Patents by Inventor Adrian Baldwin

Adrian Baldwin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11950266
    Abstract: In one embodiment, a scheme is disclosed for supporting wireless access network service request capability in a user equipment (UE) device that is operable in wide area cellular network (WACN) bands as well as in wireless access network bands (e.g., GAN bands and/or UMA bands). The UE device includes capability for gaining Internet Protocol (IP) connectivity with a wireless access network node (e.g., a GAN controller (GANC) or UMA network controller (UNC)). Thereafter, the UE device is operable to initiate a registration request message towards the wireless access network node, wherein the registration request message includes at least one information element pertaining to wireless access network services required by the UE device.
    Type: Grant
    Filed: February 12, 2021
    Date of Patent: April 2, 2024
    Assignee: Malikie Innovations Limited
    Inventors: Adrian Buckley, George Baldwin Bumiller, Paul Marcus Carpenter
  • Patent number: 11586730
    Abstract: Examples associated with ransomware attack monitoring are described herein. One example includes a monitor module to monitor files stored on the system for sequences of file accesses that match a predefined pattern of file accesses. An investigation module is activated based on a sequence of file accesses that match the predefined pattern. The investigation module logs actions taken by processes to modify files. A reaction module pauses a set of processes operating on the system based on the logging performed by the investigation module, and resumes legitimate processes.
    Type: Grant
    Filed: December 3, 2021
    Date of Patent: February 21, 2023
    Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Daniel Ellam, Adrian Baldwin, Remy Husson
  • Patent number: 11568050
    Abstract: There is disclosed a method, computer program product and a system for regulating execution of a suspicious process, comprising determining a file system location of an executable file associated with the suspicious process, encrypting the file, and creating a wrapper for the file with the same file name and location as the file associated with the suspicious process.
    Type: Grant
    Filed: October 30, 2017
    Date of Patent: January 31, 2023
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Daniel Ellam, Jonathan Griffin, Adrian Baldwin
  • Patent number: 11475107
    Abstract: A device platform, in some examples, comprises a security processor that may create a private/public cryptographic key pair, and data representing evidence of creation of the key pair, provide access to the key pair and data from an operating system component of the device platform, where the public key part of the key pair may be used to verify management commands. The device platform may validate the key pair and data in a trusted execution state.
    Type: Grant
    Filed: March 12, 2018
    Date of Patent: October 18, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Adrian Baldwin, James Robert Waldron, Mike Provencher
  • Patent number: 11356268
    Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.
    Type: Grant
    Filed: June 2, 2017
    Date of Patent: June 7, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Helen Balinsky, Scott White, Robert Taylor, Adrian Baldwin, Jonathan Griffin
  • Patent number: 11347454
    Abstract: A controller for a fulfilment service operation is described in which the controller, before initiating fulfilment of the job, operates to determine if an authorised user is present at a fulfilment service device and to determine if the user intends to remain attendant at the fulfilment service device for the duration of fulfilment of the job. If the user moves away from the fulfilment service device, the controller operates to pause the job. If the user remains away from the fulfilment service device for a period of time, the controller operates to cancel the job.
    Type: Grant
    Filed: April 27, 2017
    Date of Patent: May 31, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Nassir Mohammad, Joshua Serratelli Schiffman, Adrian Baldwin
  • Patent number: 11328055
    Abstract: Examples associated with process verification are described. One example includes a process operating in a general operating environment of the system. From an isolated environment, a protection module modifies the behavior of the process by modifying data associated with the process while the process is in operation. The protection module verifies whether the behavior of the process has changed in accordance with the modification. The protection module takes a remedial action upon determining the process has been compromised.
    Type: Grant
    Filed: January 31, 2018
    Date of Patent: May 10, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Maugan Villatel, Adrian Baldwin, Gaetan Wattiau
  • Patent number: 11321494
    Abstract: In an example, there is provided a method for attesting to a management state of a device platform configuration, based on a signed data structure that represents a device management status and a time-based value from a secure cryptoprocessor of the device. The signed data structure is sent to a management system for validation based on a comparison to the state of the cryptoprocessor at the time of signing the data structure.
    Type: Grant
    Filed: March 12, 2018
    Date of Patent: May 3, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Adrian Baldwin, James Robert Waldron, David Plaquin
  • Publication number: 20220092181
    Abstract: Examples associated with ransomware attack monitoring are described herein. One example includes a monitor module to monitor files stored on the system for sequences of file accesses that match a predefined pattern of file accesses. An investigation module is activated based on a sequence of file accesses that match the predefined pattern. The investigation module logs actions taken by processes to modify files. A reaction module pauses a set of processes operating on the system based on the logging performed by the investigation module, and resumes legitimate processes.
    Type: Application
    Filed: December 3, 2021
    Publication date: March 24, 2022
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Daniel ELLAM, Adrian BALDWIN, Remy HUSSON
  • Patent number: 11216561
    Abstract: In an example, a machine-readable medium includes instructions that, when executed by a processor, cause the processor to order, as part of an execution of a trusted process, a plurality of processes into a sequence comprising a first process, at least one intermediate process, and a last process. The machine-readable medium may further comprise instruction to cause the processor to generate, as part of an execution of the first process, a value based on a code portion of the process following the first process in the sequence, and to generate, as part of an execution of each intermediate process, a respective value based on the value generated by the process preceding the intermediate process in the sequence and based on a code portion associated with the process following the intermediate process in the sequence.
