Patents by Inventor HuyAnh D. Ngo
HuyAnh D. Ngo has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12154667Abstract: A method controls a modification of an adjustable device. A system establishes a circle of trust for a plurality of devices, where at least one of the plurality of devices is an adjustment control device for adjusting an adjustable device. Operations of the adjustment control device are controlled via a blockchain, where the blockchain must approve the adjustment control device before an adjustment of the adjustable device is performed by the adjustment control device. The system receives an approval from the blockchain for the adjustment control device to adjust the adjustable device, and the adjustment control device adjusts the adjustable device in response to receiving the approval from the blockchain.Type: GrantFiled: June 11, 2019Date of Patent: November 26, 2024Assignee: International Business Machines CorporationInventors: Adam L. Griffin, Srinivas B. Tummalapenta, Nikhilkumar V. Shah, Huyanh D. Ngo, Paul A. Ragone
-
Threat detection using hardware physical properties and operating system metrics with AI data mining
Patent number: 11681831Abstract: An approach is provided that receives a set of actual hardware power consumption details and a set of software activity details with all of the details pertaining to the use of a computer system at a first time. Based on the set of software activity details, the approach determines a set of expected hardware power consumption details. The set of actual hardware power consumption details are compared to the set of expected hardware power consumption details. If the comparison identifies variances between the actual and expected data, then a security threat is flagged and threat responses are performed.Type: GrantFiled: April 10, 2019Date of Patent: June 20, 2023Assignee: International Business Machines CorporationInventors: HuyAnh D. Ngo, Juan A. Martinez Castellanos, Srinivas B. Tummalapenta -
Patent number: 11374958Abstract: A method provides an intermediate mitigation of a vulnerability in a particular computer system. One or more processors receive a description of a vulnerability of a computer system to a malicious attack. The processor(s) perform an NLP analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, where the risk information includes an identity of a type of vulnerable computer system resource in the computer system. The processor(s) match the vulnerable computer system resource to a computer system resource in a particular computer system, and perform an intermediate mitigation action that reduces a functionality of the computer system resource in the particular computer system until a solution is implemented that both restores the functionality of the computer system resource in the particular computer system and mitigates the vulnerability of the particular computer system to the malicious attack.Type: GrantFiled: October 31, 2018Date of Patent: June 28, 2022Assignee: International Business Machines CorporationInventors: Huyanh D. Ngo, Aankur Bhatia, Adam J. Paquin, Srinivas B. Tummalapenta
-
Patent number: 11265352Abstract: A method assigns a particular rule for a previous client to a new client for use in executing a security feature on a computer system used by the new client. One or more processors match a new client profile for the new client to a previous client profile for the previous client. The new client profile is based on types of one or more client assets of the new client and an intrusion detection alert history of the new client. The processor(s) assign the particular rule for the previous client to the new client based on the new client profile matching the previous client profile. The processor(s) receive information indicating that a violation of the particular rule has occurred, and execute a security feature of the computer system used by the new client in order to resolve the violation of the particular rule.Type: GrantFiled: August 28, 2020Date of Patent: March 1, 2022Assignee: International Business Machines CorporationInventors: Aankur Bhatia, Srinivas B. Tummalapenta, Huyanh D. Ngo, Carlos E. Aguilera
-
Patent number: 11206242Abstract: An approach is disclosed that receives a request from a first device connected to a first network to connect to a second device connected to a second network. In response to verifying that a connection between the first device and the second device is allowed, the approach operates to establish a secure network communications tunnel between the first device and the second device. The secure network communications tunnel is specific to the first and second devices and the first device is inhibited from accessing other devices that are connected to the second network using the secure network communications tunnel. The secure network communications tunnel is then terminated in response to a detection of a security event.Type: GrantFiled: January 24, 2019Date of Patent: December 21, 2021Assignee: International Business Machines CorporationInventors: Srinivas B. Tummalapenta, Nikhilkumar V. Shah, Adam L. Griffin, HuyAnh D. Ngo, Paul A. Ragone
