Patents by Inventor Nigel Edwards

Nigel Edwards has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10089474
    Abstract: Virtual machine introspection can include performing an offline analysis of a virtual machine hard disk image. Core operating system files associated with the operating system can be located during the offline analysis. Operating system structure symbols can be accessed from a symbol server based on the core operating system files. Introspection of the virtual machine can be performed using the accessed operating system structure symbols.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: October 2, 2018
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Tony Roberts, Mike Wray, Nigel Edwards
  • Publication number: 20180218153
    Abstract: Examples relate to snapshots of system memory. In an example implementation, structural information of a process in a snapshot of system memory is compared with hashes or fuzzy hashes of executable regions of the same process in a previous snapshot of system memory to determine whether there is a structural anomaly.
    Type: Application
    Filed: January 31, 2017
    Publication date: August 2, 2018
    Inventors: Nigel Edwards, Michael John Wray
  • Patent number: 10027481
    Abstract: An electronic device for management of cryptographic keys, and a corresponding method implemented in a computing device comprising a physical processor, transmit feature data of the device to a key generation module, wherein the feature data comprises information corresponding to an identifier or an attribute of the device, and receive, by the device from the key generation module, a digital signature of the transmitted feature data. The device installs the received digital signature as a cryptographic private key for communication, and performs a cryptographic operation using the installed digital signature as the cryptographic private key.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: July 17, 2018
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Liqun Chen, Fraser John Dickin, Martin Sadler, Chris I Dalton, Nigel Edwards, Simon Kai-Ying Shiu, Boris Balacheff
  • Publication number: 20180157605
    Abstract: Examples include configuration of a memory controller for copy-on-write. Some examples include, in response to a determination to take a snapshot of memory accessible to a first component, a management subsystem configuring a memory controller to treat location IDs, mapped to initial memory locations of the accessible memory, as copy-on-write for the first component and not for a second component.
    Type: Application
    Filed: November 25, 2015
    Publication date: June 7, 2018
    Inventors: Nigel Edwards, Chris I. Dalton, Keith Mathew McAuliffe
  • Publication number: 20180123785
    Abstract: The present disclosure relates to generating an identifier, an encrypted value that is an original value encrypted, and a Message Authentication Code (MAC) at a server device, and to generating a message including a message header and a message body, said message header including the identifier and the MAC, and said message body including the encrypted value, and said that the MAC key used to compute the message authentication code is included in the original value to be encrypted, and further relates to transmitting the message to a client device.
    Type: Application
    Filed: November 27, 2015
    Publication date: May 3, 2018
    Inventors: Liqun Chen, Nigel Edwards
  • Publication number: 20180052997
    Abstract: Example implementations relate to determination as to whether a process is infected with malware. For example, in an implementation, information of a process extracted from a snapshot of system memory is obtained. A determination as to whether the process is infected with malware is made based on a process model.
    Type: Application
    Filed: August 19, 2016
    Publication date: February 22, 2018
    Inventors: Michael John Wray, Nigel Edwards
  • Publication number: 20170213054
    Abstract: In an example, transactions are secured between electronic circuits in a memory fabric. An electronic circuit may receive a transaction integrity key. The electronic circuit may compute a truncated message authentication code (MAC) using the received transaction integrity key and attach the truncated MAC to a security message header (SMH) of the transaction.
    Type: Application
    Filed: October 30, 2014
    Publication date: July 27, 2017
    Inventors: Liqun Chen, Chris I. Dalton, Fraser John Dickin, Nigel Edwards, Simon Kai-Ying Shiu
  • Publication number: 20170163427
    Abstract: A control device performs an admissions control process with a first device to determine whether the first device is authorized to communicate over the communication fabric that supports memory semantic operations.
