Patents by Inventor GANESH P. GADHE

GANESH P. GADHE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220284096
    Abstract: Various embodiments described herein relate to dynamic data containerization using hash data analytics. In this regard, an indication of a peripheral device being communicatively coupled to an industrial control system is received. In response to the indication, reputation data for one or more industrial control files stored by the peripheral device is determined based on a comparison between a file hash of one or more industrial control files and one or more security threat hashes. Furthermore, the reputation data for the one or more industrial control files is stored in a dynamic database container. In response to a determination that a validity time period for the dynamic database container satisfies a defined criterion, new reputation data for the one or more industrial control files is determined and the new reputation data for the one or more industrial control files is stored in a new dynamic database container.
    Type: Application
    Filed: March 4, 2022
    Publication date: September 8, 2022
    Inventor: Ganesh P. Gadhe
  • Patent number: 11405373
    Abstract: A blockchain-based network arrangement includes member nodes joined by a multicast network including a trusted node configured for creating at least one cryptographic key and for distributing copies of the cryptographic key over the multicast network as a multicast blockchain transmission to other member nodes. A requesting node outside the member nodes is configured for initiating a smart contract containing its blockchain address and for sending the smart contract as a request for group access with an address of the trusted node. The trusted node is configured for receiving the smart contract and a decides to accept or reject the smart contract, and records the decision in the blockchain by updating the smart contract. An accept decision results in a member node sending the cryptographic key to the requesting node.
    Type: Grant
    Filed: August 7, 2019
    Date of Patent: August 2, 2022
    Assignee: Honeywell International, Inc.
    Inventors: Kevin McMurdie, Brian Polcyn, Ganesh P. Gadhe
  • Patent number: 11301548
    Abstract: A method includes detecting a connection attempt from a device, quarantining the device to prevent the device from substantially interacting with a host system, and determining whether the device requires verification while the device is quarantined. The method also includes, in response to determining that the device requires verification, presenting at least one authorization challenge to a user while the device is quarantined. The at least one authorization challenge requests that the user provide at least one specified response. The method further includes, in response to determining that the device requires verification, determining whether the user correctly provided the at least one specified response while the device is quarantined, granting access to the device in response to determining that the user correctly provided the at least one specified response, and continuing to quarantine the device in response to determining that the user did not correctly provide the at least one specified response.
    Type: Grant
    Filed: March 22, 2018
    Date of Patent: April 12, 2022
    Assignee: Honeywell International Inc.
    Inventors: Peter G. Viscarola, Scott J. Noone, Eric D. Knapp, Christopher W. Barr, David Young, Kevin McMurdie, Ganesh P. Gadhe
  • Patent number: 10855448
    Abstract: An apparatus includes at least one processor configured to determine whether a blockchain identifies a valid smart contract indicating that communication with a specified node is permitted. In response to determining that the blockchain does identify the valid smart contract, the at least one processor is configured to establish a secure communication session with the specified node. In response to determining that the blockchain does not identify the valid smart contract, the at least one processor is configured to generate a new smart contract associated with the specified node, establish the secure communication session with the specified node in response to user approval of the new smart contract, and not establish the secure communication session with the specified node in response to user rejection of the new smart contract.
    Type: Grant
    Filed: May 3, 2018
    Date of Patent: December 1, 2020
    Assignee: Honeywell International Inc.
    Inventors: Kevin McMurdie, Ganesh P. Gadhe
  • Patent number: 10719608
    Abstract: This disclosure provides for patch monitoring and analysis, such as in an industrial process control and automation system. A method includes discovering at least one connected device by a risk manager system, including a software module for the connected device and installed patch information for the software module. The method includes identifying current patch information for the software module by the risk manager system. The method includes populating a patch definition file according to the device, the software module, the installed patch information, the current patch information, by the risk manager system. The method includes analyzing the patch definition file. The method includes producing an output based on the analysis by the risk manager system, the output including the software module, the installed patch information, the current patch information, and the status of the software module with respect to the installed patch information.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: July 21, 2020
    Assignee: Honeywell International Inc.
    Inventors: Seth G. Carpenter, David J. Brummet, Eric T. Boice, Ganesh P. Gadhe
  • Patent number: 10614214
    Abstract: This disclosure provides a security system and method for using machine learning to improve cybersecurity operations in an industrial control networks and other systems. A method includes collecting, by a security system, current communications channel information for a plurality of devices in a control system. The method includes analyzing, by the security system, the current communications channel information according to one or more device models. The method includes producing, by the security system and according to the analysis, a risk report that identifies an abnormal device among the plurality of devices.
    Type: Grant
    Filed: January 2, 2018
    Date of Patent: April 7, 2020
    Assignee: Honeywell International Inc.
