Patents by Inventor Nigel Edwards

Nigel Edwards has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190122831
    Abstract: The present invention relates to the field of heavy duty relays with electromagnetic, pneumatic or other mechanical means of actuation. In particular the invention relates to a relay or contactor which addresses the problem of contact welds formed during actuation of the relay. In one aspect the invention provides an electrical relay comprising a contact bridge portion carrying at least two spaced apart electrical contact surfaces, a terminal portion comprising at least two corresponding spaced apart electrical contact surfaces, and an actuating mechanism for selectively bringing the electrical contact surfaces of the bridge portion into electrical contact.
    Type: Application
    Filed: October 23, 2018
    Publication date: April 25, 2019
    Inventor: Nigel Edward Lawrence BEDGGOOD
  • Patent number: 10230531
    Abstract: A control device performs an admissions control process with a first device to determine whether the first device is authorized to communicate over the communication fabric that supports memory semantic operations.
    Type: Grant
    Filed: October 23, 2014
    Date of Patent: March 12, 2019
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Nigel Edwards, Michael R. Krause
  • Publication number: 20180365428
    Abstract: Examples include configuration of a memory controller for copy-on-write with a resource controller. Some examples include, in response to a determination to take a snapshot of memory accessible to a first component, a resource controller configuring a memory controller to treat location IDs, mapped to initial memory locations of the accessible memory, as copy-on-write for the first component and not for a second component independent of the resource controller after the configuring.
    Type: Application
    Filed: April 22, 2016
    Publication date: December 20, 2018
    Inventors: Nigel Edwards, Chris I. Dalton, Keith Matthew McAuliffe
  • Patent number: 10142109
    Abstract: Example embodiments relate to instantiating containers. For example, in an embodiment, integrity of a container image may be verified by executing a verification program using verification information associated with the container image. Provenance of the container image may be verified by checking a log associated with the container image. A container may be instantiated from the container image by loading a file system associated with the container image. The file system associated with the container image may be isolated from the verification information and the log.
    Type: Grant
    Filed: August 16, 2016
    Date of Patent: November 27, 2018
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventor: Nigel Edwards
  • Patent number: 10089474
    Abstract: Virtual machine introspection can include performing an offline analysis of a virtual machine hard disk image. Core operating system files associated with the operating system can be located during the offline analysis. Operating system structure symbols can be accessed from a symbol server based on the core operating system files. Introspection of the virtual machine can be performed using the accessed operating system structure symbols.
    Type: Grant
    Filed: October 29, 2013
    Date of Patent: October 2, 2018
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Tony Roberts, Mike Wray, Nigel Edwards
  • Patent number: 10089498
    Abstract: According to an example, memory integrity checking may include receiving computer program code, and using a loader to load the computer program code in memory. Memory integrity checking may further include verifying the integrity of the computer program code by selectively implementing synchronous verification and/or asynchronous verification. The synchronous verification may be based on loader security features associated with the loading of the computer program code. Further, the asynchronous verification may be based on a media controller associated with the memory containing the computer program code.
    Type: Grant
    Filed: October 31, 2013
    Date of Patent: October 2, 2018
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Nigel Edwards, Chris I. Dalton, Paolo Faraboschi
  • Publication number: 20180218153
    Abstract: Examples relate to snapshots of system memory. In an example implementation, structural information of a process in a snapshot of system memory is compared with hashes or fuzzy hashes of executable regions of the same process in a previous snapshot of system memory to determine whether there is a structural anomaly.
    Type: Application
    Filed: January 31, 2017
    Publication date: August 2, 2018
    Inventors: Nigel Edwards, Michael John Wray
  • Patent number: 10027481
    Abstract: An electronic device for management of cryptographic keys, and a corresponding method implemented in a computing device comprising a physical processor, transmit feature data of the device to a key generation module, wherein the feature data comprises information corresponding to an identifier or an attribute of the device, and receive, by the device from the key generation module, a digital signature of the transmitted feature data. The device installs the received digital signature as a cryptographic private key for communication, and performs a cryptographic operation using the installed digital signature as the cryptographic private key.
    Type: Grant
    Filed: June 30, 2015
    Date of Patent: July 17, 2018
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Liqun Chen, Fraser John Dickin, Martin Sadler, Chris I Dalton, Nigel Edwards, Simon Kai-Ying Shiu, Boris Balacheff
  • Publication number: 20180157605
    Abstract: Examples include configuration of a memory controller for copy-on-write. Some examples include, in response to a determination to take a snapshot of memory accessible to a first component, a management subsystem configuring a memory controller to treat location IDs, mapped to initial memory locations of the accessible memory, as copy-on-write for the first component and not for a second component.
    Type: Application
    Filed: November 25, 2015
    Publication date: June 7, 2018
    Inventors: Nigel Edwards, Chris I. Dalton, Keith Mathew McAuliffe
  • Publication number: 20180123785
    Abstract: The present disclosure relates to generating an identifier, an encrypted value that is an original value encrypted, and a Message Authentication Code (MAC) at a server device, and to generating a message including a message header and a message body, said message header including the identifier and the MAC, and said message body including the encrypted value, and said that the MAC key used to compute the message authentication code is included in the original value to be encrypted, and further relates to transmitting the message to a client device.
