Patents by Inventor Sri Nikhil Gupta Gourisetti

Sri Nikhil Gupta Gourisetti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11727120
    Abstract: Technology related to blockchain cybersecurity solutions and a blockchain applicability framework is disclosed. In one example of the disclosed technology, a system is configured to store, in a database, a plurality of cryptographically-signed records of data transmitted between an asset and a utility historian, and store, in a distributed ledger, a respective hash value corresponding to each record of the database. The system can be further configured to verify a selected record by recomputing a hash value corresponding to the selected record and comparing the recomputed hash value to the respective hash value stored in the distributed ledger in correspondence with the selected record.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: August 15, 2023
    Assignee: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Craig H. Allwardt, Beverly E. Johnson
  • Patent number: 11651082
    Abstract: Technology related to blockchain cybersecurity solutions and a blockchain applicability framework is disclosed. In one example of the disclosed technology, a system is configured to receive parameters for a blockchain candidate application and evaluate the parameters to determine a recommendation for types of blockchain to apply to the candidate application. The recommendation may be based on an evaluation of the parameters to determine a level of applicability of blockchain usage, a level of applicability of one or more blockchain privacy types, and a level of applicability of one or more blockchain consensus types. The system may be configured to calculate an overall percentage distribution of the levels of applicability and to output an indication of the overall percentage distribution.
    Type: Grant
    Filed: July 10, 2020
    Date of Patent: May 16, 2023
    Assignees: Battelle Memorial Institute, The Board of Trustees of the University of Arkansas
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Hirak Patangia
  • Patent number: 11621973
    Abstract: A cybersecurity distributed ledger is provided herein for managing, tracking, auditing, and securing assets in a power infrastructure. The cybersecurity distributed ledger may include a blockchain, and may combine with smart contract or smart negotiation technology, such as in a permissioned proof of authority blockchain. The cybersecurity distributed ledger may manage the complete life cycle of a grid asset, from asset requirement and specification, through production, testing, deployment, maintenance, and retirement. The cybersecurity distributed ledger may create an immutable record of the grid asset, which may be audited for regulatory compliance or build or development compliance. Further, the cybersecurity distributed ledger may store unique identifying information for a grid asset, which may be used to detect a security breach or other tampering with a grid asset. The cybersecurity distributed ledger may also track control or ownership of the grid asset, as well as changes or updates to the grid asset.
    Type: Grant
    Filed: July 3, 2019
    Date of Patent: April 4, 2023
    Assignee: Battelle Memorial Institute
    Inventors: Michael E. Mylrea, Sri Nikhil Gupta Gourisetti
  • Patent number: 11409887
    Abstract: Systems, methods, and computer media for mitigating cybersecurity vulnerabilities of systems are provided herein. A current cybersecurity maturity of a system can be determined based on maturity criteria. The maturity criteria can be ranked based on importance. Solution candidates for increasing the cybersecurity maturity of the system can be determined based on the ranking. The solution candidates specify cybersecurity levels for the maturity criteria. A present state value reflecting the current cybersecurity maturity of the system can be calculated. For the solution candidates, an implementation state value and a transition state value can be determined. The implementation state value represents implementation of the maturity levels of the solution candidate, and the transition state value represents a transition from the present state value to the implementation state value.
    Type: Grant
    Filed: May 7, 2020
    Date of Patent: August 9, 2022
    Assignees: Battelle Memorial Institute, Board of Trustees of the University of Arkansas
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Hirak Patangia
  • Publication number: 20220179378
    Abstract: This document describes techniques, apparatuses, and systems for a blockchain-based transactive energy system. A blockchain-based transactive energy system receives a bid associated with a supply/demand curve of a utility from a transactive node through a smart contract. A universal identifier associated with the bid may be verified by consensus nodes of the blockchain-based transactive energy system to determine a verified set of bids. The universal identifier or other data associated with the bid may be stored in an immutable database provided by a blockchain. Based on the verified set of bids, a market-clearing price of the utility may be determined and used to satisfy the bid of the transactive node according to an actual production or consumption of the utility by the transactive node. The actual production or consumption of the utility may be stored in the immutable database for future audits or verification.
