Patents by Inventor Boris Balacheff

Boris Balacheff has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230229143
    Abstract: An example method for use in additive manufacturing comprises operating, by a processor, on object model data, the object model data describing an object to be generated in an additive manufacturing process. The example method comprises determining, by a processor, based on the object model data, whether a portion of the object to be generated is identified as an object of interest. In response to a determination that a portion of the object to be generated is identified as an object of interest, then the method comprises determining, by a processor, whether a policy-based action is associated with the object of interest. In response to a determination that a policy-based action is associated with the object of interest, then the method comprises executing, by a processor, the policy-based action, and generating, by a processor, the object according to the policy-based action.
    Type: Application
    Filed: May 27, 2021
    Publication date: July 20, 2023
    Inventors: Helen BALINSKY, Boris BALACHEFF
  • Publication number: 20230179432
    Abstract: Instructions may be provided to cause a computing device to receive authorisation data, the authorisation data indicating a policy; output a cryptographic challenge, the cryptographic challenge associated with the computing device and the policy; receive a response to the cryptographic challenge; receive an indication that a hardware change has occurred or a cover of the computing device has been opened; and in response to a determination, based on the received response, that the cryptographic challenge is passed, react to the indication according to the policy.
    Type: Application
    Filed: October 4, 2022
    Publication date: June 8, 2023
    Inventors: Thalia May Laing, Adrian John Baldwin, Boris Balacheff, Joshua Serratelli Schiffman, Richard Alden Bramley, JR., Jeffrey Kevin Jeansonne
  • Publication number: 20230061057
    Abstract: In an example, a method is described. The method comprises receiving a log comprising information about a computing system. The log is sent by a computing device associated with the computing system. The computing device comprises a first identity bound to a third identity of a certificate authority (CA) and a second identity bound to the first identity. The method further comprises receiving a signature for the log. The method further comprises verifying a certificate indicative of the second identity having been certified. The method further comprises verifying the received signature.
    Type: Application
    Filed: May 12, 2022
    Publication date: March 2, 2023
    Inventors: Thalia May Laing, Joshua Serratelli Schiffman, Adrian John Baldwin, Boris Balacheff, Christopher Ian Dalton, Jeffrey Kevin Jeansonne
  • Patent number: 11520894
    Abstract: A controller that is separate from a processor of the system verifies controller code for execution on the controller. In response to verifying the controller code, the controller verifies system boot code.
    Type: Grant
    Filed: June 8, 2020
    Date of Patent: December 6, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeffrey Kevin Jeansonne, Valiuddin Y Ali, James M. Mann, Boris Balacheff
  • Publication number: 20220138304
    Abstract: In an example there is provided a method of authenticating a user. An authentication challenge is received in response to a request to authenticate a user. The challenge is distributed to each device from a subset of a set of registered devices. At each device a share of an authentication token is accessed and a partial response to the challenge is generated based on an authentication token and challenge. A response to the challenge is generated by combining the partial responses from the subset of devices, and is communicated to an authenticator. The user is authenticated when the subset of devices is an authorised subset. Every authorised subset of the set of registered devices comprises at least one device from the first group of devices.
    Type: Application
    Filed: June 23, 2020
    Publication date: May 5, 2022
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Gaetan Wattiau, Joshua Serratelli Schiffman, Thalia Laing, Boris Balacheff
  • Patent number: 11256589
    Abstract: Examples herein disclose monitoring an expected functionality upon execution of a system management mode (SMM) code. The examples detect whether a change has occurred to the SMM code based on the monitoring of the expected functionality. The change indicates that the SMM code is compromised.
    Type: Grant
    Filed: July 5, 2019
    Date of Patent: February 22, 2022
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeffrey Kevin Jeansonne, Boris Balacheff, Valiuddin Ali, Chris I. Dalton, David Plaquin
  • Publication number: 20210390216
    Abstract: According to aspect of the disclosure, there are provided methods and apparatus for connecting a peripheral device to a computer system, including an apparatus for interfacing with a peripheral device, the apparatus comprising a port configured to couple to the peripheral device, a processor, a memory coupled to the processor and comprising a software module comprising instructions that when executed on the processor protect the device from a peripheral device coupled to the port, and a hardware security controller coupled to the port, the hardware security controller configured to monitor execution of the software module by the processor and to disable the port in response to determining that the software module is not executing.