-
Patent number: 10944547Abstract: A method manages software images in a blockchain-based environment of trusted devices. A trusted device creates a software image for sharing among members of a set of trusted devices that includes the trusted device. A blockchain mechanism stores the software image on a virtual machine that is in communication with the set of trusted devices, where the blockchain mechanism uses the set of trusted devices as peer members of the blockchain mechanism. A trusted device from the set of trusted devices receives, via the virtual machine, an access request for the software image from a requesting device from the set of trusted devices. The blockchain mechanism authorizes the access request by providing the software image to the requesting device.Type: GrantFiled: August 10, 2018Date of Patent: March 9, 2021Assignee: International Business Machines CorporationInventors: Srinivas B. Tummalapenta, Adam L. Griffin, Nikhilkumar V. Shah, Huyanh D. Ngo, Paul A. Ragone
-
Publication number: 20200396261Abstract: A method assigns a particular rule for a previous client to a new client for use in executing a security feature on a computer system used by the new client. One or more processors match a new client profile for the new client to a previous client profile for the previous client. The new client profile is based on types of one or more client assets of the new client and an intrusion detection alert history of the new client. The processor(s) assign the particular rule for the previous client to the new client based on the new client profile matching the previous client profile. The processor(s) receive information indicating that a violation of the particular rule has occurred, and execute a security feature of the computer system used by the new client in order to resolve the violation of the particular rule.Type: ApplicationFiled: August 28, 2020Publication date: December 17, 2020Inventors: AANKUR BHATIA, SRINIVAS B. TUMMALAPENTA, HUYANH D. NGO, CARLOS E. AGUILERA
-
Publication number: 20200395107Abstract: A method controls a modification of an adjustable device. A system establishes a circle of trust for a plurality of devices, where at least one of the plurality of devices is an adjustment control device for adjusting an adjustable device. Operations of the adjustment control device are controlled via a blockchain, where the blockchain must approve the adjustment control device before an adjustment of the adjustable device is performed by the adjustment control device. The system receives an approval from the blockchain for the adjustment control device to adjust the adjustable device, and the adjustment control device adjusts the adjustable device in response to receiving the approval from the blockchain.Type: ApplicationFiled: June 11, 2019Publication date: December 17, 2020Inventors: ADAM L. GRIFFIN, SRINIVAS B. TUMMALAPENTA, NIKHILKUMAR V. SHAH, HUYANH D. NGO, PAUL A. RAGONE
-
Patent number: 10834142Abstract: A method improves a security of a computer system by building a new set of rules for the computer system. One or more processors input a plurality of client profiles to an artificial intelligence (AI) system, where the plurality of client profiles are based on an analysis of respective client environments comprising client assets and an intrusion detection alert history of a plurality of clients. The processor(s) match a new client profile to a respective client profile from the plurality of client profiles. The processor(s) build a new set of rules for the new client based on a similarity measure of the new client profile to the respective client profile. The processor(s) subsequently receive information indicating that a violation of the new set of rules has occurred and then execute a security feature of the computer system in order to resolve the violation of the new set of rules.Type: GrantFiled: October 9, 2018Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Aankur Bhatia, Srinivas B. Tummalapenta, Huyanh D. Ngo, Carlos E. Aguilera
-
THREAT DETECTION USING HARDWARE PHYSICAL PROPERTIES AND OPERATING SYSTEM METRICS WITH AI DATA MINING
Publication number: 20200327255Abstract: An approach is provided that receives a set of actual hardware power consumption details and a set of software activity details with all of the details pertaining to the use of a computer system at a first time. Based on the set of software activity details, the approach determines a set of expected hardware power consumption details. The set of actual hardware power consumption details are compared to the set of expected hardware power consumption details. If the comparison identifies variances between the actual and expected data, then a security threat is flagged and threat responses are performed.Type: ApplicationFiled: April 10, 2019Publication date: October 15, 2020Inventors: HuyAnh D. Ngo, Juan A. Martinez Castellanos, Srinivas B. Tummalapenta -