    Type: Application
    Filed: October 23, 2014
    Publication date: June 8, 2017
    Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Nigel Edwards, Michael R. Krause
  • Patent number: 9629042
    Abstract: A method is provided in one example embodiment and may include populating a neighbor list including one or more neighbors for a cell radio using neighbor information gathered for the cell radio; receiving a detected set measurement report from a user equipment (UE), wherein the measurement report includes, at least in part, one or more primary scrambling codes (PSCs) for one or more other neighbors detected by the UE; and updating the neighbor list to include one or more of the other neighbors based, at least in part, on whether any of the one or more PSCs received in the measurement report are included in the previously gathered neighbor information.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: April 18, 2017
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Nigel Edward Warburton, Sandro Grech, Lokendra Sharma
  • Patent number: 9596239
    Abstract: A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure having virtual entities for processing, storage and network communications. Virtual infrastructures of different users share physical resources but are isolated. Each infrastructure has its own infrastructure controller to create and configure the infrastructure. It has a user accessible part (CFC) for configuration of that user's infrastructure, and a user inaccessible part (UFC) able to access the mapping and the physical resources. This increases user control to ease system administration, while maintaining security by limiting access to the mapping.
    Type: Grant
    Filed: October 28, 2005
    Date of Patent: March 14, 2017
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Nigel Edwards, Patrick Goldsack, Antonio Lain, Adrian John Baldwin
  • Publication number: 20160232379
    Abstract: According to an example, memory integrity checking may include receiving computer program code, and using a loader to load the computer program code in memory. Memory integrity checking may further include verifying the integrity of the computer program code by selectively implementing synchronous verification and/or asynchronous verification. The synchronous verification may be based on loader security features associated with the loading of the computer program code. Further, the asynchronous verification may be based on a media controller associated with the memory containing the computer program code.
    Type: Application
    Filed: October 31, 2013
    Publication date: August 11, 2016
    Inventors: Nigel Edwards, Chris Dalton, Paolo Faraboschi
  • Publication number: 20160224794
    Abstract: Virtual machine introspection can include performing an offline analysis of a virtual machine hard disk image. Core operating system files associated with the operating system can be located during the offline analysis. Operating system structure symbols can be accessed from a symbol server based on the core operating system files. Introspection of the virtual machine can be performed using the accessed operating system structure symbols.
    Type: Application
    Filed: October 29, 2013
    Publication date: August 4, 2016
    Inventors: Tony Roberts, Mike Wray, Nigel Edwards
  • Publication number: 20160210216
    Abstract: In one implementation, a processor-readable medium stores code representing instructions that when executed at a processor cause the processor to access a source-code representation of an application, to access a machine-code representation of the application, and to generate a control flow model of the application based on the source-code representation of the application. The processor-readable medium also stores code representing instructions that when executed at the processor cause the processor to store a representation of the control flow model within a file including the machine-code representation of the application.
    Type: Application
    Filed: September 27, 2013
    Publication date: July 21, 2016
    Inventors: Brian Quentin Monahan, Nigel Edwards, Mike Wray
  • Publication number: 20160165494
    Abstract: A method is provided in one example embodiment and may include populating a neighbor list including one or more neighbors for a cell radio using neighbor information gathered for the cell radio; receiving a detected set measurement report from a user equipment (UE), wherein the measurement report includes, at least in part, one or more primary scrambling codes (PSCs) for one or more other neighbors detected by the UE; and updating the neighbor list to include one or more of the other neighbors based, at least in part, on whether any of the one or more PSCs received in the measurement report are included in the previously gathered neighbor information.
    Type: Application
    Filed: February 3, 2015
    Publication date: June 9, 2016
    Applicant: CISCO TECHNOLOGY, INC.
    Inventors: Nigel Edward Warburton, Sandro Grech, Lokendra Sharma
  • Patent number: 9341732
    Abstract: A towed system for underwater electromagnetic prospecting for use with a seaward vessel is provided. The towed system comprises a first portion, a second portion, and a tow cable. The first portion is located on the vessel and includes a controller and a power supply system. The second towed portion is for submersion in the water and transmits an electromagnetic waveform and receives a corresponding electromagnetic signal. The tow cable connects the first portion with the second portion. The tow cable includes at least a pair of suitable conductors for delivering to the second portion a power signal generated by the first portion and at least one optical fiber for carrying data communications between the first portion and the second portion. The transmitted and received signals are digitized and this information is sent digitally to the controller in the first portion.
