosure, a robot can generate a cost map associated with an environment of the robot. The cost map can comprise a plurality of pixels each corresponding to a location in the environment, where each pixel can have an associated cost. The robot can further generate a plurality of masks having projected path portions for the travel of the robot within the environment, where each mask comprises a plurality of mask pixels that correspond to locations in the environment. The robot can then determine a mask cost associated with each mask based at least in part on the cost map and select a mask based at least in part on the mask cost. Based on the projected path portions within the selected mask, the robot can navigate a space.
    Type: Grant
    Filed: January 25, 2021
    Date of Patent: July 18, 2023
    Assignee: Brain Corporation
    Inventors: Oleg Sinyavskiy, Jean-Baptiste Passot, Borja Ibarz Gabardos, Diana Vu Le
  • Patent number: 11691286
    Abstract: Systems and methods assisting a robotic apparatus are disclosed. In some exemplary implementations, a robot can encounter situations where the robot cannot proceed and/or does not know with a high degree of certainty it can proceed. Accordingly, the robot can determine that it has encountered an error and/or assist event. In some exemplary implementations, the robot can receive assistance from an operator and/or attempt to resolve the issue itself. In some cases, the robot can be configured to delay actions in order to allow resolution of the error and/or assist event.
    Type: Grant
    Filed: June 27, 2019
    Date of Patent: July 4, 2023
    Assignee: Brain Corporation
    Inventors: Oleg Sinyavskiy, Jean-Baptiste Passot, Borja Ibarz Gabardos, Diana Vu Le
  • Publication number: 20230202980
    Abstract: Provided herein are N-(2-aminophenyl)-prop-2-enamide derivatives, such as those of Formula (I), methods for the synthesis thereof, and uses thereof in the treatment of cancer, such as SALL4-expressing cancer, in a cell or subject in need thereof.
    Type: Application
    Filed: August 28, 2020
    Publication date: June 29, 2023
    Inventors: Sridhar Radhakrishnan, Daniel G. Tenen, Bee Hui Liu, Kim Anh Vu Le, Mei Lin Go, Li Chai, Chong Gao, Ahmed Kamal, Satish Sunkari, Venkata Subbarao Ayinampudi, Riyaz Syed, Miao Liu
  • Patent number: 11650801
    Abstract: Multiple execution traces of an application are accessed. The multiple execution traces have been collected at a basic block level. Basic blocks in the multiple execution traces are scored. Scores for the basic blocks represent benefits of performing binary slimming at the corresponding basic blocks. Runtime binary slimming is performed of the application based on the scores of the basic blocks.
    Type: Grant
    Filed: November 10, 2021
    Date of Patent: May 16, 2023
    Assignee: International Business Machines Corporation
    Inventors: Michael Vu Le, Ian Michael Molloy, Taemin Park
  • Publication number: 20230111047
    Abstract: Persistent storage contains a training dataset and a test dataset, each with units of text labelled from a plurality of categories. A machine learning model has been trained with the training dataset to classify input units of text into the plurality of categories. One or more processors are configured to: read the training dataset or the test dataset; determine distributional properties of the training dataset or the test dataset; determine, using the machine learning model, saliency maps for tokens in the training dataset or the test dataset; perturb, by way of token insertion, token deletion, or token replacement, the training dataset or the test dataset into an expanded dataset; obtain, using the machine learning model, classifications into the plurality of categories for the expanded dataset; and based on the distributional properties, the saliency maps, and the classifications, identify causes of failure for the machine learning model.
    Type: Application
    Filed: October 13, 2021
    Publication date: April 13, 2023
    Inventors: Lindsay Devon Brin, Joseph Béchard Marinier, Uyen Diana Vu Le, Christopher John Tyler, Parmida Atighehchian, Gabrielle Gauthier-Melançon, Frédéric Branchaud-Charron, Orlando Marquez Ayala
  • Publication number: 20230069035
    Abstract: An approach is provided that, after receiving a request to execute a computer program, determines an active set of metadata that corresponds to the requested computer program and then loads basic blocks of the requested computer program into memory. One of the loaded basic blocks is a starting block of the requested computer program. The memory also stores basic blocks corresponding to some previously loaded computer programs. The approach also inactivates basic blocks that are currently stored in the memory, with the inactivated basic blocks being identified based on a comparison of the active set of metadata to the sets of metadata that corresponding to the basic blocks of previously loaded computer programs. After inactivating some basic blocks, the approach executes the starting block of the requested computer program.
