Patents by Inventor Adrian John Baldwin
Adrian John Baldwin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250013763Abstract: In an example, a hypervisor measuring the state of a protected virtual machine using a Trusted Platform Module (TPM) filter. Using the TPM filter, the system ensures an untrusted operating system attempting to access the TPM is secure, without having to trust the security of the operating system or the operating system's built in hypervisor.Type: ApplicationFiled: July 7, 2023Publication date: January 9, 2025Applicant: Hewlett-Packard Development Company, L.P.Inventors: Adrian Laurence Shaw, Remy Husson, Adrian John Baldwin, Joshua Serratelli Schiffman, Christopher Ian Dalton
-
Publication number: 20240305634Abstract: A cluster enrollment system remote to a device cluster performs a cluster enrollment process according to a cluster enrollment policy to determine whether a target device is authenticated to join the device cluster.Type: ApplicationFiled: March 8, 2023Publication date: September 12, 2024Applicant: Hewlett-Packard Development Company, L.P.Inventors: Gaetan Wattiau, Joshua Serratelli Schiffman, Adrian John Baldwin, Derek Lukasik
-
Publication number: 20240305456Abstract: A computing device may receive data associated with an event from an originating apparatus in the form of a data item. The computing device may then apply an evaluation function to the data item, wherein applying the evaluation function generates a processing result characterizing an aspect of the data item. The computing device may generate a tag based on the processing result. The computing device may associate the generated tag with the data, wherein the tag is transmitted with the data outside the network environment where the data item is not accessible for processing outside the network environment, but the data tag is accessible. The computing device may provide the data and the tag for transmission.Type: ApplicationFiled: March 6, 2023Publication date: September 12, 2024Applicant: Hewlett-Packard Development Company, L.P.Inventors: Daniel Cameron Ellam, Adrian John Baldwin, Nelson L Chang, Stuart Lees
-
Publication number: 20240281532Abstract: At least in some examples, a non-transitory machine-readable storage medium can be encoded with instructions for analysing an operating system configuration, the instructions executable by a processor of a system, whereby to cause the system to generate a set of malware samples, each malware sample defined by a set of actions forming an attack chain representing a sequence of procedures, execute each of the malware samples on an instance of the operating system configuration to generate a set of logs, and using the set of logs, determine a set of actions detected by an anti-malware process of the operating system configuration.Type: ApplicationFiled: June 9, 2021Publication date: August 22, 2024Applicants: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P., NANYANG TECHNOLOGICAL UNIVERSITYInventors: Adrian John BALDWIN, Jonathan GRIFFIN, Jakub PRUZINEC, Quynh Anh NGUYEN
-
Publication number: 20240267286Abstract: In an example, a method is described. The method comprises receiving identifying information associated with an occurrence of an activity within a computing network. The method further comprises receiving an indication of a sequence value generated by a sequence function that iterates the sequence value in response to a metric associated with activity of the computing network triggering iteration of the sequence value. The method further comprises producing a data element representative of the identifying information by using the indicated sequence value as an input to a transformation function for at least partially concealing the identifying information when producing the data element.Type: ApplicationFiled: June 14, 2021Publication date: August 8, 2024Applicant: Hewlett-Packard Development Company, L.P.Inventors: DANIEL ELLAM, ADRIAN JOHN BALDWIN, STUART LEES, NELSON CHANG
-
Publication number: 20240103970Abstract: In an example, a computing device includes a processor which in a reimaging operation of the computing device, may determine if a backup image to be used in the reimaging operation is available from a memory device connected to a local area network of the computing device. When the backup image is available from the memory device, the processor may acquire the backup image over the local area network. When the backup image is not available from the memory device, the processor may determine if a backup image is available from a wide area network of the computing device.Type: ApplicationFiled: September 23, 2022Publication date: March 28, 2024Inventors: Gaetan Wattiau, Adrian John Baldwin, Stuart Lees
-
Publication number: 20240097905Abstract: In an example, a computing device is described. The computing device comprises a processor. The processor is to generate a key using a value as an input to generate the key. The processor is further to, in response to generating the key, exclude the value from future use as the input. The processor is further to store an indication of a subsequent value to use as the input to generate a subsequent key. The indication is cryptographically associated with an entity to control third-party access to the indication.Type: ApplicationFiled: August 23, 2023Publication date: March 21, 2024Applicant: Hewlett-Packard Development Company, L.P.Inventors: Thalia May Laing, Maugan Villatel, Adrian John Baldwin, Pierre Louis Robert Belgarric, Adrian Laurence Shaw
-
