Patents by Inventor Adam Ierymenko

Adam Ierymenko has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20110173127
    Abstract: The present invention relates to configuration of inspection systems and compliance verification systems using a handheld device and a remote database.
    Type: Application
    Filed: January 8, 2010
    Publication date: July 14, 2011
    Inventors: Albert Ho, Marc Siegel, Christopher Tossing, Adam Ierymenko, Daniar Hussain
  • Patent number: 7793850
    Abstract: The present invention relates to configuration of inspection systems and compliance verification systems using a handheld device and a remote database.
    Type: Grant
    Filed: March 14, 2010
    Date of Patent: September 14, 2010
    Assignee: KD Secure LLC
    Inventors: Albert Ho, Marc Siegel, Christopher Tossing, Adam Ierymenko, Daniar Hussain
  • Publication number: 20100185549
    Abstract: The present invention is a system and method for inspections and compliance verification of industrial equipment using a handheld device. An inspector first segments an inspected component into logical inspection points. The inspector then scans a unique machine-readable tag, such as an RFID tag, with a handheld device at each logical inspection point. The inspector then takes a media sample, such as a digital photograph, of the physical component referred to by each corresponding logical inspection point. Then the inspector associates the media samples with the corresponding scan of the unique machine-readable tag. For each of the actions the inspector carries out on the handheld device, a timestamp is added that represents evidence of a date and a time of physical visitation to the associated logical inspection point. The inspector may then annotate the media samples in such ways that substantiate inspector statements of problems with inspected components found during inspection.
    Type: Application
    Filed: April 12, 2010
    Publication date: July 22, 2010
    Inventors: Jeffery York, Marc Siegel, Albert Ho, Christopher Tossing, Adam Ierymenko, Daniar Hussain
  • Publication number: 20100153168
    Abstract: The present invention is a system and method for inspections and compliance verification of industrial equipment using a handheld device. An inspector first segments an inspected component into logical inspection points. The inspector then scans a unique machine-readable tag, such as an RFID tag, with a handheld device at each logical inspection point. The inspector then takes a media sample, such as a digital photograph, of the physical component referred to by each corresponding logical inspection point. Then the inspector associates the media samples with the corresponding scan of the unique machine-readable tag. For each of the actions the inspector carries out on the handheld device, a timestamp is added that represents evidence of a date and a time of physical visitation to the associated logical inspection point. The inspector may then annotate the media samples in such ways that substantiate inspector statements of problems with inspected components found during inspection.
    Type: Application
    Filed: June 22, 2009
    Publication date: June 17, 2010
    Inventors: Jeffrey York, Marc Siegel, Albert Ho, Christopher Tossing, Adam Ierymenko, Daniar Hussain
  • Publication number: 20100125663
    Abstract: This invention is a system, method, and apparatus for detecting compromise of IP devices that make up an IP-based network. One embodiment is a method for detecting and alerting on the following conditions: (1) Denial of Service Attack; (2) Unauthorized Usage Attack (for an IP camera, unauthorized person seeing a camera image); and (3) Spoofing Attack (for an IP camera, unauthorized person seeing substitute images). A survey of services running on the IP device, historical benchmark data, and traceroute information may be used to detect a possible Denial of Service Attack. A detailed log analysis and a passive DNS compromise system may be used to detect a possible unauthorized usage. Finally, a fingerprint (a hash of device configuration data) may be used as a private key to detect a possible spoofing attack. The present invention may be used to help mitigate intrusions and vulnerabilities in IP networks.
    Type: Application
    Filed: January 28, 2009
    Publication date: May 20, 2010
    Inventors: John J. Donovan, Daniar Hussain, Adam Ierymenko, Paul Parisi, Richard Person, Marc Siegel, Charles Stefanidakis