-
公开(公告)号:US20200351287A1
公开(公告)日:2020-11-05
申请号:US16606847
申请日:2018-01-26
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Stuart Lees , Adrian Baldwin , Daniel Ellam , Jonathan Griffin
Abstract: A method for address resolution request control in a network device of a network, the method comprises comparing address resolution requests submitted to network nodes from the network device against a predetermined threshold profile for the network device, and regulating a flow of address resolution requests from the network device in response to the comparison.
-
公开(公告)号:US10389747B2
公开(公告)日:2019-08-20
申请号:US15535826
申请日:2015-02-27
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Richard Brown , Jonathan Griffin , Andy Norman
Abstract: Example implementations relate to facilitating scanning of protecting computing resources. In example implementations, a computing device receives a scan indicator that indicates an external agent is prepared to scan a protected resource of the computing device; identifies a protected action that may be performed by the data processor, the protected action facilitating scanning the protected resource of the computing device by the external agent, the protected action comprising a change in a state of the protected resource; performs the protected action; and provides the external agent with data indicating a current state of the protected resource.
-
公开(公告)号:US20220398321A1
公开(公告)日:2022-12-15
申请号:US17755012
申请日:2019-11-22
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Adrian John Baldwin , Stuart Lees , Jonathan Griffin , Daniel Ellam
Abstract: In some examples, a method for data management, the method comprises booting a trusted diskless operating system image via a device firmware component, accessing a non-volatile storage of the device using the trusted diskless operating system image; and retrieving user data from the non-volatile storage of the device, and/or writing user data received from a remote location to the non-volatile storage of the device.
-
公开(公告)号:US20220393869A1
公开(公告)日:2022-12-08
申请号:US17755011
申请日:2019-11-22
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Adrian John Baldwin , Stuart Lees , Jonathan Griffin , Daniel Ellam
Abstract: In some example, a method for accessing a cryptographic recovery key of an encryption system of a device comprises mapping a device identity received at a key management system to a recovery key stored in the key management system, specifying at least one device-related operation to which the recovery key is linked, generating an encrypted message for the device, the encrypted message comprising the recovery key, and transmitting the encrypted message and a signed message to the device.
-
公开(公告)号:US20220382636A1
公开(公告)日:2022-12-01
申请号:US17755013
申请日:2019-11-22
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Adrian John Baldwin , Stuart Lees , Jonathan Griffin , Daniel Ellam
Abstract: In some examples, a method for performing an out-of-band security inspection of a device comprises generating a snapshot of the state of the device, storing data representing the snapshot to a non-volatile storage of the device, and storing a hash of the snapshot in a device BIOS, transitioning the power state of the device, triggering boot of a trusted diskless operating system image, providing the data representing the snapshot and the hash of the snapshot to the trusted diskless operating system image, and executing a script selected on the basis of a trigger event and the hash of the snapshot to analyse at least a portion of the non-volatile storage of the device.
-
公开(公告)号:US11356268B2
公开(公告)日:2022-06-07
申请号:US16613821
申请日:2017-06-02
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Helen Balinsky , Scott White , Robert Taylor , Adrian Baldwin , Jonathan Griffin
Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.
-
公开(公告)号:US20210165894A1
公开(公告)日:2021-06-03
申请号:US17047326
申请日:2018-06-15
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Thalia May Laing , Joshua Serratelli Schiffman , Gaëtan Wattiau , Jonathan Griffin
Abstract: An apparatus is disclosed. The apparatus may comprise a storage medium to store: a first data structure to receive a first plurality of numerical identifiers, each numerical identifier of the first plurality of numerical identifiers corresponding to a respective signal received during a first defined time interval; and a second data structure to receive a second plurality of numerical identifiers, each numerical identifier of the second plurality of numerical identifiers corresponding to a respective signal received during a second defined time interval, wherein the first defined time interval is earlier in time than the second defined time interval. The apparatus may comprise a processor. Upon expiry of a defined time period, the processor is to: delete the first data structure; and provide a third data structure to receive a third plurality of numerical identifiers, each numerical identifier of the third plurality of numerical identifiers corresponding to a respective signal received during a third defined time interval occurring after the second defined time interval. A method and a machine-readable medium are also disclosed.
-
公开(公告)号:US20190034659A1
公开(公告)日:2019-01-31
申请号:US16072149
申请日:2016-04-10
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Jonathan Griffin , Adrian J. Baldwin
Abstract: Examples associated with application approval are described. One example includes receiving an application package. The application package contains an application from a service provider and a privacy description for the application from a review provider. The application operates on private data controlled by a user. The application package is validated to ensure components of the application package is properly credentialed. An application summary for the user is generated from the privacy description. The application summary describes what portions of private data will be accessed by the application and how portions of the private data will be transmitted. An authorization is received from the user, and execution of the application is controlled based on the authorization of the user.
-
公开(公告)号:US20180276374A1
公开(公告)日:2018-09-27
申请号:US15764170
申请日:2015-10-29
Inventor: Adrian Baldwin , Jonathan Griffin
Abstract: An apparatus includes a first processing resource to execute a program code, and a second processing resource separate from the first processing resource. The program code includes an embedded execution unit. The execution unit, during execution of the program code, calculates a first security value for a part of the program code. The second processing resource runs a validation program. The validation program receives the first security value, checks the first security value against a second security value calculated from a corresponding part of a reference copy of the program code to obtain a check result, returns the check result to the execution unit. The execution unit performs a security-related action in response to a check result indicating a mismatch between the first security value and the second security value.
-
公开(公告)号:US20210365550A1
公开(公告)日:2021-11-25
申请号:US16606263
申请日:2018-06-07
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Adrian John Baldwin , Jonathan Griffin , Daniel Cameron Ellam
IPC: G06F21/55
Abstract: In an example, a method includes receiving, at a server device, a record of an event transmitted from a client device which occurred on the client device. At the server device, a record of the event is generated, by a processor. The received record is compared with the record generated at the server device. When at least a portion of the record generated at the server device is not found in the received record, an alert is issued.
-
-
-
-
-
-
-
-
-