    Type: Application
    Filed: November 29, 2021
    Publication date: June 9, 2022
    Applicant: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Steven E. Widergren, Michael E. Mylrea, David J. Sebastian Cardenas, Mark I. Borkum, Bishnu P. Bhattarai, Peng Wang, Alysha M. Randall, Hayden M. Reeve
  • Patent number: 11347866
    Abstract: Techniques and apparatuses are described for a cybersecurity risk management tool to assess cybersecurity risk and prioritize cybersecurity correction plans. The cybersecurity risk management tool categorizes cybersecurity framework security controls into maturity indicator levels, identifies implementation states achieved by an entity with respect to the cybersecurity framework security controls, and determines which of the maturity indicator levels represents the implementation state achieved by the entity with respect to each of the cybersecurity framework security controls. A cost-benefit analysis for modifying from the implementation state achieved by the entity to a next implementation state to be achieved by the entity with respect to the cybersecurity framework security controls is also enabled. The cost-benefit analysis leverages factored weights including aspects indicative of security perspectives, Gaussian distributions, and the maturity indicator levels.
    Type: Grant
    Filed: February 3, 2020
    Date of Patent: May 31, 2022
    Assignee: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Paul M. Skare
  • Patent number: 11206287
    Abstract: Technology related to evaluating cyber-risk for synchrophasor systems is disclosed. In one example of the disclosed technology, a method includes generating an event tree model of a timing-attack on a synchrophasor system architecture. The event tree model can be based on locations and types of timing-attacks, an attack likelihood, vulnerabilities and detectability along a scenario path, and consequences of the timing-attack. A cyber-risk score of the synchrophasor system architecture can be determined using the event tree model. The synchrophasor system architecture can be adapted in response to the cyber-risk score.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: December 21, 2021
    Assignee: Battelle Memorial Institute
    Inventors: Seemita Pal, Arun Veeramany, Christopher A. Bonebrake, Beverly E. Johnson, William James Hutton, III, Siddharth Sridhar, Sri Nikhil Gupta Gourisetti, Garill A. Coles
  • Patent number: 11206278
    Abstract: Technology related to risk-informed autonomous adaptive cyber controllers is disclosed. In one example of the disclosed technology, a method includes generating probabilities of a cyber-attack occurring along an attack surface of a network. The probabilities can be generated using sensor and operational data of a network as inputs to an attack graph. The risk scores can be determined using a plurality of fault trees and the generated probabilities from the attack graph. The respective risk scores can correspond to respective nodes of an event tree. The event tree and the determined risk scores can be used to determine risk estimates for a plurality of configurations of the network. The risk estimates for the plurality of configurations of the network can be used to reconfigure the network to reduce a risk from the cyber-attack.
    Type: Grant
    Filed: June 5, 2019
    Date of Patent: December 21, 2021
    Assignee: Battelle Memorial Institute
    Inventors: Arun Veeramany, William James Hutton, III, Siddharth Sridhar, Sri Nikhil Gupta Gourisetti, Garill A. Coles, Mark J. Rice, Paul M. Skare, David O. Manz, Jeffery E. Dagle, Stephen D. Unwin
  • Publication number: 20210173940
    Abstract: Method include receiving banner information from one or more queries of a network connecting a set of devices, wherein the banner information of one or more of the devices includes common vulnerability and exposure identifiers (CVEs) and the banner information of one or more of the devices does not include a CVE, identifying the devices based on the banner information including classifying devices without known CVEs by a device type, determining vulnerability scores for the devices with known CVEs based on retrieved CVE information, and determining vulnerability scores for the devices without CVEs based on a series of exploitability and impact parameter estimates associated with the device type classifications. Some methods include estimating a cyberattack vulnerability risk for the devices using the determined vulnerability scores.
