Patents by Inventor Liqun Chen

Liqun Chen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190075088
    Abstract: Examples disclosed herein relate to data objects associated with private set intersection (PSI). Some examples disclosed herein may enable identifying a set of server elements and a set of data objects. Each data object of the set of data objects may be associated with at least one server element of the set of server elements. Some examples further enable sending the set of server elements and the set of data objects to a client computing device that has a set of client elements. A private set intersection (PSI) between the set of server elements and the set of client elements may be inaccessible by the client computing device, and a subset of the set of data objects that are associated with the PSI may be accessible by the client computing device.
    Type: Application
    Filed: March 18, 2016
    Publication date: March 7, 2019
    Inventors: Liqun Chen, Stuart Haber, Tomas Sander
  • Publication number: 20190058588
    Abstract: An example non-transitory computer-readable medium includes instructions that, when executed by a processor, cause the processor to receive a request for data. The instructions also cause the processor to determine a region containing the data based on the metadata. The instructions cause the processor to traverse a tree in the metadata to determine key generation information relating a decryption key for the region to a root key.
    Type: Application
    Filed: March 21, 2016
    Publication date: February 21, 2019
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Liqun Chen, Boris Balacheff, Fraser Dickin, Taciano Perez, Wagston Staehler, Craig Walrath, James M Mann
  • Publication number: 20180254888
    Abstract: Example embodiments relate to combining hashes of data blocks. The examples disclosed herein calculate a hash value for each data block in a sequence of data blocks. The hash values are combined into a combined value, where the combined value has the same sequence as the sequence of data blocks. A master hash value is then calculated for the combined value.
    Type: Application
    Filed: December 4, 2015
    Publication date: September 6, 2018
    Inventors: Brian Quentin Monahan, Liqun Chen
  • Publication number: 20180241560
    Abstract: Example implementations relate to attestation. For example, in an implementation, a target device attestation request is transmitted to a target device, where the target device attestation request includes an identity-based encryption (IBE) ciphertext and a retrieval index. The ciphertext is a nonce encrypted using a trusted platform module (TPM) public key together with an IBE public key. The TPM public key is retrieved from a TPM of the target device, and the IBE public key is an expected value presumed to be stored at the TPM.
    Type: Application
    Filed: January 29, 2016
    Publication date: August 23, 2018
    Inventors: Liqun Chen, Carey Huscroft
  • Publication number: 20180241543
    Abstract: In one example in accordance with the present disclosure, a method may receiving a plaintext to be encrypted. The plaintext may include a first block, a second block and a third block. The method may include generating a preliminary ciphertext based on the first block and the second block and generating, using an encryption key, a first ciphertext using an encryption operation receiving the third block and the preliminary ciphertext as inputs. The method may also include generating, using the encryption key, a first finalized ciphertext using the encryption operation receiving the first block and the first ciphertext as inputs and generating, using the encryption key, a second finalized ciphertext using the encryption operation receiving the second block and the first finalized ciphertext as inputs.
    Type: Application
    Filed: March 24, 2016
    Publication date: August 23, 2018
    Inventor: Liqun Chen
  • Publication number: 20180219669
    Abstract: A blockchain includes blocks that each store a hash value computed using a hash function from data of the block. Another hash value is computed for each block using a different hash function, and added to the block within the blockchain. New blocks subsequently added to the blockchain have hash values computed using just the different hash function.
