Patents by Inventor Richard Bramley
Richard Bramley has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11928385Abstract: In an example implementation according to aspects of the present disclosure, a method of a computing device may include determining whether a first mode or a second mode is selected. If the first mode is selected, the computing device connects a microphone to a sound processing logic. If the second mode is selected, the computing device disconnects the microphone from the sound processing logic and connecting an audio source to the sound processing logic.Type: GrantFiled: July 30, 2019Date of Patent: March 12, 2024Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventor: Richard Bramley
-
Patent number: 11868276Abstract: An example non-transitory computer readable storage medium comprising instructions that when executed cause a processor of a computing device to: in response to a trigger of a system management mode (SMM), verify all processor threads have been pulled into the SMM; in response to a successful verification, enable write access to a non-volatile memory of the computing device via two registers, where the writing access is disabled upon booting of the computing device; and upon exiting the SMM, disable the write access via the two registers.Type: GrantFiled: June 2, 2022Date of Patent: January 9, 2024Assignee: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.Inventors: Richard A Bramley, Baraneedharan Anbazhagan, Valiuddin Ali
-
Publication number: 20230410246Abstract: A data processing system that comprises plural processing units is disclosed. The system includes functional units, the functional units having different processing capacities. A set of one or more processing units can operate in combination with one of the functional units according to a processing capacity required for the set of one or more processing units.Type: ApplicationFiled: November 4, 2021Publication date: December 21, 2023Inventors: Jussi Tuomas PENNALA, Henrik Nils-Sture OLSSON, Richard BRAMLEY, Nicholas John Nelson MURPHY
-
Publication number: 20230393993Abstract: An example non-transitory computer readable storage medium comprising instructions that when executed cause a processor of a computing device to: in response to a trigger of a system management mode (SMM), verify all processor threads have been pulled into the SMM; in response to a successful verification, enable write access to a non-volatile memory of the computing device via two registers, where the writing access is disabled upon booting of the computing device; and upon exiting the SMM, disable the write access via the two registers.Type: ApplicationFiled: June 2, 2022Publication date: December 7, 2023Inventors: RICHARD A BRAMLEY, BARANEEDHARAN ANBAZHAGAN, VALIUDDIN ALI
-
Publication number: 20230185578Abstract: In an example implementation according to aspects of the present disclosure, a method may include receiving by a controller a BIOS image, extracting a current manufacturing programming mode state corresponding to a computer system. A BIOS personality of the BIOS image is evaluated, wherein the BIOS personality is based on a differentiation of hardware and software functionality. Based on the current manufacturing programming state and the BIOS personality, a compatibility with the computer system is determined. Based on the compatibility, the BIOS image is written to non-volatile memory.Type: ApplicationFiled: December 13, 2021Publication date: June 15, 2023Inventors: Christopher H Stewart, VALIUDDIN ALI, Lan Wang, RICHARD BRAMLEY
-
Publication number: 20230177161Abstract: An example non-transitory computer readable storage medium comprising instructions that when executed cause a processor of an electronic device to: receive a password during a runtime of an operating system of the electronic device; generate a cryptographic key using the password; sign a Basic Input/Output System (BIOS) change request using the cryptographic key; and transmit the signed BIOS change request.Type: ApplicationFiled: December 8, 2021Publication date: June 8, 2023Inventors: Valiuddin Ali, Richard Bramley, Joshua Serratalli Schiffman
-
Publication number: 20230152805Abstract: In various examples, motifs, watermarks, and/or signature inputs are applied to a deep neural network (DNN) to detect faults in underlying hardware and/or software executing the DNN. Information corresponding to the motifs, watermarks, and/or signatures may be compared to the outputs of the DNN generated using the motifs, watermarks and/or signatures. When a the accuracy of the predictions are below a threshold, or do not correspond to the expected predictions of the DNN, the hardware and/or software may be determined to have a fault—such as a transient, an intermittent, or a permanent fault. Where a fault is determined, portions of the system that rely on the computations of the DNN may be shut down, or redundant systems may be used in place of the primary system. Where no fault is determined, the computations of the DNN may be relied upon by the system.Type: ApplicationFiled: January 20, 2023Publication date: May 18, 2023Inventors: Richard Bramley, Philip Payman Shirvani, Nirmal Saxena