    Type: Grant
    Filed: December 14, 2009
    Date of Patent: May 17, 2016
    Assignee: The Governing Council of the University of Toronto
    Inventors: Nigel Edwards, Eleanor Willoughby, Reza Mir, Carsten Scholl
  • Publication number: 20160127128
    Abstract: An electronic device for management of cryptographic keys, and a corresponding method implemented in a computing device comprising a physical processor, transmit feature data of the device to a key generation module, wherein the feature data comprises information corresponding to an identifier or an attribute of the device, and receive, by the device from the key generation module, a digital signature of the transmitted feature data. The device installs the received digital signature as a cryptographic private key for communication, and performs a cryptographic operation using the installed digital signature as the cryptographic private key.
    Type: Application
    Filed: June 30, 2015
    Publication date: May 5, 2016
    Inventors: Liqun Chen, Fraser John Dickin, Martin Sadler, Chris I. Dalton, Nigel Edwards, Simon Kai-Ying Shiu, Boris Balacheff
  • Patent number: 9294296
    Abstract: In a computer-implemented method for automated test execution in a shared virtualized resource pool, a test description containing at least one model for a service under test (SUT) is received and one or more infrastructure configurations to be tested by resources in the shared virtualized resource pool based upon the test description are identified. In addition, a service lifecycle management (SLiM) tool is interacted with to cause the SUT and a load source to be created, the SLiM tool is directed to instantiate the SUT and the load source on the one or more infrastructure configurations in the shared virtualized resource pool for the SUT, and the SLiM tool and the load source are interacted with to receive performance data related to performance of the SUT under one or more loads generated by the load source.
    Type: Grant
    Filed: January 30, 2009
    Date of Patent: March 22, 2016
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Johannes Kirschnick, Sebastian Gaisbauer, Jerome Rolia, Nigel Edwards
  • Patent number: 9165034
    Abstract: Management of heterogeneous data sources is described. In accordance with an embodiment method, a plurality of heterogeneous data sources is identified (410). The plurality of heterogeneous data sources can represent static data sources and management data streams received from servers for network management. The data sources can be encapsulated into data source containers (420). Each data source container can encapsulate a separate data source and can be mapped into an interdependent source graph (430). The interdependent source graph can include object links between the data source containers, the object links representing relationships existing between the data source containers. The interdependent source graph can be queried by traversing the interdependent source graph using data source container relationships to obtain management information about at least one of the data sources (440).
    Type: Grant
    Filed: October 15, 2009
    Date of Patent: October 20, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Nigel Edwards, Johannes Kirschnick
  • Patent number: 8904341
    Abstract: A business process (15) having a number of computer implemented steps using software application components, to enable automatic deployment on computing infrastructure, is modelled by a management system. It automatically derives a grounded model (55) of the business process from an unbound model (25) of the business process, based on an infrastructure design template (35). The unbound model specifies the application components to be used, and the grounded model adds a complete design of the computing infrastructure to be used. The use of an infrastructure design template can reduce the large number of options to be evaluated to help reduce the complexity of generating or changing the grounded model. The infrastructure design template formally relates the business process, application components and infrastructure design so that designs, or changes which are inconsistent or inefficient can be avoided. Thus more automation of the designing and changing the design is feasible.
    Type: Grant
    Filed: April 30, 2007
    Date of Patent: December 2, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Nigel Edwards, Jerome Rolia, Lawrence Wilcock, Guillaume Alexandre Belrose, Sven Graupner
  • Patent number: D767154
    Type: Grant
    Filed: January 23, 2015
    Date of Patent: September 20, 2016
    Assignee: SPECWASHIP2007 Ltd.
    Inventor: Nigel Edward Bromilow