Patents by Inventor Michael E. Mylrea

Michael E. Mylrea has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11727120
    Abstract: Technology related to blockchain cybersecurity solutions and a blockchain applicability framework is disclosed. In one example of the disclosed technology, a system is configured to store, in a database, a plurality of cryptographically-signed records of data transmitted between an asset and a utility historian, and store, in a distributed ledger, a respective hash value corresponding to each record of the database. The system can be further configured to verify a selected record by recomputing a hash value corresponding to the selected record and comparing the recomputed hash value to the respective hash value stored in the distributed ledger in correspondence with the selected record.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: August 15, 2023
    Assignee: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Craig H. Allwardt, Beverly E. Johnson
  • Patent number: 11706192
    Abstract: A cybersecurity infrastructure command validation system is provided herein for validating asset commands issued within an infrastructure network. The cybersecurity infrastructure command validation system can be integrated into an infrastructure network to monitor and validate infrastructure asset commands in real-time or while the infrastructure network is active. The cybersecurity infrastructure command validation system can receive or intercept commands issued by asset controllers. The cybersecurity infrastructure command validation system can validate the commands based on a command validation model. The command validation model can represent normal operating behavior of the infrastructure network. The cybersecurity infrastructure command validation system can provide valid commands to the intended infrastructure asset, or can reject invalid commands. The cybersecurity infrastructure command validation system can store validation results for use in updating the command validation model.
    Type: Grant
    Filed: October 16, 2019
    Date of Patent: July 18, 2023
    Assignee: Battelle Memorial Institute
    Inventors: Bora A. Akyol, Jereme N. Haack, Thomas E. Carroll, Kyle E. Monson, Penny L. McKenzie, Keith W. Thornhill, Michael E. Mylrea
  • Patent number: 11651082
    Abstract: Technology related to blockchain cybersecurity solutions and a blockchain applicability framework is disclosed. In one example of the disclosed technology, a system is configured to receive parameters for a blockchain candidate application and evaluate the parameters to determine a recommendation for types of blockchain to apply to the candidate application. The recommendation may be based on an evaluation of the parameters to determine a level of applicability of blockchain usage, a level of applicability of one or more blockchain privacy types, and a level of applicability of one or more blockchain consensus types. The system may be configured to calculate an overall percentage distribution of the levels of applicability and to output an indication of the overall percentage distribution.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: May 16, 2023
    Assignees: Battelle Memorial Institute, The Board of Trustees of the University of Arkansas
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Hirak Patangia
  • Patent number: 11621973
    Abstract: A cybersecurity distributed ledger is provided herein for managing, tracking, auditing, and securing assets in a power infrastructure. The cybersecurity distributed ledger may include a blockchain, and may combine with smart contract or smart negotiation technology, such as in a permissioned proof of authority blockchain. The cybersecurity distributed ledger may manage the complete life cycle of a grid asset, from asset requirement and specification, through production, testing, deployment, maintenance, and retirement. The cybersecurity distributed ledger may create an immutable record of the grid asset, which may be audited for regulatory compliance or build or development compliance. Further, the cybersecurity distributed ledger may store unique identifying information for a grid asset, which may be used to detect a security breach or other tampering with a grid asset. The cybersecurity distributed ledger may also track control or ownership of the grid asset, as well as changes or updates to the grid asset.
    Type: Grant
    Filed: July 3, 2019
    Date of Patent: April 4, 2023
    Assignee: Battelle Memorial Institute
    Inventors: Michael E. Mylrea, Sri Nikhil Gupta Gourisetti
  • Patent number: 11409887
    Abstract: Systems, methods, and computer media for mitigating cybersecurity vulnerabilities of systems are provided herein. A current cybersecurity maturity of a system can be determined based on maturity criteria. The maturity criteria can be ranked based on importance. Solution candidates for increasing the cybersecurity maturity of the system can be determined based on the ranking. The solution candidates specify cybersecurity levels for the maturity criteria. A present state value reflecting the current cybersecurity maturity of the system can be calculated. For the solution candidates, an implementation state value and a transition state value can be determined. The implementation state value represents implementation of the maturity levels of the solution candidate, and the transition state value represents a transition from the present state value to the implementation state value.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: August 9, 2022
    Assignees: Battelle Memorial Institute, Board of Trustees of the University of Arkansas
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Hirak Patangia
  • Publication number: 20220179378
    Abstract: This document describes techniques, apparatuses, and systems for a blockchain-based transactive energy system. A blockchain-based transactive energy system receives a bid associated with a supply/demand curve of a utility from a transactive node through a smart contract. A universal identifier associated with the bid may be verified by consensus nodes of the blockchain-based transactive energy system to determine a verified set of bids. The universal identifier or other data associated with the bid may be stored in an immutable database provided by a blockchain. Based on the verified set of bids, a market-clearing price of the utility may be determined and used to satisfy the bid of the transactive node according to an actual production or consumption of the utility by the transactive node. The actual production or consumption of the utility may be stored in the immutable database for future audits or verification.
