Patents by Inventor Hoang Viet Nguyen
Hoang Viet Nguyen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11956752Abstract: A method includes obtaining signal information based on wireless signals communicated between an electronic device and a target device. The method also includes obtaining motion information based on movement of the electronic device. The method further includes identifying first location information based on the signal information, the first location information indicating whether the target device is within a field of view (FoV) of the electronic device. Additionally, the method includes identifying second location information based on the motion information and the signal information, the second location information indicating whether the target device is within the FoV of the electronic device. The method also includes determining that the target device is within the FoV or outside the FoV of the electronic device based on at least one of the first location information or the second location information.Type: GrantFiled: July 29, 2021Date of Patent: April 9, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Hoang Viet Nguyen, Yuming Zhu, Neha Dawar, Boon Loong Ng, Yi Yang, Moonseok Kang, Aditya Vinod Padaki, Songwei Li, Moongee Cho, Hyunchul Kim
-
Publication number: 20240106846Abstract: Detecting anomalous behavior using a browser extension, including: gathering first information describing activity associated with a user and generated by a browser extension on a user device; gathering second information describing activity associated with the user and generated by an application executed on the user device; and determining, based on the first information and the second information, whether the user has deviated from normal activity.Type: ApplicationFiled: October 20, 2022Publication date: March 28, 2024Inventors: VIKRAM KAPOOR, HARISH KUMAR BHARAT SINGH, WEIFEI ZENG, VIMALKUMAR JEYAKUMAR, THERON TOCK, YING XIE, HOANG VIET NGUYEN, YIJOU CHEN
-
Patent number: 11936663Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.Type: GrantFiled: November 9, 2022Date of Patent: March 19, 2024Assignee: Cisco Technology, Inc.Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
-
Patent number: 11902120Abstract: An example method can include choosing a pattern or patterns of network traffic. This pattern can be representative of a certain type of traffic such as an attack. The pattern can be associated with various components of a network and can describe expected behavior of these various components. A system performing this method can then choose a nodes or nodes to generate traffic according to the pattern and send an instruction accordingly. After this synthetic traffic is generated, the system can compare the behavior of the components with the expected behavior. An alert can then be created to notify an administrator or otherwise remedy any problems.Type: GrantFiled: June 5, 2020Date of Patent: February 13, 2024Assignee: Cisco Technology, Inc.Inventors: Rohit Chandra Prasad, Bharathwaj Sankara Viswanathan, Hoang Viet Nguyen, Vimalkumar Jeyakumar, Roberto Fernando Spadaro, Varun Sagar Malhotra, Navindra Yadav
-
Patent number: 11892550Abstract: A method includes obtaining signal information based on wireless signals received from an external electronic device via a first antenna pair and a second antenna pair. The first and second antenna pairs are aligned along different axes. The signal information includes channel information, range information, a first angle of arrival (AoA) based on the first antenna pair, and a second AoA based on the second antenna pair. The method also includes generating an initial prediction of a presence of the external electronic device relative to a field of view (FoV) of the electronic device. The method further includes performing a smoothing operation on the range information and the first and second AoA, the smoothing operation generating a predicted location of the external electronic device relative to the FoV of the electronic device. Additionally, the method includes generating, based on the smoothing operation, confidence values associated with the predicted location.Type: GrantFiled: December 16, 2021Date of Patent: February 6, 2024Assignee: Samsung Electronics Co., Ltd.Inventors: Neha Dawar, Hoang Viet Nguyen, Khuong N. Nguyen, Songwei Li, Yuming Zhu, Boon Loong Ng, Yi Yang, Moonseok Kang, Jiho Shin, HyunChul Kim
-
