-
公开(公告)号:US10534739B2
公开(公告)日:2020-01-14
申请号:US15515743
申请日:2014-10-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Maugan Villatel , David Plaquin , Chris I. Dalton
Abstract: A bus between a requester and a target component includes a portion dedicated to carry information indicating a privilege level, from among a plurality of privilege levels, of machine-readable instructions executed on the requester.
-
公开(公告)号:US10650138B2
公开(公告)日:2020-05-12
申请号:US15417955
申请日:2017-01-27
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Michela D'Errico , Leon Frank Ehrenhart , Chris I. Dalton , Michael John Wray , Siani Pearson , Dennis Heinze
IPC: G06F21/53 , G06F16/245
Abstract: Examples relate to system call policies for containers. In an example, a method includes receiving, by a container platform, a container for running an application. The container has a metadata record that specifies an application type of the application. The container platform receives a data structure that specifies a set of system call policies for a set of application types and queries the data structure to determine a policy of the set of system call policies to apply to the container based on the application type in the metadata record. A kernel implements the policy for the container to allow or deny permission for a system call by the application running in the container based on a comparison of the system call to the policy.
-
公开(公告)号:US11757717B2
公开(公告)日:2023-09-12
申请号:US15500918
申请日:2014-11-28
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Ludovic Emmanuel Paul Noel Jacquin , Adrian Shaw , Chris I. Dalton
IPC: H04L41/0866 , H04L41/0893 , H04L41/28 , H04L41/12
CPC classification number: H04L41/0866 , H04L41/0893 , H04L41/12 , H04L41/28
Abstract: Examples relate to verifying network elements. In one example, a computing device may: receive, from a client device, a request for attestation of a back-end network, the request including back-end configuration requirements; obtain, from a network controller that controls the back-end network, a controller configuration that specifies each network element included in the back-end network; provide each network element included in the back-end network with a request for attestation of a network element configuration of the network element; receive, from each network element, response data that specifies the network element configuration of the network element; verify that the response data received from each network element meets the back-end configuration requirements included in the request for attestation of the back-end network; and provide the client device with data verifying that the back-end network meets the back-end configuration requirements.
-
公开(公告)号:US10699031B2
公开(公告)日:2020-06-30
申请号:US15328408
申请日:2014-10-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Liqun Chen , Chris I. Dalton , Fraser John Dickin , Nigel Edwards , Simon Kai-Ying Shiu
Abstract: In an example, transactions are secured between electronic circuits in a memory fabric. An electronic circuit may receive a transaction integrity key. The electronic circuit may compute a truncated message authentication code (MAC) using the received transaction integrity key and attach the truncated MAC to a security message header (SMH) of the transaction.
-
公开(公告)号:US10686612B2
公开(公告)日:2020-06-16
申请号:US15573688
申请日:2015-07-30
Applicant: Ludovic Emmanuel Paul Noel Jacquin , Liqun Chen , Fraser Dickin , Chris I. Dalton , Hewlett Packard Enterprise Development LP
Inventor: Ludovic Emmanuel Paul Noel Jacquin , Liqun Chen , Fraser Dickin , Chris I. Dalton
Abstract: Examples set out herein provide a method comprising using first cryptographic key data specific to a computing device to verify a package of machine readable instructions to run on the computing device. The verified package may be executed to generate a random number using a true random number generator of the computing device, and to store the generated random number. Second cryptographic key data may be generated by a pseudorandom number generator of the computing device based on a seed comprising a combination of the random number as a first seed portion and a second seed portion. A portion of the second cryptographic key data may be sent to a certifying authority. The method may further comprising receiving a certification value based on the sent portion of the second cryptographic key data from the certifying authority and storing the certification value.
-
公开(公告)号:US10461926B2
公开(公告)日:2019-10-29
申请号:US15252392
申请日:2016-08-31
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Chris I. Dalton , Dejan S. Milojicic
Abstract: Example implementations relate to cryptographic evidence of persisted capabilities. In an example implementation, in response to a request to access a persisted capability stored in a globally shared memory, a system may decide whether to trust the persisted capability by verification of cryptographic evidence accompanying the persisted capability. The system may load the persisted capability upon a decision to trust the persisted capability based on successful verification.
-
公开(公告)号:US20180365428A1
公开(公告)日:2018-12-20
申请号:US15735660
申请日:2016-04-22
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Nigel Edwards , Chris I. Dalton , Keith Matthew McAuliffe
Abstract: Examples include configuration of a memory controller for copy-on-write with a resource controller. Some examples include, in response to a determination to take a snapshot of memory accessible to a first component, a resource controller configuring a memory controller to treat location IDs, mapped to initial memory locations of the accessible memory, as copy-on-write for the first component and not for a second component independent of the resource controller after the configuring.
-
公开(公告)号:US20170302454A1
公开(公告)日:2017-10-19
申请号:US15515707
申请日:2014-10-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Ludovic Emmanuel Paul Noel Jacquin , Liqun Chen , Chris I. Dalton
Abstract: In an example, memory address encryption is facilitated for transactions between electronic circuits in a memory fabric. An electronic circuit may obtain a transaction integrity key and a transaction encryption key. The electronic circuit may encrypt an address using the transaction encryption key and a compute a truncated message authentication code (MAC) using the transaction integrity key.
-
公开(公告)号:US11734430B2
公开(公告)日:2023-08-22
申请号:US15735660
申请日:2016-04-22
Applicant: Hewlett Packard Enterprise Development LP
Inventor: Nigel Edwards , Chris I. Dalton , Keith Mathew McAuliffe
CPC classification number: G06F21/577 , G06F9/455 , G06F9/45558 , G06F13/16 , G06F13/1668 , G06F21/50 , G06F2009/45583 , G06F2009/45587 , G06F2009/45591
Abstract: Examples include configuration of a memory controller for copy-on-write with a resource controller. Some examples include, in response to a determination to take a snapshot of memory accessible to a first component, a resource controller configuring a memory controller to treat location IDs, mapped to initial memory locations of the accessible memory, as copy-on-write for the first component and not for a second component independent of the resource controller after the configuring.
-
公开(公告)号:US10715332B2
公开(公告)日:2020-07-14
申请号:US15515707
申请日:2014-10-30
Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
Inventor: Ludovic Emmanuel Paul Noel Jacquin , Liqun Chen , Chris I. Dalton
Abstract: In an example, memory address encryption is facilitated for transactions between electronic circuits in a memory fabric. An electronic circuit may obtain a transaction integrity key and a transaction encryption key. The electronic circuit may encrypt an address using the transaction encryption key and a compute a truncated message authentication code (MAC) using the transaction integrity key.
-
-
-
-
-
-
-
-
-