CONDITIONAL TIME-BASED ONE TIME PASSWORD TOKEN ISSUANCE BASED ON LOCALLY AGGREGATED DEVICE RISK

    公开(公告)号:US20240146534A1

    公开(公告)日:2024-05-02

    申请号:US17975309

    申请日:2022-10-27

    Applicant: VMware, Inc.

    CPC classification number: H04L9/3228 H04L9/0863 H04L9/0869

    Abstract: Disclosed are various embodiments for conditional time-based one time password token issuance based on locally aggregated device risk. Embodiments of this application can evaluate the security of the client device using mobile threat defense signals or a device posture summary before generating a seed on the client device to ensure the security of all the connected systems as a whole. Additionally, embodiments of this application can evaluate the security of the client device to determine if changes have been made that require a remedial action to be taken. In some embodiments, the client device may be completely disconnected from the network and capable of generating time-based one time passwords, while remaining offline. However, offline attacks may still occur; in such a situation, the client device can determine the security of the device and perform the remedial actions independent of other devices, systems, computing environments, or networks. In at least another embodiment, when the client device is determined to not be secure, the client device can inform the authentication service over a connected network that security issues may exist in the client device and actions may need to be taken at the authentication service to ensure the client does not further compromise the account.

    USER INTERFACE TOOLS FOR DEVICE-DRIVEN MANAGEMENT WORKFLOWS

    公开(公告)号:US20220231921A1

    公开(公告)日:2022-07-21

    申请号:US17153272

    申请日:2021-01-20

    Applicant: VMware, Inc.

    Abstract: Examples of device-driven management are described. A management console can include a set of workflow objects to use in a workflow creation user interface. Workflow objects can be positioned in the workflow creation user interface area based on user manipulation. A device state criteria overlay can be painted on a connector workflow object to indicates that a branch of executable instructions corresponding to the connector workflow object is performed where a client device corresponds to the specified device state criteria.

    DELEGATED AUTHENTICATION TO CERTIFICATE AUTHORITIES

    公开(公告)号:US20220029990A1

    公开(公告)日:2022-01-27

    申请号:US17495239

    申请日:2021-10-06

    Applicant: VMware, Inc.

    Abstract: Disclosed are various embodiments for delegating authentication to certificate authorities. A connector service identifies a certificate request from a messenger service. The certificate request includes a credential identifier for a certificate authority. An authentication credential is retrieved using the credential identifier. A certificate request and the certificate authority authentication credential are transmitted to the certificate authority. A certificate is retrieved and provided as a response to the certificate request.

    Network integration and workflow generation tools for device-driven management

    公开(公告)号:US11184250B1

    公开(公告)日:2021-11-23

    申请号:US17153270

    申请日:2021-01-20

    Applicant: VMware, Inc.

    Abstract: Examples of device-driven management is described. A management service can generate a management console that includes a set of workflow objects to use in a workflow creation user interface. A management workflow can be retrieved from a network service and translated to be formatted into the workflow objects. A user can select the management workflow, and the management console can be updated to show graphical representations of the workflow objects. The management service can transmit a device-driven management workflow that includes a translated version of the management workflow.

    Secure distribution of cryptographic certificates

    公开(公告)号:US11438177B2

    公开(公告)日:2022-09-06

    申请号:US16804511

    申请日:2020-02-28

    Applicant: VMware, Inc.

    Abstract: Disclosed are various embodiments for securely distributing certificates or encryption keys. A management service can receive an enrollment request from a client device. The management service can then send a key request to a certificate provider, the key request comprising a user identifier. The management service can also send a skeleton payload to an enterprise gateway. In response, the management service can receive an encrypted profile from the enterprise gateway, the encrypted profile comprising the skeleton payload with an encryption key inserted by the enterprise gateway into the skeleton payload. Finally, the management service can send the encrypted profile to the client device.

    NETWORK INTEGRATION AND WORKFLOW GENERATION TOOLS FOR DEVICE-DRIVEN MANAGEMENT

    公开(公告)号:US20220231922A1

    公开(公告)日:2022-07-21

    申请号:US17509527

    申请日:2021-10-25

    Applicant: VMware, Inc.

    Abstract: Examples of device-driven management are described. A management service can generate a management console that includes a set of workflow objects to use in a workflow creation user interface. A device-driven management workflow is defined through the workflow creation user interface. The management service identifies that device-driven management workflow lacks a condition specified in a comprehensiveness definition. A workflow object for the condition specified in a comprehensiveness definition is generated for display. A user interaction incorporates the workflow object into the device-driven management workflow so that device-driven management workflow considers the specified condition.

    Delegated authentication to certificate authorities

    公开(公告)号:US11165774B2

    公开(公告)日:2021-11-02

    申请号:US16220657

    申请日:2018-12-14

    Applicant: VMware, Inc.

    Abstract: Disclosed are various embodiments for delegating authentication to certificate authorities. A first request for a certificate is received from a client device. Then a certificate request can be created. The certificate request may include a credential identifier for a certificate authority. The credential identifier may uniquely identify an authentication credential to use to request the certificate from certificate authority. The certificate request can then be added to a message queue. Later, a second request from another computing device is received and the message stored in the message queue is provided in response. A certificate is then received from the other computing device and is provided to the client device in response to the first request.

Patent Agency Ranking