    Inventors: Kevin McMurdie, Ganesh P Gadhe
  • Publication number: 20200084194
    Abstract: A blockchain-based network arrangement includes member nodes joined by a multicast network including a trusted node configured for creating at least one cryptographic key and for distributing copies of the cryptographic key over the multicast network as a multicast blockchain transmission to other member nodes. A requesting node outside the member nodes is configured for initiating a smart contract containing its blockchain address and for sending the smart contract as a request for group access with an address of the trusted node. The trusted node is configured for receiving the smart contract and a decides to accept or reject the smart contract, and records the decision in the blockchain by updating the smart contract. An accept decision results in a member node sending the cryptographic key to the requesting node.
    Type: Application
    Filed: August 7, 2019
    Publication date: March 12, 2020
    Inventors: KEVIN MCMURDIE, BRIAN POLCYN, GANESH P. GADHE
  • Publication number: 20190342077
    Abstract: An apparatus includes at least one processor configured to determine whether a blockchain identifies a valid smart contract indicating that communication with a specified node is permitted. In response to determining that the blockchain does identify the valid smart contract, the at least one processor is configured to establish a secure communication session with the specified node. In response to determining that the blockchain does not identify the valid smart contract, the at least one processor is configured to generate a new smart contract associated with the specified node, establish the secure communication session with the specified node in response to user approval of the new smart contract, and not establish the secure communication session with the specified node in response to user rejection of the new smart contract.
    Type: Application
    Filed: May 3, 2018
    Publication date: November 7, 2019
    Inventors: Kevin McMurdie, Ganesh P. Gadhe
  • Publication number: 20190294768
    Abstract: A method includes obtaining first data identifying first user interactions with one or more computing or networking resources during at least one first user session that is known to be valid. The method also includes generating one or more profiles defining typical user interactions with the one or more resources based on the first data. The method further includes obtaining second data identifying second user interactions with at least one of the one or more resources during a subsequent second user session. The method also includes determining whether the second user session is valid based on the second data and at least one of the one or more profiles by comparing the second user interactions to the typical user interactions defined in the at least one profile. In addition, the method includes taking one or more actions in response to determining that the second user session is not valid.
    Type: Application
    Filed: March 26, 2018
    Publication date: September 26, 2019
    Inventors: Kevin McMurdie, Ganesh P. Gadhe, Mark Spinrad, Boyd Knutson, Scott A. Woods
  • Publication number: 20190205531
    Abstract: This disclosure provides a security system and method for using machine learning to improve cybersecurity operations in an industrial control networks and other systems. A method includes collecting, by a security system, current communications channel information for a plurality of devices in a control system. The method includes analyzing, by the security system, the current communications channel information according to one or more device models. The method includes producing, by the security system and according to the analysis, a risk report that identifies an abnormal device among the plurality of devices.
    Type: Application
    Filed: January 2, 2018
    Publication date: July 4, 2019
    Inventors: Kevin McMurdie, Ganesh P. Gadhe
  • Patent number: 10176320
    Abstract: This disclosure provides a security system and method for using machine learning to improve cybersecurity operations in an industrial control networks and other systems. A method includes collecting, by a security system, current process information for a plurality of processes in a control system. The method includes analyzing, by the security system, the current process information according to one or more process models. The method includes producing, by the security system and according to the analysis, a risk report that identifies an abnormal process among the plurality of processes.
    Type: Grant
    Filed: December 4, 2017
    Date of Patent: January 8, 2019
    Assignee: Honeywell International Inc.
    Inventors: Kevin McMurdie, Ganesh P. Gadhe
  • Patent number: 10021125
    Abstract: This disclosure provides an infrastructure monitoring tool, and related systems and methods, for collecting industrial process control and automation system risk data, and other data. A method includes discovering multiple devices in a computing system by a risk manager system. The method includes grouping the multiple devices into multiple security zones by the risk manager system. The method includes, for each security zone, causing one or more devices in that security zone to provide information to the risk manager system identifying alerts and events associated with the one or more devices. The method includes storing the information, by the risk manager system, in association with unique identifier values, the unique identifier values identifying different types of information.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: July 10, 2018
    Assignee: Honeywell International Inc.
    Inventors: Venkata Srinivasulu Reddy Talamanchi, Kenneth W. Dietrich, Eric T. Boice, Andrew W. Kowalczyk, Ganesh P. Gadhe
  • Patent number: 9930058
    Abstract: A method of analyzing cyber-security risks in an industrial control system (ICS) including a plurality of networked devices includes providing a processor and a memory storing a cyber-security algorithm. The processor runs the cyber-security algorithm and implements data collecting to compile security data including at least vulnerability data including cyber-risks (risks) regarding the plurality of networked devices by scanning the plurality of devices, processing the security data using a rules engine which associates a numerical score to each of the risks, aggregating data including ranking the risks across the plurality of networked devices and arranging the risks into at least one logical grouping, and displaying the logical grouping(s) on a user station.
    Type: Grant
    Filed: March 26, 2015
    Date of Patent: March 27, 2018
    Assignee: Honeywell International Inc.
