Patents by Inventor Hema Kumari ACHANTA

Hema Kumari ACHANTA has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11790081
    Abstract: Systems and methods are provided for the control of an industrial asset, such as a power generating asset. Accordingly, a cyber-attack model predicts a plurality of operational impacts on the industrial asset resulting from a plurality of potential cyber-attacks. The cyber-attack model also predicts a corresponding plurality of potential mitigation responses. In operation, a cyber-attack impacting at least one component of the industrial asset is detected via the cyber-attack neutralization module and a protected operational impact of the cyber-attack is identified based on the cyber-attack model. The cyber-attack neutralization module selects at least one mitigation response of the plurality of mitigation responses based on the predicted operational impact and an operating state of the industrial asset is altered based on the selected mitigation response.
    Type: Grant
    Filed: April 14, 2021
    Date of Patent: October 17, 2023
    Assignee: General Electric Company
    Inventors: Fernando Javier D'Amato, Mustafa Tekin Dokucu, Hema Kumari Achanta, III, Kalpesh Singal, Masoud Abbaszadeh, Yuh-Shyang Wang, Karla Kvaternik, Souransu Nandi, Georgios Boutselis
  • Publication number: 20230077025
    Abstract: A system and method are provided for controlling a wind turbine. Accordingly, a component of the wind turbine is monitored by at least one sensor of a sensor system. An output is received from the sensor system which indicates a fault with the sensor. A fault accommodation response is generated by a fault module. The fault accommodation response includes an accommodation signal which replaces the output signal of the faulty sensor.
    Type: Application
    Filed: January 24, 2020
    Publication date: March 9, 2023
    Inventors: Xu Fu, Hema Kumari Achanta, Satya Mohan Vamsi Andalam
  • Publication number: 20220345468
    Abstract: A method for detecting a cyberattack on a control system of a wind turbine includes providing a plurality of classification models of the control system. The method also includes receiving, via each of the plurality of classification models, a time series of operating data from one or more monitoring nodes of the wind turbine. The method further includes extracting, via the plurality of classification models, a plurality of features using the time series of operating data. Each of the plurality of features is a mathematical characterization of the time series of operating data. Moreover, the method includes generating an output from each of the plurality of classification models and determining, using a decision fusion module, a probability of the cyberattack occurring on the control system based on a combination of the outputs. Thus, the method includes implementing a control action when the probability exceeds a probability threshold.
    Type: Application
    Filed: April 21, 2021
    Publication date: October 27, 2022
    Inventors: Weizhong Yan, Zhaoyuan Yang, Masoud Abbaszadeh, Yuh-Shyang Wang, Fernando Javier D'Amato, Hema Kumari Achanta
  • Publication number: 20220334540
    Abstract: Systems and methods are provided for the control of an industrial asset, such as a power generating asset. Accordingly, a cyber-attack model predicts a plurality of operational impacts on the industrial asset resulting from a plurality of potential cyber-attacks. The cyber-attack model also predicts a corresponding plurality of potential mitigation responses. In operation, a cyber-attack impacting at least one component of the industrial asset is detected via the cyber-attack neutralization module and a protected operational impact of the cyber-attack is identified based on the cyber-attack model. The cyber-attack neutralization module selects at least one mitigation response of the plurality of mitigation responses based on the predicted operational impact and an operating state of the industrial asset is altered based on the selected mitigation response.
    Type: Application
    Filed: April 14, 2021
    Publication date: October 20, 2022
    Inventors: Fernando Javier D'Amato, Mustafa Tekin Dokucu, Hema Kumari Achanta, III, Kalpesh Singal, Masoud Abbaszadeh, Yuh-Shyang Wang, Karla Kvaternik, Souransu Nandi, Georgios Boutselis
  • Patent number: 10826922
    Abstract: In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.
    Type: Grant
    Filed: November 11, 2019
    Date of Patent: November 3, 2020
    Assignee: General Electric Company
    Inventors: Lalit Keshav Mestha, Hema Kumari Achanta, Justin Varkey John, Cody Joe Bushey
  • Publication number: 20200076838
    Abstract: In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.
    Type: Application
    Filed: November 11, 2019
    Publication date: March 5, 2020
    Inventors: Lalit Keshav MESTHA, Hema Kumari ACHANTA, Justin Varkey JOHN, Cody Joe BUSHEY
  • Patent number: 10505955
    Abstract: In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.
    Type: Grant
    Filed: August 22, 2017
    Date of Patent: December 10, 2019
    Assignee: General Electric Company
    Inventors: Lalit Keshav Mestha, Hema Kumari Achanta, Justin Varkey John, Cody Joe Bushey
  • Publication number: 20190068618
    Abstract: In some embodiments, an industrial asset may be associated with a plurality of monitoring nodes, each monitoring node generating a series of monitoring node values over time that represent operation of the industrial asset. A threat detection computer may determine that an attacked monitoring node is currently being attacked. Responsive to this determination, a virtual sensor coupled to the plurality of monitoring nodes may estimate a series of virtual node values for the attacked monitoring node(s) based on information received from monitoring nodes that are not currently being attacked. The virtual sensor may then replace the series of monitoring node values from the attacked monitoring node(s) with the virtual node values. Note that in some embodiments, virtual node values may be estimated for a particular node even before it is determined that the node is currently being attacked.
    Type: Application
    Filed: August 22, 2017
    Publication date: February 28, 2019
    Inventors: Lalit Keshav MESTHA, Hema Kumari ACHANTA, Justin Varkey JOHN, Cody Joe BUSHEY