Patents by Inventor Daniel Thanos

Daniel Thanos has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20150229516
    Abstract: The subject matter disclosed herein relates to intelligent electronic devices (IEDs), and, more specifically, to systems and methods for initial configuration or commissioning of IEDs after installation. In an embodiment, a system includes an intelligent electronic device (IED) configuring system having an IED that is configured with a wireless network configuration prior to deployment that enables the IED to automatically connect to a particular wireless network when it is detected. The IED configuring system also includes an IED configuring device configured to host the particular wireless network according to the wireless network configuration of the IED. Furthermore, the IED configuring device is configured to communicate a plurality of configuration settings to the IED via the wireless network to commission the IED once the IED has connected to the wireless network.
    Type: Application
    Filed: February 13, 2014
    Publication date: August 13, 2015
    Applicant: General Electric Company
    Inventors: Daniel Thanos, Janahan Skandaraniyam, Anca Cioraca
  • Publication number: 20150199530
    Abstract: Provided is an arbitrary automation system for secure communications. The system includes a utility device configured for processing critical data associated with the arbitrary automation system, the critical data being structured in accordance with utility device access levels. Also included is a key management module for (i) providing a data protection key (DPK) for protecting the critical data in accordance with each of the utility device access levels and (ii) generating a user key encryption key (UKEK) for encrypting the DPK based upon the device access levels. The system additionally includes a software module configured for masking an execution state of software within the utility device and the key management module via principles of evasion and resistance.
    Type: Application
    Filed: January 10, 2014
    Publication date: July 16, 2015
    Applicant: General Electric Company
    Inventors: Daniel Thanos, Satish Sharad Khanke
  • Publication number: 20140277801
    Abstract: The embodiments described herein provide a system including an intelligent electronic device (IED) comprising a first processor configured to communicate control commands to power equipment, receive measurements from the power equipment, use a secure wireless system to send data to an access point, wherein the data includes the measurements, and use the secure system to communicate with a management device, via the access point, to receive configuration information, command information, or any combination thereof.
    Type: Application
    Filed: March 15, 2013
    Publication date: September 18, 2014
    Inventors: Anca Lucia Cioraca, Daniel Thanos, Evgeny Pronin, Michael Shane Pilon
  • Publication number: 20140283047
    Abstract: The embodiments described herein include a system and a method. In one embodiment, a system includes a device monitoring component configured to measure control system behavior and an intrusion prevention system communicatively coupled to the device monitoring component and a communications network. The intrusion prevention system includes a control system analysis component configured to analyze the control system behavior measured by the device monitoring component against a first rule set to determine whether an anomaly, an intrusion, or both are present.
    Type: Application
    Filed: March 13, 2013
    Publication date: September 18, 2014
    Applicant: GENERAL ELECTRIC COMPANY
    Inventors: Paritosh Dixit, Daniel Thanos
  • Patent number: 8826437
    Abstract: A system and method are provided for controlling the latency of messages to enable a network of devices to detect and respond to potential malware. The system and method receiving a message at a device and determining whether the message represents potential malware and requires a delay to allow time to detect and respond to potential malware. The amount of the delay associated with the message is determined and the message is processed based on the delay amount.
    Type: Grant
    Filed: December 14, 2010
    Date of Patent: September 2, 2014
    Assignee: General Electric Company
    Inventors: John Erik Hershey, Bruce Gordon Barnett, Michael Joseph Dell'Anno, Daniel Thanos
  • Patent number: 8689347
    Abstract: A system and method that regulates the various operations between computing stations and storage devices. Storage devices are the storage means that are contained upon devices that are able to have data stored upon them. Any operation that involves or may lead to the exchange or accessing of content (data) between a storage device and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage device, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed upon a computing station for specific user(s) and will regulate the data operations that may take place between the computing stations and storage devices based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied.
    Type: Grant
    Filed: May 15, 2006
    Date of Patent: April 1, 2014
    Assignee: CryptoMill Inc.
    Inventors: Kha Sin Teow, Ernest Dainow, Leonid Nikolaev, Daniel Thanos
  • Patent number: 8464354
    Abstract: A system and method that regulates the various operations between computing stations and storage or content. Any operation that involves or may lead to the exchange or accessing of content (data) between storage or hosting content container and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed/updated upon a computing station for specific User(s) and will regulate the data operations that may take place between the computing stations and storage or content based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied.
    Type: Grant
    Filed: May 15, 2006
    Date of Patent: June 11, 2013
    Assignee: CryptoMill Inc.
    Inventors: Kha Sin Teow, Ernest Dainow, Leonid Nikolaev, Daniel Thanos
  • Publication number: 20130086680
    Abstract: A method for providing secure communication in an electrical power distribution network includes detecting an enhanced threat level in the electrical power distribution network. A threshold number of different configuration command shadows are received and processed to generate a configuration command data. A verified configuration command data is generated by comparing the configuration command data with a stored configuration commands and a verified configuration command related to the verified configuration command data is executed.