    Type: Application
    Filed: November 29, 2021
    Publication date: June 9, 2022
    Applicant: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Steven E. Widergren, Michael E. Mylrea, David J. Sebastian Cardenas, Mark I. Borkum, Bishnu P. Bhattarai, Peng Wang, Alysha M. Randall, Hayden M. Reeve
  • Patent number: 11347866
    Abstract: Techniques and apparatuses are described for a cybersecurity risk management tool to assess cybersecurity risk and prioritize cybersecurity correction plans. The cybersecurity risk management tool categorizes cybersecurity framework security controls into maturity indicator levels, identifies implementation states achieved by an entity with respect to the cybersecurity framework security controls, and determines which of the maturity indicator levels represents the implementation state achieved by the entity with respect to each of the cybersecurity framework security controls. A cost-benefit analysis for modifying from the implementation state achieved by the entity to a next implementation state to be achieved by the entity with respect to the cybersecurity framework security controls is also enabled. The cost-benefit analysis leverages factored weights including aspects indicative of security perspectives, Gaussian distributions, and the maturity indicator levels.
    Type: Grant
    Filed: February 3, 2020
    Date of Patent: May 31, 2022
    Assignee: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Paul M. Skare
  • Publication number: 20210173940
    Abstract: Method include receiving banner information from one or more queries of a network connecting a set of devices, wherein the banner information of one or more of the devices includes common vulnerability and exposure identifiers (CVEs) and the banner information of one or more of the devices does not include a CVE, identifying the devices based on the banner information including classifying devices without known CVEs by a device type, determining vulnerability scores for the devices with known CVEs based on retrieved CVE information, and determining vulnerability scores for the devices without CVEs based on a series of exploitability and impact parameter estimates associated with the device type classifications. Some methods include estimating a cyberattack vulnerability risk for the devices using the determined vulnerability scores.
    Type: Application
    Filed: December 10, 2020
    Publication date: June 10, 2021
    Applicant: Battelle Memorial Institute
    Inventors: Michael E. Mylrea, Sri Nikhil Gupta Gourisetti
  • Publication number: 20210067536
    Abstract: A cybersecurity distributed ledger is provided herein for managing, tracking, auditing, and securing assets in a power infrastructure. The cybersecurity distributed ledger may include a blockchain, and may combine with smart contract or smart negotiation technology, such as in a permissioned proof of authority blockchain. The cybersecurity distributed ledger may manage the complete life cycle of a grid asset, from asset requirement and specification, through production, testing, deployment, maintenance, and retirement. The cybersecurity distributed ledger may create an immutable record of the grid asset, which may be audited for regulatory compliance or build or development compliance. Further, the cybersecurity distributed ledger may store unique identifying information for a grid asset, which may be used to detect a security breach or other tampering with a grid asset. The cybersecurity distributed ledger may also track control or ownership of the grid asset, as well as changes or updates to the grid asset.
    Type: Application
    Filed: July 3, 2019
    Publication date: March 4, 2021
    Applicant: Battelle Memorial Institute
    Inventors: Michael E. Mylrea, Sri Nikhil Gupta Gourisetti
  • Publication number: 20210014065
    Abstract: Technology related to blockchain cybersecurity solutions and a blockchain applicability framework is disclosed. In one example of the disclosed technology, a system is configured to store, in a database, a plurality of cryptographically-signed records of data transmitted between an asset and a utility historian, and store, in a distributed ledger, a respective hash value corresponding to each record of the database. The system can be further configured to verify a selected record by recomputing a hash value corresponding to the selected record and comparing the recomputed hash value to the respective hash value stored in the distributed ledger in correspondence with the selected record.
