Patents by Inventor Thi Chau Nguyen-Huu

Thi Chau Nguyen-Huu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9684784
    Abstract: Various embodiments of systems and methods for securely storing data are provided. In one embodiment, a computer-readable storage module is provided for securely storing data. A storage-side processor is provided for selectively granting access to the stored data on the computer-readable storage module. A user-side memory for storing an output generation record is also provided. A user-side processor configured to provide a password receiving module for receiving a password candidate, an output generation module for using the password candidate received to attempt to access the output generation record and for generating an output based on whether the attempt to access the output generation record is successful, and an output communication module for communicating the output generated by the output generation module to the storage-side processor are also provided.
    Type: Grant
    Filed: April 30, 2015
    Date of Patent: June 20, 2017
    Inventor: Thi Chau Nguyen-Huu
  • Publication number: 20170155661
    Abstract: A method and system for controlling access to a first computer using traps. The method and system involves providing a first trap designation by designating a portion of the first computer as being a first trap; receiving from a requesting computer, a request to access the first computer; determining from the request, requested portions of the first computer; and determining if the requested portions comprise the first trap. If the requested portions comprise the first trap, determining if the request to access the first trap is authorized. If and only if the request to access the first trap is authorized, the method and system involves operating the first computer according to a first operating protocol; otherwise, the method and system involves operating the first computer according a second operating protocol. If the requested portions do not comprise the first trap, the method and system involves a third operating protocol.
    Type: Application
    Filed: October 6, 2016
    Publication date: June 1, 2017
    Inventor: Thi Chau Nguyen-Huu
  • Publication number: 20170142160
    Abstract: A method and system for controlling access to a computer device with access counting is disclosed. The method involves operating a first computer and a second computer. The method includes operating the second computer to access the first computer; monitoring the second computer to determine a second access metric relative to the second computer; monitoring the first computer to determine a first access metric relative to the first computer; comparing the access metrics; and, based on comparing the access metrics, determining if an access condition is met, and, if the access condition is met, further permitting the second computer to access the first computer, otherwise interrupting access to the first computer by the one or more external computers.
    Type: Application
    Filed: October 6, 2016
    Publication date: May 18, 2017
    Inventor: Thi Chau Nguyen-Huu
  • Publication number: 20160330201
    Abstract: A method and system for controlling access to a computer device. The method and system involves operating a computer device to control access to the computer device by a host system. The method comprises determining if the host system is authorized to have access to the computer device; operating the computer device to start a session if and only if the host system is authorized to have access to the computer device; during the session, providing the host system with access to the computer device; operating the computer device to monitor the host system during the session to determine if a session termination event has occurred; and, terminating the session when the session termination event has occurred, wherein terminating the session blocks access to the computer device by the host system.
    Type: Application
    Filed: August 17, 2015
    Publication date: November 10, 2016
    Inventor: Thi Chau Nguyen-Huu
  • Publication number: 20150379274
    Abstract: Various embodiments of systems and methods for securely storing data are provided. In one embodiment, a computer-readable storage module is provided for securely storing data. A storage-side processor is provided for selectively granting access to the stored data on the computer-readable storage module. A user-side memory for storing an output generation record is also provided. A user-side processor configured to provide a password receiving module for receiving a password candidate, an output generation module for using the password candidate received to attempt to access the output generation record and for generating an output based on whether the attempt to access the output generation record is successful, and an output communication module for communicating the output generated by the output generation module to the storage-side processor are also provided.
    Type: Application
    Filed: April 30, 2015
    Publication date: December 31, 2015
    Inventor: Thi Chau Nguyen-Huu
  • Publication number: 20100023757
    Abstract: A method and system for providing encryption are provided, involving a) transmitting a request from a sender to a database for a public key for a selected recipient, the database being configured to store for each member in a plurality of members a member public key for encrypting electronic data; b) determining if the selected recipient is in the plurality of members, and; c) if the selected recipient is in the plurality of members, then executing a member procedure, the member procedure comprising transmitting from the database to the sender the member public key stored in the database for the selected recipient; d) if the selected recipient is not in the plurality of members, then executing a non-member procedure, the non-member procedure comprising determining if at least one predetermined criterion is met, and, if the at least one predetermined criterion is met, generating a non-member public key for encrypting electronic data and a non-member private key for decrypting the electronic data encrypted usin
    Type: Application
    Filed: July 17, 2009
    Publication date: January 28, 2010
    Applicant: WINMAGIC DATA SECURITY
    Inventors: Thi Chau Nguyen-Huu, Julian Petrov Michailov