    Type: Application
    Filed: August 25, 2021
    Publication date: March 2, 2023
    Inventors: Michael Vu Le, Hani Talal Jamjoom
  • Publication number: 20220391532
    Abstract: A method, apparatus and computer program product for scheduling placement of containers in association with a set of hosts. The technique utilizes metrics that characterize container-specific risks. A first metric is a host interface risk for a container that quantifies how similar or dissimilar the container is relative to other containers running on a host. Preferably, host interface risk is derived with respect to a system call interface comprising a set of system calls, and the metric is based at least in part on a measure of dissimilarity among system calls. A second metric is a data sensitivity score that quantifies a degree to which sensitive data accesses are associated to the container. Based at least in part on the host interface risk scores and the data sensitivity scores, one or more containers are automatically scheduled for placement on the set of hosts to minimize security risk for the set of hosts.
    Type: Application
    Filed: June 7, 2021
    Publication date: December 8, 2022
    Applicant: International Business Machines Corporation
    Inventors: Michael Vu Le, Md Salman Ahmed, Hani Talal Jamjoom
  • Patent number: 11522880
    Abstract: A method, system, and computer-usable medium for analyzing security data formatted in STIX™ format. Data related to actions performed by one or more users is captured. Individual tasks, such as analytics or extract, transform, load (ETL) tasks related to the captured data is created. Individual tasks are registered to a workflow for executing particular security threat or incident analysis. The workflow is executed and visualized to perform the security threat or incident analysis.
    Type: Grant
    Filed: July 9, 2020
    Date of Patent: December 6, 2022
    Assignee: International Business Machines Corporation
    Inventors: Sulakshan Vajipayajula, Paul Coccoli, James Brent Peterson, Michael Vu Le, Ian Michael Molloy
  • Patent number: 11520989
    Abstract: The system for responding to a set of words includes an interface and a processor. The interface is configured to receive the set of words. The processor is configured to determine a token from the set of words; determine an entity and an associated keyword from the token, wherein the entity is associated with an entity type; determine an intent based at least in part on the set of words; match the entity to an entity of the intent based on the associated keyword; and determine a response based on the intent and the entity.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: December 6, 2022
    Assignee: Workday, Inc.
    Inventor: Vu Le
  • Publication number: 20220106799
    Abstract: A mounting assembly for an adjustable arrest distance fall-protection system includes an offset stanchion comprising a hollow body and a first bore formed through the hollow body, an arm connected at a first end to the hollow body, and a mounting tube comprising a first end configured to fit within the hollow body and a second bore configured to align with the first bore. The fall protection system can include multiple mounting assemblies, with a fall-arrest cable extending therebetween.
    Type: Application
    Filed: October 7, 2021
    Publication date: April 7, 2022
    Inventors: Charles Christian Birkner, Vu Le
  • Patent number: 11277434
    Abstract: Reducing attack surface by selectively collocating applications on host computers is provided. System resources utilized by each application running in a plurality of host computers of a data processing environment are measured. Which applications running in the plurality of host computers that utilize similar system resources are determined. Those applications utilizing similar system resources are collocated on respective host computers.
    Type: Grant
    Filed: March 24, 2020
    Date of Patent: March 15, 2022
    Assignee: International Business Machines Corporation
    Inventors: Michael Vu Le, Hani Talal Jamjoom, Ian Michael Molloy
  • Publication number: 20220066757
    Abstract: Multiple execution traces of an application are accessed. The multiple execution traces have been collected at a basic block level. Basic blocks in the multiple execution traces are scored. Scores for the basic blocks represent benefits of performing binary slimming at the corresponding basic blocks. Runtime binary slimming is performed of the application based on the scores of the basic blocks.
    Type: Application
    Filed: November 10, 2021
    Publication date: March 3, 2022
    Inventors: Michael Vu Le, Ian Michael Molloy, Taemin Park
  • Patent number: 11262993
    Abstract: Unused instructions and no longer used instructions in a target application binary are determined. The target application binary is rewritten before and after runtime execution of the target application binary to remove the unused and no longer used instructions to reduce binary attack surface area for the runtime execution of the target application binary. Methods, computer systems, and computer program products are disclosed.
    Type: Grant
    Filed: September 26, 2019
    Date of Patent: March 1, 2022
    Assignee: International Business Machines Corporation
    Inventors: Michael Vu Le, Ian Michael Molloy, Jacob Tinkhauser
  • Publication number: 20220014531
    Abstract: A method, system, and computer-usable medium for analyzing security data formatted in STIX™ format. Data related to actions performed by one or more users is captured. Individual tasks, such as analytics or extract, transform, load (ETL) tasks related to the captured data is created. Individual tasks are registered to a workflow for executing particular security threat or incident analysis. The workflow is executed and visualized to perform the security threat or incident analysis.
    Type: Application
    Filed: July 9, 2020
    Publication date: January 13, 2022
    Inventors: Sulakshan Vajipayajula, Paul Coccoli, James Brent Peterson, Michael Vu Le, Ian Michael Molloy