Patents by Inventor Apurva Mohan
Apurva Mohan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240005660Abstract: Techniques are generally described for user-customized computer vision event detection. A camera device may capture a first frame of image data. A first machine learning model may generate first embedding data for the first frame of image data. The first embedding data may be input into a second machine learning model associated with the camera device. The second machine learning model and the first embedding data may be used to determine that an area-of-interest represented by the first frame of image data is in a first state. State data stored in memory may be determined. The state data may indicate that the area-of-interest was previously in a second state. An alert may be sent to a device associated with the camera device indicating that the area-of-interest has changed from the second state to the first state.Type: ApplicationFiled: June 30, 2022Publication date: January 4, 2024Inventors: Dmytro Likhomanov, Ashwini Vijaykumar Karappa, Apurva Mohan Paralkar, Oleksandr Onbysh, Alexander Lazarev, Pylyp Kofman, Yevhen Diachenko, Kostiantyn Shysh, Denys Drabchuck, Serhii Kupriienko, Mykola Zekter, Vasyl Zacheshyhryva, Bohdan Bobyl, Kateryna Voroniuk, Andrii Kozak
-
Publication number: 20240005661Abstract: Techniques are generally described for user-customized computer vision event detection. A camera device may capture a first frame of image data. A first machine learning model may generate first embedding data for the first frame of image data. The first embedding data may be input into a second machine learning model associated with the camera device. The second machine learning model and the first embedding data may be used to determine that an area-of-interest represented by the first frame of image data is in a first state. State data stored in memory may be determined. The state data may indicate that the area-of-interest was previously in a second state. An alert may be sent to a device associated with the camera device indicating that the area-of-interest has changed from the second state to the first state.Type: ApplicationFiled: June 30, 2022Publication date: January 4, 2024Inventors: Dmytro Likhomanov, Ashwini Vijaykumar Karappa, Apurva Mohan Paralkar, Oleksandr Onbysh, Alexander Lazarev, Pylyp Kofman, Yevhen Diachenko, Kostiantyn Shysh, Denys Drabchuck, Serhii Kupriienko, Mykola Zekter, Vasyl Zacheshyhryva, Bohdan Bobyl, Kateryna Voroniuk, Andrii Kozak
-
Patent number: 11399038Abstract: The disclosure provides for a two-stage method for analyzing data from an oil and gas field operation site for cyber threats. The method includes, in a first stage of analysis, filtering captured events using local edge computing at the site to perform initial cyber anomaly detection by applying classification models to the captured events, forming filtered data. The method includes transmitting the filtered data to a second stage of analysis and, in the second stage of analysis, analyzing the filtered data in a cloud by applying system context and referring vulnerability databases. The disclosure provides for a system for analyzing data, including an edge computing device that includes computer instructions to filter captured events to perform initial cyber anomaly detection, forming filtered data. The system includes a cloud-based ML cluster to implement a second stage of analysis to analyze the filtered.Type: GrantFiled: November 6, 2019Date of Patent: July 26, 2022Assignee: Schlumberger Technology CorporationInventor: Apurva Mohan
-
Patent number: 11362827Abstract: The disclosure provides methods and systems for securing internet of thing systems. One method includes receiving, at a computing device, a token, wherein the token comprises a cryptographically signed list of rights that the computing device is authorized to request. The method also includes requesting, using the computing device, an action of a receiving device in an industrial location, wherein requesting the action comprises sending the token with the request to cause the receiving device to authenticate the user of the computing device and confirm the user is authorized to perform the action.Type: GrantFiled: November 6, 2019Date of Patent: June 14, 2022Assignee: Schlumberger Technology CorporationInventors: Apurva Mohan, Anh Dang, Yusef Alaas, Martin Ernst
-
Publication number: 20200344249Abstract: An automated incident response process that is configured to monitor data from at least one internet connected apparatus, use artificial intelligence to determine if the data indicates a fault and perform a playbook of actions if a fault is determined.Type: ApplicationFiled: March 27, 2020Publication date: October 29, 2020Inventors: Apurva Mohan, Himali Saxena, Gian-Marcio Gey
-
Publication number: 20200145213Abstract: The disclosure provides methods and systems for securing internet of thing systems. One method includes receiving, at a computing device, a token, wherein the token comprises a cryptographically signed list of rights that the computing device is authorized to request. The method also includes requesting, using the computing device, an action of a receiving device in an industrial location, wherein requesting the action comprises sending the token with the request to cause the receiving device to authenticate the user of the computing device and confirm the user is authorized to perform the action.Type: ApplicationFiled: November 6, 2019Publication date: May 7, 2020Inventors: Apurva Mohan, Anh Dang, Yusef Alaas, Martin Ernst
-
Publication number: 20200145440Abstract: The disclosure provides for a two-stage method for analyzing data from an oil and gas field operation site for cyber threats. The method includes, in a first stage of analysis, filtering captured events using local edge computing at the site to perform initial cyber anomaly detection by applying classification models to the captured events, forming filtered data. The method includes transmitting the filtered data to a second stage of analysis and, in the second stage of analysis, analyzing the filtered data in a cloud by applying system context and referring vulnerability databases. The disclosure provides for a system for analyzing data, including an edge computing device that includes computer instructions to filter captured events to perform initial cyber anomaly detection, forming filtered data. The system includes a cloud-based ML cluster to implement a second stage of analysis to analyze the filtered.Type: ApplicationFiled: November 6, 2019Publication date: May 7, 2020Inventor: Apurva Mohan
