Patents by Inventor Susan K. Langford

Susan K. Langford has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10951405
    Abstract: Examples disclosed herein relate to encryption of community-based security information. Some examples may enable authorizing a user of a community to access an encrypted data item (e.g., at least an encrypted portion of community-based security information of that community) using a decryption key. The community may be generated on a security information sharing platform based on a set of community attributes. The decryption key may comprise a private key corresponding to each user attribute of a set of user attributes that are associated with the authorized user where the set of user attributes satisfy the set of community attributes.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: March 16, 2021
    Assignee: MICRO FOCUS LLC
    Inventors: Terence Spies, Tomas Sander, Susan K. Langford
  • Patent number: 10868816
    Abstract: Examples disclosed herein relate to generating communities on a security information sharing platform. Some examples may enable identifying a set of community attributes to be used to generate a community on the security information sharing platform that enables sharing of security information among a plurality of communities. Some examples may enable authorizing a first user to access community-based security information of the community where the first user is associated a set of user attributes that satisfy the set of community attributes. A security indicator may be obtained from the first user of the community. Information related to the security indicator may be obtained from a second user of the community. Some examples may enable including the security indicator and the information related to the security indicator in the community-based security information of the community.
    Type: Grant
    Filed: January 29, 2016
    Date of Patent: December 15, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Tomas Sander, Terence Spies, Susan K. Langford
  • Patent number: 10742412
    Abstract: According to examples, an apparatus may include a security enclosure, a main processor housed in the security enclosure, and a physical security monitoring control unit (PSMCU) processor housed in the security enclosure. The PSMCU processor may cause the apparatus to switchably operate between a first mode and a second mode. In the first mode, the PSMCU processor may allow access by the main processor to a first cryptographic key while preventing access by the main processor to a second cryptographic key. In addition, in the second mode, the PSMCU processor may allow access by the main processor to the second cryptographic key while preventing access by the main processor to the first cryptographic key.
    Type: Grant
    Filed: January 29, 2018
    Date of Patent: August 11, 2020
    Assignee: MICRO FOCUS LLC
    Inventors: Chris A. Windle, Susan K. Langford, John Martin Lewis
  • Publication number: 20200028683
    Abstract: According to examples, an apparatus may include a security enclosure, a main processor housed in the security enclosure, and a physical security monitoring control unit (PSMCU) processor housed in the security enclosure. The PSMCU processor may cause the apparatus to switchably operate between a first mode and a second mode. In the first mode, the PSMCU processor may allow access by the main processor to a first cryptographic key while preventing access by the main processor to a second cryptographic key. In addition, in the second mode, the PSMCU processor may allow access by the main processor to the second cryptographic key while preventing access by the main processor to the first cryptographic key.
    Type: Application
    Filed: January 29, 2018
    Publication date: January 23, 2020
    Applicant: EntlT Software LLC
    Inventors: Chris A. WINDLE, Susan K. Langford, John Martin Lewis
  • Patent number: 10389719
    Abstract: Example implementations relate to a security information sharing platform that enables sharing of security information among a plurality of members. For example, in an implementation, a system may determine that a first member of a community of a security information sharing platform is entitled access to a first set of encrypted information shared by a second member of the community. The system may also receive a request, from the first member, to access the first set of encrypted information, the request including a masked parameter. The system may also determine that the masked parameter matches an access parameter for accessing the first set of encrypted information and provide the first member access to the first set of encrypted information in response to determining that the masked parameter matches the access parameter.
    Type: Grant
    Filed: October 28, 2016
    Date of Patent: August 20, 2019
    Assignee: ENTIT SOFTWARE LLC
    Inventors: Terence Spies, Tomas Sander, Susan K. Langford
  • Patent number: 10341381
    Abstract: A technique includes performing a plurality of instances of retrieving components of a security key from a plurality of locations of an electronic device and constructing the security key from the components. The technique includes inhibiting electromagnetic field-based eavesdropping from being used to reveal the security key, where the inhibiting includes varying a protocol that is used to retrieve the components among the instances.
    Type: Grant
    Filed: April 29, 2015
    Date of Patent: July 2, 2019
    Assignee: ENTIT SOFTWARE LLC
    Inventors: John M. Lewis, Susan K. Langford
  • Publication number: 20190036938
    Abstract: Examples disclosed herein relate to generating communities on a security information sharing platform. Some examples may enable identifying a set of community attributes to be used to generate a community on the security information sharing platform that enables sharing of security information among a plurality of communities. Some examples may enable authorizing a first user to access community-based security information of the community where the first user is associated a set of user attributes that satisfy the set of community attributes. A security indicator may be obtained from the first user of the community. Information related to the security indicator may be obtained from a second user of the community. Some examples may enable including the security indicator and the information related to the security indicator in the community-based security information of the community.
