Patents by Inventor Jonathan Griffin
Jonathan Griffin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20210200887Abstract: In one example in accordance with the present disclosure, a computing device is described. The computing device includes an encryption device to encrypt, using an encryption key, a document to be rendered. A generating device generates multiple shares of a decryption key using a secret-sharing scheme. A threshold number of the multiple shares allows decryption of the document. A transmit device transmits different shares of the multiple shares to different devices. The document is rendered when the threshold number of multiple shares are rejoined at a rendering device.Type: ApplicationFiled: April 21, 2017Publication date: July 1, 2021Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Nassir MOHAMMAD, Jonathan GRIFFIN, Gurchetan GREWAL, Luke T. MATHER, Joshua Serratelli SCHIFFMAN
-
Publication number: 20210165894Abstract: An apparatus is disclosed. The apparatus may comprise a storage medium to store: a first data structure to receive a first plurality of numerical identifiers, each numerical identifier of the first plurality of numerical identifiers corresponding to a respective signal received during a first defined time interval; and a second data structure to receive a second plurality of numerical identifiers, each numerical identifier of the second plurality of numerical identifiers corresponding to a respective signal received during a second defined time interval, wherein the first defined time interval is earlier in time than the second defined time interval. The apparatus may comprise a processor.Type: ApplicationFiled: June 15, 2018Publication date: June 3, 2021Applicant: Hewlett-Packard Development Company, L.P.Inventors: Thalia May Laing, Joshua Serratelli Schiffman, Gaƫtan Wattiau, Jonathan Griffin
-
Publication number: 20210105251Abstract: Examples disclosed herein relate to determining whether to allow access to an IP address based on a security level and domain name access information. In one implementation, a processor intercepts a response to a Domain Name System request related to a domain name and updates a security level based on the request and/or response. The processor may determine whether to forward or block the response based on the security level and a comparison of the domain name to stored information related to previous domain name access.Type: ApplicationFiled: September 23, 2016Publication date: April 8, 2021Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Adrian J. BALDWIN, Daniel C. ELLAM, Jonathan GRIFFIN
-
Publication number: 20210046125Abstract: Described herein are methods of producing decellularized tissue hydrogels. In some aspects, the decellularized tissue hydrogels can contain one or more extracellular matrix proteins. Also described herein are methods of making the decellularized tissue hydrogels. Also described herein are methods of using the decellularized tissue hydrogels. In some aspects, the decellularized tissue hydrogels or a pre-gel solution can be administered to a subject.Type: ApplicationFiled: February 21, 2019Publication date: February 18, 2021Inventors: Nikunj Agrawal, Jonathan Griffin, Christine E. Schmidt, Michaela W. McCrary, Deanna Bousalis, Young Hye Song
-
Patent number: 10905745Abstract: A compound having agonist activity at the GLP-1 (glucagon-like-peptide 1) and GLP-2 (glucagon-like peptide 2) receptors, and a pharmaceutical composition containing the compound or a pharmaceutically acceptable salt or solvate thereof in admixture with a pharmaceutically acceptable carrier, an excipient or a vehicle are provided. The compound can be used, inter alia, in the prophylaxis or treatment of intestinal damage and dysfunction, regulation of body weight, and prophylaxis or treatment of metabolic dysfunction.Type: GrantFiled: August 19, 2019Date of Patent: February 2, 2021Assignee: Zealand Pharma A/SInventors: Bjarne Due Larsen, Jonathan Griffin, Lise Giehm, Alistair Vincent Gordon Edwards
-
Patent number: 10878123Abstract: Examples associated with application approval are described. One example includes receiving an application package. The application package contains an application from a service provider and a privacy description for the application from a review provider. The application operates on private data controlled by a user. The application package is validated to ensure components of the application package is properly credentialed. An application summary for the user is generated from the privacy description. The application summary describes what portions of private data will be accessed by the application and how portions of the private data will be transmitted. An authorization is received from the user, and execution of the application is controlled based on the authorization of the user.Type: GrantFiled: April 10, 2016Date of Patent: December 29, 2020Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jonathan Griffin, Adrian J. Baldwin
-
Patent number: 10867037Abstract: Examples disclosed herein relate to selecting a security mitigation action based on device usage. In one implementation, a processor selects a security mitigation action for a device based on information related to usage of the device and associated usage limitations associated with the selected security mitigation action. The processor may output information related to the selected security mitigation action.Type: GrantFiled: November 30, 2015Date of Patent: December 15, 2020Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jonathan Griffin, Adrian Baldwin
