Patents by Inventor Justin Varkey John

Justin Varkey John has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190342318
    Abstract: According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset control system. A current operating mode of the industrial asset control system may be received and used to determine a current operating mode group from a set of potential operating mode groups. For each stream of monitoring node signal values, a current monitoring node feature vector may be determined. Based on the current operating mode group, an appropriate decision boundary may be selected for each monitoring node, the appropriate decision boundary separating a normal state from an abnormal state for that monitoring node in the current operating mode. Each generated current monitoring node feature vector may be compared with the selected corresponding appropriate decision boundary, and a threat alert signal may be automatically transmitted based on results of said comparisons.
    Type: Application
    Filed: July 15, 2019
    Publication date: November 7, 2019
    Inventors: Daniel Francis HOLZHAUER, Cody Joe BUSHEY, Lalit Keshav MESTHA, Masoud ABBASZADEH, Justin Varkey JOHN
  • Patent number: 10397257
    Abstract: According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset control system. A current operating mode of the industrial asset control system may be received and used to determine a current operating mode group from a set of potential operating mode groups. For each stream of monitoring node signal values, a current monitoring node feature vector may be determined. Based on the current operating mode group, an appropriate decision boundary may be selected for each monitoring node, the appropriate decision boundary separating a normal state from an abnormal state for that monitoring node in the current operating mode. Each generated current monitoring node feature vector may be compared with the selected corresponding appropriate decision boundary, and a threat alert signal may be automatically transmitted based on results of said comparisons.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: August 27, 2019
    Assignee: GENERAL ELECTRIC COMPANY
    Inventors: Daniel Francis Holzhauer, Cody Joe Bushey, Lalit Keshav Mestha, Masoud Abbaszadeh, Justin Varkey John
  • Publication number: 20190260768
    Abstract: In some embodiments, an Unmanned Aerial Vehicle (“UAV”) system may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the UAV system. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors. The attack detection computer platform may access an attack detection model having at least one decision boundary (e.g., created using a set of normal feature vectors a set of attacked feature vectors). The attack detection model may then be executed and the platform may transmit an attack alert signal based on the set of current feature vectors and the at least one decision boundary. According to some embodiments, attack localization and/or neutralization functions may also be provided.
    Type: Application
    Filed: February 20, 2018
    Publication date: August 22, 2019
    Inventors: Lalit Keshav MESTHA, Olugbenga ANUBI, Justin Varkey JOHN
  • Publication number: 20190068618
    Abstract: In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.
    Type: Application
    Filed: August 22, 2017
    Publication date: February 28, 2019
    Inventors: Lalit Keshav MESTHA, Hema Kumari ACHANTA, Justin Varkey JOHN, Cody Joe BUSHEY
  • Patent number: 10204226
    Abstract: According to some embodiments, a threat detection model creation computer may receive a series of normal monitoring node values (representing normal operation of the industrial asset control system) and generate a set of normal feature vectors. The threat detection model creation computer may also receive a series of threatened monitoring node values (representing a threatened operation of the industrial asset control system) and generate a set of threatened feature vectors. At least one potential decision boundary for a threat detection model may be calculated based on the set of normal feature vectors, the set of threatened feature vectors, and an initial algorithm parameter. A performance of the at least one potential decision boundary may be evaluated based on a performance metric. The initial algorithm parameter may then be tuned based on a result of the evaluation, and the at least one potential decision boundary may be re-calculated.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: February 12, 2019
    Assignee: GENERAL ELECTRIC COMPANY
    Inventors: Cody Joe Bushey, Lalit Keshav Mestha, Justin Varkey John, Daniel Francis Holzhauer
  • Publication number: 20180316701
    Abstract: A system to protect a fleet of industrial assets may include a communication port to exchange information with a plurality of remote industrial assets. An industrial fleet protection system may receive information from the plurality of remote industrial assets or a cloud-based security platform and calculate, based on information received from multiple industrial assets, a current fleet-wide operation feature vector. The industrial fleet protection system may then compare the current fleet-wide operation feature vector with a fleet-wide decision boundary (e.g., separating normal from abnormal operation of the industrial fleet). The system may then automatically transmit a response (e.g., a cyber-attack threat alert or an adjustment to a decision boundary of an industrial asset) when a result of the comparison indicates abnormal operation of the industrial fleet.
