Patents by Inventor Lalit Keshav Mestha

Lalit Keshav Mestha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190219994
    Abstract: Heterogeneous monitoring nodes may each generate a series of monitoring node values over time associated with operation of an industrial asset. An offline abnormal state detection model creation computer may receive the series of monitoring node values and perform a feature extraction process using a multi-modal, multi-disciplinary framework to generate an initial set of feature vectors. The model creation computer may then perform feature dimensionality reduction to generate a selected feature vector subset. The model creation computer may derive digital models through a data-driven machine learning modeling method, based on input/output variables identified by domain experts or by learning from the data. The system may then automatically generate domain level features based on a difference between sensor measurements and digital model output.
    Type: Application
    Filed: May 21, 2018
    Publication date: July 18, 2019
    Inventors: Weizhong YAN, Lalit Keshav MESTHA, Daniel Francis HOLZHAUER
  • Publication number: 20190222596
    Abstract: In some embodiments, a plurality of monitoring nodes each generate a series of current monitoring node values over time that represent a current operation of the industrial asset. An attack detection computer platform may receive the series of current monitoring node values and generate a set of current feature vectors including a current feature for capturing transients (e.g., local transients and/or global transients). The attack detection computer platform may also access an attack detection model having at least one decision boundary that was created using at least one of a set of normal feature vectors and/or a set of attacked feature vectors. The attack detection model may then be executed such that an attack alert signal is transmitted by the attack detection computer platform, when appropriate, based on the set of current feature vectors (including the current feature to capture transients) and the at least one decision boundary.
    Type: Application
    Filed: April 27, 2018
    Publication date: July 18, 2019
    Inventors: Masoud ABBASZADEH, Lalit Keshav MESTHA
  • Publication number: 20190222595
    Abstract: According to some embodiments, a plurality of monitoring nodes may each generate a series of current monitoring node values over time that represent a current operation of the industrial asset. A node classification computer may determine, for each monitoring node, a classification result indicating whether each monitoring node is in a normal or abnormal state. A disambiguation engine may receive the classification results from the node classification computer and associate a Hidden Markov Model (“HMM”) with each monitoring node. For each node in an abnormal state, the disambiguation engine may execute the HMM associated with that monitoring node to determine a disambiguation result indicating if the abnormal state is a result of an attack or a fault and output a current status of each monitoring node based on the associated classification result and the disambiguation result.
    Type: Application
    Filed: April 20, 2018
    Publication date: July 18, 2019
    Inventors: Annarita GIANI, Masoud ABBASZADEH, Lalit Keshav MESTHA
  • Publication number: 20190212710
    Abstract: According to some embodiments, a validation platform computer may interpret at least one received data packet to identify a control command for a controller of an industrial asset control system. The at least data packet being might be received, for example, from a network associated with a current operation of the industrial asset control system. The control command may then be introduced into an industrial asset simulation executing in parallel with the industrial asset control system. A simulated result of the control command from the industrial asset simulation may be validated, and, upon validation of the simulated result, it may be arranged for the control command to be provided to the controller of the industrial asset control system. Additionally, in some embodiments failed validation of a simulated result will prompt a threat-alert signal as well as prevent the command (e.g., data packet) from continuing to the controller.
    Type: Application
    Filed: March 15, 2019
    Publication date: July 11, 2019
    Inventors: Cody Joe BUSHEY, Lalit Keshav MESTHA, Daniel Francis HOLZHAUER
  • Patent number: 10328946
    Abstract: An alerter augmentation system includes one or more processors that determine an alertness of an operator of a vehicle system. The one or more processors also generate operator input requests that are separated in time by a temporal delay. These input requests seek responses or action by the operator in an attempt to keep or make the operator alert. The one or more processors change one or more of the temporal delay between the input requests and/or a type of the input requests that are generated based at least in part on the alertness of the operator that is determined.