-
Patent number: 10623436Abstract: Devices, methods, systems, and computer-readable for providing a cyber-security architecture for microgrid systems are described herein. One or more embodiments include a system for providing a cyber-security architecture for a microgrid, comprising a supervisory control and data acquisition network device having at least one remote network connection to a non-local network device and allowing communication of data and control instructions between the non-local network device and at least one local device in a microgrid network and a control network for providing control instructions to the local device based on data from the microgrid and a power generation network device, the control network allowing communication of data and control instructions between the power generation network device and the local device in the microgrid network.Type: GrantFiled: April 27, 2015Date of Patent: April 14, 2020Assignee: HONEYWELL INTERNATIONAL INC.Inventors: Apurva Mohan, Himanshu Khurana, Gregory Brainard, Scott Fischer
-
Patent number: 10218675Abstract: Devices, methods, systems, and computer-readable media for legacy device securitization within a microgrid system are described herein. One or more embodiments include a system having a microgrid network with at least one remote network connection to a non-local network device and the network having at least one local legacy device in communication with the non-local network device and a bump-in-the-wire (BITW) security device between the local legacy device and the at least one remote connection.Type: GrantFiled: April 27, 2015Date of Patent: February 26, 2019Assignee: Honeywell International Inc.Inventors: Apurva Mohan, Himanshu Khurana, Gregory Brainard, Scott Fischer
-
Patent number: 9762388Abstract: A system and method includes obtaining a secret key at a processor of a device, obtaining a salt and an environmental variable, generating a cryptographically transformed derived key via the processor of the device using the secret key, the salt, and the environmental variable, storing the derived key in a memory of the device, and using the derived key for cryptographic communications via a network with another device.Type: GrantFiled: November 19, 2014Date of Patent: September 12, 2017Assignee: Honeywell International Inc.Inventors: Apurva Mohan, Paul Popowski
-
Patent number: 9645566Abstract: Physical presence verification by an industrial control system controller is described herein. One industrial control system controller includes a mechanism configured to verify that a user of the industrial control system controller is physically present at a location of the controller, a memory, and a processor configured to execute executable instructions stored in the memory to permit the user to perform industrial control operations using the controller only if the user is physically present at the location of the controller.Type: GrantFiled: November 21, 2013Date of Patent: May 9, 2017Assignee: Honeywell International Inc.Inventors: Apurva Mohan, Himanshu Khurana
-
Publication number: 20170063918Abstract: Devices, methods, systems, and computer-readable for providing a cyber-security architecture for microgrid systems are described herein. One or more embodiments include a system for providing a cyber-security architecture for a microgrid, comprising a supervisory control and data acquisition network device having at least one remote network connection to a non-local network device and allowing communication of data and control instructions between the non-local network device and at least one local device in a microgrid network and a control network for providing control instructions to the local device based on data from the microgrid and a power generation network device, the control network allowing communication of data and control instructions between the power generation network device and the local device in the microgrid network.Type: ApplicationFiled: April 27, 2015Publication date: March 2, 2017Inventors: Apurva Mohan, Himanshu Khurana, Gregory Brainard, Scott Fischer
-
Publication number: 20160142205Abstract: A system and method includes obtaining a secret key at a processor of a device, obtaining a salt and an environmental variable, generating a cryptographically transformed derived key via the processor of the device using the secret key, the salt, and the environmental variable, storing the derived key in a memory of the device, and using the derived key for cryptographic communications via a network with another device.Type: ApplicationFiled: November 19, 2014Publication date: May 19, 2016Inventors: Apurva Mohan, Paul Popowski
-
Publication number: 20150312216Abstract: Devices, methods, systems, and computer-readable media for legacy device securitization within a microgrid system are described herein. One or more embodiments include a system having a microgrid network with at least one remote network connection to a non-local network device and the network having at least one local legacy device in communication with the non-local network device and a bump-in-the-wire (BITW) security device between the local legacy device and the at least one remote connection.Type: ApplicationFiled: April 27, 2015Publication date: October 29, 2015Inventors: Apurva Mohan, Himanshu Khurana, Gregory Brainard, Scott Fischer
-
Publication number: 20150142138Abstract: Physical presence verification by an industrial control system controller is described herein. One industrial control system controller includes a mechanism configured to verify that a user of the industrial control system controller is physically present at a location of the controller, a memory, and a processor configured to execute executable instructions stored in the memory to permit the user to perform industrial control operations using the controller only if the user is physically present at the location of the controller.Type: ApplicationFiled: November 21, 2013Publication date: May 21, 2015Applicant: Honeywell International Inc.Inventors: Apurva Mohan, Himanshu Khurana