    Type: Application
    Filed: September 30, 2011
    Publication date: April 4, 2013
    Applicant: GENERAL ELECTRIC COMPANY
    Inventors: John Erik Hershey, Bruce Gordon Barnett, Michael Joseph Dell'Anno, Daniel Thanos
  • Publication number: 20130086635
    Abstract: A method for providing secure communication in an electrical power distribution network includes detecting an enhanced threat level in the electrical power distribution network. A plurality of configuration command messages including information related to a common configuration command are received. The common configuration commands are certified if the plurality of configuration command messages have originated from a threshold number of command sites. The method further includes executing the certified configuration command.
    Type: Application
    Filed: September 30, 2011
    Publication date: April 4, 2013
    Applicant: GENERAL ELECTRIC COMPANY
    Inventors: John Erik Hershey, Bruce Gordon Barnett, Michael Joseph Dell'Anno, Daniel Thanos
  • Publication number: 20120151589
    Abstract: A system and method are provided for controlling the latency of messages to enable a network of devices to detect and respond to potential malware. The system and method receiving a message at a device and determining whether the message represents potential malware and requires a delay to allow time to detect and respond to potential malware. The amount of the delay associated with the message is determined and the message is processed based on the delay amount.
    Type: Application
    Filed: December 14, 2010
    Publication date: June 14, 2012
    Applicant: GENERAL ELECTRIC COMPANY
    Inventors: John Erik Hershey, Bruce Gordon Barnett, Michael Joseph Dell'Anno, Daniel Thanos
  • Patent number: 8112521
    Abstract: A system and method for monitoring a network and detecting network vulnerabilities is provided. A communication associated with one or more programs is issued to one or more devices in a network and the response from the devices is detected and analyzed. Based on the analysis, a device response is identified as a threat response if it represents at least an alert, an unexpected response or a response time-out indicating that the device did not response to the communication. The vulnerability of the network is determined based on the threat responses of the devices.
    Type: Grant
    Filed: February 25, 2010
    Date of Patent: February 7, 2012
    Assignee: General Electric Company
    Inventors: Bruce Gordon Barnett, John Erik Hershey, Daniel Thanos
  • Publication number: 20110208849
    Abstract: A system and method for monitoring a network and detecting network vulnerabilities is provided. A communication associated with one or more programs is issued to one or more devices in a network and the response from the devices is detected and analyzed. Based on the analysis, a device response is identified as a threat response if it represents at least an alert, an unexpected response or a response time-out indicating that the device did not response to the communication. The vulnerability of the network is determined based on the threat responses of the devices.
    Type: Application
    Filed: February 25, 2010
    Publication date: August 25, 2011
    Applicant: GENERAL ELECTRIC COMPANY
    Inventors: Bruce Gordon Barnett, John Erik Hershey, Daniel Thanos
  • Publication number: 20100058072
    Abstract: A system and method that regulates the various operations between computing stations and storage or content. Any operation that involves or may lead to the exchange or accessing of content (data) between storage or hosting content container and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed/updated upon a computing station for specific User(s) and will regulate the data operations that may take place between the computing stations and storage or content based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied.
    Type: Application
    Filed: May 15, 2006
    Publication date: March 4, 2010
    Inventors: Kha Sin Teow, Ernest Dainow, Leonid Nikolaev, Daniel Thanos
  • Publication number: 20090217385
    Abstract: A system and method that regulates the various operations between computing stations and storage devices. Storage devices are the storage means that are contained upon devices that are able to have data stored upon them. Any operation that involves or may lead to the exchange or accessing of content (data) between a storage device and computing station may be regulated by means of a policy which comprise a set of rules. Rules may be defined according to specific criteria, including the type of storage device, the type of content, the attributes of the content, and other attributes associated with the storage device and/or the content. The policy will be dynamically installed upon a computing station for specific user(s) and will regulate the data operations that may take place between the computing stations and storage devices based on evaluation of the policy. Based on the evaluation of the policy, the requested operation is permitted, restricted in some areas, or denied.
    Type: Application
    Filed: May 15, 2006
    Publication date: August 27, 2009
    Inventors: Kha Sin Teow, Ernest Dainow, Daniel Thanos, Leonid Nikolaev
  • Publication number: 20030084290
    Abstract: The invention relates to a method of transferring data between a host computer server and a secure network storage system via a data transfer architecture. The secure network storage system has a plurality of storage devices for storage of the data. The method comprises (a) authenticating the host computer server with a security system associated with the secure network storage system; (b) obtaining a storage key from the security system after authentication; and (c) performing an encryption/decryption operation comprising at least one of (i) encrypting and storing data on the secure network storage system, and (ii) retrieving and decrypting data stored on the secure network storage system.
    Type: Application
    Filed: October 11, 2002
    Publication date: May 1, 2003
    Inventors: Kumar Murty, Vladimir Kolesnikov, Daniel Thanos