Patents by Inventor Vladimir Dimitrov
Vladimir Dimitrov has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240069578Abstract: A control system is configured to monitor operation of a flow control, like a control valve. These configurations can use of continuous or real-time data to evaluate fitness or function of the device under operating conditions. This feature can alert operators to problems or issues with one or more devices, or process lines in total. These problems may, for example, indicate that a valve is incorrectly sized for actual working conditions. As a result, engineers may find that the valve is too big (or oversize) or too small (or undersize) because the design process for layout of the process line relies upon a design load that reflects a future maximum (plus some factor of safety), and not the actual working conditions that might prevail once the device is in service in the field.Type: ApplicationFiled: August 31, 2022Publication date: February 29, 2024Inventors: Vladimir Dimitrov Kostadinov, Joseph Georges Shahda, Cyril Nicolas Vlassoff, Jeremy Asher Glaun, David Chunhe Zhou, Christopher Bittner, Justin Walter Betley
-
Publication number: 20230122668Abstract: A controller is configured to perform in-situ testing on a control valve. These configurations can generate a signal that changes position of a closure member in the valve during operation of a process. These changes exercise components of the valve for a short period of time. This testing may result in data that can indicate whether the device is operating properly or may be in need of maintenance or repair.Type: ApplicationFiled: October 19, 2021Publication date: April 20, 2023Inventors: Vladimir Dimitrov Kostadinov, Arkady Khasin
-
Methods and systems that generate proxy objects that provide an interface to third-party executables
Patent number: 10795646Abstract: The current document is directed to methods and systems that that generate proxy-object interfaces to external executable code for use in workflows executed by a workflow-execution system. The workflow-execution-engine component of a cloud-management system provides one example of a workflow-execution system in which proxy-object interfaces to external executable code are used. In one implementation, an existing automated-code-generation subsystem generates plug-in class declarations that represent one or more external executables. An additional class-wrapping subsystem then generates a proxy class for each code-generated plug-in class.Type: GrantFiled: July 7, 2017Date of Patent: October 6, 2020Assignee: VMware, Inc.Inventors: Vladimir Dimitrov, Julian Vassev -
Patent number: 10700871Abstract: A system and associated method for securing communication between a first device and a second device are provided. The system includes a first device communicatively coupled with a second device over a communication connection line. The system includes a security transformation device coupled to the communication connection line. The security transformation device is configured to transform non-secure communication into secure communication to send over the communication connection line to a destination. The security transformation device is configured to evaluate communication using security evaluation functionality by either authenticating or failing to authenticate the communication. If the communication is successfully authenticated, then the communication is provided to a destination, otherwise, the communication is not provided to the destination.Type: GrantFiled: July 20, 2017Date of Patent: June 30, 2020Assignee: Dresser, LLCInventor: Vladimir Dimitrov Kostadinov
-
METHODS AND SYSTEMS THAT GENERATE PROXY OBJECTS THAT PROVIDE AN INTERFACE TO THIRD-PARTY EXECUTABLES
Publication number: 20190012150Abstract: The current document is directed to methods and systems that that generate proxy-object interfaces to external executable code for use in workflows executed by a workflow-execution system. The workflow-execution-engine component of a cloud-management system provides one example of a workflow-execution system in which proxy-object interfaces to external executable code are used. In one implementation, an existing automated-code-generation subsystem generates plug-in class declarations that represent one or more external executables. An additional class-wrapping subsystem then generates a proxy class for each code-generated plug-in class.Type: ApplicationFiled: July 7, 2017Publication date: January 10, 2019Applicant: VMware, Inc.Inventors: Vladimir Dimitrov, Julian Vassev -
Patent number: 9946868Abstract: A system and associated method for controlling access to features of a device are provided. The system includes a feature access component that maintains an access control register configured to store an access control parameter indicating whether a user has access to a feature of the device. Responsive to receiving a request to modify the access control register to enable or disable access to the feature, an access authentication parameter is set to an authentication key of the request and an access parameter is set to a value of the request (e.g., 1 “Enable”). The access authentication parameter and access parameter are evaluated utilizing an authentication algorithm. Responsive to successfully authenticating the request, the access control register is modified based upon the value of the access parameter, such as to indicate that the user is now authorized to read and/or modify a parameter and/or invoke a service to execute.Type: GrantFiled: October 12, 2015Date of Patent: April 17, 2018Assignee: Dresser, Inc.Inventors: Vladimir Dimitrov Kostadinov, Xiaoping Jiang, Min Huang
-
