Delegated authentication to certificate authorities

    公开(公告)号:US11165774B2

    公开(公告)日:2021-11-02

    申请号:US16220657

    申请日:2018-12-14

    Applicant: VMware, Inc.

    Abstract: Disclosed are various embodiments for delegating authentication to certificate authorities. A first request for a certificate is received from a client device. Then a certificate request can be created. The certificate request may include a credential identifier for a certificate authority. The credential identifier may uniquely identify an authentication credential to use to request the certificate from certificate authority. The certificate request can then be added to a message queue. Later, a second request from another computing device is received and the message stored in the message queue is provided in response. A certificate is then received from the other computing device and is provided to the client device in response to the first request.

    ADAPTIVE OFFLINE POLICY ENFORCEMENT BASED ON CONTEXT

    公开(公告)号:US20200007580A1

    公开(公告)日:2020-01-02

    申请号:US16019950

    申请日:2018-06-27

    Applicant: VMware, Inc.

    Abstract: Disclosed are various examples that relate to adjusting a stringency of offline policy restrictions based on a situational context of a computing device. In one example, a system can receive an offline restriction policy for an application. The offline restriction policy comprises one or more rules that are associated with one or more actions. The system can cause the one or more actions to be performed during an offline period of time in an instance in which one of the rules is satisfied. The offline period of time representing time periods when the system does not have a network connection with a management system. The system can cause a first authentication action to be performed in an instance in which a first condition of the system satisfies a first rule. The system can also cause a second authentication action to be performed in an instance in which a second condition of the system satisfies a second rule.

    UNMANAGED SECURE INTER-APPLICATION DATA COMMUNICATIONS

    公开(公告)号:US20210377022A1

    公开(公告)日:2021-12-02

    申请号:US17398456

    申请日:2021-08-10

    Applicant: VMware, Inc.

    Abstract: Aspects of secure inter-application data communications are described. In one example, a first application executing on a computing device obtains an identity certificate. The identity certificate can include a unique identifier of the computing device and a public key of the first application. To obtain the public keys of other applications executing on the computing device, the first application can query a management computing environment using the identity certificate. Once the computing device is authenticated by the management computing environment, the management computing environment can store the public key of the first application and return any public keys of other applications executing on the computing device. Once the public keys have been exchanged between the applications, the applications can encrypt and sign data packages for secure data communications between each other.

    DISTRIBUTED PROFILE AND KEY MANAGEMENT
    6.
    发明申请

    公开(公告)号:US20190068568A1

    公开(公告)日:2019-02-28

    申请号:US15685094

    申请日:2017-08-24

    Applicant: VMware, Inc.

    Abstract: Disclosed are various examples for distributed profile and key management. In one example, a management service can generate a partially populated device profile and provide the partially populated device profile to a client application executable on a client device. The client application can generate a credential and insert the credential into the partially populated device profile to generate a fully populated device profile. The credential can be shared with at least one other client application on the client device. The management service can use the fully populated device profile to generate multiple profiles that rely on a single credential, such as a single X.509 security certificate.

    Distributed profile and key management

    公开(公告)号:US10992656B2

    公开(公告)日:2021-04-27

    申请号:US15685094

    申请日:2017-08-24

    Applicant: VMware, Inc.

    Abstract: Disclosed are various examples for distributed profile and key management. In one example, a management service can generate a partially populated device profile and provide the partially populated device profile to a client application executable on a client device. The client application can generate a credential and insert the credential into the partially populated device profile to generate a fully populated device profile. The credential can be shared with at least one other client application on the client device. The management service can use the fully populated device profile to generate multiple profiles that rely on a single credential, such as a single X.509 security certificate.

    Adaptive offline policy enforcement based on coniext

    公开(公告)号:US11736529B2

    公开(公告)日:2023-08-22

    申请号:US17331709

    申请日:2021-05-27

    Applicant: VMware, Inc.

    Abstract: Disclosed are various examples that relate to adjusting a stringency of offline policy restrictions based on a situational context of a computing device. In one example, a system can receive an offline restriction policy for an application. The system can identify a request to execute an application during the offline period of time. A situational context of the computing device can be determined. A first application restriction can be enforced for the application on the computing device based on the identification of the computing device being in the offline period of time and the situational context. A change in the situational context of the computing device can be identified during the offline period of time based on a detection of a second condition. A second application restriction can be enforced for the application on the computing device during the offline period of time.

Patent Agency Ranking