-
公开(公告)号:US11270012B2
公开(公告)日:2022-03-08
申请号:US16076544
申请日:2017-04-21
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Nassir Mohammad , Jonathan Griffin , Gurchetan Grewal , Luke T. Mather , Joshua Serratelli Schiffman
Abstract: In one example in accordance with the present disclosure, a computing device is described. The computing device includes an encryption device to encrypt, using an encryption key, a document to be rendered. A generating device generates multiple shares of a decryption key using a secret-sharing scheme. A threshold number of the multiple shares allows decryption of the document. A transmit device transmits different shares of the multiple shares to different devices. The document is rendered when the threshold number of multiple shares are rejoined at a rendering device.
-
公开(公告)号:US11223602B2
公开(公告)日:2022-01-11
申请号:US16074110
申请日:2016-09-23
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Adrian J. Baldwin , Daniel C. Ellam , Jonathan Griffin
Abstract: Examples disclosed herein relate to determining whether to allow access to an IP address based on a security level and domain name access information. In one implementation, a processor intercepts a response to a Domain Name System request related to a domain name and updates a security level based on the request and/or response. The processor may determine whether to forward or block the response based on the security level and a comparison of the domain name to stored information related to previous domain name access.
-
公开(公告)号:US20180276377A1
公开(公告)日:2018-09-27
申请号:US15764484
申请日:2015-11-30
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Jonathan Griffin , Adrian Baldwin
CPC classification number: G06F21/554 , G06F9/445 , G06F21/55 , G06F21/57 , G06F2221/034 , H04L63/1425
Abstract: Examples disclosed herein relate to selecting a security mitigation action based on device usage. In one implementation, a processor selects a security mitigation action for a device based on information related to usage of the device and associated usage limitations associated with the selected security mitigation action. The processor may output information related to the selected security mitigation action.
-
公开(公告)号:US11568050B2
公开(公告)日:2023-01-31
申请号:US16754392
申请日:2017-10-30
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Daniel Ellam , Jonathan Griffin , Adrian Baldwin
Abstract: There is disclosed a method, computer program product and a system for regulating execution of a suspicious process, comprising determining a file system location of an executable file associated with the suspicious process, encrypting the file, and creating a wrapper for the file with the same file name and location as the file associated with the suspicious process.
-
公开(公告)号:US20220100900A1
公开(公告)日:2022-03-31
申请号:US17414587
申请日:2019-06-14
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Adrian John Baldwin , Daniel Ellam , Nelson L. Chang , Jonathan Griffin
Abstract: In examples, there is provided a method for modifying a data item from a source apparatus, the data item associated with an event, in which the method comprises, within a trusted environment, parsing the data item to generate a set of tuples relating to the event and/or associated with the source apparatus, each tuple comprising a data item, and a data identifier related to the data item, applying a rule to a first tuple to pseudonymise a first data item to provide a transformed data item, and/or generate a contextual supplement to the first data item, generating a mapping between the transformed data item and the first data item, whereby to provide a link between the transformed data item and the first data item to enable subsequent resolution of the first data item using the transformed data item, and forwarding the transformed data item and the data identifier related to the first data item to an analytics engine situated logically outside of the trusted environment.
-
公开(公告)号:US20200186354A1
公开(公告)日:2020-06-11
申请号:US16613821
申请日:2017-06-02
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Helen Balinsky , Scott White , Robert Taylor , Adrian Baldwin , Jonathan Griffin
Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.
-
公开(公告)号:US10664593B2
公开(公告)日:2020-05-26
申请号:US15764170
申请日:2015-10-29
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Adrian Baldwin , Jonathan Griffin
IPC: G06F21/54 , G06F21/12 , G06F21/50 , G06F21/52 , G06F21/53 , G06F21/56 , G06F21/51 , G06F21/64 , H04L9/08
Abstract: An apparatus includes a first processing resource to execute a program code, and a second processing resource separate from the first processing resource. The program code includes an embedded execution unit. The execution unit, during execution of the program code, calculates a first security value for a part of the program code. The second processing resource runs a validation program. The validation program receives the first security value, checks the first security value against a second security value calculated from a corresponding part of a reference copy of the program code to obtain a check result, returns the check result to the execution unit. The execution unit performs a security-related action in response to a check result indicating a mismatch between the first security value and the second security value.
-
公开(公告)号:US20220035910A1
公开(公告)日:2022-02-03
申请号:US17299656
申请日:2018-12-19
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Daniel Ellam , Adrian John Baldwin , Jonathan Griffin , Stuart Lees
IPC: G06F21/55
Abstract: Apparatus and methods to process received results of an analytical process performed on first external data at a first computer at a server, to obtain sensitizing data; and provide the sensitizing data from the server to a second computer for use in performing a sensitized analytical process on second external data received at the second computer.
-
公开(公告)号:US20220027438A1
公开(公告)日:2022-01-27
申请号:US17296390
申请日:2019-04-04
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Daniel Ellam , Jonathan Griffin
Abstract: A non-transitory machine-readable storage medium encoded with instructions executable with a processor is described. The instructions comprise instructions to determine whether a received data item is required by an analytic process to make a determination; and instructions to, in response to determining that the received data item is required by the analytic process, store the received data item in a pre-analytic store.
-
公开(公告)号:US20210334364A1
公开(公告)日:2021-10-28
申请号:US16605609
申请日:2018-08-22
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Adrian John Baldwin , Jonathan Griffin , Daniel Cameron Ellam
Abstract: In an example, a method includes analysing data collected from a service. A value representative of the number of anomalies in the data is generated, this value then being compared with a threshold. Depending on whether the value is greater or less than the threshold, a performance parameter of the monitoring service may be evaluated.
-
-
-
-
-
-
-
-
-