-
公开(公告)号:US11329976B2
公开(公告)日:2022-05-10
申请号:US16079140
申请日:2016-11-21
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Ronaldo Rod Ferreira , Endrigo Nadin Pinheiro , Fabio Riffel , Karyne Mayer , Jose Paulo Pires , Christopher C. Mohrman , Vali Ali
Abstract: Examples associated with presence identification are described. One example includes detecting a presence identifier broadcast by a mobile device. The mobile device belongs to a user. A portion of the presence identifier is generated based on a one-time password seed. The portion of the presence identifier is provided to an identification server. Identifying information associated with the user is received from the identification server. The identification server uses the portion to identify the user based on the one-time password seed. An action is performed based on the identifying information.
-
公开(公告)号:US10768941B2
公开(公告)日:2020-09-08
申请号:US15563981
申请日:2015-06-26
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Kate Mallichan , Boris Balacheff , Vali Ali , Shane Steiger , Logan Clay Browne
Abstract: A computing device includes a processor, a memory coupled to the processor, and a non-transitory computer readable storage medium coupled to the processor that includes instructions, that when executed by the processor, cause the processor to manage a transition between a first operating system and a second operating system. The instructions cause the processor to instantiate a copy-on-write virtual computing system executing a first operating system, delete a second operating system from the non-transitory computer readable storage medium or the memory, copy the first operating system to the non-transitory computer readable storage medium. The instructions can further cause the processor to instantiate the first operating system on the computing device.
-
公开(公告)号:US10452855B2
公开(公告)日:2019-10-22
申请号:US15309812
申请日:2014-08-12
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Vali Ali , Helen Balinsky
Abstract: According to an example of accessing a composite document, a request to access a composite document is received. A key associated with a group is fetched, and the key is used to decrypt a part of the composite document comprising an attribute. In the event that the attribute is verified, access to the composite document is provided.
-
公开(公告)号:US20200210588A1
公开(公告)日:2020-07-02
申请号:US16479495
申请日:2017-09-19
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Vali Ali , Rick Bramley , Endrigo Nadin Pinheiro , Rodrigo Dias Correa , Ronaldo Rod Ferreira
Abstract: Examples associated with cryptographic key security are described. One example system includes a secure storage accessible to a basic input/output system (BIOS). A BIOS security module stores an authorization value in a fixed location in the secure storage. The authorization value is stored by the BIOS during a boot of the system. A cryptographic key module reads the authorization value from the fixed location, overwrites the authorization value in the fixed location, and obtains a cryptographic key using the authorization value.
-
公开(公告)号:US20190107982A1
公开(公告)日:2019-04-11
申请号:US16088583
申请日:2016-05-27
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Vali Ali , Christopher C Mohrman , Adilson A Mohr , ENDRIGO NADIN PINHEIRO , Fabio Riffel , Ronaldo Rod Ferreira , Jose Paulo Pires
CPC classification number: G06F3/1238 , G06F3/1204 , G06F3/1222 , G06F3/1226 , G06F3/1236 , G06F3/1292 , G06F21/602 , G06F21/608 , H04L67/12 , H04L69/14 , H04N1/4486 , H04N2201/3281 , H04W4/80 , H04W84/12
Abstract: In one example of the disclosure, an encrypted document and an encryption key for decrypting the encrypted document are received from a computer. Presence data for a printer is received via a first wireless network. A user instruction to print the encrypted document at the printer is received. A credential is received from the printer via the first wireless network, where the credential for communication with the printer via a second wireless network with greater bandwidth than the first wireless network. The encrypted document and the encryption key are sent to the printer, where the printer is to utilize the encryption key to decrypt the encrypted document and is to print the document following decryption.
-
6.
公开(公告)号:US20190007621A1
公开(公告)日:2019-01-03
申请号:US15772270
申请日:2016-02-29
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Isaac Lagnado , Vali Ali
CPC classification number: H04N5/23293 , G01S3/28 , G01S3/34 , H04N5/225 , H04N5/232 , H04N5/445 , H04W74/06
Abstract: A technique includes sensing energy emitted from an object using an omnidirectional antenna of electronic device and sensing the energy using a unidirectional antenna of the electronic device. The technique includes, based at least in part on the sensing of energy using the omnidirectional antenna and the sensing of the energy using the unidirectional antenna, determining whether an image of the object is displayed in a camera viewfinder of the electronic device. The technique includes selectively causing the electronic device to generate an output based at least in part on the determination.
-
公开(公告)号:US11422901B2
公开(公告)日:2022-08-23
申请号:US16478800
申请日:2017-11-06
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Vali Ali , Michael Provencher , Charles Ricardo Staub , Juliano Francisco Cagnini Ciocari , Paulo Alcantara
IPC: G06F11/00 , G06F11/14 , G06F9/4401 , G06F11/22
Abstract: An example computing device includes a first storage device storing a firmware. The computing device also includes a second storage device storing an operating system of the computing device. The computing device further includes a processor. The processor is to retrieve a recovery agent from another computing device via the firmware; validate the recovery agent; execute the recovery agent to retrieve recovery data; validate the recovery data; and repair the operating system using the recovery data via the recovery agent.
-
公开(公告)号:US11409878B2
公开(公告)日:2022-08-09
申请号:US16980884
申请日:2018-05-31
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Vali Ali , Richard Bramley , Ronaldo Rod Ferreira , Endrigo Pinheiro
IPC: G06F21/57 , G06F16/22 , G06F9/4401
Abstract: An example computer system includes a memory having a computer program, a set of data containing a cryptographic first hash protected by a code, and a set of trusted security guidelines for operating an electronic device; a trusted platform module device to store a second hash associated with the computer program; a trusted application computing agent to establish that a hardware initialization sequence of the electronic device is trusted upon matching the first hash with the second hash; and a controller to operate the computer program on the electronic device according to the set of trusted security guidelines.
-
公开(公告)号:US10521168B2
公开(公告)日:2019-12-31
申请号:US16088583
申请日:2016-05-27
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Vali Ali , Christopher C Mohrman , Adilson A Mohr , Endrigo Nadin Pinheiro , Fabio Riffel , Ronaldo Rod Ferreira , Jose Paulo Pires
Abstract: In one example of the disclosure, an encrypted document and an encryption key for decrypting the encrypted document are received from a computer. Presence data for a printer is received via a first wireless network. A user instruction to print the encrypted document at the printer is received. A credential is received from the printer via the first wireless network, where the credential for communication with the printer via a second wireless network with greater bandwidth than the first wireless network. The encrypted document and the encryption key are sent to the printer, where the printer is to utilize the encryption key to decrypt the encrypted document and is to print the document following decryption.
-
公开(公告)号:US10205597B2
公开(公告)日:2019-02-12
申请号:US15308324
申请日:2014-06-30
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Vali Ali , Helen Balinsky
IPC: G06F3/0481 , G06F21/42 , H04L9/32 , G06F21/10 , H04L9/14 , H04L9/30 , H04L29/06 , G06Q10/10 , H04L29/08
Abstract: According to one example, a method is described in which a computer system receives a composite document with at least one referenced resource location. The computer system decrypts the referenced resource location, determines if the referenced resource location requires loading, and determines if the referenced resource location is editable. In the event that the referenced resource location requires loading, the referenced resource may be loaded from the referenced resource location and decrypted. In the event that the referenced resource location is editable, the referenced resource location may be edited.
-
-
-
-
-
-
-
-
-