Patents by Inventor Vali Ali

Vali Ali has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190087582
    Abstract: Examples associated with basic input/output system (BiOS) security are described. One example includes detecting a mismatch between an active BiOS setting and a saved BIOS setting. An update previously applied to the active BiOS setting is validated. The update Is applied to the saved BIOS setting creating an updated BIOS setting. The saved BIOS setting is updated when the updated BIOS setting and the active BIOS setting match. The saved BIOS setting is updated to the active BIOS setting. A security action is taken when the updated BiOS setting and the active BiOS setting differ.
    Type: Application
    Filed: October 21, 2016
    Publication date: March 21, 2019
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Maugan VILLATEL, Boris BALACHEFF, David PLAQUIN, Vali ALI, Jeffrey Kevin JEANSONNE
  • Publication number: 20190065747
    Abstract: Examples associated with heartbeat signal verification are disclosed. One example includes verifying a provisioning key using a trusted key. The provisioning key is received from a remote device via an intermediary process. An intermediate key provided by the intermediary process is verified using the provisioning key. A session identifier encrypted using the intermediate key and provided to the intermediary process. A first heartbeat signal is received from intermediary process. The heartbeat signal is generated based on the session identifier.
    Type: Application
    Filed: February 3, 2016
    Publication date: February 28, 2019
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Marcelo Gomes de Oliveira, Diogo Cesa Rosa, Fernando Ferretto, Charles R Staub, Lan Wang, Vali Ali, James R Waldron, Tiago V de Quadros Weber, Julio Cesar Sa Campao
  • Publication number: 20190052627
    Abstract: Examples associated with presence identification are described. One example includes detecting a presence identifier broadcast by a mobile device. The mobile device belongs to a user. A portion of the presence identifier is generated based on a one-time password seed. The portion of the presence identifier is provided to an identification server. Identifying information associated with the user is received from the identification server. The identification server uses the portion to identify the user based on the one-time password seed. An action is performed based on the identifying information.
    Type: Application
    Filed: November 21, 2016
    Publication date: February 14, 2019
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Ronaldo Rod FERREIRA, Endrigo Nadin PINHEIRO, Fabio RIFFEL, Karyne MAYER, Jose Paulo PIRES, Christopher C. MOHRMAN, Vali ALI
  • Patent number: 10205597
    Abstract: According to one example, a method is described in which a computer system receives a composite document with at least one referenced resource location. The computer system decrypts the referenced resource location, determines if the referenced resource location requires loading, and determines if the referenced resource location is editable. In the event that the referenced resource location requires loading, the referenced resource may be loaded from the referenced resource location and decrypted. In the event that the referenced resource location is editable, the referenced resource location may be edited.
    Type: Grant
    Filed: June 30, 2014
    Date of Patent: February 12, 2019
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Vali Ali, Helen Balinsky
  • Publication number: 20190036689
    Abstract: In an example, a method includes pairing a first electronic device and a data relay apparatus associated with a second electronic device to establish a secure wireless communication link therebetween. Each of the first electronic device and the data relay apparatus may be associated with an identifier and a verifier, each verifier being to verify the identifier of the other of the first electronic device or data relay apparatus. The pairing may include mutual verification of an identifier using the verifier, establishing shared key data and using the shared key data to establish a shared secret value for use in determining a derived key.
    Type: Application
    Filed: September 8, 2016
    Publication date: January 31, 2019
    Applicant: HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.
    Inventors: Joshua Ser SCHIFFMAN, Vali ALI, Boris BALACHEFF
  • Publication number: 20190007621
    Abstract: A technique includes sensing energy emitted from an object using an omnidirectional antenna of electronic device and sensing the energy using a unidirectional antenna of the electronic device. The technique includes, based at least in part on the sensing of energy using the omnidirectional antenna and the sensing of the energy using the unidirectional antenna, determining whether an image of the object is displayed in a camera viewfinder of the electronic device. The technique includes selectively causing the electronic device to generate an output based at least in part on the determination.