-
Patent number: 11592828Abstract: In various examples, motifs, watermarks, and/or signature inputs are applied to a deep neural network (DNN) to detect faults in underlying hardware and/or software executing the DNN. Information corresponding to the motifs, watermarks, and/or signatures may be compared to the outputs of the DNN generated using the motifs, watermarks and/or signatures. When a the accuracy of the predictions are below a threshold, or do not correspond to the expected predictions of the DNN, the hardware and/or software may be determined to have a fault—such as a transient, an intermittent, or a permanent fault. Where a fault is determined, portions of the system that rely on the computations of the DNN may be shut down, or redundant systems may be used in place of the primary system. Where no fault is determined, the computations of the DNN may be relied upon by the system.Type: GrantFiled: January 16, 2020Date of Patent: February 28, 2023Assignee: NVIDIA CorporationInventors: Richard Bramley, Philip Payman Shirvani, Nirmal Saxena
-
Patent number: 11537757Abstract: A computer system includes an independent compute core; and an isolated secure data storage device to store data accessible only to the independent compute core. The independent compute core is to open an Application Program Interface (API) during runtime of the computer system in response to receiving a verified message containing secure data to be written to the secure data storage device.Type: GrantFiled: February 19, 2016Date of Patent: December 27, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Dallas M Barlow, Stanley Hyojun Park, Christopher H Stewart, Baraneedharan Anbazhagan, Scott B Marcak, Richard A Bramley, Jr.
-
Patent number: 11520662Abstract: In some examples, a device includes a processor, a core hardware logic to execute instructions to perform a task in the device, and a controller separate from the processor. The controller detects corruption of the instructions, and in response to detecting the corruption, load a recovery code to the core hardware logic to trigger recovery of the core hardware logic from the corruption of the instructions.Type: GrantFiled: February 11, 2019Date of Patent: December 6, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jeffrey Kevin Jeansonne, Valiuddin Ali, Richard Bramley
-
Patent number: 11409878Abstract: An example computer system includes a memory having a computer program, a set of data containing a cryptographic first hash protected by a code, and a set of trusted security guidelines for operating an electronic device; a trusted platform module device to store a second hash associated with the computer program; a trusted application computing agent to establish that a hardware initialization sequence of the electronic device is trusted upon matching the first hash with the second hash; and a controller to operate the computer program on the electronic device according to the set of trusted security guidelines.Type: GrantFiled: May 31, 2018Date of Patent: August 9, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Vali Ali, Richard Bramley, Ronaldo Rod Ferreira, Endrigo Pinheiro
-
Publication number: 20220197623Abstract: In an example, a non-transitory computer-readable medium has instructions stored therein that, in response to being executed on computer circuitry, cause the computer circuitry to execute instructions to operate an application installed in the memory circuitry and to generate an iterative communication to indicate that the application is operating. The instructions further cause, in response to being executed, the computer circuitry to detect the presence of the iterative communication, and to reinstall the application in response to an interruption in the iterative communication.Type: ApplicationFiled: September 12, 2019Publication date: June 23, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventors: Endrigo Nadin Pinheiro, Richard Bramley, Valiuddin Ali
-
Publication number: 20220147308Abstract: In an example implementation according to aspects of the present disclosure, a method of a computing device may include determining whether a first mode or a second mode is selected. If the first mode is selected, the computing device connects a microphone to a sound processing logic. If the second mode is selected, the computing device disconnects the microphone from the sound processing logic and connecting an audio source to the sound processing logic.Type: ApplicationFiled: July 30, 2019Publication date: May 12, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventor: Richard Bramley
-
Patent number: 11321454Abstract: A computer program product for providing notifications to a user of an intrusion into firmware includes, in one example, non-transitory computer readable medium including computer usable program code embodied therewith to, when executed by a processor, detect intrusion to the firmware of a computing system during runtime in a system management mode.Type: GrantFiled: January 25, 2016Date of Patent: May 3, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Jeffrey Kevin Jeansonne, Richard A. Bramley, Jr., Vali Ali
