Patents by Inventor ENDRIGO NADIN PINHEIRO
ENDRIGO NADIN PINHEIRO has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11948008Abstract: In an example, a system includes a firmware controller to initiate a SM execution mode of the system. The firmware controller scans memory for a process pool tag. The firmware controller compares the process pool tag to a set of operating system process pool tags and detects a coherency discrepancy between the process pool tag and the set of operating system process pool tags. The firmware controller exits the SM execution mode of the system.Type: GrantFiled: April 30, 2019Date of Patent: April 2, 2024Assignee: Hewlett-Packard Development Company, L.P.Inventors: Mason Gunyuzlu, Valiuddin Ali, Robert Craig, Tevin Richards, Richard Bramley, Endrigo Nadin Pinheiro
-
Publication number: 20230274412Abstract: An example electronic device includes a memory. An electronic list of baseline items and a description of an arrangement of the baseline items associated with a room are stored in the memory. The baseline items and the description of the arrangement of the baseline items are generated based on room usage information and a classification of an individual using the room. A camera is provided to capture a digital profile of the room. The digital profile includes a stock of items and an arrangement of the items monitored in the room. A processor is communicatively linked to the camera. The processor is to compare the digital profile to the electronic list and generate an alert when the digital profile is different than the electronic list.Type: ApplicationFiled: September 23, 2020Publication date: August 31, 2023Applicant: Hewlett-Packard Development Company, L.P.Inventors: ENDRIGO NADIN PINHEIRO, CHRISTOPHER C. MOHRMAN, NICK SUTTON
-
Publication number: 20230229774Abstract: Examples of computing devices are described herein. In some examples, a computing device may include a controller to generate a key upon boot of the computing device. In some examples, the computing device may include a kernel driver. In some examples, the kernel driver may be to receive the key from a basic input/output system (BIOS) during operating system (OS) boot. In some examples, the kernel driver may be to receive an action request for a BIOS action from an application. In some examples, the kernel driver may be to sign the action request with the key in response to determining that the application is authorized to request the BIOS action. In some examples, the computing device may include the BIOS to perform the BIOS action in response to receiving the signed action request.Type: ApplicationFiled: July 30, 2020Publication date: July 20, 2023Applicant: Hewlett-Packard Development Company, L.P.Inventors: ENDRIGO NADIN PINHEIRO, JOSHUA SERRATELLI SCHIFFMAN, RICHARD ALDEN BRAMLEY, Jr., VALIUDDIN ALI
-
Publication number: 20230206711Abstract: Example implementations relate to data extraction from identification badges. For example, a device that includes a processor and a memory resource storing instructions that when executed by the processor cause the processor to: identify a presence of a user within an area, identify that the user is wearing an identification badge, extract data from the identification badge, and add the extracted data to a database associated with attendance within the area.Type: ApplicationFiled: June 2, 2020Publication date: June 29, 2023Applicant: Hewlett-Packard Development Company, L.P.Inventors: Endrigo Nadin Pinheiro, Christopher Charles Mohrman, Nicholas Ian Sutton, Stephen Mark Hinton
-
Publication number: 20230196305Abstract: An example device includes a user interface positionable at a room, a network interface to communicate with a computer network, a processor connected to the user interface and the network interface. The processor outputs at the user interface a user-interface element associated with a physical condition of the room, receives a selection of the user-interface element from an occupant of the room, and, in response to the selection of the user-interface element, transmits to a server via the network interface a service request related to the physical condition of the room.Type: ApplicationFiled: December 20, 2021Publication date: June 22, 2023Inventors: Endrigo NADIN PINHEIRO, Nicholas SUTTON
-
Patent number: 11507668Abstract: Examples associated with cryptographic key security are described. One example system includes a secure storage accessible to a basic input/output system (BIOS). A BIOS security module stores an authorization value in a fixed location in the secure storage. The authorization value is stored by the BIOS during a boot of the system. A cryptographic key module reads the authorization value from the fixed location, overwrites the authorization value in the fixed location, and obtains a cryptographic key using the authorization value.Type: GrantFiled: September 19, 2017Date of Patent: November 22, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Vali Ali, Rick Bramley, Endrigo Nadin Pinheiro, Rodrigo Dias Correa, Ronaldo Rod Ferreira
-
Publication number: 20220197623Abstract: In an example, a non-transitory computer-readable medium has instructions stored therein that, in response to being executed on computer circuitry, cause the computer circuitry to execute instructions to operate an application installed in the memory circuitry and to generate an iterative communication to indicate that the application is operating. The instructions further cause, in response to being executed, the computer circuitry to detect the presence of the iterative communication, and to reinstall the application in response to an interruption in the iterative communication.Type: ApplicationFiled: September 12, 2019Publication date: June 23, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventors: Endrigo Nadin Pinheiro, Richard Bramley, Valiuddin Ali
