Patents by Inventor Jennifer Rios

Jennifer Rios has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9740587
    Abstract: Example embodiments disclosed herein relate to distributing information. A set of information about components of a computing device is retrieved from a low-level system of the computing device. Programs are determined to be sent data based on the set of information.
    Type: Grant
    Filed: January 28, 2011
    Date of Patent: August 22, 2017
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Christopher H Stewart, Nazih H Hage, Jon P Styskal, Jennifer Rios
  • Patent number: 8972743
    Abstract: A computer security system comprises a secure platform adapted to receive sensitive data from an agent. The secure platform is also adapted to cooperate with a trusted platform module (TPM) to encrypt the sensitive data via a TPM storage key associated with the agent.
    Type: Grant
    Filed: May 16, 2005
    Date of Patent: March 3, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Lan Wang, Jennifer Rios, Valiuddin Ali, Boris Balacheff
  • Publication number: 20130185583
    Abstract: Example embodiments disclosed herein relate to distributing information. A set of information about components of a computing device is retrieved from a low-level system of the computing device. Programs are determined to be sent data based on the set of information.
    Type: Application
    Filed: January 28, 2011
    Publication date: July 18, 2013
    Inventors: Christopher H. Stewart, Nazih H. Hage, Jon P. Styskal, Jennifer Rios
  • Publication number: 20110264925
    Abstract: Disclosed embodiments relate to a method for securing data on a self-encrypting storage device. The method may comprise, for example, receiving, by a self-encrypting storage device, information indicating a procedure for securing data stored on the self-encrypting storage device and selecting, by the self-encrypting storage device, a procedure for securing data stored on the self-encrypting storage device based on the received information. The procedure may comprise replacing data stored on the self-encrypting storage device or deleting a decryption key associated with data stored on the self-encrypting storage device. In one embodiment, the method further involves performing, by the self-encrypting storage device, the selected procedure.
    Type: Application
    Filed: April 23, 2010
    Publication date: October 27, 2011
    Inventors: Leonard E. Russo, Valiuddin Ali, Jennifer Rios, Lan Wang
  • Patent number: 7711942
    Abstract: A computer security system comprises a basic input/output system (BIOS) adapted to store a user key generated by a trusted platform module (TPM) for a user. The BIOS is also adapted to receive TPM authentication data from the user for initiating a boot process and interface with the TPM to request validation of the TPM authentication data by the TPM for initiating the boot process using the user key.
    Type: Grant
    Filed: September 23, 2004
    Date of Patent: May 4, 2010
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Lan Wang, Jennifer Rios, Valiuddin Ali
  • Patent number: 7568225
    Abstract: A system for remote security enablement comprises a trusted platform module (TPM) disposed on a user client and an administration client adapted to access, via a communication network, the user client to cause enablement of the TPM on a subsequent boot of the user client.
    Type: Grant
    Filed: September 8, 2004
    Date of Patent: July 28, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Lan Wang, Jennifer Rios, Valiuddin Ali
  • Publication number: 20070245142
    Abstract: A system comprises storage and a basic input/output system (BIOS) stored in the storage and adapted to be executed by a processor. The BIOS has an associated setting. The system receives an encrypted value that comprises an encrypted hash of a request to alter at least one of the BIOS and the setting. A first key is used to encrypt the value. The processor uses a second key corresponding to the first key to authenticate said request.
    Type: Application
    Filed: April 13, 2006
    Publication date: October 18, 2007
    Inventors: Jennifer Rios, Lan Wang, Valluddin Ali, Manuel Novoa
  • Publication number: 20070208928
    Abstract: A portable device comprise non-volatile storage. The non-volatile storage comprises a basic input/output system (BIOS) setting. The BIOS setting is applied from the portable device onto a system to which the portable device can be coupled.
    Type: Application
    Filed: March 3, 2006
    Publication date: September 6, 2007
    Inventors: Jennifer Rios, Valiuddin Ali, Lan Wang
  • Publication number: 20060259782
    Abstract: A computer security system comprises a secure platform adapted to receive sensitive data from an agent. The secure platform is also adapted to cooperate with a trusted platform module (TPM) to encrypt the sensitive data via a TPM storage key associated with the agent.
    Type: Application
    Filed: May 16, 2005
    Publication date: November 16, 2006
    Inventors: Lan Wang, Jennifer Rios, Valiuddin Ali, Boris Balacheff
  • Publication number: 20060064752
    Abstract: A computer security system comprises a basic input/output system (BIOS) adapted to store a user key generated by a trusted platform module (TPM) for a user. The BIOS is also adapted to receive TPM authentication data from the user for initiating a boot process and interface with the TPM to request validation of the TPM authentication data by the TPM for initiating the boot process using the user key.
    Type: Application
    Filed: September 23, 2004
    Publication date: March 23, 2006
    Inventors: Lan Wang, Jennifer Rios, Valiuddin Ali
  • Publication number: 20060053277
    Abstract: A system for remote security enablement comprises a trusted platform module (TPM) disposed on a user client and an administration client adapted to access, via a communication network, the user client to cause enablement of the TPM on a subsequent boot of the user client.
    Type: Application
    Filed: September 8, 2004
    Publication date: March 9, 2006
    Inventors: Lan Wang, Jennifer Rios, Valiuddin Ali