Patent number: 9843449Abstract: A system and associated method for securing communication between a first device and a second device are provided. The system includes a first device communicatively coupled with a second device over a communication connection line. The system includes a security transformation device coupled to the communication connection line. The security transformation device is configured to transform non-secure communication into secure communication to send over the communication connection line to a destination. The security transformation device is configured to evaluate communication using security evaluation functionality by either authenticating or failing to authenticate the communication. If the communication is successfully authenticated, then the communication is provided to a destination, otherwise, the communication is not provided to the destination.Type: GrantFiled: June 9, 2015Date of Patent: December 12, 2017Assignee: Dresser, Inc.Inventor: Vladimir Dimitrov Kostadinov
-
Publication number: 20170353316Abstract: A system and associated method for securing communication between a first device and a second device are provided. The system includes a first device communicatively coupled with a second device over a communication connection line. The system includes a security transformation device coupled to the communication connection line. The security transformation device is configured to transform non-secure communication into secure communication to send over the communication connection line to a destination. The security transformation device is configured to evaluate communication using security evaluation functionality by either authenticating or failing to authenticate the communication. If the communication is successfully authenticated, then the communication is provided to a destination, otherwise, the communication is not provided to the destination.Type: ApplicationFiled: July 20, 2017Publication date: December 7, 2017Inventor: Vladimir Dimitrov Kostadinov
-
Publication number: 20170103198Abstract: A system and associated method for controlling access to features of a device are provided. The system includes a feature access component that maintains an access control register configured to store an access control parameter indicating whether a user has access to a feature of the device. Responsive to receiving a request to modify the access control register to enable or disable access to the feature, an access authentication parameter is set to an authentication key of the request and an access parameter is set to a value of the request (e.g., 1 “Enable”). The access authentication parameter and access parameter are evaluated utilizing an authentication algorithm. Responsive to successfully authenticating the request, the access control register is modified based upon the value of the access parameter, such as to indicate that the user is now authorized to read and/or modify a parameter and/or invoke a service to execute.Type: ApplicationFiled: October 12, 2015Publication date: April 13, 2017Inventors: Vladimir Dimitrov Kostadinov, Xiaoping Jiang, Min Huang
-
Publication number: 20160366131Abstract: A system and associated method for securing communication between a first device and a second device are provided. The system includes a first device communicatively coupled with a second device over a communication connection line. The system includes a security transformation device coupled to the communication connection line. The security transformation device is configured to transform non-secure communication into secure communication to send over the communication connection line to a destination. The security transformation device is configured to evaluate communication using security evaluation functionality by either authenticating or failing to authenticate the communication. If the communication is successfully authenticated, then the communication is provided to a destination, otherwise, the communication is not provided to the destination.Type: ApplicationFiled: June 9, 2015Publication date: December 15, 2016Inventor: Vladimir Dimitrov Kostadinov
-
Patent number: 9411574Abstract: Embodiments of a system and method to update firmware across multiple devices in a process facility using a single domain of a FOUNDATION Fieldbus protocol. In one embodiment, the system has a receiving device that couples with a pair of target devices, e.g., a first target device and a second target device. The receiving device includes operating instructions that can process an input and generate an output. The input comprises data comprising a first firmware component and a second firmware component for, respectively, the first target device and the second target device. The receiving device can direct the firmware component to the appropriate target device; generating a first output and a second output that distribute the firmware components to complete the upgrade process.Type: GrantFiled: August 19, 2013Date of Patent: August 9, 2016Assignee: Dresser, Inc.Inventors: Vladimir Dimitrov Kostadinov, Larry Gene Schoonover, Anatoly Podpaly
-
Patent number: 9389596Abstract: The embodiments described herein include a system and a method. In one embodiment, a system includes an industrial controller configured to control a first field device. The first field device includes an actuator and a positioner coupled to the actuator. The positioner is configured to position the actuator. The first field device is configured to detect an undesired condition and to communicate the undesired condition to the industrial controller by using a ReadBack facility of the first field device.Type: GrantFiled: February 20, 2013Date of Patent: July 12, 2016Assignee: General Electric CompanyInventors: Sandro Esposito, John Alexander Petzen, Vladimir Dimitrov Kostadinov