-
Patent number: 11329976Abstract: Examples associated with presence identification are described. One example includes detecting a presence identifier broadcast by a mobile device. The mobile device belongs to a user. A portion of the presence identifier is generated based on a one-time password seed. The portion of the presence identifier is provided to an identification server. Identifying information associated with the user is received from the identification server. The identification server uses the portion to identify the user based on the one-time password seed. An action is performed based on the identifying information.Type: GrantFiled: November 21, 2016Date of Patent: May 10, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ronaldo Rod Ferreira, Endrigo Nadin Pinheiro, Fabio Riffel, Karyne Mayer, Jose Paulo Pires, Christopher C. Mohrman, Vali Ali
-
Publication number: 20220138356Abstract: In an example, an apparatus for access regulation of peripheral devices may include a processor and a communication interface to communicate to a peripheral device and to the processor. The processor may identify a pattern associated with receiving input data from a first peripheral device, wherein the pattern includes a keystroke rate, a delay in a keystroke pattern, a keystroke pressure, or a combination thereof. Similarly, the processor may, in response to detecting enumeration of a second peripheral device coupled to the apparatus, compare particular input data received from the second peripheral device with the pattern, and regulate access of the second peripheral device to the apparatus, based on the comparison.Type: ApplicationFiled: July 24, 2019Publication date: May 5, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventors: Endrigo Nadin Pinheiro, Mason Gunyuzlu, Robert Craig
-
Publication number: 20220114113Abstract: An example of an apparatus includes an application engine to execute an application. The apparatus includes a first communication interface to communicate with a first peripheral device. The apparatus includes a second communication interface to communicate with a second peripheral device. The apparatus includes an orchestration engine in communication with the application engine, the first communication interface, and the second communication interface. The orchestration engine is to receive an application command from the application and to broadcast the application command to the first peripheral device and the second peripheral device. The orchestration engine is to receive a device command from the first peripheral device or the second peripheral device, wherein the device command is to control the application.Type: ApplicationFiled: June 20, 2019Publication date: April 14, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventors: Endrigo Nadin Pinheiro, Christopher Charles Mohrman, Roger Benson, Stephen Mark Hinton, Syed Azam
-
Patent number: 11074056Abstract: An example computing device includes a processor, a first storage device, and a second storage device. The second storage device stores instructions to implement a firmware. The firmware is to install an agent application into the first storage device. The firmware is also to activate the agent application subsequent to installing the agent application. The firmware is further to, in response to receiving a manifest file, instruct the agent application to monitor the computing device based on the manifest file.Type: GrantFiled: June 29, 2017Date of Patent: July 27, 2021Assignee: Hewlett-Packard Development Company, L.P.Inventors: Valiuddin Ali, Rick Bramley, Endrigo Nadin Pinheiro, Rodrigo Dias Correa, Ronaldo Rod Ferreira
-
Patent number: 10977022Abstract: Examples associated with operating system retrieval are described. One example includes presenting a reference to an operating system image file. The image may be presented by a personal computer basic input/output system (BIOS). The personal computer may connect to a mobile device that has retrieved the operating system image file from a remote location based on the reference. The operating system image file is received from the mobile device, and initiated by the personal computer.Type: GrantFiled: March 21, 2017Date of Patent: April 13, 2021Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ronaldo Rod Ferreira, Endrigo Nadin Pinheiro, Fabio Riffel, Christopher C. Mohrman
-
Patent number: 10862693Abstract: Example implementations relate to meeting passcodes. In an example, meeting passcodes can employ a meeting hub including an antenna and a controller coupled to the antenna to wirelessly receive, via the antenna, information including a first meeting passcode from a meeting device, generate a second meeting passcode in response to receipt of the first meeting passcode, cause the second meeting passcode to be sent to a registered user of meeting device, and admit the meeting device to a meeting using the second meeting passcode.Type: GrantFiled: March 30, 2016Date of Patent: December 8, 2020Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ronaldo Rod Ferreira, Endrigo Nadin Pinheiro, Adilson Arthur Mohr, Jose Paulo Xavier Pires, Fabio D. Riffel, Christopher Charles Mohrman, Valiuddin Y. Ali
-