    Type: Application
    Filed: April 26, 2017
    Publication date: November 1, 2018
    Inventors: Daniel Francis HOLZHAUER, Masoud ABBASZADEH, Lalit Keshav MESTHA, Justin Varkey JOHN, Cody BUSHY
  • Patent number: 9998487
    Abstract: A normal space data source stores, for each of a plurality of threat nodes, a series of normal values that represent normal operation of an industrial asset control system, and a threatened space data source stores a series of threatened values. A model creation computer may generate sets of normal and threatened feature vectors. The computer may also calculate and output at least one decision boundary for a threat detection model based on the normal and threatened feature vectors. The plurality of threat nodes may then generate a series of current values from threat nodes that represent a current operation of the asset control system. A threat detection computer may receive the series of current values from threat nodes, generate a set of current feature vectors, execute the threat detection model, and transmit a threat alert signal based on the current feature vectors and at the least one decision boundary.
    Type: Grant
    Filed: April 25, 2016
    Date of Patent: June 12, 2018
    Assignee: GENERAL ELECTRIC COMPANY
    Inventors: Lalit Keshav Mestha, Jonathan Carl Thatcher, Daniel Francis Holzhauer, Justin Varkey John
  • Publication number: 20180157838
    Abstract: According to some embodiments, a threat detection model creation computer may receive a series of normal monitoring node values (representing normal operation of the industrial asset control system) and generate a set of normal feature vectors. The threat detection model creation computer may also receive a series of threatened monitoring node values (representing a threatened operation of the industrial asset control system) and generate a set of threatened feature vectors. At least one potential decision boundary for a threat detection model may be calculated based on the set of normal feature vectors, the set of threatened feature vectors, and an initial algorithm parameter. A performance of the at least one potential decision boundary may be evaluated based on a performance metric. The initial algorithm parameter may then be tuned based on a result of the evaluation, and the at least one potential decision boundary may be re-calculated.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Cody Joe BUSHEY, Lalit Keshav MESTHA, Justin Varkey JOHN, Daniel Francis HOLZHAUER
  • Publication number: 20180159877
    Abstract: According to some embodiments, streams of monitoring node signal values may be received over time that represent a current operation of an industrial asset control system. A current operating mode of the industrial asset control system may be received and used to determine a current operating mode group from a set of potential operating mode groups. For each stream of monitoring node signal values, a current monitoring node feature vector may be determined. Based on the current operating mode group, an appropriate decision boundary may be selected for each monitoring node, the appropriate decision boundary separating a normal state from an abnormal state for that monitoring node in the current operating mode. Each generated current monitoring node feature vector may be compared with the selected corresponding appropriate decision boundary, and a threat alert signal may be automatically transmitted based on results of said comparisons.
    Type: Application
    Filed: December 7, 2016
    Publication date: June 7, 2018
    Inventors: Daniel Francis HOLZHAUER, Cody Joe BUSHEY, Lalit Keshav MESTHA, Masoud ABBASZADEH, Justin Varkey JOHN
  • Publication number: 20180159879
    Abstract: A threat detection model creation computer receives normal monitoring node values and abnormal monitoring node values. At least some received monitoring node values may be processed with a deep learning model to determine parameters of the deep learning model (e.g., a weight matrix and affine terms). The parameters of the deep learning model and received monitoring node values may then be used to compute feature vectors. The feature vectors may be spatial along a plurality of monitoring nodes. At least one decision boundary for a threat detection model may be automatically calculated based on the computed feature vectors, and the system may output the decision boundary separating a normal state from an abnormal state for that monitoring node. The decision boundary may also be obtained by combining feature vectors from multiple nodes. The decision boundary may then be used to detect normal and abnormal operation of an industrial asset.
