-
公开(公告)号:US20220083666A1
公开(公告)日:2022-03-17
申请号:US17414836
申请日:2019-06-03
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Thalia Laing , Adrian John Baldwin , Joshua Serratelli Schiffman
Abstract: In an example there is provided a method to certify a cryptographic key. The method comprises accessing an identifier stored at a secure location on the computing device, generating a cryptographic key according to a key generation process and certifying the cryptographic key is authentically generated during the boot process of the computing device, on the basis of the identifier.
-
公开(公告)号:US11270012B2
公开(公告)日:2022-03-08
申请号:US16076544
申请日:2017-04-21
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Nassir Mohammad , Jonathan Griffin , Gurchetan Grewal , Luke T. Mather , Joshua Serratelli Schiffman
Abstract: In one example in accordance with the present disclosure, a computing device is described. The computing device includes an encryption device to encrypt, using an encryption key, a document to be rendered. A generating device generates multiple shares of a decryption key using a secret-sharing scheme. A threshold number of the multiple shares allows decryption of the document. A transmit device transmits different shares of the multiple shares to different devices. The document is rendered when the threshold number of multiple shares are rejoined at a rendering device.
-
43.
公开(公告)号:US20210406378A1
公开(公告)日:2021-12-30
申请号:US16479737
申请日:2018-01-29
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Jeffrey Kevin Jeansonne , Rosilet Retnamoni Braduke , Joshua Serratelli Schiffman , David Plaquin
Abstract: An example system with a pre-OS (Operating System) environment, the pre-OS environment includes a private memory that is isolated from a processor of the system. The pre-OS environment also includes an embedded controller (EC) coupled to the private memory, where the EC includes an embedded key. The EC is to execute instructions to generate an encryption key based on the embedded key; generate a signature key; obtain data; produce an integrity-verification tag based on a hash of the obtained data, where the hash employs the signature key; encrypt the obtained data based on the encryption key; store the encrypted data in the private memory; and store the integrity-verification tag in the private memory in association with the stored encrypted data.
-
公开(公告)号:US20210391992A1
公开(公告)日:2021-12-16
申请号:US17283367
申请日:2018-12-05
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Joshua Serratelli Schiffman , Remy Husson , Thalia May Laing
IPC: H04L9/32
Abstract: A method comprising: receiving, by a blockchain maintainer, a client request for a cryptographic token, the cryptographic token to allow the client to access a particular service from a service provider; processing, by the blockchain maintainer, the request using a blockchain smart contract to determine if the client request is valid; if the client request is determined to be valid, including the client request in the blockchain; generating, by a token issuer, the requested cryptographic token in response to inclusion of the valid client request in the blockchain; and issuing the generated cryptographic token to the client.
-
公开(公告)号:US20210390216A1
公开(公告)日:2021-12-16
申请号:US17286584
申请日:2019-11-26
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Joshua Serratelli Schiffman , Boris Balacheff , Richard Alden Bramley, Jr. , Valiuddin Ali
Abstract: According to aspect of the disclosure, there are provided methods and apparatus for connecting a peripheral device to a computer system, including an apparatus for interfacing with a peripheral device, the apparatus comprising a port configured to couple to the peripheral device, a processor, a memory coupled to the processor and comprising a software module comprising instructions that when executed on the processor protect the device from a peripheral device coupled to the port, and a hardware security controller coupled to the port, the hardware security controller configured to monitor execution of the software module by the processor and to disable the port in response to determining that the software module is not executing.
-
公开(公告)号:US20210382996A1
公开(公告)日:2021-12-09
申请号:US17052991
申请日:2019-02-28
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Jeffrey Kevin Jeansonne , Valiuddin Ali , Richard Alden Bramley, JR. , Adrian John Baldwin , Joshua Serratelli Schiffman
Abstract: An example computing device includes a user interface, a network interface, a non-volatile memory, a processor coupled to the user interface, the network interface, and the non-volatile memory, and a set of instructions stored in the non-volatile memory. The set of instructions, when executed by the processor, is to perform a hardware initialization of the computing device according to a setting, establish a local trust domain and a remote trust domain, use a local-access public key to issue a challenge via the user interface to grant local access to the setting, and use a remote-access public key to grant remote access via the network interface to remote access to the setting.
-
公开(公告)号:US11137948B2
公开(公告)日:2021-10-05
申请号:US16628755
申请日:2018-07-13
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Joshua Serratelli Schiffman , Luke T. Mather , Boris Balacheff
Abstract: User equipment, the user equipment to receive data representing identity information broadcast by a rendering apparatus over a passive non-contact short proximity data transport mechanism when the user equipment is proximate the rendering apparatus, and push the gathered identity information to a workstation, to enable the workstation to connect with the rendering apparatus.
-
公开(公告)号:US10771444B2
公开(公告)日:2020-09-08
申请号:US15947299
申请日:2018-04-06
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Joshua Serratelli Schiffman , Gurchetan Grewal , Thalia Laing , Boris Balacheff
Abstract: Examples associated with distributed authentication are described. One example includes generating a paired public key and private key associated with a user. The private key is split into a set of shares, which are distributed to a set of devices associated with the user. A challenge is generated to authenticate the user to grant the user access to a resource upon receiving an authenticating response to the challenge. The challenge is distributed to members of the set of devices. Partial responses are received from members of the set of devices and combined into a group signature. The group signature serves as an authenticating response to the challenge when generated from partial responses received from a threshold number of members of the set of devices.
-
公开(公告)号:US12192384B2
公开(公告)日:2025-01-07
申请号:US18041285
申请日:2020-08-21
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Gaetan Wattiau , Thalia May Laing , Joshua Serratelli Schiffman
Abstract: A system, comprising an authentication module to generate a challenge to authenticate a user, the challenge to be distributed to members of a set of verifying parties; and grant the user access to a resource upon receiving an authenticating response to the challenge; and a combiner module to receive partial responses from members of the set of verifying parties upon verification of the user by each member, the verification made using a provided contextual identifier of the user; based on the partial responses reaching a threshold number of responses, combine the partial responses to obtain a combined response, and provide the combined response to the authentication module as an authenticating response to the challenge.
-
公开(公告)号:US11914713B2
公开(公告)日:2024-02-27
申请号:US17052991
申请日:2019-02-28
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Jeffrey Kevin Jeansonne , Valiuddin Ali , Richard Alden Bramley, Jr. , Adrian John Baldwin , Joshua Serratelli Schiffman
CPC classification number: G06F21/572 , G06F21/36 , H04L9/3228 , H04L9/3247 , H04L63/0838 , G06F2221/033
Abstract: An example computing device includes a user interface, a network interface, a non-volatile memory, a processor coupled to the user interface, the network interface, and the non-volatile memory, and a set of instructions stored in the non-volatile memory. The set of instructions, when executed by the processor, is to perform a hardware initialization of the computing device according to a setting, establish a local trust domain and a remote trust domain, use a local-access public key to issue a challenge via the user interface to grant local access to the setting, and use a remote-access public key to grant remote access via the network interface to remote access to the setting.
-
-
-
-
-
-
-
-
-