    Type: Grant
    Filed: April 18, 2017
    Date of Patent: January 4, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Remy Husson, Adrian Baldwin, Daniel Ellam
  • Patent number: 11200314
    Abstract: Examples associated with ransomware attack monitoring are described. One example includes a monitor module to monitor files stored on the system for sequences of file accesses that match a predefined pattern of file accesses. An investigation module is activated when a number of sequences of file accesses that match the predefined pattern exceeds a first threshold. The investigation module logs actions taken by processes to modify files. A reaction module pauses a set of processes operating on the system when the number of sequences of file accesses that match the predefined pattern exceeds a second threshold. The reaction module then identifies processes associated with a suspected ransomware attack based on the logging performed by the investigation module, and resumes legitimate processes.
    Type: Grant
    Filed: December 15, 2016
    Date of Patent: December 14, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Daniel Ellam, Adrian Baldwin, Remy Husson
  • Publication number: 20210365529
    Abstract: A device platform, in some examples, comprises a security processor that may create a private/public cryptographic key pair, and data representing evidence of creation of the key pair, provide access to the key pair and data from an operating system component of the device platform, where the public key part of the key pair may be used to verify management commands. The device platform may validate the key pair and data in a trusted execution state.
    Type: Application
    Filed: March 12, 2018
    Publication date: November 25, 2021
    Inventors: ADRIAN BALDWIN, JAMES ROBERT WALDRON, MIKE PROVENCHER
  • Publication number: 20210209205
    Abstract: A method for regulating access to a system BIOS comprises generating an access token for a user providing selected BIOS access privileges according to a system policy for the user.
    Type: Application
    Filed: October 30, 2017
    Publication date: July 8, 2021
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Adrian Baldwin, Stuart Lees, David Plaquin
  • Publication number: 20210200484
    Abstract: A controller for a fulfilment service operation is described in which the controller, before initiating fulfilment of the job, operates to determine if an authorised user is present at a fulfilment service device and to determine if the user intends to remain attendant at the fulfilment service device for the duration of fulfilment of the job. If the user moves away from the fulfilment service device, the controller operates to pause the job. If the user remains away from the fulfilment service device for a period of time, the controller operates to cancel the job.
    Type: Application
    Filed: April 27, 2017
    Publication date: July 1, 2021
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Nassir MOHAMMAD, Joshua Serratelli SCHIFFMAN, Adrian BALDWIN
  • Publication number: 20210192051
    Abstract: A method, in an example, for secure key exchange in a platform, the method comprises checking a value of parameter via a platform hardware initialisation device to determine a status of an agent, generating at least one symmetric cryptographic key, encrypting the at least one symmetric cryptographic key using a public cryptographic key, generating a variable representing the encrypted at least one symmetric cryptographic key, and enabling access to the variable from the agent via the platform hardware initialisation device.
    Type: Application
    Filed: January 29, 2018
    Publication date: June 24, 2021
    Inventors: JAMES ROBERT WALDRON, ADRIAN BALDWIN, RICK BRAMLEY
  • Publication number: 20210182434
    Abstract: In an example, there is provided a method for attesting to a management state of a device platform configuration, based on a signed data structure that represents a device management status and a time-based value from a secure cryptoprocessor of the device. The signed data structure is sent to a management system for validation based on a comparison to the state of the cryptoprocessor at the time of signing the data structure.
    Type: Application
    Filed: March 12, 2018
    Publication date: June 17, 2021
    Inventors: ADRIAN BALDWIN, JAMES ROBERT WALDRON, DAVID PLAQUIN
  • Patent number: 10896085
    Abstract: In an example there is provided a method of applying a mitigation action to a computing system. The method comprises receiving notification of an intrusion event on a computing system. The notification identifies one or more of data, and a process affected by the intrusion event. The method comprises accessing state data corresponding to a state of the computing system prior to the intrusion event, accessing a policy specifying one or more mitigation actions to be applied to the one or more of data, and a process in response to an intrusion event, restoring the one or more of data, and the process on the basis of the state data, and applying a mitigation action according to the policy.
    Type: Grant
    Filed: May 8, 2018
    Date of Patent: January 19, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ronny Chevalier, David Plaquin, Guillaume Hiet, Adrian Baldwin
  • Patent number: 10867037
    Abstract: Examples disclosed herein relate to selecting a security mitigation action based on device usage. In one implementation, a processor selects a security mitigation action for a device based on information related to usage of the device and associated usage limitations associated with the selected security mitigation action. The processor may output information related to the selected security mitigation action.
    Type: Grant
    Filed: November 30, 2015
    Date of Patent: December 15, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jonathan Griffin, Adrian Baldwin
  • Publication number: 20200364331
    Abstract: Examples associated with process verification are described. One example includes a process operating in a general operating environment of the system. From an isolated environment, a protection module modifies the behavior of the process by modifying data associated with the process while the process is in operation. The protection module verifies whether the behavior of the process has changed in accordance with the modification. The protection module takes a remedial action upon determining the process has been compromised.
    Type: Application
    Filed: January 31, 2018
    Publication date: November 19, 2020
    Inventors: Maugan Villatel, Adrian Baldwin, Gaetan Wattiau
  • Publication number: 20200351287
    Abstract: A method for address resolution request control in a network device of a network, the method comprises comparing address resolution requests submitted to network nodes from the network device against a predetermined threshold profile for the network device, and regulating a flow of address resolution requests from the network device in response to the comparison.
    Type: Application
    Filed: January 26, 2018
    Publication date: November 5, 2020
    Inventors: Stuart Lees, Adrian Baldwin, Daniel Ellam, Jonathan Griffin