    Type: Application
    Filed: November 26, 2019
    Publication date: December 16, 2021
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Joshua Serratelli Schiffman, Boris Balacheff, Richard Alden Bramley, Jr., Valiuddin Ali
  • Patent number: 11144621
    Abstract: A system and method for authentication are described herein. An authentication request is received at a combiner proxy (350). The combiner proxy (350), is arranged to receive a user authentication request, receive one or more share values from one or more communications devices (330A, . . . , 330N) where each of the communications devices (330A, . . . 330N) stores at least one share value of a set of share values and determine if one or more share values that have been received from the communications devices (330A, . . . , 330N) meet a quantitative criteria. The combiner proxy (350) is arranged to authenticate the user if the received share values meet the quantitative criteria.
    Type: Grant
    Filed: December 13, 2019
    Date of Patent: October 12, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Joshua Serratelli Schiffman, Gurchetan Grewal, Boris Balacheff
  • Patent number: 11137948
    Abstract: User equipment, the user equipment to receive data representing identity information broadcast by a rendering apparatus over a passive non-contact short proximity data transport mechanism when the user equipment is proximate the rendering apparatus, and push the gathered identity information to a workstation, to enable the workstation to connect with the rendering apparatus.
    Type: Grant
    Filed: July 13, 2018
    Date of Patent: October 5, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Joshua Serratelli Schiffman, Luke T. Mather, Boris Balacheff
  • Patent number: 11057196
    Abstract: In an example, a method includes pairing a first electronic device and a data relay apparatus associated with a second electronic device to establish a secure wireless communication link therebetween. Each of the first electronic device and the data relay apparatus may be associated with an identifier and a verifier, each verifier being to verify the identifier of the other of the first electronic device or data relay apparatus. The pairing may include mutual verification of an identifier using the verifier, establishing shared key data and using the shared key data to establish a shared secret value for use in determining a derived key.
    Type: Grant
    Filed: September 8, 2016
    Date of Patent: July 6, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Joshua Serratelli Schiffman, Vali Ali, Boris Balacheff
  • Publication number: 20210185526
    Abstract: A method for location-based authentication of a device comprises receiving multiple device location fingerprints generated using respective ones of multiple device sensors, comparing the device location fingerprints with corresponding respective environment fingerprints generated using respective ones of multiple static sensors and generating a token for the device to authorise it to use one or more selected services.
    Type: Application
    Filed: September 17, 2018
    Publication date: June 17, 2021
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Gurchetan GREWAL, Joshua Serratelli SCHIFFMAN, Boris BALACHEFF
  • Patent number: 11032087
    Abstract: Examples associated with certificate analysis are disclosed. One example periodically analyzing a secure socket layer certificate chain between a client device and a server device. The client device may perform this periodic analysis. In response to detecting an unexpected certificate in the secure socket layer certificate chain, a responsive action is taken.
    Type: Grant
    Filed: September 30, 2015
    Date of Patent: June 8, 2021
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: James R Waldron, Vali Ali, Boris Balacheff
  • Publication number: 20200396212
    Abstract: Examples associated with distributed authentication are described. One example includes generating a paired public key and private key associated with a user. The private key is split into a set of shares, which are distributed to a set of devices associated with the user. A challenge is generated to authenticate the user to grant the user access to a resource upon receiving an authenticating response to the challenge. The challenge is distributed to members of the set of devices. Partial responses are received from members of the set of devices and combined into a group signature. The group signature serves as an authenticating response to the challenge when generated from partial responses received from a threshold number of members of the set of devices.