    Type: Application
    Filed: January 27, 2017
    Publication date: August 2, 2018
    Inventors: Liqun Chen, Stuart Haber
  • Patent number: 10027481
    Abstract: An electronic device for management of cryptographic keys, and a corresponding method implemented in a computing device comprising a physical processor, transmit feature data of the device to a key generation module, wherein the feature data comprises information corresponding to an identifier or an attribute of the device, and receive, by the device from the key generation module, a digital signature of the transmitted feature data. The device installs the received digital signature as a cryptographic private key for communication, and performs a cryptographic operation using the installed digital signature as the cryptographic private key.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: July 17, 2018
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Liqun Chen, Fraser John Dickin, Martin Sadler, Chris I Dalton, Nigel Edwards, Simon Kai-Ying Shiu, Boris Balacheff
  • Publication number: 20180165479
    Abstract: There is provided an example memory system comprising a plurality of memory modules, each memory module comprising a persistent memory to store root key information and encrypted primary data; a volatile memory to store a working key for encrypting data, the encrypted primary data stored in the persistent memory being encrypted using the working key; and a control unit to provide load and store access to the primary data. The memory system further comprises a working key recovery mechanism to retrieve first root key information from a first module and second root key information from a second module; and compute the working key for a given module based on the retrieved first root key information and the retrieved second root key information.
    Type: Application
    Filed: September 14, 2015
    Publication date: June 14, 2018
    Inventors: Liqun Chen, Chris I. Dalton, Fraser Dickin, Mark Lillibridge, Simon Kai Ying Shiu
  • Publication number: 20180152305
    Abstract: Examples set out herein provide a method comprising using first cryptographic key data specific to a computing device to verify a package of machine readable instructions to run on the computing device. The verified package may be executed to generate a random number using a true random number generator of the computing device, and to store the generated random number. Second cryptographic key data may be generated by a pseudorandom number generator of the computing device based on a seed comprising a combination of the random number as a first seed portion and a second seed portion. A portion of the second cryptographic key data may be sent to a certifying authority. The method may further comprising receiving a certification value based on the sent portion of the second cryptographic key data from the certifying authority and storing the certification value.
    Type: Application
    Filed: July 30, 2015
    Publication date: May 31, 2018
    Inventors: Ludovic Emmanuel Paul Noel Jacquin, Liqun Chen, Fraser Dickin, Chris Dalton
  • Publication number: 20180123785
    Abstract: The present disclosure relates to generating an identifier, an encrypted value that is an original value encrypted, and a Message Authentication Code (MAC) at a server device, and to generating a message including a message header and a message body, said message header including the identifier and the MAC, and said message body including the encrypted value, and said that the MAC key used to compute the message authentication code is included in the original value to be encrypted, and further relates to transmitting the message to a client device.
    Type: Application
    Filed: November 27, 2015
    Publication date: May 3, 2018
    Inventors: Liqun Chen, Nigel Edwards
  • Patent number: 9853816
    Abstract: A message to be signed and a base name point derived from a direct anonymous attestation (DAA) credential may be provided to a device. A signed version of the message and a public key value associated with the base name point may be received in response. Thereafter, the DAA credential may be determined to be valid based on the signed version of the message.
    Type: Grant
    Filed: January 14, 2016
    Date of Patent: December 26, 2017
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Liqun Chen, Graeme John Proudler
  • Patent number: 9798888
    Abstract: An example method for managing data in accordance with aspects of the present disclosure includes receiving from a user in the computer network environment a policy about how a piece of data should be treated, an encryption of the piece of data, a signature of a cryptographic hash of the policy and a cryptographic key, requesting from a trust authority the cryptographic key to access the piece of data, transmitting an encryption of at least one share to the trust authority, wherein the at least one share is created by and received from the trust authority, receiving from the trust authority the cryptographic key, wherein the cryptographic key is recreated by a combiner using a subset of the at least one share, shares associated with the trust authority and shares associated with the combiner, and decrypting the encryption of the piece of data using the recreated cryptographic key.
    Type: Grant
    Filed: July 30, 2013
    Date of Patent: October 24, 2017
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Michael Bernd Beiter, Siani Pearson, Marco Casassa Mont, Liqun Chen
  • Publication number: 20170302454
    Abstract: In an example, memory address encryption is facilitated for transactions between electronic circuits in a memory fabric. An electronic circuit may obtain a transaction integrity key and a transaction encryption key. The electronic circuit may encrypt an address using the transaction encryption key and a compute a truncated message authentication code (MAC) using the transaction integrity key.