    Type: Application
    Filed: April 11, 2017
    Publication date: June 7, 2018
    Inventors: Lalit Keshav MESTHA, Justin Varkey JOHN, Weizhong YAN, David Joseph HARTMAN
  • Publication number: 20170364674
    Abstract: Systems and methods are described for accessing a secure system requiring multi-point authentication by receiving an optical image, wherein the optical image includes at least a portion of an identification badge; determining a plurality of characteristics from the optical image of at least a portion of the identification badge; comparing one or more of the plurality of characteristics to a database of characteristics of authorized users; assigning a confidence factor based on the comparison; and prompting for a second form of authentication if the confidence factor meets or exceeds a threshold or denying access to the secure system if the confidence factor does not meet or exceed the threshold.
    Type: Application
    Filed: November 20, 2014
    Publication date: December 21, 2017
    Inventors: Robert William GRUBBS, Justin Varkey JOHN
  • Publication number: 20170359366
    Abstract: In some embodiments, a plurality of real-time monitoring node signal inputs receive streams of monitoring node signal values over time that represent a current operation of the industrial asset control system. A threat detection computer platform, coupled to the plurality of real-time monitoring node signal inputs, may receive the streams of monitoring node signal values and, for each stream of monitoring node signal values, generate a current monitoring node feature vector. The threat detection computer platform may then compare each generated current monitoring node feature vector with a corresponding decision boundary for that monitoring node, the decision boundary separating a normal state from an abnormal state for that monitoring node, and localize an origin of a threat to a particular monitoring node. The threat detection computer platform may then automatically transmit a threat alert signal based on results of said comparisons along with an indication of the particular monitoring node.
    Type: Application
    Filed: June 10, 2016
    Publication date: December 14, 2017
    Inventors: Cody Joe BUSHEY, Lalit Keshav MESTHA, Daniel Francis HOLZHAUER, Justin Varkey JOHN
  • Publication number: 20170310690
    Abstract: A normal space data source stores, for each of a plurality of threat nodes, a series of normal values that represent normal operation of an industrial asset control system, and a threatened space data source stores a series of threatened values. A model creation computer may generate sets of normal and threatened feature vectors. The computer may also calculate and output at least one decision boundary for a threat detection model based on the normal and threatened feature vectors. The plurality of threat nodes may then generate a series of current values from threat nodes that represent a current operation of the asset control system. A threat detection computer may receive the series of current values from threat nodes, generate a set of current feature vectors, execute the threat detection model, and transmit a threat alert signal based on the current feature vectors and at the least one decision boundary.
    Type: Application
    Filed: April 25, 2016
    Publication date: October 26, 2017
    Inventors: Lalit Keshav MESTHA, Jonathan Carl THATCHER, Daniel Francis HOLZHAUER, Justin Varkey JOHN
  • Patent number: 9560523
    Abstract: One aspect of the invention is a system for mobile device authentication. The system includes a public-facing server configured to interface with a mobile device. The system also includes a secure server configured to interface with the public-facing server and an authorization station. The authorization station includes processing circuitry configured to establish authorization limits for the mobile device and generate an authentication key associated with the authorization limits. The processing circuitry is further configured to provide the authentication key and an identifier of the mobile device to the secure server, and generate an authorization code including an encoded version of the authentication key and an address of the public-facing server. The processing circuitry is also configured to provide the authorization code to the mobile device to establish authentication for the mobile device to receive data from a control system network as constrained by the authorization limits.
    Type: Grant
    Filed: August 23, 2013
    Date of Patent: January 31, 2017
    Assignee: GENERAL ELECTRIC COMPANY
    Inventors: Justin Varkey John, Robert William Grubbs
  • Patent number: 9383890
    Abstract: A system includes a processor configured to cause a display to display a graphical visualization of an industrial system, detect a user input corresponding to an area of the display, perform a semantic zoom of the area of the display, and to display a first level of information based on a first level of the semantic zoom. The first level of information includes a data that was not previously displayed on the area of the display. The processor is configured to perform a semantic zoom of a graphical visualization of a graphical device during the first level of the semantic zoom. The processor is configured to cause the display to transition to a concurrent display of the graphical device and a second level of information during a second level of the semantic zoom.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: July 5, 2016
    Assignee: General Electric Company
    Inventors: Robert William Grubbs, Justin Varkey John
  • Patent number: 9007207
    Abstract: A dynamic alarm system for operating a power plant is disclosed. The dynamic alarm system includes a sensor configured to generate a signal related to a measurement of an operation of the power plant. An interface displays a generated alarm to an operator and receives a dynamic rating value from the operator related to the generated alarm. A processor generates the alarm using the generated signal, compiles the rating value and alters an operation of the power plant from the compiled rating value.