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: June 25, 2019
    Assignee: GE GLOBAL SOURCING LLC
    Inventors: James Brooks, Lalit Keshav Mestha
  • Patent number: 10268170
    Abstract: According to some embodiments, a validation platform computer may interpret at least one received data packet to identify a control command for a controller of an industrial asset control system. The at least data packet being might be received, for example, from a network associated with a current operation of the industrial asset control system. The control command may then be introduced into an industrial asset simulation executing in parallel with the industrial asset control system. A simulated result of the control command from the industrial asset simulation may be validated, and, upon validation of the simulated result, it may be arranged for the control command to be provided to the controller of the industrial asset control system. Additionally, in some embodiments failed validation of a simulated result will prompt a threat-alert signal as well as prevent the command (e.g., data packet) from continuing to the controller.
    Type: Grant
    Filed: January 3, 2017
    Date of Patent: April 23, 2019
    Assignee: GENERAL ELECTRIC COMPANY
    Inventors: Cody Joe Bushey, Lalit Keshav Mestha, Daniel Francis Holzhauer
  • Publication number: 20190068618
    Abstract: In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.
    Type: Application
    Filed: August 22, 2017
    Publication date: February 28, 2019
    Inventors: Lalit Keshav MESTHA, Hema Kumari ACHANTA, Justin Varkey JOHN, Cody Joe BUSHEY
  • Publication number: 20190056722
    Abstract: In some embodiments, a system model construction platform may receive, from a system node data store, system node data associated with an industrial asset. The system model construction platform may automatically construct a data-driven, dynamic system model for the industrial asset based on the received system node data. A synthetic attack platform may then inject at least one synthetic attack into the data-driven, dynamic system model to create, for each of a plurality of monitoring nodes, a series of synthetic attack monitoring node values over time that represent simulated attacked operation of the industrial asset. The synthetic attack platform may store, in a synthetic attack space data source, the series of synthetic attack monitoring node values over time that represent simulated attacked operation of the industrial asset. This information may then be used, for example, along with normal operational data to construct a threat detection model for the industrial asset.
    Type: Application
    Filed: August 21, 2017
    Publication date: February 21, 2019
    Inventors: Masoud ABBASZADEH, Lalit Keshav MESTHA, Cody Joe BUSHEY
  • Publication number: 20190058715
    Abstract: According to some embodiments, a plurality of monitoring nodes may each generate a series of current monitoring node values over time that represent a current operation of the industrial asset. A node classifier computer, coupled to the plurality of monitoring nodes, may receive the series of current monitoring node values and generate a set of current feature vectors. The node classifier computer may also access at least one multi-class classifier model having at least one decision boundary. The at least one multi-class classifier model may be executed and the system may transmit a classification result based on the set of current feature vectors and the at least one decision boundary. The classification result may indicate, for example, whether a monitoring node status is normal, attacked, or faulty.
    Type: Application
    Filed: August 21, 2017
    Publication date: February 21, 2019
    Inventors: Masoud ABBASZADEH, Lalit Keshav MESTHA, Weizhong YAN
  • Patent number: 10204226
    Abstract: According to some embodiments, a threat detection model creation computer may receive a series of normal monitoring node values (representing normal operation of the industrial asset control system) and generate a set of normal feature vectors. The threat detection model creation computer may also receive a series of threatened monitoring node values (representing a threatened operation of the industrial asset control system) and generate a set of threatened feature vectors. At least one potential decision boundary for a threat detection model may be calculated based on the set of normal feature vectors, the set of threatened feature vectors, and an initial algorithm parameter. A performance of the at least one potential decision boundary may be evaluated based on a performance metric. The initial algorithm parameter may then be tuned based on a result of the evaluation, and the at least one potential decision boundary may be re-calculated.