    Type: Application
    Filed: February 29, 2016
    Publication date: January 3, 2019
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: Isaac Lagnado, Vali Ali
  • Publication number: 20180239901
    Abstract: Examples herein disclose a processor-based computing system. The system comprises at least one processor, a non-volatile memory comprising a basic input output system (BIOS), wherein the BIOS creates a data structure and sets up at least one verification software component executed by the processor, a controller communicatively linked to the at least one verification software component, and a memory comprising a system management memory coupled to the at least one processor and code which is executable by the processor-based system to cause the processor to validate the BIOS during a runtime of the processor-based system using the at least one verification software component and the controller.
    Type: Application
    Filed: September 30, 2015
    Publication date: August 23, 2018
    Inventors: JEFFREY KEVIN JEANSONNE, VALI ALI, DAVID PLAQUIN, MAUGAN VILLATEL
  • Publication number: 20180232521
    Abstract: A computer program product for providing notifications to a user of an intrusion into firmware includes, in one example, non-transitory computer readable medium including computer usable program code embodied therewith to, when executed by a processor, detect intrusion to the firmware of a computing system during runtime in a system management mode.
    Type: Application
    Filed: January 25, 2016
    Publication date: August 16, 2018
    Inventors: Jeffrey Kevin Jeansonne, Richard A. BRANLEY, Jr., Vali ALI
  • Publication number: 20180219689
    Abstract: Examples associated with certificate analysis are disclosed. One example periodically analyzing a secure socket layer certificate chain between a client device and a server device. The client device may perform this periodic analysis. In response to detecting an unexpected certificate in the secure socket layer certificate chain, a responsive action is taken.
    Type: Application
    Filed: September 30, 2015
    Publication date: August 2, 2018
    Inventors: JAMES R WALDRON, VALI ALI, BORIS BALACHEFF
  • Publication number: 20180136940
    Abstract: In examples provided herein, a computing device includes a processor, a memory coupled to the processor, and a non-transitory computer readable storage medium coupled to the processor that includes instructions, that when executed by the processor, cause the processor to manage a transition between a first operating system and a second operating system. The instructions cause the processor to instantiate a copy-on-write virtual computing system executing a first operating system, delete a second operating system from the non-transitory computer readable storage medium or the memory, copy the first operating system to the non-transitory computer readable storage medium. The instructions can further cause the processor to instantiate the first operating system on the computing device.
    Type: Application
    Filed: June 26, 2015
    Publication date: May 17, 2018
    Inventors: KATE MALLICHAN, BORIS BALACHEFF, VALI ALI, SHANE STEIGER, LOGAN CLAY BROWNE
  • Publication number: 20170262642
    Abstract: According to an example of accessing a composite document, a request to access a composite document is received. A key associated with a group is fetched, and the key is used to decrypt a part of the composite document comprising an attribute. In the event that the attribute is verified, access to the composite document is provided.
    Type: Application
    Filed: August 12, 2014
    Publication date: September 14, 2017
    Applicant: Hewlett-Packard Development Company, L.P.
    Inventors: VALI ALI, HELEN BALINSKY
  • Publication number: 20170192840
    Abstract: According to an example of providing an instruction to resolve a computing device error, a connection with a first computing device is established and an error code and an identifier from the first computing device are received. An instruction associated with the error code is fetched, and contact information for a user of the first computing device is determined. The instruction is transmitted to the user of the first computing device, wherein transmitting the instruction to the user of the first computing device comprises transmitting the instruction to a second computing device.
    Type: Application
    Filed: August 26, 2014
    Publication date: July 6, 2017
    Inventors: JEFFREY KEVIN JEANSONNE, VALI ALI, DUANE J GATLIN
  • Publication number: 20170104599
    Abstract: According to one example, a method is described in which a computer system receives a composite document with at least one referenced resource location. The computer system decrypts the referenced resource location, determines if the referenced resource location requires loading, and determines if the referenced resource location is editable. In the event that the referenced resource location requires loading, the referenced resource may be loaded from the referenced resource location and decrypted. In the event that the referenced resource location is editable, the referenced resource location may be edited.
