Patents by Inventor Diego Medaglia

Diego Medaglia has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11586775
    Abstract: In some examples, securing data on a computing device includes one or more cryptographic operations on at least a portion of data stored in a memory module of the computing device in response to a change of operational state of the system from a first operational state to a second operational state.
    Type: Grant
    Filed: September 10, 2020
    Date of Patent: February 21, 2023
    Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Christian Perone, Diego Medaglia, Wagston Staehler, Craig Walrath
  • Publication number: 20210367769
    Abstract: A computing device that includes a non-volatile memory device comprising an ephemeral memory region therein, the ephemeral memory region being encrypted and comprising an associated encryption key; and firmware to cause the encryption key to be stored prior to any power loss to the computing device.
    Type: Application
    Filed: August 17, 2018
    Publication date: November 25, 2021
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Diego Medaglia, Carlos Haas, Raphael Gay, Byron A. Alcorn, Shane Ward
  • Publication number: 20210141547
    Abstract: A system includes a server and a computer. The server stores a non-volatile dual in-line memory module (NVDIMM) configuration profile. The computer includes a plurality of NVDIMMs. The computer downloads the NVDIMM configuration profile from the server and applies the NVDIMM configuration profile to the plurality of NVDIMMs.
    Type: Application
    Filed: October 31, 2017
    Publication date: May 13, 2021
    Inventors: Diego Medaglia, Taciano Perez, Charles Staub, Anellena Satos, Kimon Berlin
  • Publication number: 20200410137
    Abstract: In some examples, securing data on a computing device includes one or more cryptographic operations on at least a portion of data stored in a memory module of the computing device in response to a change of operational state of the system from a first operational state to a second operational state.
    Type: Application
    Filed: September 10, 2020
    Publication date: December 31, 2020
    Inventors: Christian Perone, Diego Medaglia, Wagston Staehler, Craig Walrath
  • Patent number: 10860745
    Abstract: Examples of a system and method for securing data on a computing device are described herein. One or more cryptographic operations are executed on at least a portion of data stored in a memory module of the computing device in response to a change of operational state of the system from a first operational state to a second operational state.
    Type: Grant
    Filed: March 8, 2016
    Date of Patent: December 8, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Christian Perone, Diego Medaglia, Wagston Staehler, Craig Walrath
  • Patent number: 10860246
    Abstract: Examples associated with persistent memory updating are described. One example includes receiving a first store instruction associated with a first page of memory in a persistent memory from an application. The first page is copied to a new page of the persistent memory. A virtual address space of the application is updated to a location of the new page in a read-write mode. The first store instruction is executed on the new page. A file mapping in the persistent memory is updated from a location of the first page to the location of the new page, and the virtual address space for the location of the new page is updated to a read-only mode.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: December 8, 2020
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Taciano Perez, Diego Medaglia, Tadeu Marchese
  • Publication number: 20190310796
    Abstract: Examples associated with persistent memory updating are described. One example includes receiving a first store instruction associated with a first page of memory in a persistent memory from an application. The first page is copied to a new page of the persistent memory. A virtual address space of the application is updated to a location of the new page in a read-write mode. The first store instruction is executed on the new page. A file mapping in the persistent memory is updated from a location of the first page to the location of the new page, and the virtual address space for the location of the new page is updated to a read-only mode.
    Type: Application
    Filed: December 21, 2016
    Publication date: October 10, 2019
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Taciano PEREZ, Diego MEDAGLIA, Tadeu MARCHESE
  • Publication number: 20190251263
    Abstract: One example of a system includes a plurality of machine-readable storage devices, a machine-readable storage medium, and platform firmware. Each machine-readable storage device is to be unlocked for read and/or write access via a passphrase for each machine-readable storage device. The machine-readable storage medium stores an encrypted passphrase for each machine-readable storage device. The platform firmware is to receive a user token, derive a key from the user token, decrypt the encrypted passphrase stored in the machine-readable storage medium for each machine-readable storage device using the key, and unlock each machine-readable storage device using the decrypted passphrase for each machine-readable storage device.
    Type: Application
    Filed: July 29, 2016
    Publication date: August 15, 2019
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Taciano PEREZ, Diego MEDAGLIA, Thiago SILVA, Carlos HAAS, Kimon BERLIN
  • Publication number: 20180349646
    Abstract: Examples of a system and method for securing data on a computing device are described herein. One or more cryptographic operations are executed on at least a portion of data stored in a memory module of the computing device in response to a change of operational state of the system from a first operational state to a second operational state.
    Type: Application
    Filed: March 8, 2016
    Publication date: December 6, 2018
    Inventors: Christian Perone, Diego Medaglia, Wagston Staehler, Craig Walrath
  • Publication number: 20180285575
    Abstract: Examples include a system comprising a processing resource and a memory resource. Examples include a cryptography engine arranged in-line with the processing resource and the memory resource. The cryptography engine is to selectively decrypt data during read accesses of the memory resource by the processing resource.
    Type: Application
    Filed: January 21, 2016
    Publication date: October 4, 2018
    Inventors: Tadeu Marchese, Christian Perone, Diego Medaglia, Wagston Staehler