    Type: Application
    Filed: July 10, 2020
    Publication date: January 14, 2021
    Applicant: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Craig H. Allwardt, Beverly E. Johnson
  • Publication number: 20210012013
    Abstract: Technology related to blockchain cybersecurity solutions and a blockchain applicability framework is disclosed. In one example of the disclosed technology, a system is configured to receive parameters for a blockchain candidate application and evaluate the parameters to determine a recommendation for types of blockchain to apply to the candidate application. The recommendation may be based on an evaluation of the parameters to determine a level of applicability of blockchain usage, a level of applicability of one or more blockchain privacy types, and a level of applicability of one or more blockchain consensus types. The system may be configured to calculate an overall percentage distribution of the levels of applicability and to output an indication of the overall percentage distribution.
    Type: Application
    Filed: July 10, 2020
    Publication date: January 14, 2021
    Applicants: Battelle Memorial Institute, The Board of Trustees of the University of Arkansas
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Hirak Patangia
  • Publication number: 20200364346
    Abstract: Apparatus and methods are disclosed for producing configuration recommendations and implementing those recommendations in a computing environment. In some examples, a browser-based tool is provided that allows hardware and software developers to assess the maturity level of their design and development processes, allows management to determine desired maturity levels in seven domains, and allows developers to monitor process maturity improvements against management goals. The disclosed technologies can be used by commercial software developers as well as internal development organizations.
    Type: Application
    Filed: April 3, 2020
    Publication date: November 19, 2020
    Applicant: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Scott R. Mix, Jessica L. Smith, Michael E. Mylrea, Christopher A. Bonebrake, Paul M. Skare, David O. Manz
  • Publication number: 20200356678
    Abstract: Systems, methods, and computer media for mitigating cybersecurity vulnerabilities of systems are provided herein. A current cybersecurity maturity of a system can be determined based on maturity criteria. The maturity criteria can be ranked based on importance. Solution candidates for increasing the cybersecurity maturity of the system can be determined based on the ranking. The solution candidates specify cybersecurity levels for the maturity criteria. A present state value reflecting the current cybersecurity maturity of the system can be calculated. For the solution candidates, an implementation state value and a transition state value can be determined. The implementation state value represents implementation of the maturity levels of the solution candidate, and the transition state value represents a transition from the present state value to the implementation state value.
    Type: Application
    Filed: May 7, 2020
    Publication date: November 12, 2020
    Applicants: Battelle Memorial Institute, Board of Trustees of the University of Arkansas
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Hirak Patangia
  • Publication number: 20200250317
    Abstract: Techniques and apparatuses are described for a cybersecurity risk management tool to assess cybersecurity risk and prioritize cybersecurity correction plans. The cybersecurity risk management tool categorizes cybersecurity framework security controls into maturity indicator levels, identifies implementation states achieved by an entity with respect to the cybersecurity framework security controls, and determines which of the maturity indicator levels represents the implementation state achieved by the entity with respect to each of the cybersecurity framework security controls. A cost-benefit analysis for modifying from the implementation state achieved by the entity to a next implementation state to be achieved by the entity with respect to the cybersecurity framework security controls is also enabled. The cost-benefit analysis leverages factored weights including aspects indicative of security perspectives, Gaussian distributions, and the maturity indicator levels.
    Type: Application
    Filed: February 3, 2020
    Publication date: August 6, 2020
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Paul M. Skare
  • Publication number: 20200127973
    Abstract: A cybersecurity infrastructure command validation system is provided herein for validating asset commands issued within an infrastructure network. The cybersecurity infrastructure command validation system can be integrated into an infrastructure network to monitor and validate infrastructure asset commands in real-time or while the infrastructure network is active. The cybersecurity infrastructure command validation system can receive or intercept commands issued by asset controllers. The cybersecurity infrastructure command validation system can validate the commands based on a command validation model. The command validation model can represent normal operating behavior of the infrastructure network. The cybersecurity infrastructure command validation system can provide valid commands to the intended infrastructure asset, or can reject invalid commands. The cybersecurity infrastructure command validation system can store validation results for use in updating the command validation model.
    Type: Application
    Filed: October 16, 2019
    Publication date: April 23, 2020
    Applicant: Battelle Memorial Institute
    Inventors: Bora A. Akyol, Jereme N. Haack, Thomas E. Carroll, Kyle E. Monson, Penny L. McKenzie, Keith W. Thornhill, Michael E. Mylrea