Patents by Inventor ARPIT BHATT

ARPIT BHATT has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11489679
    Abstract: Methods and systems for implementing Blockchain-based verifiable claims for use with assets in a physical world, such as Internet-of-Things (IoT) devices, are described. Verifiable claims are integrated with Root of Trust (RoT) technology, in a manner that allows verifiable claims to be linked with physical assets and a “proof” of provisioning of decentralized identity to be established. A system integrates Blockchain and IoT technologies, including Blockchain IoT device with hardware RoT implemented thereon. A validation process leverages RoT of the device to establish a decentralized “proof” of RoT on the Blockchain, which can then be used as a verifiable claim for the device. The validation process can also use the “proof” of RoT to further validate data obtained from the Blockchain IoT device, and to validate business logic allowing context based control of any subsequent transactions. Further, the validation process achieves automation with respect to trustability.
    Type: Grant
    Filed: July 6, 2020
    Date of Patent: November 1, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Abilash Soundararajan, Michael Reid Tennefoss, Arpit Bhatt
  • Patent number: 11310265
    Abstract: Systems and methods are provided for detecting MAC/IP spoofing attacks on networks. A method may include authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message.
    Type: Grant
    Filed: February 27, 2020
    Date of Patent: April 19, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Arpit Bhatt, Deepak Jain
  • Publication number: 20220006651
    Abstract: Methods and systems for implementing Blockchain-based verifiable claims for use with assets in a physical world, such as Internet-of-Things (IoT) devices, are described. Verifiable claims are integrated with Root of Trust (RoT) technology, in a manner that allows verifiable claims to be linked with physical assets and a “proof” of provisioning of decentralized identity to be established. A system integrates Blockchain and IoT technologies, including Blockchain IoT device with hardware RoT implemented thereon. A validation process leverages RoT of the device to establish a decentralized “proof” of RoT on the Blockchain, which can then be used as a verifiable claim for the device. The validation process can also use the “proof” of RoT to further validate data obtained from the Blockchain IoT device, and to validate business logic allowing context based control of any subsequent transactions. Further, the validation process achieves automation with respect to trustability.
    Type: Application
    Filed: July 6, 2020
    Publication date: January 6, 2022
    Inventors: ABILASH SOUNDARARAJAN, Michael Reid Tennefoss, Arpit Bhatt
  • Publication number: 20210273975
    Abstract: Systems and methods are provided for detecting MAC/IP spoofing attacks on networks. A method may include authenticating a network device for access to a network using a Media Access Control (MAC) address and an Internet Protocol (IP) address of the network device; wherein an attacking device is connected to the network, and to the network device, by a network hub; wherein the attacking device spoofs the MAC address and the IP address of the network device; establishing a Transport Control Protocol (TCP) connection with the network device subsequent to authenticating the network device; sending at least one TCP keepalive message to the IP address of the network device, wherein, responsive to receiving the TCP keepalive message, the attacking device transmits a TCP reset (RST) message; receiving the TCP RST message; and determining the attacking device is present in the network responsive to receiving the TCP RST message.
    Type: Application
    Filed: February 27, 2020
    Publication date: September 2, 2021
    Inventors: ARPIT BHATT, DEEPAK JAIN