    Type: Application
    Filed: October 30, 2014
    Publication date: October 19, 2017
    Applicant: Hewlett Packard Enterprise Development LP
    Inventors: Ludovic Emmanuel Paul Noel Jacquin, Liqun Chen, Chris I. Dalton
  • Publication number: 20170279603
    Abstract: In some examples, a non-transitory machine readable storage medium has machine readable instructions to cause a computer processor to segment a datastream into a plurality of equal length blocks each of which has a fixed length, separately encrypt each equal length block using a first encryption key, swap a subset of bits of a first encrypted equal length block with a subset of bits of a second encrypted equal length block such that both of the blocks each have a length equal to the fixed length, and separately encrypt each block using a second encryption key.
    Type: Application
    Filed: March 20, 2015
    Publication date: September 28, 2017
    Inventors: Liqun CHEN, Peter CAMBLE, Michael WENDLAND
  • Publication number: 20170262546
    Abstract: Implementations are directed, for example, to a method that includes receiving, at a data storage system from a client, a key search token that has not been used to encrypt data records or keywords associated with the data records. The key search token is independent of an encryption key used to encrypt the data records associated with the key search token. The method further includes determining an encrypted data record associated with the key search token, and transmitting the determined encrypted data record to the client. Implementations of the client are also provided.
    Type: Application
    Filed: July 30, 2014
    Publication date: September 14, 2017
    Inventors: Liqun Chen, Stuart Haber Haber, Kate Mallichan, Simon Kai-Ying Shiu
  • Publication number: 20170250801
    Abstract: Utilizing error correction (ECC) for secure secret sharing includes computing an encrypted key using a key and a number of random values, computing, based on a first ECC scheme, a key ECC for the encrypted key and the random values, and storing a number of key fragments on a number of storage servers, the number of key fragments includes the encrypted key, the random values, and the key ECC.
    Type: Application
    Filed: September 24, 2014
    Publication date: August 31, 2017
    Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Liqun CHEN, Peter Thomas CAMBLE, Mark Robert WATKINS, Ieuan James HENRY
  • Publication number: 20170222800
    Abstract: According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.
    Type: Application
    Filed: October 27, 2014
    Publication date: August 3, 2017
    Inventors: Stuart Haber, Liqun CHEN
  • Publication number: 20170213054
    Abstract: In an example, transactions are secured between electronic circuits in a memory fabric. An electronic circuit may receive a transaction integrity key. The electronic circuit may compute a truncated message authentication code (MAC) using the received transaction integrity key and attach the truncated MAC to a security message header (SMH) of the transaction.
    Type: Application
    Filed: October 30, 2014
    Publication date: July 27, 2017
    Inventors: Liqun Chen, Chris I. Dalton, Fraser John Dickin, Nigel Edwards, Simon Kai-Ying Shiu
  • Patent number: 9709896
    Abstract: Illumination system for a lithographic projection exposure step-and-scan apparatus comprising a light source, a pupil shaping unit, a field defining unit, a first lens array, a first slit array, a second lens array, a third lens array, a second slit array, a fourth lens array, a condenser lens, and a scanning drive unit sequentially arranged along the light beam propagation direction. The illumination system reduces requirements on lens processing, slit scanning speed, and slit scanning precision, therefore may be implemented more easily.
    Type: Grant
    Filed: December 30, 2015
    Date of Patent: July 18, 2017
    Assignee: Shanghai Institute of Optics And Fine Mechanics, Chinese Academy of Sciences
    Inventors: Aijun Zeng, Liqun Chen, Ruifang Fang, Huijie Huang
  • Patent number: 9703606
    Abstract: Detecting a workflow termination. An object with embedded access control is sent to a next participant in a workflow, wherein the embedded access control is provided and enforced by placing a subset of access keys for individual content-parts into a unique key-map entry for each participant, wherein the object is a Publicly Posted Composite Document. A workflow termination is detected after failure to receive a confirmation token from the next participant after a specified condition is not met.
    Type: Grant
    Filed: January 30, 2012
    Date of Patent: July 11, 2017
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Helen Y Balinsky, Liqun Chen, Steven J Simske