Patent number: 11841662Abstract: A sheet conveyance device includes a sheet passage, a first sheet stacker, a second sheet stacker, and a sheet feeder. The first sheet stacker has a bottom and a lift. The sheet feeder includes an opening and a feed roller. The sheet conveyance device includes an assist plate supported to be movable between a first and a second position and an urging member. With the first sheet stacker mounted in an apparatus body, the assist plate moves from the first to the second position against the urging force of the urging member to allow passage of a sheet from the first sheet stacker to the sheet feeder. With the first sheet stacker removed from the apparatus body, the assist plate is urged by the urging member to move from the second to the first position to support the sheet conveyed from the second sheet stacker to the sheet feeder.Type: GrantFiled: March 1, 2023Date of Patent: December 12, 2023Assignee: KYOCERA DOCUMENT SOLUTIONS INC.Inventors: Hoang Viet Nguyen, Ha Thi Ngoc Do
-
Publication number: 20230280671Abstract: A sheet conveyance device includes a sheet passage, a first sheet stacker, a second sheet stacker, and a sheet feeder. The first sheet stacker has a bottom and a lift. The sheet feeder includes an opening and a feed roller. The sheet conveyance device includes an assist plate supported to be movable between a first and a second position and an urging member. With the first sheet stacker mounted in an apparatus body, the assist plate moves from the first to the second position against the urging force of the urging member to allow passage of a sheet from the first sheet stacker to the sheet feeder. With the first sheet stacker removed from the apparatus body, the assist plate is urged by the urging member to move from the second to the first position to support the sheet conveyed from the second sheet stacker to the sheet feeder.Type: ApplicationFiled: March 1, 2023Publication date: September 7, 2023Applicant: KYOCERA Document Solutions Inc.Inventors: Hoang Viet NGUYEN, Ha Thi Ngoc DO
-
Patent number: 11750653Abstract: Systems, methods, and computer-readable media for gathering network intrusion counter-intelligence. A system can maintain a decoy network environment at one or more machines. The system can identify a malicious user accessing network services through the network environment. Further, the system can receive network service access requests from the user at one or more machines in the network environment and subsequently direct the network service access requests from the malicious user to the decoy network environment based on an identification of the malicious user. The network services access requests can be satisfied with network service access responses generated in the decoy network environment. Subsequently, the system can maintain malicious user analytics based on the network service access requests of the malicious user that are directed to the decoy network environment.Type: GrantFiled: December 20, 2021Date of Patent: September 5, 2023Assignee: Cisco Technology, Inc.Inventors: Navindra Yadav, Shih-Chun Chang, Shashi Gandham, Xiaofei Guo, Hoang Viet Nguyen, Xin Liu, Thanh Trung Ngo, Duan Tran, Xuan Loc Bui
-
Patent number: 11751008Abstract: A method includes obtaining channel information, range information, and angle of arrival (AoA) information based on wireless signals communicated between an electronic device and an external electronic device. The method also includes generating an initial prediction of a presence of the external electronic device relative to a field of view (FoV) of the electronic device based on the channel information and at least one of the range information or the AoA information. The initial prediction includes an indication of whether the external electronic device is within the FoV or outside the FoV of the electronic device. The method further includes performing, using a tracking filter, a smoothing operation on the range information and the AoA information. Additionally, the method includes determining that the external electronic device is within the FoV of the electronic device based on the AoA information, the smoothed AoA information, and the initial prediction.Type: GrantFiled: July 23, 2021Date of Patent: September 5, 2023Assignee: Samsung Electronics Co., Ltd.Inventors: Neha Dawar, Hoang Viet Nguyen, Yuming Zhu, Boon Loong Ng, Yi Yang, Moonseok Kang, Aditya Vinod Padaki, Songwei Li, Moongee Cho, Hyunchul Kim
-
Publication number: 20230246882Abstract: A method includes obtaining a channel impulse response (CIR) based on multiple ultrawide band (UWB) measurements between a mobile device and a target object. The method also includes estimating a first distance between the mobile device and the target object based on an energy of the CIR. The method also includes estimating a second distance between the mobile device and the target object based on a phase of the CIR. The method also includes obtaining an estimated distance between the mobile device and the target object based on at least one of the first distance and the second distance.Type: ApplicationFiled: January 27, 2023Publication date: August 3, 2023Inventors: Hoang Viet Nguyen, Yuming Zhu, Jiho Shin, Qiang Xie
