The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 02, 2020

Filed:

Aug. 21, 2017
Applicant:

General Electric Company, Schenectady, NY (US);

Inventors:

Masoud Abbaszadeh, Clifton Park, NY (US);

Lalit Keshav Mestha, North Colonie, NY (US);

Cody Joe Bushey, Clifton Park, NY (US);

Assignee:

General Electric Company, Schenectady, NY (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/55 (2013.01); G05B 19/418 (2006.01); G06F 21/60 (2013.01); G06F 21/56 (2013.01); H04L 29/06 (2006.01);
U.S. Cl.
CPC ...
G05B 19/41885 (2013.01); G06F 21/55 (2013.01); G06F 21/566 (2013.01); G06F 21/604 (2013.01); H04L 63/1408 (2013.01); H04L 63/1433 (2013.01); G05B 2219/35269 (2013.01); G05B 2219/36546 (2013.01); G06F 2221/034 (2013.01);
Abstract

In some embodiments, a system model construction platform may receive, from a system node data store, system node data associated with an industrial asset. The system model construction platform may automatically construct a data-driven, dynamic system model for the industrial asset based on the received system node data. A synthetic attack platform may then inject at least one synthetic attack into the data-driven, dynamic system model to create, for each of a plurality of monitoring nodes, a series of synthetic attack monitoring node values over time that represent simulated attacked operation of the industrial asset. The synthetic attack platform may store, in a synthetic attack space data source, the series of synthetic attack monitoring node values over time that represent simulated attacked operation of the industrial asset. This information may then be used, for example, along with normal operational data to construct a threat detection model for the industrial asset.


Find Patent Forward Citations

Loading…