    Type: Grant
    Filed: January 22, 2013
    Date of Patent: April 14, 2015
    Assignee: General Electric Company
    Inventors: Justin Varkey John, Robert William Grubbs, Jonathan Carl Thatcher
  • Publication number: 20150058808
    Abstract: One aspect of the invention is a system for providing a dynamic contextual touch menu. The system includes a multi-touch display and processing circuitry coupled to the multi-touch display. The processing circuitry is configured to detect a contextual menu display request in response to a touch detected on the multi-touch display. The processing circuitry is configured to display a dynamic contextual touch menu associated with a first element as a targeted element in response to the detected contextual menu display request. The processing circuitry is also configured to modify content of the dynamic contextual touch menu to align with a second element as the targeted element in response to a detected motion on the multi-touch display between the first and second elements.
    Type: Application
    Filed: August 23, 2013
    Publication date: February 26, 2015
    Applicant: General Electric Company
    Inventors: Justin Varkey John, Robert William Grubbs
  • Publication number: 20150058947
    Abstract: One aspect of the invention is a system for mobile device authentication. The system includes a public-facing server configured to interface with a mobile device. The system also includes a secure server configured to interface with the public-facing server and an authorization station. The authorization station includes processing circuitry configured to establish authorization limits for the mobile device and generate an authentication key associated with the authorization limits. The processing circuitry is further configured to provide the authentication key and an identifier of the mobile device to the secure server, and generate an authorization code including an encoded version of the authentication key and an address of the public-facing server. The processing circuitry is also configured to provide the authorization code to the mobile device to establish authentication for the mobile device to receive data from a control system network as constrained by the authorization limits.
    Type: Application
    Filed: August 23, 2013
    Publication date: February 26, 2015
    Applicant: General Electric Company
    Inventors: Justin Varkey John, Robert William Grubbs
  • Publication number: 20150058796
    Abstract: One aspect of the invention is a system for providing navigation control for a tabletop computer system. The system includes a multi-touch display and processing circuitry coupled to the multi-touch display. The processing circuitry is configured to display a user interface on the multi-touch display and render a navigation pane on the multi-touch display. The navigation pane includes a reduced-scale copy of the user interface. The processing circuitry is also configured to detect a touch-based input at a position on the navigation pane and determine a scaled position on the user interface corresponding to the position on the navigation pane. The processing circuitry is further configured to interpret the touch-based input at the position on the navigation pane as an equivalent touch-based input at the scaled position on the user interface and trigger an event corresponding to the equivalent touch-based input at the scaled position on the user interface.
    Type: Application
    Filed: August 23, 2013
    Publication date: February 26, 2015
    Applicant: General Electric Company
    Inventors: Pavan Kumar Singh Thakur, Justin Varkey John, Venkatesh Mani Selvaraj
  • Publication number: 20150058809
    Abstract: One aspect of the invention is a system for multi-touch gesture processing. The system includes a multi-touch display and processing circuitry coupled to the multi-touch display. The processing circuitry is configured to detect a gesture on a gesture target area of a panel toolbar associated with a panel displayed on the multi-touch display. The panel includes panel content displayed in a content area. The gesture target area includes an empty area absent one or more command icons. Based on detection of the gesture, additional content is displayed on the multi-touch display associated with the panel content.
    Type: Application
    Filed: August 23, 2013
    Publication date: February 26, 2015
    Applicant: General Electric Company
    Inventors: Robert William Grubbs, Justin Varkey John