Patents by Inventor Susan K. Langford
Susan K. Langford has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10951405Abstract: Examples disclosed herein relate to encryption of community-based security information. Some examples may enable authorizing a user of a community to access an encrypted data item (e.g., at least an encrypted portion of community-based security information of that community) using a decryption key. The community may be generated on a security information sharing platform based on a set of community attributes. The decryption key may comprise a private key corresponding to each user attribute of a set of user attributes that are associated with the authorized user where the set of user attributes satisfy the set of community attributes.Type: GrantFiled: January 29, 2016Date of Patent: March 16, 2021Assignee: MICRO FOCUS LLCInventors: Terence Spies, Tomas Sander, Susan K. Langford
-
Patent number: 10868816Abstract: Examples disclosed herein relate to generating communities on a security information sharing platform. Some examples may enable identifying a set of community attributes to be used to generate a community on the security information sharing platform that enables sharing of security information among a plurality of communities. Some examples may enable authorizing a first user to access community-based security information of the community where the first user is associated a set of user attributes that satisfy the set of community attributes. A security indicator may be obtained from the first user of the community. Information related to the security indicator may be obtained from a second user of the community. Some examples may enable including the security indicator and the information related to the security indicator in the community-based security information of the community.Type: GrantFiled: January 29, 2016Date of Patent: December 15, 2020Assignee: MICRO FOCUS LLCInventors: Tomas Sander, Terence Spies, Susan K. Langford
-
Patent number: 10742412Abstract: According to examples, an apparatus may include a security enclosure, a main processor housed in the security enclosure, and a physical security monitoring control unit (PSMCU) processor housed in the security enclosure. The PSMCU processor may cause the apparatus to switchably operate between a first mode and a second mode. In the first mode, the PSMCU processor may allow access by the main processor to a first cryptographic key while preventing access by the main processor to a second cryptographic key. In addition, in the second mode, the PSMCU processor may allow access by the main processor to the second cryptographic key while preventing access by the main processor to the first cryptographic key.Type: GrantFiled: January 29, 2018Date of Patent: August 11, 2020Assignee: MICRO FOCUS LLCInventors: Chris A. Windle, Susan K. Langford, John Martin Lewis
-
Publication number: 20200028683Abstract: According to examples, an apparatus may include a security enclosure, a main processor housed in the security enclosure, and a physical security monitoring control unit (PSMCU) processor housed in the security enclosure. The PSMCU processor may cause the apparatus to switchably operate between a first mode and a second mode. In the first mode, the PSMCU processor may allow access by the main processor to a first cryptographic key while preventing access by the main processor to a second cryptographic key. In addition, in the second mode, the PSMCU processor may allow access by the main processor to the second cryptographic key while preventing access by the main processor to the first cryptographic key.Type: ApplicationFiled: January 29, 2018Publication date: January 23, 2020Applicant: EntlT Software LLCInventors: Chris A. WINDLE, Susan K. Langford, John Martin Lewis
-
Patent number: 10389719Abstract: Example implementations relate to a security information sharing platform that enables sharing of security information among a plurality of members. For example, in an implementation, a system may determine that a first member of a community of a security information sharing platform is entitled access to a first set of encrypted information shared by a second member of the community. The system may also receive a request, from the first member, to access the first set of encrypted information, the request including a masked parameter. The system may also determine that the masked parameter matches an access parameter for accessing the first set of encrypted information and provide the first member access to the first set of encrypted information in response to determining that the masked parameter matches the access parameter.Type: GrantFiled: October 28, 2016Date of Patent: August 20, 2019Assignee: ENTIT SOFTWARE LLCInventors: Terence Spies, Tomas Sander, Susan K. Langford
-
Patent number: 10341381Abstract: A technique includes performing a plurality of instances of retrieving components of a security key from a plurality of locations of an electronic device and constructing the security key from the components. The technique includes inhibiting electromagnetic field-based eavesdropping from being used to reveal the security key, where the inhibiting includes varying a protocol that is used to retrieve the components among the instances.Type: GrantFiled: April 29, 2015Date of Patent: July 2, 2019Assignee: ENTIT SOFTWARE LLCInventors: John M. Lewis, Susan K. Langford
-
Publication number: 20190036938Abstract: Examples disclosed herein relate to generating communities on a security information sharing platform. Some examples may enable identifying a set of community attributes to be used to generate a community on the security information sharing platform that enables sharing of security information among a plurality of communities. Some examples may enable authorizing a first user to access community-based security information of the community where the first user is associated a set of user attributes that satisfy the set of community attributes. A security indicator may be obtained from the first user of the community. Information related to the security indicator may be obtained from a second user of the community. Some examples may enable including the security indicator and the information related to the security indicator in the community-based security information of the community.Type: ApplicationFiled: January 29, 2016Publication date: January 31, 2019Inventors: Tomas Sander, Terence Spies, Susan K. Langford