-
Publication number: 20200351287Abstract: A method for address resolution request control in a network device of a network, the method comprises comparing address resolution requests submitted to network nodes from the network device against a predetermined threshold profile for the network device, and regulating a flow of address resolution requests from the network device in response to the comparison.Type: ApplicationFiled: January 26, 2018Publication date: November 5, 2020Inventors: Stuart Lees, Adrian Baldwin, Daniel Ellam, Jonathan Griffin
-
Publication number: 20200311269Abstract: There is disclosed a method, computer program product and a system for regulating execution of a suspicious process, comprising determining a file system location of an executable file associated with the suspicious process, encrypting the file, and creating a wrapper for the file with the same file name and location as the file associated with the suspicious process.Type: ApplicationFiled: October 30, 2017Publication date: October 1, 2020Applicant: Hewlett-Packard Development Company, L.P.Inventors: Daniel Ellam, Jonathan Griffin, Adrian Baldwin
-
Publication number: 20200297818Abstract: A compound having agonist activity at the GLP-1 (glucagon-like-peptide 1) and GLP-2 (glucagon-like peptide 2) receptors, and a pharmaceutical composition containing the compound or a pharmaceutically acceptable salt or solvate thereof in admixture with a pharmaceutically acceptable carrier, an excipient or a vehicle are provided. The compound can be used, inter alia, in the prophylaxis or treatment of intestinal damage and dysfunction, regulation of body weight, and prophylaxis or treatment of metabolic dysfunction.Type: ApplicationFiled: April 6, 2020Publication date: September 24, 2020Inventors: Bjarne DUE LARSEN, Jonathan GRIFFIN, Lise GIEHM, Alistair Vincent Gordon EDWARDS
-
Publication number: 20200186354Abstract: Examples associated with digital composition hashing are described. One example method includes receiving a digital composition file from a user. The digital composition file may include a top-level design and a hierarchy of sub-level designs. A hashed structure may be generated from the digital composition file, where a node in the hashed structure for the first sub-level design is generated based on hashes of sub-level designs below the first sub-level design in the hierarchy. The hashed structure and a hash of the digital composition file are stored in association with the user.Type: ApplicationFiled: June 2, 2017Publication date: June 11, 2020Applicant: Hewlett-Packard Development Company, L.P.Inventors: Helen Balinsky, Scott White, Robert Taylor, Adrian Baldwin, Jonathan Griffin
-
Patent number: 10664593Abstract: An apparatus includes a first processing resource to execute a program code, and a second processing resource separate from the first processing resource. The program code includes an embedded execution unit. The execution unit, during execution of the program code, calculates a first security value for a part of the program code. The second processing resource runs a validation program. The validation program receives the first security value, checks the first security value against a second security value calculated from a corresponding part of a reference copy of the program code to obtain a check result, returns the check result to the execution unit. The execution unit performs a security-related action in response to a check result indicating a mismatch between the first security value and the second security value.Type: GrantFiled: October 29, 2015Date of Patent: May 26, 2020Assignee: Hewlett-Packard Development Company, L.P.Inventors: Adrian Baldwin, Jonathan Griffin
-
Publication number: 20190365865Abstract: A compound having agonist activity at the GLP-1 (glucagon-like-peptide 1) and GLP-2 (glucagon-like peptide 2) receptors, and a pharmaceutical composition containing the compound or a pharmaceutically acceptable salt or solvate thereof in admixture with a pharmaceutically acceptable carrier, an excipient or a vehicle are provided. The compound can be used, inter alia, in the prophylaxis or treatment of intestinal damage and dysfunction, regulation of body weight, and prophylaxis or treatment of metabolic dysfunction.Type: ApplicationFiled: August 19, 2019Publication date: December 5, 2019Inventors: Bjarne DUE LARSEN, Jonathan GRIFFIN, Lise GIEHM, Alistair Vincent Gordon EDWARDS
-
Patent number: 10389747Abstract: Example implementations relate to facilitating scanning of protecting computing resources. In example implementations, a computing device receives a scan indicator that indicates an external agent is prepared to scan a protected resource of the computing device; identifies a protected action that may be performed by the data processor, the protected action facilitating scanning the protected resource of the computing device by the external agent, the protected action comprising a change in a state of the protected resource; performs the protected action; and provides the external agent with data indicating a current state of the protected resource.Type: GrantFiled: February 27, 2015Date of Patent: August 20, 2019Assignee: Hewlett-Packard Development Company, L.P.Inventors: Richard Brown, Jonathan Griffin, Andy Norman