    Type: Application
    Filed: December 10, 2020
    Publication date: June 10, 2021
    Applicant: Battelle Memorial Institute
    Inventors: Michael E. Mylrea, Sri Nikhil Gupta Gourisetti
  • Publication number: 20210110319
    Abstract: Methods can include accessing an organizational framework describing an organization, wherein the organizational framework comprises one or more relational matrices defining matrixed interdependencies between business functions, business processes, engineering applications, assets, responsible entities, and facilities of the organization, and using the relational matrices to compute a criticality of an asset, engineering application, or business process, and using a computed criticality to compute a value at risk or a value of a consequence to the organization.
    Type: Application
    Filed: October 9, 2020
    Publication date: April 15, 2021
    Applicant: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Abhishek Somani, Crystal R. Eppinger, Md Touhiduzzaman, Saptarshi Bhattacharya, Paul M. Skare
  • Publication number: 20210067536
    Abstract: A cybersecurity distributed ledger is provided herein for managing, tracking, auditing, and securing assets in a power infrastructure. The cybersecurity distributed ledger may include a blockchain, and may combine with smart contract or smart negotiation technology, such as in a permissioned proof of authority blockchain. The cybersecurity distributed ledger may manage the complete life cycle of a grid asset, from asset requirement and specification, through production, testing, deployment, maintenance, and retirement. The cybersecurity distributed ledger may create an immutable record of the grid asset, which may be audited for regulatory compliance or build or development compliance. Further, the cybersecurity distributed ledger may store unique identifying information for a grid asset, which may be used to detect a security breach or other tampering with a grid asset. The cybersecurity distributed ledger may also track control or ownership of the grid asset, as well as changes or updates to the grid asset.
    Type: Application
    Filed: July 3, 2019
    Publication date: March 4, 2021
    Applicant: Battelle Memorial Institute
    Inventors: Michael E. Mylrea, Sri Nikhil Gupta Gourisetti
  • Publication number: 20210014065
    Abstract: Technology related to blockchain cybersecurity solutions and a blockchain applicability framework is disclosed. In one example of the disclosed technology, a system is configured to store, in a database, a plurality of cryptographically-signed records of data transmitted between an asset and a utility historian, and store, in a distributed ledger, a respective hash value corresponding to each record of the database. The system can be further configured to verify a selected record by recomputing a hash value corresponding to the selected record and comparing the recomputed hash value to the respective hash value stored in the distributed ledger in correspondence with the selected record.
    Type: Application
    Filed: July 10, 2020
    Publication date: January 14, 2021
    Applicant: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Craig H. Allwardt, Beverly E. Johnson
  • Publication number: 20210012013
    Abstract: Technology related to blockchain cybersecurity solutions and a blockchain applicability framework is disclosed. In one example of the disclosed technology, a system is configured to receive parameters for a blockchain candidate application and evaluate the parameters to determine a recommendation for types of blockchain to apply to the candidate application. The recommendation may be based on an evaluation of the parameters to determine a level of applicability of blockchain usage, a level of applicability of one or more blockchain privacy types, and a level of applicability of one or more blockchain consensus types. The system may be configured to calculate an overall percentage distribution of the levels of applicability and to output an indication of the overall percentage distribution.
    Type: Application
    Filed: July 10, 2020
    Publication date: January 14, 2021
    Applicants: Battelle Memorial Institute, The Board of Trustees of the University of Arkansas
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Hirak Patangia
  • Publication number: 20200364346
    Abstract: Apparatus and methods are disclosed for producing configuration recommendations and implementing those recommendations in a computing environment. In some examples, a browser-based tool is provided that allows hardware and software developers to assess the maturity level of their design and development processes, allows management to determine desired maturity levels in seven domains, and allows developers to monitor process maturity improvements against management goals. The disclosed technologies can be used by commercial software developers as well as internal development organizations.