    Inventors: Seth G. Carpenter, Eric T. Boice, Andrew Kowalczyk, Ken Dietrich, Ganesh P. Gadhe, Eric D. Knapp
  • Publication number: 20170237752
    Abstract: This disclosure provides systems and methods for prediction of potential cyber security threats and risks in an industrial control system using predictive cyber analytics. A method includes receiving, by a risk manager system, real-time data from a plurality of connected devices. The method includes creating, by the risk manager system, a data model based on the real-time data. The method includes analyzing, by the risk manager system, the data model to identify potential current threats. The method includes predicting, by the risk manager system, potential threats. The method includes notifying a user, by the risk manager system, of the potential threats.
    Type: Application
    Filed: February 11, 2016
    Publication date: August 17, 2017
    Inventors: Ritwik Ganguly, Avinash Rajan, Praveen R. Shetty, Ganesh P. Gadhe
  • Publication number: 20160234240
    Abstract: This disclosure provides a rules engine for converting system-related characteristics and events into cyber-security risk assessment values, including related systems and methods. A method includes receiving information identifying characteristics of multiple devices in a computing system and multiple events associated with the multiple devices. The method includes analyzing the information using multiple sets of rules. The method includes generating at least one risk assessment value based on the analyzing. The at least one risk assessment value identifies at least one cyber-security risk of the multiple devices. The method includes displaying the at least one risk assessment value in a user interface.
    Type: Application
    Filed: September 30, 2015
    Publication date: August 11, 2016
    Inventors: Kenneth W. Dietrich, Ganesh P. Gadhe, Eric T. Boice, Seth G. Carpenter
  • Publication number: 20160232359
    Abstract: This disclosure provides for patch monitoring and analysis, such as in an industrial process control and automation system. A method includes discovering at least one connected device by a risk manager system, including a software module for the connected device and installed patch information for the software module. The method includes identifying current patch information for the software module by the risk manager system. The method includes populating a patch definition file according to the device, the software module, the installed patch information, the current patch information, by the risk manager system. The method includes analyzing the patch definition file. The method includes producing an output based on the analysis by the risk manager system, the output including the software module, the installed patch information, the current patch information, and the status of the software module with respect to the installed patch information.
    Type: Application
    Filed: September 30, 2015
    Publication date: August 11, 2016
    Inventors: Seth G. Carpenter, David J. Brummet, Eric T. Boice, Ganesh P. Gadhe
  • Publication number: 20160234241
    Abstract: This disclosure provides an infrastructure monitoring tool, and related systems and methods, for collecting industrial process control and automation system risk data, and other data. A method includes discovering multiple devices in a computing system by a risk manager system. The method includes grouping the multiple devices into multiple security zones by the risk manager system. The method includes, for each security zone, causing one or more devices in that security zone to provide information to the risk manager system identifying alerts and events associated with the one or more devices. The method includes storing the information, by the risk manager system, in association with unique identifier values, the unique identifier values identifying different types of information.
    Type: Application
    Filed: September 30, 2015
    Publication date: August 11, 2016
    Inventors: Venkata Srinivasulu Reddy Talamanchi, Kenneth W. Dietrich, Eric T. Boice, Andrew W. Kowalczyk, Ganesh P. Gadhe
  • Publication number: 20160234243
    Abstract: This disclosure provides a technique for using infrastructure monitoring software to collect cyber-security risk data. A method includes sending first information from a risk manager system to a plurality of agents each associated with a respective device in a computing system. The first information is associated with one or more risk-monitoring configurations. The method includes receiving second information by the risk manager system from the agents. The second information identifies identified vulnerabilities and events associated with the respective devices. The method includes storing and displaying to a user at least one of the second information and an analysis of the second information.
    Type: Application
    Filed: September 30, 2015
    Publication date: August 11, 2016
    Inventors: Venkata Srinivasulu Reddy Talamanchi, Eric T. Boice, Ganesh P. Gadhe, Kenneth W. Dietrich, Andrew W. Kowalczyk
  • Publication number: 20160050225
    Abstract: A method of analyzing cyber-security risks in an industrial control system (ICS) including a plurality of networked devices includes providing a processor and a memory storing a cyber-security algorithm. The processor runs the cyber-security algorithm and implements data collecting to compile security data including at least vulnerability data including cyber-risks (risks) regarding the plurality of networked devices by scanning the plurality of devices, processing the security data using a rules engine which associates a numerical score to each of the risks, aggregating data including ranking the risks across the plurality of networked devices and arranging the risks into at least one logical grouping, and displaying the logical grouping(s) on a user station.
    Type: Application
    Filed: March 26, 2015
    Publication date: February 18, 2016
    Inventors: SETH G. CARPENTER, ERIC T. BOICE, ANDREW KOWALCZYK, KEN DIETRICH, GANESH P. GADHE, ERIC D. KNAPP