-
Publication number: 20220121748Abstract: According to examples, an apparatus may include a memory storing a firmware and a processor. The processor may receive a request to modify the firmware, in which the request may be associated with a first credential. The processor may also determine, based on the first credential, whether modification of the firmware is authorized and based on a determination that modification of the firmware is authorized, display a set of defined functionalities for the firmware that are authorized to be modified. The processor may further receive a modification to a functionality in the set of defined functionalities that are authorized to be modified and may apply the received modification to the functionality.Type: ApplicationFiled: July 3, 2019Publication date: April 21, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventors: Baraneedharan Anbazhagan, Christopher H. Stewart, Richard Bramley
-
Publication number: 20220083068Abstract: An autonomous driving system could create or exacerbate a hazardous driving situation due to incorrect machine learning, algorithm design, sensor limitations, environmental conditions or other factors. This technology presents solutions that use machine learning to detect when the autonomous driving system is in this state e.g., erratic or reckless driving and other behavior, in order to take remedial action to prevent a hazard such as a collision.Type: ApplicationFiled: September 15, 2021Publication date: March 17, 2022Inventors: Philip SHIRVANI, Richard BRAMLEY, John MONTRYM, Nirmal SAXENA
-
Publication number: 20220066784Abstract: An example computing device includes a storage device, a random-access memory, a read only memory, and a processor. The processor is to determine, during a booting process, whether an operating system being booted is a primary operating system, in response to a determination that the operating system being booted is different from the primary operating system, determine whether the operating system being booted satisfies a first criteria, and, in response to a determination that the operating system being booted fails to satisfy the first criteria, disable software persistence.Type: ApplicationFiled: May 17, 2019Publication date: March 3, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventors: Valiuddin Ali, Richard Bramley
-
Publication number: 20220043915Abstract: Aspects of the present disclosure are directed to storage of network credentials. In an example, a computing apparatus for storage of network credentials includes a processor, a first memory to store an operating system of the computing apparatus, a second memory to store firmware for initiating the computing apparatus, a third memory, and a controller. Responsive to power-on of the computing apparatus, the operating system of the computing apparatus can access an agent application in the first memory, provision a wireless network credential using the agent application, and encrypt the wireless network credential using the agent application. The firmware stored by the second memory can, in response to receiving the encrypted wireless network credential from the first memory, store the encrypted wireless network credential in the third memory.Type: ApplicationFiled: April 30, 2019Publication date: February 10, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventors: Richard Bramley, Michael Provencher, Charles Ricardo Staub
-
Publication number: 20220043683Abstract: In an example, a system includes a firmware controller to initiate a SM execution mode of the system. The firmware controller scans memory for a process pool tag. The firmware controller compares the process pool tag to a set of operating system process pool tags and detects a coherency discrepancy between the process pool tag and the set of operating system process pool tags. The firmware controller exits the SM execution mode of the system.Type: ApplicationFiled: April 30, 2019Publication date: February 10, 2022Applicant: Hewlett-Packard Development Company, L.P.Inventors: Mason Gunyuzlu, Valiuddin Ali, Robert Craig, Tevin Richards, Richard Bramley, Endrigo Nadlin Pinheiro
-
Patent number: 11221841Abstract: In an example implementation according to aspects of the present disclosure, a method may include receiving by a controller a BIOS image, extracting a current manufacturing programming mode state corresponding to a computer system. A BIOS personality of the BIOS image is evaluated, wherein the BIOS personality is based on a differentiation of hardware and software functionality. Based on the current manufacturing programming state and the BIOS personality, a compatibility with the computer system is determined. Based on the compatibility, the BIOS image is written to non-volatile memory.Type: GrantFiled: August 3, 2018Date of Patent: January 11, 2022Assignee: Hewlett-Packard Development Company, L.P.Inventors: Christopher H Stewart, Valiuddin Ali, Richard Bramley, Lan Wang