    Type: Application
    Filed: November 27, 2015
    Publication date: May 3, 2018
    Inventors: Liqun Chen, Nigel Edwards
  • Publication number: 20180052997
    Abstract: Example implementations relate to determination as to whether a process is infected with malware. For example, in an implementation, information of a process extracted from a snapshot of system memory is obtained. A determination as to whether the process is infected with malware is made based on a process model.
    Type: Application
    Filed: August 19, 2016
    Publication date: February 22, 2018
    Inventors: Michael John Wray, Nigel Edwards
  • Publication number: 20180054314
    Abstract: Example embodiments relate to instantiating containers. For example, in an embodiment, integrity of a container image may be verified by executing a verification program using verification information associated with the container image. Provenance of the container image may be verified by checking a log associated with the container image. A container may be instantiated from the container image by loading a file system associated with the container image. The file system associated with the container image may be isolated from the verification information and the log.
    Type: Application
    Filed: August 16, 2016
    Publication date: February 22, 2018
    Inventor: Nigel EDWARDS
  • Publication number: 20180032258
    Abstract: Example embodiments relate to storage systems for containers. An example storage system may include a set of servers associated with a global namespace for containers, a plurality of storage domains connected under the global namespace, and a processor to identify a storage tree for a container image of a container, where the storage tree is mapped to a storage domain storing the container image, and to clone the container to a second container, where the second container image is stored in a second storage domain.
    Type: Application
    Filed: July 29, 2016
    Publication date: February 1, 2018
    Inventors: Nigel EDWARDS, Chris I. DALTON, Venkataraman KAMALAKSHA, Kishore Kumar M
  • Publication number: 20170213054
    Abstract: In an example, transactions are secured between electronic circuits in a memory fabric. An electronic circuit may receive a transaction integrity key. The electronic circuit may compute a truncated message authentication code (MAC) using the received transaction integrity key and attach the truncated MAC to a security message header (SMH) of the transaction.
    Type: Application
    Filed: October 30, 2014
    Publication date: July 27, 2017
    Inventors: Liqun Chen, Chris I. Dalton, Fraser John Dickin, Nigel Edwards, Simon Kai-Ying Shiu
  • Publication number: 20170163427
    Abstract: A control device performs an admissions control process with a first device to determine whether the first device is authorized to communicate over the communication fabric that supports memory semantic operations.
    Type: Application
    Filed: October 23, 2014
    Publication date: June 8, 2017
    Applicant: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Nigel Edwards, Michael R. Krause
  • Patent number: 9629042
    Abstract: A method is provided in one example embodiment and may include populating a neighbor list including one or more neighbors for a cell radio using neighbor information gathered for the cell radio; receiving a detected set measurement report from a user equipment (UE), wherein the measurement report includes, at least in part, one or more primary scrambling codes (PSCs) for one or more other neighbors detected by the UE; and updating the neighbor list to include one or more of the other neighbors based, at least in part, on whether any of the one or more PSCs received in the measurement report are included in the previously gathered neighbor information.
    Type: Grant
    Filed: February 3, 2015
    Date of Patent: April 18, 2017
    Assignee: CISCO TECHNOLOGY, INC.
    Inventors: Nigel Edward Warburton, Sandro Grech, Lokendra Sharma
  • Patent number: 9596239
    Abstract: A system has a virtual overlay infrastructure mapped onto physical resources for processing, storage and network communications, the virtual infrastructure having virtual entities for processing, storage and network communications. Virtual infrastructures of different users share physical resources but are isolated. Each infrastructure has its own infrastructure controller to create and configure the infrastructure. It has a user accessible part (CFC) for configuration of that user's infrastructure, and a user inaccessible part (UFC) able to access the mapping and the physical resources. This increases user control to ease system administration, while maintaining security by limiting access to the mapping.
    Type: Grant
    Filed: October 28, 2005
    Date of Patent: March 14, 2017
    Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP
    Inventors: Nigel Edwards, Patrick Goldsack, Antonio Lain, Adrian John Baldwin
  • Publication number: 20160331829
    Abstract: This invention relates to Hendra and Nipah immunogenic compositions and methods of use. The invention also relates to methods of distinguishing subjects vaccinated with the immunogenic compositions of the invention from those infected with Hendra and/or Nipah virus.
    Type: Application
    Filed: December 15, 2014
    Publication date: November 17, 2016
    Inventors: Nigel EDWARDS, JinAn HUANG, Mark WAREING
  • Publication number: 20160232379
    Abstract: According to an example, memory integrity checking may include receiving computer program code, and using a loader to load the computer program code in memory. Memory integrity checking may further include verifying the integrity of the computer program code by selectively implementing synchronous verification and/or asynchronous verification. The synchronous verification may be based on loader security features associated with the loading of the computer program code. Further, the asynchronous verification may be based on a media controller associated with the memory containing the computer program code.
    Type: Application
    Filed: October 31, 2013
    Publication date: August 11, 2016
    Inventors: Nigel Edwards, Chris Dalton, Paolo Faraboschi
  • Patent number: D767154
    Type: Grant
    Filed: January 23, 2015
    Date of Patent: September 20, 2016
    Assignee: SPECWASHIP2007 Ltd.
    Inventor: Nigel Edward Bromilow