Patents by Inventor MY T. THAI

MY T. THAI has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230370269
    Abstract: Various embodiments of the present disclosure provide a distributed ledger platform for electronic voting and/or polling. In one example, an embodiment provides for receiving a request to commit a transaction to a distributed ledger in the distributed ledger system. The transaction may include one or more encrypted votes, a cryptography authentication proof, and/or an input validation proof. Another embodiment provides for executing a smart contract to (i) authenticate a user identifier associated with the transaction based on the cryptography authentication proof and (ii) validate the one or more encrypted votes based on the input validation proof. In an instance in which the smart contract authenticates the user identifier and validates the one or more encrypted votes, a data block associated with the transaction is added to the distributed ledger.
    Type: Application
    Filed: May 11, 2023
    Publication date: November 16, 2023
    Inventors: My T. Thai, Truc Nguyen
  • Patent number: 11531982
    Abstract: An exemplary transaction sharding method comprises splitting a distributed ledger into a plurality of shards; and storing a shard across the subgroup of computer nodes associated with the shard. Such a method further comprises assigning a new transaction to one of the plurality of shards, wherein assigning the new transaction comprises iteratively choosing one of the plurality of shards; in each iteration, determining a transaction-to-shard score measuring a probability that a subgroup of computing nodes associated with the chosen shard for the current iteration would be involved in a same-shard transaction for the new transaction; in each iteration, determining a latency-to-shard score by estimating a confirmation latency of the new transaction under the chosen shard for the current iteration; and selecting the new transaction to be assigned to the shard based on a combination of the transaction-to-shard score and the latency-to-shard score.
    Type: Grant
    Filed: June 24, 2020
    Date of Patent: December 20, 2022
    Assignees: University of Florida Research Foundation, Inc., Virginia Commonwealth University
    Inventors: My T. Thai, Thang N. Dinh, Lan Nguyen, Truc Nguyen
  • Publication number: 20210406872
    Abstract: An exemplary transaction sharding method comprises splitting a distributed ledger into a plurality of shards; and storing a shard across the subgroup of computer nodes associated with the shard. Such a method further comprises assigning a new transaction to one of the plurality of shards, wherein assigning the new transaction comprises iteratively choosing one of the plurality of shards; in each iteration, determining a transaction-to-shard score measuring a probability that a subgroup of computing nodes associated with the chosen shard for the current iteration would be involved in a same-shard transaction for the new transaction; in each iteration, determining a latency-to-shard score by estimating a confirmation latency of the new transaction under the chosen shard for the current iteration; and selecting the new transaction to be assigned to the shard based on a combination of the transaction-to-shard score and the latency-to-shard score.
    Type: Application
    Filed: June 24, 2020
    Publication date: December 30, 2021
    Inventors: MY T. THAI, THANG N. DINH, LAN NGUYEN, TRUC NGUYEN
  • Patent number: 9419933
    Abstract: Methods are provided for constructing an on-the-fly circle of trust for a user of an online social network to enable the user to reduce the likelihood that information will be leaked to an unwanted target. In one embodiment, a maximum circle of trust is constructed by using an iterative greedy construction (IGC) algorithm with leakage estimation using disjoint cut-sets. In another embodiment, the maximum circle of trust is constructed by using the IGC algorithm with leakage estimation using a hybrid method where the initial CT is constructed using the disjoint cut-sets and then the neighbors not included in the CT are sorted in non-decreasing order of visibilities and then each of these neighbors is included in the CT one at a time while checking if the leakage is below a threshold using a Sampling algorithm. In yet another embodiment, randomized rounding is used to construct the maximum circle of trust.
    Type: Grant
    Filed: May 16, 2013
    Date of Patent: August 16, 2016
    Assignee: University of Florida Research Foundation, Incorporated
    Inventor: My T. Thai
  • Patent number: 8705407
    Abstract: Embodiments of the invention provide systems and methods for deactivating reactive jamming attacks and other sophisticated attacks in wireless sensor networks (WSNs). In one system, trigger nodes (nodes whose transmissions invoke jammer nodes) are identified and communications between the sensor nodes of the WSN are routed to avoid sending (e.g., transmitting) information from identified trigger nodes. For example, identified trigger nodes are routed as receivers only. One method of identification uses an advanced randomized error-tolerant non-adaptive group testing technique and a clique-independent set problem solution. Another method of identification uses a hexagon tiling coloring and sequential group testing scheme.
    Type: Grant
    Filed: July 12, 2011
    Date of Patent: April 22, 2014
    Assignee: University of Florida Research Foundation, Inc.
    Inventor: My T. Thai
  • Publication number: 20130311582
    Abstract: Methods are provided for constructing an on-the-fly circle of trust for a user of an online social network to enable the user to reduce the likelihood that information will be leaked to an unwanted target. In one embodiment, a maximum circle of trust is constructed by using an iterative greedy construction (IGC) algorithm with leakage estimation using disjoint cut-sets. In another embodiment, the maximum circle of trust is constructed by using the IGC algorithm with leakage estimation using a hybrid method where the initial CT is constructed using the disjoint cut-sets and then the neighbors not included in the CT are sorted in non-decreasing order of visibilities and then each of these neighbors is included in the CT one at a time while checking if the leakage is below a threshold using a Sampling algorithm. In yet another embodiment, randomized rounding is used to construct the maximum circle of trust.
    Type: Application
    Filed: May 16, 2013
    Publication date: November 21, 2013
    Applicant: UNIVERSITY OF FLORIDA RESEARCH FOUNDATION, INCORPORATED
    Inventor: MY T. THAI
  • Publication number: 20120051239
    Abstract: Embodiments of the invention provide systems and methods for deactivating reactive jamming attacks and other sophisticated attacks in wireless sensor networks (WSNs). In one system, trigger nodes (nodes whose transmissions invoke jammer nodes) are identified and communications between the sensor nodes of the WSN are routed to avoid sending (e.g., transmitting) information from identified trigger nodes. For example, identified trigger nodes are routed as receivers only. One method of identification uses an advanced randomized error-tolerant non-adaptive group testing technique and a clique-independent set problem solution. Another method of identification uses a hexagon tiling coloring and sequential group testing scheme.
    Type: Application
    Filed: July 12, 2011
    Publication date: March 1, 2012
    Applicant: University of Florida Research Foundation, Inc.
    Inventor: MY T. THAI