Publication number: 20200244625Abstract: An approach is disclosed that receives a request from a first device connected to a first network to connect to a second device connected to a second network. In response to verifying that a connection between the first device and the second device is allowed, the approach operates to establish a secure network communications tunnel between the first device and the second device. The secure network communications tunnel is specific to the first and second devices and the first device is inhibited from accessing other devices that are connected to the second network using the secure network communications tunnel. The secure network communications tunnel is then terminated in response to a detection of a security event.Type: ApplicationFiled: January 24, 2019Publication date: July 30, 2020Inventors: Srinivas B. Tummalapenta, Nikhilkumar V. Shah, Adam L. Griffin, HuyAnh D. Ngo, Paul A. Ragone
-
Publication number: 20200137103Abstract: A method provides an intermediate mitigation of a vulnerability in a particular computer system. One or more processors receive a description of a vulnerability of a computer system to a malicious attack. The processor(s) perform an NLP analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, where the risk information includes an identity of a type of vulnerable computer system resource in the computer system. The processor(s) match the vulnerable computer system resource to a computer system resource in a particular computer system, and perform an intermediate mitigation action that reduces a functionality of the computer system resource in the particular computer system until a solution is implemented that both restores the functionality of the computer system resource in the particular computer system and mitigates the vulnerability of the particular computer system to the malicious attack.Type: ApplicationFiled: October 31, 2018Publication date: April 30, 2020Inventors: HUYANH D. NGO, AANKUR BHATIA, ADAM J. PAQUIN, SRINIVAS B. TUMMALAPENTA
-
Publication number: 20200112590Abstract: A method improves a security of a computer system by building a new set of rules for the computer system. One or more processors input a plurality of client profiles to an artificial intelligence (AI) system, where the plurality of client profiles are based on an analysis of respective client environments comprising client assets and an intrusion detection alert history of a plurality of clients. The processor(s) match a new client profile to a respective client profile from the plurality of client profiles. The processor(s) build a new set of rules for the new client based on a similarity measure of the new client profile to the respective client profile. The processor(s) subsequently receive information indicating that a violation of the new set of rules has occurred and then execute a security feature of the computer system in order to resolve the violation of the new set of rules.Type: ApplicationFiled: October 9, 2018Publication date: April 9, 2020Inventors: AANKUR BHATIA, SRINIVAS B. TUMMALAPENTA, HUYANH D. NGO, CARLOS E. AGUILERA
-
Publication number: 20200052882Abstract: A method manages software images in a blockchain-based environment of trusted devices. A trusted device creates a software image for sharing among members of a set of trusted devices that includes the trusted device. A blockchain mechanism stores the software image on a virtual machine that is in communication with the set of trusted devices, where the blockchain mechanism uses the set of trusted devices as peer members of the blockchain mechanism. A trusted device from the set of trusted devices receives, via the virtual machine, an access request for the software image from a requesting device from the set of trusted devices. The blockchain mechanism authorizes the access request by providing the software image to the requesting device.Type: ApplicationFiled: August 10, 2018Publication date: February 13, 2020Inventors: SRINIVAS B. TUMMALAPENTA, ADAM L. GRIFFIN, NIKHILKUMAR V. SHAH, HUYANH D. NGO, PAUL A. RAGONE
-
Publication number: 20130282739Abstract: An approach is presented for generating a log parser. Regular expressions are received and stored in a crowd-sourced data repository. An instruction is received to create a log parser based on a sample log. The sample log is received. Matches are identified between strings of characters included in the received sample log and regular expressions included in the stored regular expressions. Each match indicates a stored regular expression is capable of parsing a string included in the sample log. Based on the identified matches, the log parser is generated so as to include the regular expressions that match the strings included in the sample log.Type: ApplicationFiled: April 18, 2012Publication date: October 24, 2013Applicant: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian M. Anderson, Michael A. Hughes, HuyAnh D. Ngo, Patrick A. Spizzo