Patents by Inventor Samuel L. Clements

Samuel L. Clements has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9092631
    Abstract: Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.
    Type: Grant
    Filed: October 16, 2013
    Date of Patent: July 28, 2015
    Assignee: Battelle Memorial Institute
    Inventors: George Muller, Casey J. Perkins, Mary J. Lancaster, Douglas G. MacDonald, Samuel L. Clements, William J. Hutton, Scott W. Patrick, Bradley Robert Key
  • Publication number: 20150106941
    Abstract: Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.
    Type: Application
    Filed: October 16, 2013
    Publication date: April 16, 2015
    Applicant: Battelle Memorial Institute
    Inventors: George Muller, Casey J. Perkins, Mary J. Lancaster, Douglas G. MacDonald, Samuel L. Clements, William J. Hutton, Scott W. Patrick, Bradley Robert Key
  • Publication number: 20100265039
    Abstract: A system and a method for securing control systems for critical infrastructure, complex networks and/or industrial processing facilities. Aspects of the invention can include a proximity-based user identification device that generates a computer-readable identification of operators who are in proximity to a control device in the control system and an imaging device that captures a visual likeness of operators in proximity to the control device. A network sensor can read operation data from the control system. An overlay network can interconnect the proximity-based identification device, the imaging device, and the network sensor, and can interface to the control system without modifying the control system. Processing hardware can execute processor-implemented instructions to generate a correlation between at least a portion of the operation data and the control system, the computer-readable identification, and the visual likeness.
    Type: Application
    Filed: April 17, 2009
    Publication date: October 21, 2010
    Applicant: BATTELLE MEMORIAL INSTITUTE
    Inventors: Samuel L. Clements, Thomas W. Edgar, Mark D. Hadley