    Type: Grant
    Filed: December 7, 2016
    Date of Patent: February 12, 2019
    Assignee: GENERAL ELECTRIC COMPANY
    Inventors: Cody Joe Bushey, Lalit Keshav Mestha, Justin Varkey John, Daniel Francis Holzhauer
  • Publication number: 20180330083
    Abstract: The example embodiments are directed to a system and method for forecasting anomalies in feature detection. In one example, the method includes storing feature behavior information of at least one monitoring node of an asset, including a normalcy boundary identifying normal feature behavior and abnormal feature behavior for the at least one monitoring node in feature space, receiving input signals from the at least one monitoring node of the asset and transforming the input signals into feature values in the feature space, wherein the feature values are located within the normalcy boundary, forecasting that a future feature value corresponding to a future input signal from the at least one monitoring node is going to be positioned outside the normalcy boundary based on the feature values within the normalcy boundary, and outputting information concerning the forecasted future feature value being outside the normalcy boundary for display.
    Type: Application
    Filed: May 15, 2017
    Publication date: November 15, 2018
    Inventors: Masoud ABBASZADEH, Lalit Keshav MESTHA
  • Publication number: 20180316701
    Abstract: A system to protect a fleet of industrial assets may include a communication port to exchange information with a plurality of remote industrial assets. An industrial fleet protection system may receive information from the plurality of remote industrial assets or a cloud-based security platform and calculate, based on information received from multiple industrial assets, a current fleet-wide operation feature vector. The industrial fleet protection system may then compare the current fleet-wide operation feature vector with a fleet-wide decision boundary (e.g., separating normal from abnormal operation of the industrial fleet). The system may then automatically transmit a response (e.g., a cyber-attack threat alert or an adjustment to a decision boundary of an industrial asset) when a result of the comparison indicates abnormal operation of the industrial fleet.
    Type: Application
    Filed: April 26, 2017
    Publication date: November 1, 2018
    Inventors: Daniel Francis HOLZHAUER, Masoud ABBASZADEH, Lalit Keshav MESTHA, Justin Varkey JOHN, Cody BUSHY
  • Publication number: 20180303351
    Abstract: A system includes an imaging device that captures multichannel image data from a region of interest on a patient, one or more processors, and memory storing instructions. The memory storing instructions cause the one or more processors to receive the multichannel image data from the imaging device, such that the multichannel image data includes an image signal representative of plethysmographic waveform data for the region of interest and specular noise in the multichannel image data. Furthermore, the memory storing instructions cause the one or more processors to generate a projection matrix associated with the multichannel image data and iterate values of the projection matrix to remove the specular noise to generate a representative physiological signal, such that the representative physiological signal has an improved signal-to-noise ratio relative to the image signal and the representative physiological signal is a representative plethysmographic waveform.
    Type: Application
    Filed: April 20, 2017
    Publication date: October 25, 2018
    Inventors: Lalit Keshav Mestha, Gayathri Seenumani, Pengfei Meng, Ramakrishna Mukkamala
  • Publication number: 20180262525
    Abstract: According to some embodiments, a plurality of heterogeneous data source nodes may each generate a series of data source node values over time associated with operation of an electric power grid control system. An offline abnormal state detection model creation computer may receive the series of data source node values and perform a feature extraction process to generate an initial set of feature vectors. The model creation computer may then perform feature selection with a multi-model, multi-disciplinary framework to generate a selected feature vector subset. According to some embodiments, feature dimensionality reduction may also be performed to generate the selected feature subset. At least one decision boundary may be automatically calculated and output for an abnormal state detection model based on the selected feature vector subset.
    Type: Application
    Filed: March 9, 2017
    Publication date: September 13, 2018
    Inventors: Weizhong YAN, Masoud ABBASZADEH, Lalit Keshav MESTHA
  • Publication number: 20180260561
    Abstract: According to some embodiments, a plurality of heterogeneous data source nodes may each generate a series of current data source node values over time that represent a current operation of an electric power grid. A real-time threat detection computer, coupled to the plurality of heterogeneous data source nodes, may receive the series of current data source node values and generate a set of current feature vectors. The threat detection computer may then access an abnormal state detection model having at least one decision boundary created offline using at least one of normal and abnormal feature vectors. The abnormal state detection model may be executed, and a threat alert signal may be transmitted if appropriate based on the set of current feature vectors and the at least one decision boundary.
