-
公开(公告)号:US20180219689A1
公开(公告)日:2018-08-02
申请号:US15747242
申请日:2015-09-30
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: JAMES R WALDRON , VALI ALI , BORIS BALACHEFF
CPC classification number: H04L9/3265 , H04L9/0891 , H04L9/0894 , H04L63/0272 , H04L63/0823 , H04L2209/38
Abstract: Examples associated with certificate analysis are disclosed. One example periodically analyzing a secure socket layer certificate chain between a client device and a server device. The client device may perform this periodic analysis. In response to detecting an unexpected certificate in the secure socket layer certificate chain, a responsive action is taken.
-
公开(公告)号:US20180136940A1
公开(公告)日:2018-05-17
申请号:US15563981
申请日:2015-06-26
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: KATE MALLICHAN , BORIS BALACHEFF , VALI ALI , SHANE STEIGER , LOGAN CLAY BROWNE
IPC: G06F9/4401 , G06F11/14 , G06F21/57 , G06F9/455
Abstract: In examples provided herein, a computing device includes a processor, a memory coupled to the processor, and a non-transitory computer readable storage medium coupled to the processor that includes instructions, that when executed by the processor, cause the processor to manage a transition between a first operating system and a second operating system. The instructions cause the processor to instantiate a copy-on-write virtual computing system executing a first operating system, delete a second operating system from the non-transitory computer readable storage medium or the memory, copy the first operating system to the non-transitory computer readable storage medium. The instructions can further cause the processor to instantiate the first operating system on the computing device.
-
公开(公告)号:US20170262642A1
公开(公告)日:2017-09-14
申请号:US15309812
申请日:2014-08-12
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: VALI ALI , HELEN BALINSKY
CPC classification number: G06F21/6209 , G06F21/31 , G06F21/602 , G06F2221/2115 , G06F2221/2141 , G06Q10/101
Abstract: According to an example of accessing a composite document, a request to access a composite document is received. A key associated with a group is fetched, and the key is used to decrypt a part of the composite document comprising an attribute. In the event that the attribute is verified, access to the composite document is provided.
-
公开(公告)号:US20170098090A1
公开(公告)日:2017-04-06
申请号:US15307015
申请日:2014-06-24
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: VALI ALI , HELEN BALINSKY
IPC: G06F21/60
CPC classification number: G06F21/602 , G06F17/21 , G06F21/10 , G06F2221/2107 , H04L63/105
Abstract: According to one example, a first computer system receives at least one request by at least one workflow participant to access a composite document content-part from a second computer system. The first computer system retrieves at least one encrypted bundle from the composite document for the at least one workflow participant, decrypts the encrypted bundle using a private key, and ascertains whether at least one rule retrieved from the decrypted bundle is satisfied. In the event that at least one rule is satisfied, the first computer system releases a token from the decrypted bundle to the second computer system to access the composite document content-part.
-
-
-