-
Patent number: 9377993Abstract: Embodiments of methods that are useful to avoid overflow in fixed-length buffers. In one embodiment, the methods dynamically adjust parameters (e.g., sample time) and reconfigure data in the buffer to allow new data samples to fit in the buffer. These embodiments allow data collection to automatically adapt, e.g., by adjusting the sample rate to allow the data to fit in the limited buffer size. These embodiments can configure hardware and/or software on a valve positioner of a valve assembly to improve data collection for use in on-line valve diagnostics and other data processing techniques.Type: GrantFiled: June 17, 2014Date of Patent: June 28, 2016Assignee: Dresser, Inc.Inventors: Larry Gene Schoonover, Arkady Khasin, Vladimir Dimitrov Kostadinov, Justin Scott Shriver
-
Publication number: 20150052269Abstract: Embodiments of methods that are useful to avoid overflow in fixed-length buffers. In one embodiment, the methods dynamically adjust parameters (e.g., sample time) and reconfigure data in the buffer to allow new data samples to fit in the buffer. These embodiments allow data collection to automatically adapt, e.g., by adjusting the sample rate to allow the data to fit in the limited buffer size. These embodiments can configure hardware and/or software on a valve positioner of a valve assembly to improve data collection for use in on-line valve diagnostics and other data processing techniques.Type: ApplicationFiled: June 17, 2014Publication date: February 19, 2015Inventors: Larry Gene Schoonover, Arkady Khasin, Vladimir Dimitrov Kostadinov, Justin Scott Shriver
-
Publication number: 20150052512Abstract: Embodiments of a system and method to update firmware across multiple devices in a process facility using a single domain of a FOUNDATION Fieldbus protocol. In one embodiment, the system has a receiving device that couples with a pair of target devices, e.g., a first target device and a second target device. The receiving device includes operating instructions that can process an input and generate an output. The input comprises data comprising a first firmware component and a second firmware component for, respectively, the first target device and the second target device. The receiving device can direct the firmware component to the appropriate target device; generating a first output and a second output that distribute the firmware components to complete the upgrade process.Type: ApplicationFiled: August 19, 2013Publication date: February 19, 2015Applicant: Dresser, Inc.Inventors: Vladimir Dimitrov Kostadinov, Larry Gene Schoonover, Anatoly Podpaly
-
Publication number: 20140236318Abstract: The embodiments described herein include a system and a method. In one embodiment, a system includes an industrial controller configured to control a first field device. The first field device includes an actuator and a positioner coupled to the actuator. The positioner is configured to position the actuator. The first field device is configured to detect an undesired condition and to communicate the undesired condition to the industrial controller by using a ReadBack facility of the first field device.Type: ApplicationFiled: February 20, 2013Publication date: August 21, 2014Applicant: GENERAL ELECTRIC COMPANYInventors: Sandro Esposito, John Alexander Petzen, Vladimir Dimitrov Kostadinov
-
Patent number: 8578059Abstract: A method and system are disclosed for deploying a configuration in a process control system wherein at least a portion of the configuration is deployed to a set of field devices. Initially the set of deployment packages are stored within a configuration storage. Thereafter, deployment is initiated on the set of deployment packages from the configuration storage. In response to the initiating deployment step, an automated cascaded deployment is commenced to the set of connected field devices. The automated cascaded deployment includes first deploying the sets of deployment packages to a set of control module assemblies. The method furthermore includes second deploying the received portions of the set of deployment packages to a set of I/O module assemblies. The set of I/O module assemblies maintain and pass the received sub-portions of the set of deployment packages to sets of field devices.Type: GrantFiled: February 1, 2010Date of Patent: November 5, 2013Assignee: Invensys Systems, Inc.Inventors: Jayamani Odayappan, Johan Ingemar Tegnell, Charles Wilson Piper, Vladimir Dimitrov Kostadinov
-
Publication number: 20110191500Abstract: A method and system are disclosed for deploying a configuration in a process control system wherein at least a portion of the configuration is deployed to a set of field devices. Initially the set of deployment packages are stored within a configuration storage. Thereafter, deployment is initiated on the set of deployment packages from the configuration storage. In response to the initiating deployment step, an automated cascaded deployment is commenced to the set of connected field devices. The automated cascaded deployment includes first deploying the sets of deployment packages to a set of control module assemblies. The method furthermore includes second deploying the received portions of the set of deployment packages to a set of I/O module assemblies. The set of I/O module assemblies maintain and pass the received sub-portions of the set of deployment packages to sets of field devices.Type: ApplicationFiled: February 1, 2010Publication date: August 4, 2011Applicant: Invensys Systems, Inc.Inventors: Jayamani Odayappan, Johan Ingemar Tegnell, Charles Wilson Piper, Vladimir Dimitrov Kostadinov