    Type: Application
    Filed: January 29, 2016
    Publication date: January 31, 2019
    Inventors: Tomas Sander, Terence Spies, Susan K. Langford
  • Publication number: 20190036686
    Abstract: Examples disclosed herein relate to encryption of community-based security information. Some examples may enable authorizing a user of a community to access an encrypted data item (e.g., at least an encrypted portion of community-based security information of that community) using a decryption key. The community may be generated on a security information sharing platform based on a set of community attributes. The decryption key may comprise a private key corresponding to each user attribute of a set of user attributes that are associated with the authorized user where the set of user attributes satisfy the set of community attributes.
    Type: Application
    Filed: January 29, 2016
    Publication date: January 31, 2019
    Inventors: Terence Spies, Tomas Sander, Susan K. Langford
  • Publication number: 20180124054
    Abstract: Example implementations relate to a security information sharing platform that enables sharing of security information among a plurality of members. For example, in an implementation, a system may determine that a first member of a community of a security information sharing platform is entitled access to a first set of encrypted information shared by a second member of the community. The system may also receive a request, from the first member, to access the first set of encrypted information, the request including a masked parameter. The system may also determine that the masked parameter matches an access parameter for accessing the first set of encrypted information and provide the first member access to the first set of encrypted information in response to determining that the masked parameter matches the access parameter.
    Type: Application
    Filed: October 28, 2016
    Publication date: May 3, 2018
    Inventors: Terence Spies, Tomas Sander, Susan K. Langford
  • Publication number: 20180115583
    Abstract: A technique includes performing a plurality of instances of retrieving components of a security key from a plurality of locations of an electronic device and constructing the security key from the components. The technique includes inhibiting electromagnetic field-based eavesdropping from being used to reveal the security key, where the inhibiting includes varying a protocol that is used to retrieve the components among the instances.
    Type: Application
    Filed: April 29, 2015
    Publication date: April 26, 2018
    Inventors: John M. Lewis, Susan K. Langford
  • Publication number: 20170353487
    Abstract: Examples disclosed herein relate to controlling data access on a security information sharing platform. Some examples may enable receiving, from a first member of a first community of the security information sharing platform that enables sharing of security information among a plurality of users, a request to share a first set of information. Some examples may enable determining, based on a set of parameters associated with the request to share the first set of information, an encryption mechanism to use to encrypt the first set of information. Some examples may enable encrypting the first set of information using the determined encryption mechanism. Some examples may enable sharing the encrypted first set of information.
    Type: Application
    Filed: June 1, 2016
    Publication date: December 7, 2017
    Inventors: Terence Spies, Tomas Sander, Susan K. LANGFORD
  • Patent number: 8667244
    Abstract: In one implementation, a data set including a plurality of data values having an order is stored at a memory having a plurality of memory locations. Each data value from the data set stored a current memory location of that data value from the plurality of memory locations. Each data value from the data set is periodically moved from the current memory location of that data value from the plurality of memory locations to a next memory location of that data value from the plurality of memory locations. The next memory location of each data value from the plurality of memory locations is the current memory location of that data value from the plurality of memory locations after the moving. The plurality of data values is then provided in the order to a client in response to a request for the data set.
    Type: Grant
    Filed: March 21, 2011
    Date of Patent: March 4, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Ted A Hadley, Susan K Langford
  • Publication number: 20130188790
    Abstract: A technique to facilitate cryptographic key management is provided. In one aspect, multiple strings or components are sorted and concatenated in the order in which they were sorted.
    Type: Application
    Filed: January 24, 2012
    Publication date: July 25, 2013
    Inventors: Susan K. Langford, Bryan Gene Olson
  • Publication number: 20120246432
    Abstract: In one implementation, a data set including a plurality of data values having an order is stored at a memory having a plurality of memory locations. Each data value from the data set stored a current memory location of that data value from the plurality of memory locations. Each data value from the data set is periodically moved from the current memory location of that data value from the plurality of memory locations to a next memory location of that data value from the plurality of memory locations. The next memory location of each data value from the plurality of memory locations is the current memory location of that data value from the plurality of memory locations after the moving. The plurality of data values is then provided in the order to a client in response to a request for the data set.
    Type: Application
    Filed: March 21, 2011
    Publication date: September 27, 2012
    Inventors: Ted A. Hadley, Susan K. Langford
  • Patent number: 6321247
    Abstract: A system and method are provided for performing modulo multiplication of two numbers N bits long with a modulus of 2N+1, where the resulting modulus is determined without a need to perform successive reductions. Without a need to perform successive reductions, a hardware implementation does not require a divider circuit.
    Type: Grant
    Filed: December 28, 1998
    Date of Patent: November 20, 2001
    Assignee: Compaq Computer Corporation
    Inventors: Donald P. Matthews, Jr., Susan K. Langford