18454495. VALUES EXCLUSIONS simplified abstract (HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.)

From WikiPatents
Jump to navigation Jump to search

VALUES EXCLUSIONS

Organization Name

HEWLETT-PACKARD DEVELOPMENT COMPANY, L.P.

Inventor(s)

Thalia May Laing of Bristol (GB)

Maugan Villatel of Bristol (GB)

Adrian John Baldwin of Bristol (GB)

Pierre Louis Robert Belgarric of Bristol (GB)

Adrian Laurence Shaw of Bristol (GB)

VALUES EXCLUSIONS - A simplified explanation of the abstract

This abstract first appeared for US patent application 18454495 titled 'VALUES EXCLUSIONS

Simplified Explanation

The computing device described in the patent application generates a key using a value as an input, excludes the value from future use, stores an indication of a subsequent value for generating a subsequent key, and cryptographically associates the indication with an entity to control access.

  • Processor generates key using input value
  • Processor excludes input value from future use
  • Processor stores indication of subsequent value for generating subsequent key
  • Indication is cryptographically associated with entity for access control

Potential Applications

The technology described in the patent application could be applied in various fields such as cybersecurity, data encryption, secure communication protocols, and digital rights management.

Problems Solved

This technology addresses the issue of securely generating and managing cryptographic keys, ensuring that sensitive information is protected and access is controlled.

Benefits

The benefits of this technology include enhanced security, improved data protection, and more robust access control mechanisms for cryptographic key generation and management.

Potential Commercial Applications

A potential commercial application of this technology could be in the development of secure communication systems for industries such as finance, healthcare, and government, where data protection and access control are critical.

Possible Prior Art

One possible prior art for this technology could be existing cryptographic key management systems that use similar methods for generating and storing keys securely.

What are the specific cryptographic algorithms used in this technology?

The specific cryptographic algorithms used in this technology are not mentioned in the abstract. Further details on the algorithms employed would provide a clearer understanding of the security measures implemented.

How does the technology handle potential cyber attacks or breaches?

The abstract does not provide information on how the technology handles potential cyber attacks or breaches. An explanation of the security measures in place to prevent and mitigate such threats would be beneficial for assessing the overall effectiveness of the technology.


Original Abstract Submitted

In an example, a computing device is described. The computing device comprises a processor. The processor is to generate a key using a value as an input to generate the key. The processor is further to, in response to generating the key, exclude the value from future use as the input. The processor is further to store an indication of a subsequent value to use as the input to generate a subsequent key. The indication is cryptographically associated with an entity to control third-party access to the indication.