-
Publication number: 20190036686Abstract: Examples disclosed herein relate to encryption of community-based security information. Some examples may enable authorizing a user of a community to access an encrypted data item (e.g., at least an encrypted portion of community-based security information of that community) using a decryption key. The community may be generated on a security information sharing platform based on a set of community attributes. The decryption key may comprise a private key corresponding to each user attribute of a set of user attributes that are associated with the authorized user where the set of user attributes satisfy the set of community attributes.Type: ApplicationFiled: January 29, 2016Publication date: January 31, 2019Inventors: Terence Spies, Tomas Sander, Susan K. Langford
-
Publication number: 20180124054Abstract: Example implementations relate to a security information sharing platform that enables sharing of security information among a plurality of members. For example, in an implementation, a system may determine that a first member of a community of a security information sharing platform is entitled access to a first set of encrypted information shared by a second member of the community. The system may also receive a request, from the first member, to access the first set of encrypted information, the request including a masked parameter. The system may also determine that the masked parameter matches an access parameter for accessing the first set of encrypted information and provide the first member access to the first set of encrypted information in response to determining that the masked parameter matches the access parameter.Type: ApplicationFiled: October 28, 2016Publication date: May 3, 2018Inventors: Terence Spies, Tomas Sander, Susan K. Langford
-
Publication number: 20180115583Abstract: A technique includes performing a plurality of instances of retrieving components of a security key from a plurality of locations of an electronic device and constructing the security key from the components. The technique includes inhibiting electromagnetic field-based eavesdropping from being used to reveal the security key, where the inhibiting includes varying a protocol that is used to retrieve the components among the instances.Type: ApplicationFiled: April 29, 2015Publication date: April 26, 2018Inventors: John M. Lewis, Susan K. Langford
-
Publication number: 20170353487Abstract: Examples disclosed herein relate to controlling data access on a security information sharing platform. Some examples may enable receiving, from a first member of a first community of the security information sharing platform that enables sharing of security information among a plurality of users, a request to share a first set of information. Some examples may enable determining, based on a set of parameters associated with the request to share the first set of information, an encryption mechanism to use to encrypt the first set of information. Some examples may enable encrypting the first set of information using the determined encryption mechanism. Some examples may enable sharing the encrypted first set of information.Type: ApplicationFiled: June 1, 2016Publication date: December 7, 2017Inventors: Terence Spies, Tomas Sander, Susan K. LANGFORD
-
Patent number: 8667244Abstract: In one implementation, a data set including a plurality of data values having an order is stored at a memory having a plurality of memory locations. Each data value from the data set stored a current memory location of that data value from the plurality of memory locations. Each data value from the data set is periodically moved from the current memory location of that data value from the plurality of memory locations to a next memory location of that data value from the plurality of memory locations. The next memory location of each data value from the plurality of memory locations is the current memory location of that data value from the plurality of memory locations after the moving. The plurality of data values is then provided in the order to a client in response to a request for the data set.Type: GrantFiled: March 21, 2011Date of Patent: March 4, 2014Assignee: Hewlett-Packard Development Company, L.P.Inventors: Ted A Hadley, Susan K Langford
-
Publication number: 20130188790Abstract: A technique to facilitate cryptographic key management is provided. In one aspect, multiple strings or components are sorted and concatenated in the order in which they were sorted.Type: ApplicationFiled: January 24, 2012Publication date: July 25, 2013Inventors: Susan K. Langford, Bryan Gene Olson
-
Publication number: 20120246432Abstract: In one implementation, a data set including a plurality of data values having an order is stored at a memory having a plurality of memory locations. Each data value from the data set stored a current memory location of that data value from the plurality of memory locations. Each data value from the data set is periodically moved from the current memory location of that data value from the plurality of memory locations to a next memory location of that data value from the plurality of memory locations. The next memory location of each data value from the plurality of memory locations is the current memory location of that data value from the plurality of memory locations after the moving. The plurality of data values is then provided in the order to a client in response to a request for the data set.Type: ApplicationFiled: March 21, 2011Publication date: September 27, 2012Inventors: Ted A. Hadley, Susan K. Langford
-
Patent number: 6321247Abstract: A system and method are provided for performing modulo multiplication of two numbers N bits long with a modulus of 2N+1, where the resulting modulus is determined without a need to perform successive reductions. Without a need to perform successive reductions, a hardware implementation does not require a divider circuit.Type: GrantFiled: December 28, 1998Date of Patent: November 20, 2001Assignee: Compaq Computer CorporationInventors: Donald P. Matthews, Jr., Susan K. Langford