Publication number: 20240097884Abstract: In an example, a computing device is described. The computing device comprises a memory to store a set of states and a corresponding set of non-overlapping time intervals. The computing device further comprises a timing unit to indicate a time at which a signature is to be produced. The computing device further comprises a processor to: identify which time interval of the set of non-overlapping time intervals includes the indicated time; generate a signing key based on a state associated with the identified time interval; and produce a signature, under a stateful signature scheme, with the signing key.Type: ApplicationFiled: August 22, 2023Publication date: March 21, 2024Applicant: Hewlett-Packard Development Company, L.P.Inventors: Thalia May Laing, Maugan Villatel, Pierre Louis Robert Belgarric, Adrian John Baldwin, Adrian Laurence Shaw
-
Publication number: 20240097914Abstract: In an example, a computing device is described. The computing device comprises an interface to receive a request from a signer for a state. The state is to be used as an input to generate a key under a stateful signature scheme. The computing device further comprises a processor. The processor is to identify an available state that the signer is authorized to use in response to the request received via the interface. The available state is identified from a set of states that can be used by the signer to maintain statefulness of the stateful signature scheme. The processor is further to instruct a reply to be sent to the signer via the interface. The reply comprises an indication of the state that the signer is authorized to use.Type: ApplicationFiled: August 21, 2023Publication date: March 21, 2024Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Thalia May Laing, Maugan Villatel, Pierre Louis Robert Belgarric, Adrian John Baldwin, Adrian Laurence Shaw, Remy Husson
-
Publication number: 20240097913Abstract: In an example, a computing device is described. The computing device comprises a communication interface and a processor. The processor is to determine whether a signature, produced by a signer, is derived from a free state under a stateful signature scheme. The free state is a state that has not been used as an input to generate a signing key. The signature is encrypted by the signer. The processor is further to, in response to determining that the signature is derived from a free state, decrypt the encrypted signature. The processor is further to transmit the decrypted signature to a recipient via the communication interface.Type: ApplicationFiled: August 21, 2023Publication date: March 21, 2024Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Thalia May Laing, Maugan Villatel, Adrian Shaw, Adrian John Baldwin, Pierre Belgarric
-
Patent number: 11914713Abstract: An example computing device includes a user interface, a network interface, a non-volatile memory, a processor coupled to the user interface, the network interface, and the non-volatile memory, and a set of instructions stored in the non-volatile memory. The set of instructions, when executed by the processor, is to perform a hardware initialization of the computing device according to a setting, establish a local trust domain and a remote trust domain, use a local-access public key to issue a challenge via the user interface to grant local access to the setting, and use a remote-access public key to grant remote access via the network interface to remote access to the setting.Type: GrantFiled: February 28, 2019Date of Patent: February 27, 2024Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Jeffrey Kevin Jeansonne, Valiuddin Ali, Richard Alden Bramley, Jr., Adrian John Baldwin, Joshua Serratelli Schiffman
-
Publication number: 20230409756Abstract: In an example, an apparatus is described. The apparatus comprises processing circuitry comprising a control module. The control module is to protect information regarding a machine learning model owned by a third party. The information is protected in a memory communicatively coupled to the control module. In response to receiving an indication that a computing device under control of the control module complies with a third party policy associated with the machine learning model, the control module is to release the information to the computing device.Type: ApplicationFiled: October 29, 2020Publication date: December 21, 2023Inventors: ADRIAN JOHN BALDWIN, PIERRE BELGARRIC, CHRISTOPHER IAN DALTON, DANIEL CAMERON ELLAM, DAVID PLAQUIN
-
Publication number: 20230396435Abstract: In an example, an apparatus is described. The apparatus comprises processing circuitry comprising a control module. The control module determines whether a computing device communicatively coupled to the control module is in a specified state for executing a machine learning model controlled by a third party entity. In response to determining that the computing device is in the specified state, the control module is to send, to an attestation module in a data processing pipeline associated with the computing device, an indication that the computing device is in the specified state.Type: ApplicationFiled: October 29, 2020Publication date: December 7, 2023Inventors: ADRIAN JOHN BALDWIN, CHRISTOPHER IAN DALTON, PIERRE BELGARRIC, DAVID PLAQUIN, DANIEL CAMERON ELLAM
-
Publication number: 20230261857Abstract: In an example, an apparatus is described. The apparatus comprises processing circuitry comprising a generating module, a signing module and an interfacing module. The generating module is to generate a statement comprising: a control plane indicator to indicate a control plane state of a computing device used to execute a machine learning model. The statement further comprises information regarding the machine learning model. The signing module is to generate a signature for the statement using an attestation key associated with the apparatus. The interfacing module is to send the statement and the signature to a requesting entity.Type: ApplicationFiled: October 29, 2020Publication date: August 17, 2023Inventors: ADRIAN JOHN BALDWIN, CHRISTOPHER IAN DALTON, PIERRE BELGARRIC, DANIEL CAMERON ELLAM, DAVID PLAQUIN