Publication number: 20200327235Abstract: An example computing device includes a processor, a first storage device, and a second storage device. The second storage device stores instructions to implement a firmware. The firmware is to install an agent application into the first storage device. The firmware is also to activate the agent application subsequent to installing the agent application. The firmware is further to, in response to receiving a manifest file, instruct the agent application to monitor the computing device based on the manifest file.Type: ApplicationFiled: June 29, 2017Publication date: October 15, 2020Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Valiuddin ALI, Rick BRAMLEY, Endrigo Nadin PINHEIRO, Rodrigo DIAS CORREA, Ronaldo Rod FERREIRA
-
Publication number: 20200326922Abstract: Examples associated with operating system retrieval are described. One example includes presenting a reference to an operating system image file. The image may be presented by a personal computer basic input/output system (BIOS). The personal computer may connect to a mobile device that has retrieved the operating system image file from a remote location based on the reference. The operating system image file is received from the mobile device, and initiated by the personal computer.Type: ApplicationFiled: March 21, 2017Publication date: October 15, 2020Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Ronaldo Rod FERREIRA, Endrigo Nadin PINHEIRO, Fabio RIFFEL, Christopher C. MOHRMAN
-
Patent number: 10721005Abstract: Example implementations relate to signal strength based printings. In an example, signal strength based printings can employ a personal computing device including a network adapter coupled to a computer network, an antenna to receive a wireless signal from a mobile electronic device, a processor to compare a signal strength indication (RSSI) value of the received wireless signal to a RSSI threshold value, and send, via the network adapter, a printable file to a printer based on the comparison of the RSSI value to the RSSI threshold value.Type: GrantFiled: April 22, 2016Date of Patent: July 21, 2020Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ronaldo Rob Ferreira, Endrigo Nadin Pinheiro, Adilson Arthur Mohr, Fabio Delazeri Riffel, Jose Paulo Xavier Pires, Christopher Charles Mohrman, Valiuddin Y Ali
-
Publication number: 20200210588Abstract: Examples associated with cryptographic key security are described. One example system includes a secure storage accessible to a basic input/output system (BIOS). A BIOS security module stores an authorization value in a fixed location in the secure storage. The authorization value is stored by the BIOS during a boot of the system. A cryptographic key module reads the authorization value from the fixed location, overwrites the authorization value in the fixed location, and obtains a cryptographic key using the authorization value.Type: ApplicationFiled: September 19, 2017Publication date: July 2, 2020Inventors: Vali Ali, Rick Bramley, Endrigo Nadin Pinheiro, Rodrigo Dias Correa, Ronaldo Rod Ferreira
-
Patent number: 10521168Abstract: In one example of the disclosure, an encrypted document and an encryption key for decrypting the encrypted document are received from a computer. Presence data for a printer is received via a first wireless network. A user instruction to print the encrypted document at the printer is received. A credential is received from the printer via the first wireless network, where the credential for communication with the printer via a second wireless network with greater bandwidth than the first wireless network. The encrypted document and the encryption key are sent to the printer, where the printer is to utilize the encryption key to decrypt the encrypted document and is to print the document following decryption.Type: GrantFiled: May 27, 2016Date of Patent: December 31, 2019Assignee: Hewlett-Packard Development Company, L.P.Inventors: Vali Ali, Christopher C Mohrman, Adilson A Mohr, Endrigo Nadin Pinheiro, Fabio Riffel, Ronaldo Rod Ferreira, Jose Paulo Pires
-
Publication number: 20190107982Abstract: In one example of the disclosure, an encrypted document and an encryption key for decrypting the encrypted document are received from a computer. Presence data for a printer is received via a first wireless network. A user instruction to print the encrypted document at the printer is received. A credential is received from the printer via the first wireless network, where the credential for communication with the printer via a second wireless network with greater bandwidth than the first wireless network. The encrypted document and the encryption key are sent to the printer, where the printer is to utilize the encryption key to decrypt the encrypted document and is to print the document following decryption.Type: ApplicationFiled: May 27, 2016Publication date: April 11, 2019Inventors: Vali Ali, Christopher C Mohrman, Adilson A Mohr, ENDRIGO NADIN PINHEIRO, Fabio Riffel, Ronaldo Rod Ferreira, Jose Paulo Pires
-
Publication number: 20190052627Abstract: Examples associated with presence identification are described. One example includes detecting a presence identifier broadcast by a mobile device. The mobile device belongs to a user. A portion of the presence identifier is generated based on a one-time password seed. The portion of the presence identifier is provided to an identification server. Identifying information associated with the user is received from the identification server. The identification server uses the portion to identify the user based on the one-time password seed. An action is performed based on the identifying information.Type: ApplicationFiled: November 21, 2016Publication date: February 14, 2019Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Ronaldo Rod FERREIRA, Endrigo Nadin PINHEIRO, Fabio RIFFEL, Karyne MAYER, Jose Paulo PIRES, Christopher C. MOHRMAN, Vali ALI