    Type: Application
    Filed: April 3, 2020
    Publication date: November 19, 2020
    Applicant: Battelle Memorial Institute
    Inventors: Sri Nikhil Gupta Gourisetti, Scott R. Mix, Jessica L. Smith, Michael E. Mylrea, Christopher A. Bonebrake, Paul M. Skare, David O. Manz
  • Publication number: 20200356678
    Abstract: Systems, methods, and computer media for mitigating cybersecurity vulnerabilities of systems are provided herein. A current cybersecurity maturity of a system can be determined based on maturity criteria. The maturity criteria can be ranked based on importance. Solution candidates for increasing the cybersecurity maturity of the system can be determined based on the ranking. The solution candidates specify cybersecurity levels for the maturity criteria. A present state value reflecting the current cybersecurity maturity of the system can be calculated. For the solution candidates, an implementation state value and a transition state value can be determined. The implementation state value represents implementation of the maturity levels of the solution candidate, and the transition state value represents a transition from the present state value to the implementation state value.
    Type: Application
    Filed: May 7, 2020
    Publication date: November 12, 2020
    Applicants: Battelle Memorial Institute, Board of Trustees of the University of Arkansas
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Hirak Patangia
  • Publication number: 20200250317
    Abstract: Techniques and apparatuses are described for a cybersecurity risk management tool to assess cybersecurity risk and prioritize cybersecurity correction plans. The cybersecurity risk management tool categorizes cybersecurity framework security controls into maturity indicator levels, identifies implementation states achieved by an entity with respect to the cybersecurity framework security controls, and determines which of the maturity indicator levels represents the implementation state achieved by the entity with respect to each of the cybersecurity framework security controls. A cost-benefit analysis for modifying from the implementation state achieved by the entity to a next implementation state to be achieved by the entity with respect to the cybersecurity framework security controls is also enabled. The cost-benefit analysis leverages factored weights including aspects indicative of security perspectives, Gaussian distributions, and the maturity indicator levels.
    Type: Application
    Filed: February 3, 2020
    Publication date: August 6, 2020
    Inventors: Sri Nikhil Gupta Gourisetti, Michael E. Mylrea, Paul M. Skare
  • Publication number: 20200244698
    Abstract: Technology related to evaluating cyber-risk for synchrophasor systems is disclosed. In one example of the disclosed technology, a method includes generating an event tree model of a timing-attack on a synchrophasor system architecture. The event tree model can be based on locations and types of timing-attacks, an attack likelihood, vulnerabilities and detectability along a scenario path, and consequences of the timing-attack. A cyber-risk score of the synchrophasor system architecture can be determined using the event tree model. The synchrophasor system architecture can be adapted in response to the cyber-risk score.
    Type: Application
    Filed: January 29, 2019
    Publication date: July 30, 2020
    Applicant: Battelle Memorial Institute
    Inventors: Seemita Pal, Arun Veeramany, Christopher A. Bonebrake, Beverly E. Johnson, William James Hutton, III, Siddharth Sridhar, Sri Nikhil Gupta Gourisetti, Garill A. Coles
  • Publication number: 20200244691
    Abstract: Technology related to risk-informed autonomous adaptive cyber controllers is disclosed. In one example of the disclosed technology, a method includes generating probabilities of a cyber-attack occurring along an attack surface of a network. The probabilities can be generated using sensor and operational data of a network as inputs to an attack graph. The risk scores can be determined using a plurality of fault trees and the generated probabilities from the attack graph. The respective risk scores can correspond to respective nodes of an event tree. The event tree and the determined risk scores can be used to determine risk estimates for a plurality of configurations of the network. The risk estimates for the plurality of configurations of the network can be used to reconfigure the network to reduce a risk from the cyber-attack.
    Type: Application
    Filed: June 5, 2019
    Publication date: July 30, 2020
    Applicant: Battelle Memorial Institute
    Inventors: Arun Veeramany, William James Hutton, III, Siddharth Sridhar, Sri Nikhil Gupta Gourisetti, Garill A. Coles, Mark J. Rice, Paul M. Skare, David O. Manz, Jeffery E. Dagle, Stephen D. Unwin