-
Patent number: 11647238Abstract: According to examples, a system for generating and delivering enhanced content utilizing remote rendering and data streaming is described. The system may include a processor and a memory storing instructions. The processor, when executing the instructions, may cause the system to transmit a selected engagement content item for transmission to a user device and receive an indication of interest relating to the selected engagement content item. The processor, when executing the instructions, may then select, based on the received indication of interest, an enhanced content item, process the enhanced to content item to generate a stream of content data associated with the enhanced content item and transmit the stream of content data associated with the enhanced content item to the user device.Type: GrantFiled: November 9, 2021Date of Patent: May 9, 2023Assignee: META PLATFORMS, INC.Inventors: Rakesh Ravuru, Brian Fox, Keenan Christopher Pridmore, Miguel Angel Perez, Xin Zhou, Adetunji Toritseju Olojede, Kyle Scot Shank, Robert Thomas Moakler, Nikhil Girish Nawathe, Lara Jessamine Andrews, Tatiana Borrell Peck, Rotem Druker, Siqi Huang, Siyi Wang, Hoang Viet Nguyen
-
Publication number: 20230118563Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.Type: ApplicationFiled: November 9, 2022Publication date: April 20, 2023Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
-
Patent number: 11528283Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.Type: GrantFiled: June 11, 2020Date of Patent: December 13, 2022Assignee: Cisco Technology, Inc.Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc Ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Fernando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
-
Publication number: 20220373646Abstract: A method for contactless vital sign monitoring includes transmitting, via a transceiver, radar signals for object detection. The method also includes generating a clutter removed channel impulse response from received reflections of the radar signals a portion of which are reflected off of a living object. The method further includes identifying a set of range bins corresponding to a position of the living object. Additionally, the method includes identifying a first set of signal components representing a respiration rate of the living object and a second set of signal components representing a heart rate of the living object.Type: ApplicationFiled: May 19, 2022Publication date: November 24, 2022Inventors: Hoang Viet Nguyen, Raghunandan M. Rao, Yuming Zhu, Yi Yang, Jiho Shin
-
Patent number: 11403200Abstract: Systems, methods, and computer-readable for defining host functionalities in a computing environment include obtaining two or more snapshots comprising information pertaining to two or more processes executing in two or more hosts, the two or more snapshots being obtained at two or more points in time from the two or more hosts. One or more long-running processes amongst the two or more processes are identified based on one or more criteria associated with long-running processes. One or more priorities associated with the one or more long-running processes and used for defining functionalities for at least a subset of the two or more hosts, where high priorities are assigned to long-running processes, such as web server or database server processes, which are unique to at least the subset of the two or more hosts. Resources may be provisioned based on these host functionalities.Type: GrantFiled: June 11, 2020Date of Patent: August 2, 2022Assignee: CISCO TECHNOLOGY, INC.Inventors: Xin Liu, Sunil Gupta, Thanh Trung Ngo, Xuan Loc Bui, Hoang Viet Nguyen, Shashi Gandham, Navindra Yadav
-
Publication number: 20220196782Abstract: A method includes obtaining signal information based on wireless signals received from an external electronic device via a first antenna pair and a second antenna pair. The first and second antenna pairs are aligned along different axes. The signal information includes channel information, range information, a first angle of arrival (AoA) based on the first antenna pair, and a second AoA based on the second antenna pair. The method also includes generating an initial prediction of a presence of the external electronic device relative to a field of view (FoV) of the electronic device. The method further includes performing a smoothing operation on the range information and the first and second AoA, the smoothing operation generating a predicted location of the external electronic device relative to the FoV of the electronic device. Additionally, the method includes generating, based on the smoothing operation, confidence values associated with the predicted location.Type: ApplicationFiled: December 16, 2021Publication date: June 23, 2022Inventors: Neha Dawar, Hoang Viet Nguyen, Khuong N. Nguyen, Songwei Li, Yuming Zhu, Boon Loong Ng, Yi Yang, Moonseok Kang, Jiho Shin, HyunChul Kim
