-
公开(公告)号:US20210391992A1
公开(公告)日:2021-12-16
申请号:US17283367
申请日:2018-12-05
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Joshua Serratelli Schiffman , Remy Husson , Thalia May Laing
IPC: H04L9/32
Abstract: A method comprising: receiving, by a blockchain maintainer, a client request for a cryptographic token, the cryptographic token to allow the client to access a particular service from a service provider; processing, by the blockchain maintainer, the request using a blockchain smart contract to determine if the client request is valid; if the client request is determined to be valid, including the client request in the blockchain; generating, by a token issuer, the requested cryptographic token in response to inclusion of the valid client request in the blockchain; and issuing the generated cryptographic token to the client.
-
公开(公告)号:US11200314B2
公开(公告)日:2021-12-14
申请号:US16087712
申请日:2016-12-15
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Daniel Ellam , Adrian Baldwin , Remy Husson
Abstract: Examples associated with ransomware attack monitoring are described. One example includes a monitor module to monitor files stored on the system for sequences of file accesses that match a predefined pattern of file accesses. An investigation module is activated when a number of sequences of file accesses that match the predefined pattern exceeds a first threshold. The investigation module logs actions taken by processes to modify files. A reaction module pauses a set of processes operating on the system when the number of sequences of file accesses that match the predefined pattern exceeds a second threshold. The reaction module then identifies processes associated with a suspected ransomware attack based on the logging performed by the investigation module, and resumes legitimate processes.
-
公开(公告)号:US20210034764A1
公开(公告)日:2021-02-04
申请号:US16980046
申请日:2018-04-24
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Helen Balinsky , Alberto Such Vicente , Chris Dalton , Remy Husson
Abstract: In an example, print apparatus comprises a security services engine to perform cryptographic services. The security services engine may receive a request for a cryptographic service and validate that the request is an authorised request. On successful validation, the security services engine may perform the cryptographic service by acquiring a first key, acquire an associated first key identifier and may output the first key identifier.
-
-