Patents by Inventor Filip Nguyen

Filip Nguyen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20140215498
    Abstract: A mechanism for providing an operating system history is disclosed. A method includes placing, by an operating system (OS) of a processing device, a pointer to context of a first application in a history context of plurality of applications in a direct interface array (DIR) of the OS upon indication of switching from an interface of a first application to the interface of a second application. The method also includes moving the pointer from the context of the first application to the context of the second application in the DIR in view of an indication of a closing of the interface of the second application. The second application is closed in a foreground of the OS and is executing in a background of the OS. The method further includes providing the interface of the second application in the foreground of the OS upon activation of a global back function.
    Type: Application
    Filed: January 31, 2013
    Publication date: July 31, 2014
    Applicant: RED HAT, INC.
    Inventors: Filip Nguyen, Martin Vecera
  • Publication number: 20140149564
    Abstract: A mechanism for preventing overload in enterprise application integration (EAI) services. A method includes determining, by a processing device executing enterprise application integration (EAI) system, a first location in a chain of services in the EAI. The method also includes providing, by the processing device, access for insertion of an overload prevention service beginning (OPSB) at the first location in the chain of services in the EAI. The OPSB includes a service in the chain of services and counts number of messages processed in the EAI service. The method also includes determining, by the processing device, a second location in the chain of services in the EAI. The second location occurs after the first location in the chain of services in the EAI. The method further providing, by the processing device, access for the insertion of an overload prevention service end (OPSE) at the second location in the chain of services in the EAI.
    Type: Application
    Filed: November 29, 2012
    Publication date: May 29, 2014
    Applicant: RED HAT, INC.
    Inventors: Filip Elias, Filip Nguyen
  • Publication number: 20140149452
    Abstract: A mechanism for providing messages for Java message service (JMS). A method includes receiving, by a Java message service (JMS) server executed by a processing device, key-value data pair. The key-value data pair is sent by a client. The method also includes extracting, by the processing device, destination information of a JMS message from the value data of the key-value data pair. The destination information is either a JMS queue or a JMS topic. The method further includes storing, by the processing device, the key-value data pair in a column family of not only structured query language (NoSQL) database when one of the JMS queue or the JMS topic associated with the received key-value data pair exists in the column family of the the NoSQL database. The column family includes a plurality of stored key-value data pairs.
    Type: Application
    Filed: November 29, 2012
    Publication date: May 29, 2014
    Applicant: RED HAT, INC.
    Inventors: Filip Nguyen, Filip Elias
  • Patent number: 8713699
    Abstract: A mechanism for securing information by hiding identity in a computing device is disclosed. A method includes generating, by a computing device, a dummy profile of the computing device. The dummy profile is a clone of a home profile stored in the computing device and the home profile is assigned to a user authorized to use the computing device. The method also includes altering, based on instructions from the user, the dummy profile to remove data that the user indicates is not to be included in the dummy profile. The method further includes switching a current operating profile of the computing device from the home profile to the dummy profile and executing the computing device in a normal operation mode using the dummy profile.
    Type: Grant
    Filed: May 25, 2012
    Date of Patent: April 29, 2014
    Assignee: Red Hat, Inc.
    Inventors: Filip Nguyen, Martin Vecera
  • Publication number: 20140059526
    Abstract: A mechanism for providing class loading for a JAVA application is disclosed. A method of the invention includes retrieving, by a processing device, a JAVA class file. The method also includes identifying, by the processing device, a class dependency for the JAVA class file. The method also includes determining, by the processing device, a probability that the JAVA class file is to be loaded into a cache based on the identified class dependency. The method further includes loading, by the processing device, the JAVA class file into the cache based on the probability determined for the JAVA class file.
    Type: Application
    Filed: August 23, 2012
    Publication date: February 27, 2014
    Inventors: Filip Nguyen, Marek Baluch
  • Publication number: 20140059204
    Abstract: A mechanism for providing message flow analysis for an enterprise bus service (ESB) system is disclosed. A method includes identifying, by a computing device executing the ESB system, messages exchanged in the ESB system in a time interval. The method also includes recording, by the computing device, a number of the identified messages exchanged in the time interval. The method further includes generating, by the computing device, a result that depicts the recorded number of the identified messages in the time interval.
    Type: Application
    Filed: August 24, 2012
    Publication date: February 27, 2014
    Inventors: Filip Nguyen, Filip Elias
  • Publication number: 20130326427
    Abstract: A system and method for assessing the effectiveness of a user interface (UI) are disclosed. In accordance with one embodiment, a computer system identifies shortest paths in a directed graph that corresponds to a user interface (UI), obtains a tree from the directed graph, computes an average distance from the root of the tree to a leaf of the tree, and when the average distance exceeds a desired average distance by more than a positive threshold value, provides to a user a message that identifies one or more nodes of the tree and that indicates that navigation to UI states corresponding to these nodes should be modified to reduce the average distance.
    Type: Application
    Filed: May 30, 2012
    Publication date: December 5, 2013
    Applicant: Red Hat, Inc.
    Inventors: Filip Eliás, Filip Nguyen
  • Publication number: 20130318618
    Abstract: A mechanism for securing information by hiding identity in a computing device is disclosed. A method includes generating, by a computing device, a dummy profile of the computing device. The dummy profile is a clone of a home profile stored in the computing device and the home profile is assigned to a user authorized to use the computing device. The method also includes altering, based on instructions from the user, the dummy profile to remove data that the user indicates is not to be included in the dummy profile. The method further includes switching a current operating profile of the computing device from the home profile to the dummy profile and executing the computing device in a normal operation mode using the dummy profile.
    Type: Application
    Filed: May 25, 2012
    Publication date: November 28, 2013
    Inventors: Filip Nguyen, Martin Vecera