-
公开(公告)号:US20200210588A1
公开(公告)日:2020-07-02
申请号:US16479495
申请日:2017-09-19
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Vali Ali , Rick Bramley , Endrigo Nadin Pinheiro , Rodrigo Dias Correa , Ronaldo Rod Ferreira
Abstract: Examples associated with cryptographic key security are described. One example system includes a secure storage accessible to a basic input/output system (BIOS). A BIOS security module stores an authorization value in a fixed location in the secure storage. The authorization value is stored by the BIOS during a boot of the system. A cryptographic key module reads the authorization value from the fixed location, overwrites the authorization value in the fixed location, and obtains a cryptographic key using the authorization value.
-
公开(公告)号:US11074056B2
公开(公告)日:2021-07-27
申请号:US16089082
申请日:2017-06-29
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Valiuddin Ali , Rick Bramley , Endrigo Nadin Pinheiro , Rodrigo Dias Correa , Ronaldo Rod Ferreira
Abstract: An example computing device includes a processor, a first storage device, and a second storage device. The second storage device stores instructions to implement a firmware. The firmware is to install an agent application into the first storage device. The firmware is also to activate the agent application subsequent to installing the agent application. The firmware is further to, in response to receiving a manifest file, instruct the agent application to monitor the computing device based on the manifest file.
-
公开(公告)号:US20220197623A1
公开(公告)日:2022-06-23
申请号:US17297131
申请日:2019-09-12
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Endrigo Nadin Pinheiro , Richard Bramley , Valiuddin Ali
IPC: G06F8/61
Abstract: In an example, a non-transitory computer-readable medium has instructions stored therein that, in response to being executed on computer circuitry, cause the computer circuitry to execute instructions to operate an application installed in the memory circuitry and to generate an iterative communication to indicate that the application is operating. The instructions further cause, in response to being executed, the computer circuitry to detect the presence of the iterative communication, and to reinstall the application in response to an interruption in the iterative communication.
-
公开(公告)号:US11329976B2
公开(公告)日:2022-05-10
申请号:US16079140
申请日:2016-11-21
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Ronaldo Rod Ferreira , Endrigo Nadin Pinheiro , Fabio Riffel , Karyne Mayer , Jose Paulo Pires , Christopher C. Mohrman , Vali Ali
Abstract: Examples associated with presence identification are described. One example includes detecting a presence identifier broadcast by a mobile device. The mobile device belongs to a user. A portion of the presence identifier is generated based on a one-time password seed. The portion of the presence identifier is provided to an identification server. Identifying information associated with the user is received from the identification server. The identification server uses the portion to identify the user based on the one-time password seed. An action is performed based on the identifying information.
-
公开(公告)号:US11948008B2
公开(公告)日:2024-04-02
申请号:US17293015
申请日:2019-04-30
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Mason Gunyuzlu , Valiuddin Ali , Robert Craig , Tevin Richards , Richard Bramley , Endrigo Nadin Pinheiro
IPC: G06F9/50
CPC classification number: G06F9/5016
Abstract: In an example, a system includes a firmware controller to initiate a SM execution mode of the system. The firmware controller scans memory for a process pool tag. The firmware controller compares the process pool tag to a set of operating system process pool tags and detects a coherency discrepancy between the process pool tag and the set of operating system process pool tags. The firmware controller exits the SM execution mode of the system.
-
公开(公告)号:US11507668B2
公开(公告)日:2022-11-22
申请号:US16479495
申请日:2017-09-19
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Vali Ali , Rick Bramley , Endrigo Nadin Pinheiro , Rodrigo Dias Correa , Ronaldo Rod Ferreira
Abstract: Examples associated with cryptographic key security are described. One example system includes a secure storage accessible to a basic input/output system (BIOS). A BIOS security module stores an authorization value in a fixed location in the secure storage. The authorization value is stored by the BIOS during a boot of the system. A cryptographic key module reads the authorization value from the fixed location, overwrites the authorization value in the fixed location, and obtains a cryptographic key using the authorization value.
-
公开(公告)号:US20220138356A1
公开(公告)日:2022-05-05
申请号:US17293285
申请日:2019-07-24
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Endrigo Nadin Pinheiro , Mason Gunyuzlu , Robert Craig
Abstract: In an example, an apparatus for access regulation of peripheral devices may include a processor and a communication interface to communicate to a peripheral device and to the processor. The processor may identify a pattern associated with receiving input data from a first peripheral device, wherein the pattern includes a keystroke rate, a delay in a keystroke pattern, a keystroke pressure, or a combination thereof. Similarly, the processor may, in response to detecting enumeration of a second peripheral device coupled to the apparatus, compare particular input data received from the second peripheral device with the pattern, and regulate access of the second peripheral device to the apparatus, based on the comparison.
-
公开(公告)号:US10862693B2
公开(公告)日:2020-12-08
申请号:US16066406
申请日:2016-03-30
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Ronaldo Rod Ferreira , Endrigo Nadin Pinheiro , Adilson Arthur Mohr , Jose Paulo Xavier Pires , Fabio D. Riffel , Christopher Charles Mohrman , Valiuddin Y. Ali
IPC: G06F15/173 , G06F15/16 , H04L12/18 , H04L9/32 , G06F21/44 , H04L29/06 , H04L29/08 , H04W4/02 , H04W12/06
Abstract: Example implementations relate to meeting passcodes. In an example, meeting passcodes can employ a meeting hub including an antenna and a controller coupled to the antenna to wirelessly receive, via the antenna, information including a first meeting passcode from a meeting device, generate a second meeting passcode in response to receipt of the first meeting passcode, cause the second meeting passcode to be sent to a registered user of meeting device, and admit the meeting device to a meeting using the second meeting passcode.
-
公开(公告)号:US20230206711A1
公开(公告)日:2023-06-29
申请号:US17926889
申请日:2020-06-02
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Endrigo Nadin Pinheiro , Christopher Charles Mohrman , Nicholas Ian Sutton , Stephen Mark Hinton
Abstract: Example implementations relate to data extraction from identification badges. For example, a device that includes a processor and a memory resource storing instructions that when executed by the processor cause the processor to: identify a presence of a user within an area, identify that the user is wearing an identification badge, extract data from the identification badge, and add the extracted data to a database associated with attendance within the area.
-
公开(公告)号:US20220114113A1
公开(公告)日:2022-04-14
申请号:US17288545
申请日:2019-06-20
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Endrigo Nadin Pinheiro , Christopher Charles Mohrman , Roger Benson , Stephen Mark Hinton , Syed Azam
Abstract: An example of an apparatus includes an application engine to execute an application. The apparatus includes a first communication interface to communicate with a first peripheral device. The apparatus includes a second communication interface to communicate with a second peripheral device. The apparatus includes an orchestration engine in communication with the application engine, the first communication interface, and the second communication interface. The orchestration engine is to receive an application command from the application and to broadcast the application command to the first peripheral device and the second peripheral device. The orchestration engine is to receive a device command from the first peripheral device or the second peripheral device, wherein the device command is to control the application.
-
-
-
-
-
-
-
-
-