-
Publication number: 20190142904Abstract: A compound having agonist activity at the GLP-1 (glucagon-like-peptide 1) and GLP-2 (glucagon-like peptide 2) receptors, and a pharmaceutical composition containing the compound or a pharmaceutically acceptable salt or solvate thereof in admixture with a pharmaceutically acceptable carrier, an excipient or a vehicle are provided. The compound can be used, inter alia, in the prophylaxis or treatment of intestinal damage and dysfunction, regulation of body weight, and prophylaxis or treatment of metabolic dysfunction.Type: ApplicationFiled: November 19, 2018Publication date: May 16, 2019Inventors: Bjarne DUE LARSEN, Jonathan GRIFFIN, Lise GIEHM, Alistair Vincent Gordon EDWARDS
-
Publication number: 20190034659Abstract: Examples associated with application approval are described. One example includes receiving an application package. The application package contains an application from a service provider and a privacy description for the application from a review provider. The application operates on private data controlled by a user. The application package is validated to ensure components of the application package is properly credentialed. An application summary for the user is generated from the privacy description. The application summary describes what portions of private data will be accessed by the application and how portions of the private data will be transmitted. An authorization is received from the user, and execution of the application is controlled based on the authorization of the user.Type: ApplicationFiled: April 10, 2016Publication date: January 31, 2019Applicant: Hewlett-Packard Development Company, L.P.Inventors: Jonathan Griffin, Adrian J. Baldwin
-
Publication number: 20180276374Abstract: An apparatus includes a first processing resource to execute a program code, and a second processing resource separate from the first processing resource. The program code includes an embedded execution unit. The execution unit, during execution of the program code, calculates a first security value for a part of the program code. The second processing resource runs a validation program. The validation program receives the first security value, checks the first security value against a second security value calculated from a corresponding part of a reference copy of the program code to obtain a check result, returns the check result to the execution unit. The execution unit performs a security-related action in response to a check result indicating a mismatch between the first security value and the second security value.Type: ApplicationFiled: October 29, 2015Publication date: September 27, 2018Inventors: Adrian Baldwin, Jonathan Griffin
-
Publication number: 20180276377Abstract: Examples disclosed herein relate to selecting a security mitigation action based on device usage. In one implementation, a processor selects a security mitigation action for a device based on information related to usage of the device and associated usage limitations associated with the selected security mitigation action. The processor may output information related to the selected security mitigation action.Type: ApplicationFiled: November 30, 2015Publication date: September 27, 2018Inventors: Jonathan Griffin, Adrian Baldwin
-
Publication number: 20170353485Abstract: Example implementations relate to facilitating scanning of protecting computing resources. In example implementations, a computing device receives a scan indicator that indicates an external agent is prepared to scan a protected resource of the computing device; identifies a protected action that may be performed by the date processor, the protected action facilitating scanning the protected resource of the computing device by the external agent, the protected action comprising a change in a state of the protected resource; performs the protected action; and provides the external agent with data indicating a current state of the protected resource.Type: ApplicationFiled: February 27, 2015Publication date: December 7, 2017Inventors: RICHARD BROWN, JONATHAN GRIFFIN, ANDY NORMAN
-
Publication number: 20170046629Abstract: According to an example, statistics-based data trace classification may include generating sets of training data traces from training data information by assigning a subset of the training data information that has a predetermined property with a first label and assigning another subset of the training data information that does not have the predetermined property with a second label. A trained trace classifier may be generated to detect whether or not a set of input data traces satisfies the predetermined property. The trace classifier may be trained to learn the predetermined property from a statistical data object determined from the sets of the training data traces, and the first and second labels related to the sets of the training data traces.Type: ApplicationFiled: April 25, 2014Publication date: February 16, 2017Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Philipp REINECKE, Brian Quentin MONAHAN, Jonathan GRIFFIN