SECURE ENTERPRISE ACCESS WITH VOICE ASSISTANT DEVICES

    公开(公告)号:US20220028398A1

    公开(公告)日:2022-01-27

    申请号:US17016367

    申请日:2020-09-09

    Applicant: VMWARE, INC.

    Abstract: Systems and methods are provided for optimizing and securing an enterprise voice service accessed by an external voice assistant device. An enterprise voice assistant installed on a client device acts as an enterprise voice service for an external voice assistant device. The enterprise voice assistant receives a voice query from the external voice assistant device. The voice query is processed using a machine learning model to extract an intent and at least one slot. The extracted intent and at least one slot are used to determine whether a response to the voice query can be generated using local enterprise data that was previously received and stored by the client device from a management server. The response is generated based on the determination by using the local enterprise data or by sending the extracted intent and at least one slot to and receiving the response from the management server.

    DYNAMIC VARIANCE MECHANISM FOR SECURING ENTERPRISE RESOURCES USING A VIRTUAL PRIVATE NETWORK

    公开(公告)号:US20210185012A1

    公开(公告)日:2021-06-17

    申请号:US16788325

    申请日:2020-02-12

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various examples for securing enterprise resources using a virtual private network. A client device can send a first unique device identifier for the client device to a remote management service upon enrollment. When a virtual private network application is first executed, the client device can send a second unique device identifier to the remote management service, where the remote management service is configured to store the second unique device identifier in association with the first unique universal identifier. During subsequent executions of the virtual private network application, the virtual private network service can authenticate the client device by comparing the first unique device identifier and the second unique device identifier to a device identifier received from the remote management service. A machine learning routine can be employed to identify anomalies as the virtual private network application is executed.

    Single sign on (SSO) capability for services accessed through messages

    公开(公告)号:US11516202B2

    公开(公告)日:2022-11-29

    申请号:US16790776

    申请日:2020-02-14

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various approaches for facilitating single sign-on (SSO) for third-party services that are accessible through messages (e.g., email) received by a user. A user can receive a message that includes an embedded URL or link that opens in a third-party service that requires authentication. Instead of requiring the user to enter authentication credentials for accessing the third-party service, a tunnel service can be used to intercept requests for authentication and redirect the requests to an identity manager that can issue a SSO token following an authentication of the user and device. Upon supplying the third-party service with the SSO token, the user can access the content associated with the third-party service without entering authentication credentials.

    Dynamic variance mechanism for securing enterprise resources using a virtual private network

    公开(公告)号:US11418488B2

    公开(公告)日:2022-08-16

    申请号:US16788325

    申请日:2020-02-12

    Applicant: VMWARE, INC.

    Abstract: Disclosed are various examples for securing enterprise resources using a virtual private network. A client device can send a first unique device identifier for the client device to a remote management service upon enrollment. When a virtual private network application is first executed, the client device can send a second unique device identifier to the remote management service, where the remote management service is configured to store the second unique device identifier in association with the first unique universal identifier. During subsequent executions of the virtual private network application, the virtual private network service can authenticate the client device by comparing the first unique device identifier and the second unique device identifier to a device identifier received from the remote management service. A machine learning routine can be employed to identify anomalies as the virtual private network application is executed.

    Distributed encryption
    8.
    发明授权

    公开(公告)号:US11706202B2

    公开(公告)日:2023-07-18

    申请号:US17157367

    申请日:2021-01-25

    Applicant: VMware, Inc.

    Abstract: Examples described herein include systems and methods for performing distributed encryption across multiple devices. An example method can include a first device discovering a second device that shares a network. The device can identify data to be sent to a server and calculate a checksum for that data. The device can then split the data into multiple portions and send a portion to the second device, along with a certificate associated with the server for encrypting the data. The first device can encrypt the portion of data it retained. The first device can receive an encrypted version of the second portion of the data sent to the second device. The first device can merge these two portions and send the merged encrypted data to the server, along with the checksum value. The server can decrypt the data and confirm that it reflects the original set of data.

    Context Driven Dynamic Actions Embedded in Messages

    公开(公告)号:US20210328952A1

    公开(公告)日:2021-10-21

    申请号:US17364970

    申请日:2021-07-01

    Applicant: VMware, Inc.

    Abstract: Disclosed are various approaches for dynamically creating content to present to a user based on an identified intent, or other context, associated with a message (e.g., email). A message that is received from a message server can be analyzed to identify the message content within the message prior to distributing to the recipient client device. Trained intent identification models can be applied to the identified message content to determine an intent, or other type of context, associated with the message. Upon identifying the intent, the message header can be modified to include the intent prior to forwarding the message to the recipient client device. The client device can then display a user interface including the message and a user interface element corresponding to a third-party service. The user interface element can be dynamically generated to include an action component that upon selection, triggers an action associated with the intent.

    Distributed encryption
    10.
    发明授权

    公开(公告)号:US10904230B2

    公开(公告)日:2021-01-26

    申请号:US15898670

    申请日:2018-02-19

    Applicant: VMWARE, INC.

    Abstract: Examples described herein include systems and methods for performing distributed encryption across multiple devices. An example method can include a first device discovering a second device that shares a network. The device can identify data to be sent to a server and calculate a checksum for that data. The device can then split the data into multiple portions and send a portion to the second device, along with a certificate associated with the server for encrypting the data. The first device can encrypt the portion of data it retained. The first device can receive an encrypted version of the second portion of the data sent to the second device. The first device can merge these two portions and send the merged encrypted data to the server, along with the checksum value. The server can decrypt the data and confirm that it reflects the original set of data.

Patent Agency Ranking