Patents by Inventor Gareth David Richards

Gareth David Richards has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230421389
    Abstract: A process includes communicating by a first device, with a second device. The communicating includes the first device receiving data from the second device that represents a certificate. The certificate binds a hierarchy of logical identifiers to a cryptographic key. The hierarchy of identifiers includes a first logical identifier that corresponds to a group membership. The process includes authenticating, by the first device, the second device based on the certificate. The process includes allowing, by the first device, a secure connection to be set up between the first device and the second device based on whether the first logical identifier represents that the second device is a member of a first group of devices of which the first device is a member.
    Type: Application
    Filed: June 24, 2022
    Publication date: December 28, 2023
    Inventors: Christopher Anthony Grant Hillier, Gareth David Richards, Ludovic Emmanuel Paul Noel Jacquin, Thomas M. Laffey
  • Publication number: 20230421554
    Abstract: Examples for identification and authentication of hardware. Techniques may include receiving a node identifier during an initial phase of the node. The node identifier may include an initial unique identifier of the node. The node may receive a latest change identifier during a phase change of the node, wherein the phase change may cause a hierarchical change of the node. The latest change identifier is configured to incorporate a latest unique identifier corresponding to a latest system and one or more unique identifiers corresponding to one or more earlier systems of the node. Further, responsive to the reception of the latest change identifier, delete an earlier change identifier, and the node may send the second change identifier to a management service, in response to a request for authentication of the node by the management service.
    Type: Application
    Filed: June 24, 2022
    Publication date: December 28, 2023
    Inventors: Gareth David RICHARDS, Christopher Anthony Grant HILLIER, Ludovic Emmanuel Paul Noel JACQUIN, Thomas M. LAFFEY
  • Patent number: 11226867
    Abstract: Example implementations relate to encrypting data objects. In an example, data objects of a file system instance contained by a security domain are encrypted using a Data Encryption Key that is specific to the security domain and is wrapped by a Key Encryption Key shared exclusively within a cluster. A backup of the file system instance is created on a backup node. The backup includes at least some of the encrypted data objects. The DEK is sent to the backup node. The backup node cannot decrypt the backup unless the backup node is a member of the cluster and has access to the KEK to unwrap the DEK.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: January 18, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Gareth David Richards, Glenn S. Watkins, John Michael Czerkowicz
  • Patent number: 11113408
    Abstract: A method for use in managing a secure object store in a computing system includes: securing the secure object store including creating, maintaining, and using a hierarchical key system and accessing an encrypted data object using the Node Key Encryption Key and a selected one of the Data Encryption Keys. The securing includes: generating a Node Key Encryption Key; generating a plurality of Data Encryption Keys that are encrypted using the Node Key Encryption Key; and encrypting a plurality of data objects using the Data Encryption Keys, each data object being encrypted by a respective Data Encryption Key.
    Type: Grant
    Filed: August 20, 2018
    Date of Patent: September 7, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Gareth David Richards, Michael William Francis Healey, Jr.
  • Patent number: 11100235
    Abstract: Example implementations relate to encrypting data objects. In an example, data objects of a file system instance contained by a security domain are encrypted using a Data Encryption Key that is specific to the security domain and is wrapped by a Key Encryption Key shared exclusively within a cluster. A root object of the file system instance is encrypted using a Metadata Encryption Key. A backup of the file system instance is created on a backup node. The Data Encryption Key and the Metadata Encryption Key are sent to the backup node.
    Type: Grant
    Filed: April 29, 2019
    Date of Patent: August 24, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Gareth David Richards, Glenn S. Watkins, John Michael Czerkowicz
  • Publication number: 20200341860
    Abstract: Example implementations relate to encrypting data objects. In an example, data objects of a file system instance contained by a security domain are encrypted using a Data Encryption Key that is specific to the security domain and is wrapped by a Key Encryption Key shared exclusively within a cluster. A backup of the file system instance is created on a backup node. The backup includes at least some of the encrypted data objects. The DEK is sent to the backup node. The backup node cannot decrypt the backup unless the backup node is a member of the cluster and has access to the KEK to unwrap the DEK.
    Type: Application
    Filed: April 29, 2019
    Publication date: October 29, 2020
    Inventors: Gareth David Richards, Glenn S. Watkins, John Michael Czerkowicz
  • Publication number: 20200342117
    Abstract: Example implementations relate to encrypting data objects. In an example, data objects of a file system instance contained by a security domain are encrypted using a Data Encryption Key that is specific to the security domain and is wrapped by a Key Encryption Key shared exclusively within a cluster. A root object of the file system instance is encrypted using a Metadata Encryption Key. A backup of the file system instance is created on a backup node. The Data Encryption Key and the Metadata Encryption Key are sent to the backup node.
    Type: Application
    Filed: April 29, 2019
    Publication date: October 29, 2020
    Inventors: Gareth David Richards, Glenn S. Watkins, John Michael Czerkowicz
  • Publication number: 20200057859
    Abstract: A method for use in managing a secure object store in a computing system includes: securing the secure object store including creating, maintaining, and using a hierarchical key system and accessing an encrypted data object using the Node Key Encryption Key and a selected one of the Data Encryption Keys. The securing includes: generating a Node Key Encryption Key; generating a plurality of Data Encryption Keys that are encrypted using the Node Key Encryption Key; and encrypting a plurality of data objects using the Data Encryption Keys, each data object being encrypted by a respective Data Encryption Key.
    Type: Application
    Filed: August 20, 2018
    Publication date: February 20, 2020
    Inventors: Gareth David Richards, Michael William Francis Healey, JR.