-
Publication number: 20230176767Abstract: In an example, an apparatus is described. The apparatus comprises a processor to interface with a computing system and a memory device comprising a set of logical cells. A logical cell of the set of logical cells indicates a data value by an amount of charge stored in a physical cell of the logical cell. Charge leakage between the physical cell and an adjacent physical cell of the logical cell is to occur at a rate that at least partially depends on a relative amount of charge stored in the physical cell and the adjacent physical cell. The apparatus further comprises a machine-readable medium storing instructions readable and executable by the processor to cause the processor to process a request issued via the computing system for the processor to cause a memory operation to be performed in the memory device.Type: ApplicationFiled: December 3, 2021Publication date: June 8, 2023Applicant: Hewlett-Packard Development Company, L.P.Inventors: Adrian John Baldwin, Pierre Belgarric, Christopher Ian Dalton, Thalia May Laing
-
Publication number: 20230176746Abstract: In an example, an apparatus is described. The apparatus comprises a memory device comprising a set of logical cells. A logical cell of the set of logical cells indicates a data value by an amount of charge stored in a physical cell of the logical cell. Charge leakage between the physical cell and an adjacent physical cell of the logical cell is to occur at a rate that at least partially depends on a relative amount of charge stored in the physical cell and the adjacent physical cell. A set of data values indicated by the set of logical cells is to change over time due to the charge leakage. The set of data values indicated by the set of logical cells is representative of information that is valid over an estimated period of time, which is based on the rate of charge leakage.Type: ApplicationFiled: December 3, 2021Publication date: June 8, 2023Applicant: Hewlett-Packard Development Company, L.P.Inventors: Adrian John Baldwin, Pierre Belgarric, Christopher Ian Dalton, Thalia May Laing
-
Publication number: 20230179432Abstract: Instructions may be provided to cause a computing device to receive authorisation data, the authorisation data indicating a policy; output a cryptographic challenge, the cryptographic challenge associated with the computing device and the policy; receive a response to the cryptographic challenge; receive an indication that a hardware change has occurred or a cover of the computing device has been opened; and in response to a determination, based on the received response, that the cryptographic challenge is passed, react to the indication according to the policy.Type: ApplicationFiled: October 4, 2022Publication date: June 8, 2023Inventors: Thalia May Laing, Adrian John Baldwin, Boris Balacheff, Joshua Serratelli Schiffman, Richard Alden Bramley, JR., Jeffrey Kevin Jeansonne
-
Patent number: 11657138Abstract: An example computing device includes a memory accessible at startup of the computing device, a buffer, and a set of instructions. The memory stores a configuration setting that is configurable by the application of a change request. The memory also stores a first public key and a second public key. The buffer stores change requests submitted by a remote entity, including a first change request to make a first setting change and a second change request to make a second setting change. The first change request is signed by a first private key corresponding to the first public key, and the second change request is signed by a second private key corresponding to the second public key. The set of instructions retrieves a change request from the buffer, determines whether the change request is authenticated by a public key, and if authenticated, applies the change request.Type: GrantFiled: February 28, 2019Date of Patent: May 23, 2023Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Richard Alden Bramley, Jr., Dallas M. Barlow, Patrick Lee Gibbons, Adrian John Baldwin, Tevin Jaupaul Richards, Robert Stephen Craig, Valiuddin Ali, Jeffrey Kevin Jeansonne
-
Publication number: 20230141210Abstract: The present disclosure relates to a neural network. The neural network may comprise a first portion, comprising a plurality of layers of the neural network, to perform a first cryptographic operation on input data. The neural network may further comprise a second portion, comprising a plurality of layers of the neural network, to perform processing on the data. The neural network may further comprise a third portion, comprising a plurality of layers of the neural network, to perform a second cryptographic operation on the processed data.Type: ApplicationFiled: April 10, 2020Publication date: May 11, 2023Applicant: Hewlett-Packard Development Company, L.P.Inventors: Pierre Belgarric, Christopher Ian Dalton, Adrian John Baldwin
-
Publication number: 20230061057Abstract: In an example, a method is described. The method comprises receiving a log comprising information about a computing system. The log is sent by a computing device associated with the computing system. The computing device comprises a first identity bound to a third identity of a certificate authority (CA) and a second identity bound to the first identity. The method further comprises receiving a signature for the log. The method further comprises verifying a certificate indicative of the second identity having been certified. The method further comprises verifying the received signature.Type: ApplicationFiled: May 12, 2022Publication date: March 2, 2023Inventors: Thalia May Laing, Joshua Serratelli Schiffman, Adrian John Baldwin, Boris Balacheff, Christopher Ian Dalton, Jeffrey Kevin Jeansonne