-
公开(公告)号:US11128666B2
公开(公告)日:2021-09-21
申请号:US16134542
申请日:2018-09-18
Applicant: VMware, Inc.
Inventor: Simon Brooks , Daniel E. Zeck , Xinpi Du , Ali Mohsin , Kishore Sajja , Nikhil Mehta
Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
-
公开(公告)号:US12184789B2
公开(公告)日:2024-12-31
申请号:US17578198
申请日:2022-01-18
Applicant: VMware, Inc.
Inventor: Simon Brooks , Stephen Louis Turner , Daniel Ochoa
Abstract: Disclosed are various embodiments for replacing hard-coded certificate pinning with blockchain based certificate pinning. A signing device can obtain a public key from an endpoint device, produce a signature for the public key, and store the public key on a distributed data store, such as a blockchain. A client device can obtain and validate the public keys from the distributed data store and use the public keys to establish a secure connection between the client device and the endpoint device.
-
公开(公告)号:US12093428B2
公开(公告)日:2024-09-17
申请号:US17141542
申请日:2021-01-05
Applicant: VMware, Inc.
Inventor: Simon Brooks , Hemant Sahani , Lucas Chen , Josh Olson
CPC classification number: G06F21/629 , G06F21/51 , G06F21/54 , G06F2221/032 , G06F2221/2141
Abstract: Examples for determining access to restricted features of an application are disclosed. A current working status of a user account and an access policy can be analyzed to determine whether access to the restricted feature should be granted or denied. The functionality can be provided by a library bundled within an application.
-
公开(公告)号:US20220014507A1
公开(公告)日:2022-01-13
申请号:US16922569
申请日:2020-07-07
Applicant: VMware, Inc.
IPC: H04L29/06 , G06F3/0481 , G06F21/36
Abstract: Systems and methods are included for creating an assured record of a user interaction. An application on a user device can receive an agreement. The agreement can include a specification with instructions for assuring the user interaction. The application can pass the agreement to an assured module installed in the application. The assured module can present the agreement to a user in an interface. The assured module can receive user input indicating acceptance or rejection of the agreement. The assured module can generate a confirmation file that confirms the user interaction. The assured module can sign the confirmation file with a digital signature that can be used by other entities to verify the authenticity of the confirmation file.
-
公开(公告)号:US20220014382A1
公开(公告)日:2022-01-13
申请号:US16922551
申请日:2020-07-07
Applicant: VMware, Inc.
Abstract: Systems and methods are included for creating an assured record of a user interaction. An application on a user device can receive an agreement. The agreement can include a specification with instructions for assuring the user interaction. The application can pass the agreement to an assured module installed in the application. The assured module can present the agreement to a user in an interface. The assured module can receive user input indicating acceptance or rejection of the agreement. The assured module can generate a confirmation file that confirms the user interaction. The assured module can sign the confirmation file with a digital signature that can be used by other entities to verify the authenticity of the confirmation file.
-
公开(公告)号:US20210377022A1
公开(公告)日:2021-12-02
申请号:US17398456
申请日:2021-08-10
Applicant: VMware, Inc.
Inventor: Eugene Liderman , Stephen Louis Turner , Simon Brooks
Abstract: Aspects of secure inter-application data communications are described. In one example, a first application executing on a computing device obtains an identity certificate. The identity certificate can include a unique identifier of the computing device and a public key of the first application. To obtain the public keys of other applications executing on the computing device, the first application can query a management computing environment using the identity certificate. Once the computing device is authenticated by the management computing environment, the management computing environment can store the public key of the first application and return any public keys of other applications executing on the computing device. Once the public keys have been exchanged between the applications, the applications can encrypt and sign data packages for secure data communications between each other.
-
公开(公告)号:US20220215106A1
公开(公告)日:2022-07-07
申请号:US17141542
申请日:2021-01-05
Applicant: VMware, Inc.
Inventor: Simon Brooks , Hemant Sahani , Lucas Chen , Josh Olson
Abstract: Examples for determining access to restricted features of an application are disclosed. A current working status of a user account and an access policy can be analyzed to determine whether access to the restricted feature should be granted or denied. The functionality can be provided by a library bundled within an application.
-
公开(公告)号:US20210409452A1
公开(公告)日:2021-12-30
申请号:US17470711
申请日:2021-09-09
Applicant: VMware, Inc.
Inventor: Simon Brooks , Daniel E. Zeck , Xinpi Du , Ali Mohsin , Kishore Sajja , Nikhil Mehta
Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
-
公开(公告)号:US20210216539A1
公开(公告)日:2021-07-15
申请号:US16738260
申请日:2020-01-09
Applicant: VMware, Inc.
Inventor: Siavash James Joorabchian Hawkins , Lorenzo Blasa , Phillip Riscombe-Burton , Simon Brooks , Neil Broadbent
IPC: G06F16/242
Abstract: Disclosed are various examples for an application settings module that provides uniform access to diverse types of data, such as mobile device settings. A client device, such as a mobile device, can be configured through execution of program instructions to access a schema file comprising a definition of a plurality of keypaths, where individual ones of the plurality of keypaths uniquely correspond to one of a plurality of device settings and the keypaths are defined in the schema file in association with a plurality of methods. The client device can identify a function invoked using one of the keypaths to read or write a corresponding one of the device settings, whether stored locally or remote, and, in response to the function being invoked, execute a portion of the methods corresponding to the one of the keypaths in the schema file and return a result to a requesting process.
-
公开(公告)号:US20210126835A1
公开(公告)日:2021-04-29
申请号:US17140593
申请日:2021-01-04
Applicant: VMware, Inc.
Inventor: Stephen Turner , Daniel E. Zeck , Simon Brooks
Abstract: Disclosed are various examples for Internet of Things (IoT) device discovery and deployment. In some embodiments, a device identifier is received from an IoT device. The IoT device is determined, based on the device identifier, to be associated with a device account with a management service. An enrollment of the IoT device is performed. A capabilities declaration is received from the IoT device. IoT device instructions are determined based on the capabilities declaration. IoT device instructions are transmitted to the IoT device, causing it to perform a capability specified in the capabilities declaration.
-
-
-
-
-
-
-
-
-