-
公开(公告)号:US20230308299A1
公开(公告)日:2023-09-28
申请号:US18041285
申请日:2020-08-21
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Gaetan Wattiau , Thalia May Laing , Joshua Serratelli Schiffman
CPC classification number: H04L9/3271 , H04L9/3073 , H04L9/3247
Abstract: A system, comprising an authentication module to generate a challenge to authenticate a user, the challenge to be distributed to members of a set of verifying parties; and grant the user access to a resource upon receiving an authenticating response to the challenge; and a combiner module to receive partial responses from members of the set of verifying parties upon verification of the user by each member, the verification made using a provided contextual identifier of the user; based on the partial responses reaching a threshold number of responses, combine the partial responses to obtain a combined response, and provide the combined response to the authentication module as an authenticating response to the challenge.
-
公开(公告)号:US20230198779A1
公开(公告)日:2023-06-22
申请号:US17997177
申请日:2020-05-04
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Thalia Laing , Joshua Serratelli Schiffman
CPC classification number: H04L9/3247 , H04L9/085 , H04L9/3271 , H04W12/63 , G06N20/00
Abstract: An example system includes a policy engine to measure a local environmental characteristic and determine whether a security policy is satisfied based on the environmental characteristic. The system also includes a signature engine to generate a partial signature using a share of a shared secret based on the security policy being satisfied.
-
公开(公告)号:US20220385465A1
公开(公告)日:2022-12-01
申请号:US17755910
申请日:2019-12-12
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Thalia May Laing , Joshua Serratelli Schiffman , Remy Husson
Abstract: In an example, a method includes receiving a signed message generated by a computing device associated with a private key and a public key. The signed message includes an input message signed with the private key. The method further includes generating, using processing circuitry, a candidate public key based on the input message and the signed message using a public key recovery procedure. The method further includes determining the public key associated with the computing device based on an indication as to whether or not the candidate public key corresponds to the public key associated with the computing device.
-
24.
公开(公告)号:US11429722B2
公开(公告)日:2022-08-30
申请号:US16479737
申请日:2018-01-29
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Jeffrey Kevin Jeansonne , Rosilet Retnamoni Braduke , Joshua Serratelli Schiffman , David Plaquin
Abstract: An example system with a pre-OS (Operating System) environment, the pre-OS environment includes a private memory that is isolated from a processor of the system. The pre-OS environment also includes an embedded controller (EC) coupled to the private memory, where the EC includes an embedded key. The EC is to execute instructions to generate an encryption key based on the embedded key; generate a signature key; obtain data; produce an integrity-verification tag based on a hash of the obtained data, where the hash employs the signature key; encrypt the obtained data based on the encryption key; store the encrypted data in the private memory; and store the integrity-verification tag in the private memory in association with the stored encrypted data.
-
公开(公告)号:US20220006647A1
公开(公告)日:2022-01-06
申请号:US17283358
申请日:2018-12-07
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Thalia May Laing , Joshua Serratelli Schiffman , Daniel Cameron Ellam , Jonathan Francis Griffin
Abstract: A method of operating a service provider server and a computing device to provide anonymous service access. For the service provider server, the method comprises: receiving a service message from a computing device; and determining whether to send a service response message, and if so sending a service response message. The service message includes a pseudonym associated with the computing device, service data and a signature on the pseudonym generated by either the service provider server or an identity manager. The service response message is broadcast by the service provider server or transmitted to the identity manager.
-
公开(公告)号:US20210377007A1
公开(公告)日:2021-12-02
申请号:US16606462
申请日:2018-06-01
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Joshua Serratelli Schiffman , Thalia Laing , Shivaun Albright
Abstract: In an example, a method of encryption is described to include generation of a content encryption key and a key encryption key. In that example, the content encryption key is wrapped based on a key wrap operation using the key encryption key and the wrapped content encryption key is encrypted using a policy encryption key. Further in that example, the policy encryption key is encrypted using a public key corresponding to a print apparatus. In an example, a method of decryption is described. The example method of decryption performs recovery of a policy object using a private key corresponding to a print apparatus. In that example, the policy object includes a wrapped key that is unwrapped using a key encryption key to recover a content encryption key usable to decrypt an encrypted electronic document.
-
公开(公告)号:US20210320902A1
公开(公告)日:2021-10-14
申请号:US17189532
申请日:2021-03-02
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Mamadou Diambar Ndour , Patrick Jacques Andre Marie De Marcillac , Sandro Secci , Joshua Serratelli Schiffman
IPC: H04L29/06
Abstract: In some examples, a method for generating a low data rate signal for transmission from a first network domain to a second network domain, the second network domain logically separated from the first network domain by a firewall, comprises encoding a signal from a first device logically positioned within the first network domain to form a data signal, and transmitting the data signal over an out-of-band communications channel from the first network domain to the second network domain.
-
公开(公告)号:US11144621B2
公开(公告)日:2021-10-12
申请号:US16714198
申请日:2019-12-13
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Joshua Serratelli Schiffman , Gurchetan Grewal , Boris Balacheff
Abstract: A system and method for authentication are described herein. An authentication request is received at a combiner proxy (350). The combiner proxy (350), is arranged to receive a user authentication request, receive one or more share values from one or more communications devices (330A, . . . , 330N) where each of the communications devices (330A, . . . 330N) stores at least one share value of a set of share values and determine if one or more share values that have been received from the communications devices (330A, . . . , 330N) meet a quantitative criteria. The combiner proxy (350) is arranged to authenticate the user if the received share values meet the quantitative criteria.
-
公开(公告)号:US20210248246A1
公开(公告)日:2021-08-12
申请号:US17056638
申请日:2018-10-31
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Thalia May Laing , Joshua Serratelli Schiffman
Abstract: According to aspect of the present disclosure there are provided methods and apparatus for printing to a group of printers in a network, including a method comprising provisioning each printing device of the plurality of printing devices with a respective private cryptographic key, defining a first group of printing devices comprising a first subset of the plurality of printing devices, generating a first group public key for the defined first group of printing devices, the first group public key generated based on public cryptographic keys corresponding to the respective private cryptographic keys provisioned to the first subset of the plurality of printing devices, and providing the first group public key to a user.
-
公开(公告)号:US11057196B2
公开(公告)日:2021-07-06
申请号:US16074544
申请日:2016-09-08
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Joshua Serratelli Schiffman , Vali Ali , Boris Balacheff
Abstract: In an example, a method includes pairing a first electronic device and a data relay apparatus associated with a second electronic device to establish a secure wireless communication link therebetween. Each of the first electronic device and the data relay apparatus may be associated with an identifier and a verifier, each verifier being to verify the identifier of the other of the first electronic device or data relay apparatus. The pairing may include mutual verification of an identifier using the verifier, establishing shared key data and using the shared key data to establish a shared secret value for use in determining a derived key.
-
-
-
-
-
-
-
-
-