-
公开(公告)号:US11321494B2
公开(公告)日:2022-05-03
申请号:US16771181
申请日:2018-03-12
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Adrian Baldwin , James Robert Waldron , David Plaquin
IPC: G06F21/72 , G06F21/57 , H04L9/08 , H04L9/32 , G06F9/4401
Abstract: In an example, there is provided a method for attesting to a management state of a device platform configuration, based on a signed data structure that represents a device management status and a time-based value from a secure cryptoprocessor of the device. The signed data structure is sent to a management system for validation based on a comparison to the state of the cryptoprocessor at the time of signing the data structure.
-
公开(公告)号:US20200351287A1
公开(公告)日:2020-11-05
申请号:US16606847
申请日:2018-01-26
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Stuart Lees , Adrian Baldwin , Daniel Ellam , Jonathan Griffin
Abstract: A method for address resolution request control in a network device of a network, the method comprises comparing address resolution requests submitted to network nodes from the network device against a predetermined threshold profile for the network device, and regulating a flow of address resolution requests from the network device in response to the comparison.
-
公开(公告)号:US20200034540A1
公开(公告)日:2020-01-30
申请号:US16470283
申请日:2017-04-18
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Remy Husson , Adrian Baldwin , Daniel Ellam
Abstract: In an example, a machine-readable medium includes instructions that, when executed by a processor, cause the processor to order, as part of an execution of a trusted process, a plurality of processes into a sequence comprising a first process, at least one intermediate process, and a last process. The machine-readable medium may further comprise instruction to cause the processor to generate, as part of an execution of the first process, a value based on a code portion of the process following the first process in the sequence, and to generate, as part of an execution of each intermediate process, a respective value based on the value generated by the process preceding the intermediate process in the sequence and based on a code portion associated with the process following the intermediate process in the sequence.
-
公开(公告)号:US11568050B2
公开(公告)日:2023-01-31
申请号:US16754392
申请日:2017-10-30
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Daniel Ellam , Jonathan Griffin , Adrian Baldwin
Abstract: There is disclosed a method, computer program product and a system for regulating execution of a suspicious process, comprising determining a file system location of an executable file associated with the suspicious process, encrypting the file, and creating a wrapper for the file with the same file name and location as the file associated with the suspicious process.
-
公开(公告)号:US11328055B2
公开(公告)日:2022-05-10
申请号:US16606740
申请日:2018-01-31
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Maugan Villatel , Adrian Baldwin , Gaetan Wattiau
Abstract: Examples associated with process verification are described. One example includes a process operating in a general operating environment of the system. From an isolated environment, a protection module modifies the behavior of the process by modifying data associated with the process while the process is in operation. The protection module verifies whether the behavior of the process has changed in accordance with the modification. The protection module takes a remedial action upon determining the process has been compromised.
-
公开(公告)号:US10896085B2
公开(公告)日:2021-01-19
申请号:US15974625
申请日:2018-05-08
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Ronny Chevalier , David Plaquin , Guillaume Hiet , Adrian Baldwin
Abstract: In an example there is provided a method of applying a mitigation action to a computing system. The method comprises receiving notification of an intrusion event on a computing system. The notification identifies one or more of data, and a process affected by the intrusion event. The method comprises accessing state data corresponding to a state of the computing system prior to the intrusion event, accessing a policy specifying one or more mitigation actions to be applied to the one or more of data, and a process in response to an intrusion event, restoring the one or more of data, and the process on the basis of the state data, and applying a mitigation action according to the policy.
-
公开(公告)号:US20200186354A1
公开(公告)日:2020-06-11
申请号:US16613821
申请日:2017-06-02
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Helen Balinsky , Scott White , Robert Taylor , Adrian Baldwin , Jonathan Griffin
Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.
-
公开(公告)号:US10664593B2
公开(公告)日:2020-05-26
申请号:US15764170
申请日:2015-10-29
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Adrian Baldwin , Jonathan Griffin
IPC: G06F21/54 , G06F21/12 , G06F21/50 , G06F21/52 , G06F21/53 , G06F21/56 , G06F21/51 , G06F21/64 , H04L9/08
Abstract: An apparatus includes a first processing resource to execute a program code, and a second processing resource separate from the first processing resource. The program code includes an embedded execution unit. The execution unit, during execution of the program code, calculates a first security value for a part of the program code. The second processing resource runs a validation program. The validation program receives the first security value, checks the first security value against a second security value calculated from a corresponding part of a reference copy of the program code to obtain a check result, returns the check result to the execution unit. The execution unit performs a security-related action in response to a check result indicating a mismatch between the first security value and the second security value.
-
公开(公告)号:US11475107B2
公开(公告)日:2022-10-18
申请号:US16763496
申请日:2018-03-12
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Adrian Baldwin , James Robert Waldron , Mike Provencher
Abstract: A device platform, in some examples, comprises a security processor that may create a private/public cryptographic key pair, and data representing evidence of creation of the key pair, provide access to the key pair and data from an operating system component of the device platform, where the public key part of the key pair may be used to verify management commands. The device platform may validate the key pair and data in a trusted execution state.
-
公开(公告)号:US11347454B2
公开(公告)日:2022-05-31
申请号:US16076987
申请日:2017-04-27
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Nassir Mohammad , Joshua Serratelli Schiffman , Adrian Baldwin
Abstract: A controller for a fulfilment service operation is described in which the controller, before initiating fulfilment of the job, operates to determine if an authorised user is present at a fulfilment service device and to determine if the user intends to remain attendant at the fulfilment service device for the duration of fulfilment of the job. If the user moves away from the fulfilment service device, the controller operates to pause the job. If the user remains away from the fulfilment service device for a period of time, the controller operates to cancel the job.
-
-
-
-
-
-
-
-
-