-
Publication number: 20220201434Abstract: A method for localizing a target device (TD) by a user device (UD) includes determining whether the TD is within a range and within a field-of-view (FoV) of the UD based on a UWB channel between the TD and the UD. In response to a determination that the TD is outside the range and not within the FoV, the method includes identifying a first electronic device. The method also includes transmitting, to the first electronic device, a request for localizing the TD using an out-of-band channel. The method further includes receiving, from the first electronic device, location information of the TD on the out-of-band channel. The location information represents a candidate location of the TD in a coordinate system of the first or a second electronic device. Additionally, the method includes identifying a TD location with respect to a coordinate system of the UD based on the candidate location.Type: ApplicationFiled: November 4, 2021Publication date: June 23, 2022Inventors: Hoang Viet Nguyen, Yuming Zhu, Boon Loong Ng
-
Publication number: 20220150553Abstract: According to examples, a system for generating and delivering enhanced content utilizing remote rendering and data streaming is described. The system may include a processor and a memory storing instructions. The processor, when executing the instructions, may cause the system to transmit a selected engagement content item for transmission to a user device and receive an indication of interest relating to the selected engagement content item. The processor, when executing the instructions, may then select, based on the received indication of interest, an enhanced content item, process the enhanced to content item to generate a stream of content data associated with the enhanced content item and transmit the stream of content data associated with the enhanced content item to the user device.Type: ApplicationFiled: November 9, 2021Publication date: May 12, 2022Applicant: Facebook, Inc.Inventors: Rakesh RAVURU, Brian FOX, Keenan Christopher PRIDMORE, Miguel Angel PEREZ, Xin ZHOU, Adetunji Toritseju OLOJEDE, Kyle Scot SHANK, Robert Thomas MOAKLER, Nikhil Girish NAWATHE, Lara Jessamine ANDREWS, Tatiana Borrell PECK, Rotem DRUKER, Siqi HUANG, Siyi WANG, Hoang Viet NGUYEN
-
Publication number: 20220137204Abstract: A method for operating an electronic device includes transmitting signals to an external electronic device. The method also includes receiving signals from the external electronic device. The method further includes generating location information of the external electronic device relative to the electronic device based on a differences between the transmitted signals and the received signals. Additionally, the method includes determining an action for changing a state on at least one of the electronic device or the external electronic device based on the location information. In response to determining that the action is associated with the electronic device, the method includes performing the action. In response to determining that the action is associated with the external electronic device, method includes sending an instruction to the external electronic device to perform the action.Type: ApplicationFiled: June 8, 2021Publication date: May 5, 2022Inventors: Hoang Viet Nguyen, Jin Cao, Guanbo Chen, Boon Loong Ng
-
Publication number: 20220116421Abstract: Systems, methods, and computer-readable media for gathering network intrusion counter-intelligence. A system can maintain a decoy network environment at one or more machines. The system can identify a malicious user accessing network services through the network environment. Further, the system can receive network service access requests from the user at one or more machines in the network environment and subsequently direct the network service access requests from the malicious user to the decoy network environment based on an identification of the malicious user. The network services access requests can be satisfied with network service access responses generated in the decoy network environment. Subsequently, the system can maintain malicious user analytics based on the network service access requests of the malicious user that are directed to the decoy network environment.Type: ApplicationFiled: December 20, 2021Publication date: April 14, 2022Inventors: Navindra Yadav, Shih-Chun Chang, Shashi Gandham, Xiaofei Guo, Hoang Viet Nguyen, Xin Liu, Thanh Trung Ngo, Duan Tran, Xuan Loc Bui