-
公开(公告)号:US20230267226A1
公开(公告)日:2023-08-24
申请号:US17679813
申请日:2022-02-24
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Helen Balinsky , Derek Lukasik
CPC classification number: G06F21/6227 , H04L63/08 , G06F21/604
Abstract: In one example in accordance with the present disclosure, an electronic device is described. The example electronic device includes a processor and a memory communicatively coupled to the processor. The memory stores executable instructions that when executed cause the processor to store data received from a first entity in a blockchain ledger based on a smart contract. The instructions also cause the processor to verify, with the smart contract, that a second entity is authorized to receive the data. The instructions further cause the processor to send the data to the second entity in response to verifying the second entity is authorized to receive the data.
-
公开(公告)号:US20220405426A1
公开(公告)日:2022-12-22
申请号:US17770069
申请日:2019-10-31
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Remy Husson , Helen Balinsky
Abstract: In an example there is provided a method for certifying transactions of a workflow for a workflow comprising a set of transactions and a permitted order of execution of transactions. The method comprises generating verification data in response to a request from a client to certify a transaction of the workflow on the basis of a secure ledger where the verification data certifies the validity of the secure ledger. The method further comprises communicating the verification data to the client. The secure ledger is determined on the basis of workflow transactions.
-
公开(公告)号:US20220083320A1
公开(公告)日:2022-03-17
申请号:US17420047
申请日:2019-01-09
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Helen Balinsky , Grady Cooper , Daniel Cameron Ellam
Abstract: In an example there is provided a method to access data records generated by a computing device, the data records specifying at least an event log of in-device code executed by the computing device. The method comprises applying pattern recognition to the data records of the computing device to determine if the computing device needs in-device code maintenance and performing maintenance of the in-device code on the computing device in response to the output of the pattern recognition.
-
公开(公告)号:US20210154937A1
公开(公告)日:2021-05-27
申请号:US17047365
申请日:2018-08-09
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Craig Peter Sayers , William E Hertling , Helen Balinsky
IPC: B29C64/386 , B29C64/171 , B33Y50/00 , B33Y10/00 , B33Y30/00 , G05B19/4099 , G06Q30/02 , G06Q50/18 , G06Q10/10 , G06Q10/06 , G06Q30/00 , G06Q20/40
Abstract: A three-dimensional (3D) printing device includes a processor and memory communicatively coupled to the processor. The processor verifies that a digital contract certified by an authorized party is authentic and applicable. The digital contract includes a process bound, a part bound for each part in a packed bed of parts, a time bound, and a cost identifier to define a cost of printing the packed bed that is based on the process bound, the part bound for each part in the packed bed of parts, and the time bound.
-
公开(公告)号:US20210034764A1
公开(公告)日:2021-02-04
申请号:US16980046
申请日:2018-04-24
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Helen Balinsky , Alberto Such Vicente , Chris Dalton , Remy Husson
Abstract: In an example, print apparatus comprises a security services engine to perform cryptographic services. The security services engine may receive a request for a cryptographic service and validate that the request is an authorised request. On successful validation, the security services engine may perform the cryptographic service by acquiring a first key, acquire an associated first key identifier and may output the first key identifier.
-
公开(公告)号:US10460100B2
公开(公告)日:2019-10-29
申请号:US14917839
申请日:2013-09-23
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: David S Perez , Helen Balinsky , Steven J Simske
Abstract: A callback, which may be assigned to a creation event of an application process, may be executed. In response to the execution of the callback, a data flow control object may be injected into the application process. The data flow control object may be to intercept a system call made by the application process and to control flow of data handled by the system call.
-
公开(公告)号:US10205597B2
公开(公告)日:2019-02-12
申请号:US15308324
申请日:2014-06-30
Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
Inventor: Vali Ali , Helen Balinsky
IPC: G06F3/0481 , G06F21/42 , H04L9/32 , G06F21/10 , H04L9/14 , H04L9/30 , H04L29/06 , G06Q10/10 , H04L29/08
Abstract: According to one example, a method is described in which a computer system receives a composite document with at least one referenced resource location. The computer system decrypts the referenced resource location, determines if the referenced resource location requires loading, and determines if the referenced resource location is editable. In the event that the referenced resource location requires loading, the referenced resource may be loaded from the referenced resource location and decrypted. In the event that the referenced resource location is editable, the referenced resource location may be edited.
-
公开(公告)号:US20150363681A1
公开(公告)日:2015-12-17
申请号:US14832664
申请日:2015-08-21
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Steven J. Simske , Marie Vans , Helen Balinsky
CPC classification number: G06K19/0614 , G06K7/12 , G06K19/06037 , H04L2209/34
Abstract: A method and apparatus for encoding, in a simultaneous multiple security application, independently encrypted security data elements within a single matrix of blocks in a progressive barcode. The method and apparatus including, encoding information of a first data element within the matrix using black modules and, encoding information of a second data element within the matrix using color modules. The barcode being configured to be overprinted as it progresses through progressive states. The progressive barcode, resulting from the overprinting through the progressive states, masking the ability to conclusively determine the barcode in a previous state.
Abstract translation: 一种用于在同时多重安全应用中对逐行条形码的单个矩阵中的独立加密的安全数据元素进行编码的方法和装置。 所述方法和装置包括:使用黑色模块对所述矩阵内的第一数据元素的信息进行编码;以及使用颜色模块对所述矩阵内的第二数据元素的信息进行编码。 条形码被配置为在进行逐行状态时被套印。 通过逐行状态的叠印产生的逐行条形码,掩盖了在先前状态下最终确定条形码的能力。
-
公开(公告)号:US11356268B2
公开(公告)日:2022-06-07
申请号:US16613821
申请日:2017-06-02
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Helen Balinsky , Scott White , Robert Taylor , Adrian Baldwin , Jonathan Griffin
Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.
-
公开(公告)号:US20200044843A1
公开(公告)日:2020-02-06
申请号:US16488615
申请日:2017-04-27
Applicant: Hewlett-Packard Development Company, L.P.
Inventor: Nassir Mohammad , Helen Balinsky
Abstract: A method for regulating document access, the method comprising providing a set of access keys for a user, respective ones of the keys providing different user access privileges for components of a composite document, selecting multiple nodes in a distributed storage system, distributing data representing N fragments of encrypted or unencrypted versions of the set of access keys and/or at least one of the individual keys and/or a symmetric key. K, associated with the user across N selected nodes of the distributed storage system, wherein the encrypted versions are encrypted using the symmetric encryption key. K, associated with the user, encrypting data relating to address information of the N selected nodes using a public encryption key of the user to generate a location object and storing the location object as a component of the composite document.
-
-
-
-
-
-
-
-
-