    Type: Application
    Filed: March 8, 2017
    Publication date: September 13, 2018
    Inventors: Lalit Keshav MESTHA, Santosh Sambamoorthy VEDA, Masoud ABBASZADEH, Chaitanya Ashok BAONE, Weizhong YAN, Saikat RAY MAJUMDER, Sumit BOSE, Annartia GIANI, Olugbenga ANUBI
  • Publication number: 20180255091
    Abstract: The example embodiments are directed to a system and method for neutralizing abnormal signals in a cyber-physical system. In one example, the method includes receiving input signals comprising time series data associated with an asset and transforming the input signals into feature values in a feature space, detecting one or more abnormal feature values in the feature space based on a predetermined normalcy boundary associated with the asset, and determining an estimated true value for each abnormal feature value, and performing an inverse transform of each estimated true value to generate neutralized signals comprising time series data and outputting the neutralized signals.
    Type: Application
    Filed: March 9, 2017
    Publication date: September 6, 2018
    Inventors: Lalit Keshav MESTHA, Olugbenga ANUBI, Masoud ABBASZADEH
  • Patent number: 10055542
    Abstract: What is disclosed is a software interface tool for breast cancer screening that is designed for medical professionals to view and analyze suspicious regions for hot spots and hence facilitate a determination of whether identified areas of breast tissue are cancerous. Isotherm maps are constructed at designated temperature resolution. Maps are displayed on the screen. Point & click on the isotherm map can extract temperature values of pixels within the region covered by the isotherm contours. Also provided are isothermic views at different viewing angles which is advantageous for visual detection. Additional functionalities for hotspot selection, cropping, zooming, viewing at different angles, etc. are also enabled by the present software interface. The present software interface further utilizes a tumor detection method which is also disclosed herein.
    Type: Grant
    Filed: March 25, 2015
    Date of Patent: August 21, 2018
    Assignee: Niramai Health Analytix Pvt Ltd
    Inventors: Krithika Venkataramani, Lalit Keshav Mestha, Michael P. Kehoe, Geetha Manjunath
  • Publication number: 20180186234
    Abstract: A control system having one or more controllers configured to determine physical or psychophysiological (3P) changes of an operator of a vehicle. First and second imaging devices take real-time images of an operator of a vehicle. Then, based on the physical, physiological and/or psychological features extracted from the imaging device data, and a 3P model from historical data the one or more processors also configured to, responsive to the physical, physiological and/or psychological changes of the operator of the vehicle, alert the operator and control the operation of the vehicle.
    Type: Application
    Filed: January 3, 2017
    Publication date: July 5, 2018
    Inventors: Lalit Keshav Mestha, James Brooks, Peter Tu
  • Publication number: 20180191758
    Abstract: According to some embodiments, a threat detection model creation computer may receive a series of monitoring node values (representing normal and/or threatened operation of the industrial asset control system) and generate a set of normal feature vectors. The threat detection model creation computer may identify a first cluster and a second cluster in the set of feature vectors. The threat detection model creation computer may then automatically determine a plurality of cluster-based decision boundaries for a threat detection model. For example, a first potential cluster-based decision boundary for the threat detection model may be automatically calculated based on the first cluster in the set of feature vectors. Similarly, the threat detection model creation computer may also automatically calculate a second potential cluster-based decision boundary for the threat detection model based on the second cluster in the set of feature vectors.
    Type: Application
    Filed: January 3, 2017
    Publication date: July 5, 2018
    Inventors: Masoud ABBASZADEH, Cody Joe BUSHEY, Lalit Keshav MESTHA, Daniel Francis HOLZHAUER
  • Publication number: 20180186379
    Abstract: An alerter augmentation system includes one or more processors that determine an alertness of an operator of a vehicle system. The one or more processors also generate operator input requests that are separated in time by a temporal delay. These input requests seek responses or action by the operator in an attempt to keep or make the operator alert. The one or more processors change one or more of the temporal delay between the input requests and/or a type of the input requests that are generated based at least in part on the alertness of the operator that is determined.
    Type: Application
    Filed: January 3, 2017
    Publication date: July 5, 2018
    Inventors: James Brooks, Lalit Keshav Mestha