    Type: Application
    Filed: June 30, 2014
    Publication date: April 13, 2017
    Inventors: VALI ALI, HELEN BALINSKY
  • Publication number: 20170098090
    Abstract: According to one example, a first computer system receives at least one request by at least one workflow participant to access a composite document content-part from a second computer system. The first computer system retrieves at least one encrypted bundle from the composite document for the at least one workflow participant, decrypts the encrypted bundle using a private key, and ascertains whether at least one rule retrieved from the decrypted bundle is satisfied. In the event that at least one rule is satisfied, the first computer system releases a token from the decrypted bundle to the second computer system to access the composite document content-part.
    Type: Application
    Filed: June 24, 2014
    Publication date: April 6, 2017
    Inventors: VALI ALI, HELEN BALINSKY
  • Patent number: 9547765
    Abstract: A plurality of virtual domains are isolated from one another by a virtual machine monitor (VMM), the plurality of virtual domains including a first guest domain and a privileged domain. Peripheral related instructions are isolated from the first guest domain. The privileged domain is to cause execution of the peripheral related instructions, where the peripheral related instructions upon execution validate a type of the peripheral device.
    Type: Grant
    Filed: November 27, 2015
    Date of Patent: January 17, 2017
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeff Jeansonne, Vali Ali, James M. Mann
  • Publication number: 20160078224
    Abstract: A plurality of virtual domains are isolated from one another by a virtual machine monitor (VMM), the plurality of virtual domains including a first guest domain and a privileged domain. Peripheral related instructions are isolated from the first guest domain. The privileged domain is to cause execution of the peripheral related instructions, where the peripheral related instructions upon execution validate a type of the peripheral device.
    Type: Application
    Filed: November 27, 2015
    Publication date: March 17, 2016
    Inventors: Jeff Jeansonne, Vali Ali, James M. Mann
  • Patent number: 9213829
    Abstract: A first guest domain and an isolated peripheral related task. A peripheral related task to communicate with the peripheral and prevent the first guest domain from communicating with the peripheral.
    Type: Grant
    Filed: July 12, 2011
    Date of Patent: December 15, 2015
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jeff Jeansonne, Vali Ali, James M. Mann
  • Patent number: 8907986
    Abstract: The present technique provides a system and method for automatically switching a computer system between multiple display profiles in response to a system event, such as a hardware event. The present technique detects the system event, identifies the hardware configuration of the computer system, and automatically reconfigures the computer system to accommodate the hardware configuration in real-time. The system event may be a physical rotation of a display between landscape and portrait orientations or between viewing and writing orientations. The system event also may be a physical docking or undocking of a first computing device with a second device in a variety of mounting positions. Any suitable sensor, switch, or hardware/software detection mechanism may be used for the foregoing event detection.
    Type: Grant
    Filed: January 21, 2009
    Date of Patent: December 9, 2014
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Peter D. Hunt, Lan Wang, Pablo J. Salazar, Mark E. Baerenstecher, Vali Ali
  • Publication number: 20140223543
    Abstract: A first guest domain and an isolated peripheral related task. A peripheral related task to communicate with the peripheral and prevent the first guest domain from communicating with the peripheral.
    Type: Application
    Filed: July 12, 2011
    Publication date: August 7, 2014
    Inventors: Jeff Jeansonne, Vali Ali, James M. Mann
  • Publication number: 20140040636
    Abstract: In one embodiment a computing system includes an embedded controller to verify the provider of the core root of trust for measurement (CRTM).
    Type: Application
    Filed: April 29, 2011
    Publication date: February 6, 2014
    Inventors: Jeff Jeansonne, Monji G Jabori, Vali Ali