    Type: Application
    Filed: August 28, 2020
    Publication date: December 17, 2020
    Inventors: Joshua Serratelli Schiffman, Gurchetan Grewal, Thalia Laing, Boris Balacheff
  • Patent number: 10848305
    Abstract: An example non-transitory computer-readable medium includes instructions that, when executed by a processor, cause the processor to receive a request for data. The instructions also cause the processor to determine a region containing the data based on the metadata. The instructions cause the processor to traverse a tree in the metadata to determine key generation information relating a decryption key for the region to a root key.
    Type: Grant
    Filed: March 21, 2016
    Date of Patent: November 24, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Liqun Chen, Boris Balacheff, Fraser Dickin, Taciano Perez, Wagston Staehler, Craig Walrath, James M Mann
  • Patent number: 10803176
    Abstract: Examples associated with basic input/output system (BiOS) security are described. One example includes detecting a mismatch between an active BiOS setting and a saved BIOS setting. An update previously applied to the active BiOS setting is validated. The update Is applied to the saved BIOS setting creating an updated BIOS setting. The saved BIOS setting is updated when the updated BIOS setting and the active BIOS setting match. The saved BIOS setting is updated to the active BIOS setting. A security action is taken when the updated BiOS setting and the active BiOS setting differ.
    Type: Grant
    Filed: October 21, 2016
    Date of Patent: October 13, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Maugan Villatel, Boris Balacheff, David Plaquin, Vali Ali, Jeffrey Kevin Jeansonne
  • Publication number: 20200302057
    Abstract: A controller that is separate from a processor of the system verifies controller code for execution on the controller. In response to verifying the controller code, the controller verifies a system boot code.
    Type: Application
    Filed: June 8, 2020
    Publication date: September 24, 2020
    Inventors: Jeffrey Kevin Jeansonne, Valiuddin Y. Ali, James M. Mann, Boris Balacheff
  • Publication number: 20200293234
    Abstract: User equipment, the user equipment to receive data representing identity information broadcast by a rendering apparatus over a passive non-contact short proximity data transport mechanism when the user equipment is proximate the rendering apparatus, and push the gathered identity information to a workstation, to enable the workstation to connect with the rendering apparatus.
    Type: Application
    Filed: July 13, 2018
    Publication date: September 17, 2020
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Joshua Serratelli SCHIFFMAN, Luke T. MATHER, Boris BALACHEFF
  • Patent number: 10768941
    Abstract: A computing device includes a processor, a memory coupled to the processor, and a non-transitory computer readable storage medium coupled to the processor that includes instructions, that when executed by the processor, cause the processor to manage a transition between a first operating system and a second operating system. The instructions cause the processor to instantiate a copy-on-write virtual computing system executing a first operating system, delete a second operating system from the non-transitory computer readable storage medium or the memory, copy the first operating system to the non-transitory computer readable storage medium. The instructions can further cause the processor to instantiate the first operating system on the computing device.
    Type: Grant
    Filed: June 26, 2015
    Date of Patent: September 8, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Kate Mallichan, Boris Balacheff, Vali Ali, Shane Steiger, Logan Clay Browne
  • Patent number: 10771444
    Abstract: Examples associated with distributed authentication are described. One example includes generating a paired public key and private key associated with a user. The private key is split into a set of shares, which are distributed to a set of devices associated with the user. A challenge is generated to authenticate the user to grant the user access to a resource upon receiving an authenticating response to the challenge. The challenge is distributed to members of the set of devices. Partial responses are received from members of the set of devices and combined into a group signature. The group signature serves as an authenticating response to the challenge when generated from partial responses received from a threshold number of members of the set of devices.
    Type: Grant
    Filed: April 6, 2018
    Date of Patent: September 8, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Joshua Serratelli Schiffman, Gurchetan Grewal, Thalia Laing, Boris Balacheff
  • Patent number: 10733288
    Abstract: A controller that is separate from a processor of the system verifies controller code for execution on the controller. In response to verifying the controller code, the controller verifies a system boot code.
    Type: Grant
    Filed: April 23, 2013
    Date of Patent: August 4, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeffrey Kevin Jeansonne, Valiuddin Y Ali, James M Mann, Boris Balacheff