-
公开(公告)号:US20190340040A1
公开(公告)日:2019-11-07
申请号:US15969188
申请日:2018-05-02
Applicant: VMware, Inc.
Inventor: Jayaprakash Mara , Xinpi Du , Sophat Nouv , Ravi Sarma , Ali Mohsin
Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.
-
公开(公告)号:US20190303596A1
公开(公告)日:2019-10-03
申请号:US15936840
申请日:2018-03-27
Applicant: VMware, Inc.
Inventor: Xinpi Du , Ali Mohsin
Abstract: Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard.
-
公开(公告)号:US11750660B2
公开(公告)日:2023-09-05
申请号:US17470711
申请日:2021-09-09
Applicant: VMware, Inc.
Inventor: Simon Brooks , Daniel E. Zeck , Xinpi Du , Ali Mohsin , Kishore Sajja , Nikhil Mehta
CPC classification number: H04L63/20 , G06F9/542 , G06F21/552 , G06F21/554
Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
-
公开(公告)号:US11032363B2
公开(公告)日:2021-06-08
申请号:US16895877
申请日:2020-06-08
Applicant: VMWARE INC.
Inventor: Jayaprakash Mara , Xinpi Du , Sophat Nouv , Ravi Sarma , Ali Mohsin
Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.
-
公开(公告)号:US20210297479A1
公开(公告)日:2021-09-23
申请号:US17339331
申请日:2021-06-04
Applicant: VMWARE, INC.
Inventor: Jayaprakash Mara , Xinpi Du , Sophat Nouv , Ravi Sarma , Ali Mohsin
Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.
-
公开(公告)号:US11113420B2
公开(公告)日:2021-09-07
申请号:US15936840
申请日:2018-03-27
Applicant: VMware, Inc.
Inventor: Xinpi Du , Ali Mohsin
Abstract: Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard.
-
公开(公告)号:US20210409452A1
公开(公告)日:2021-12-30
申请号:US17470711
申请日:2021-09-09
Applicant: VMware, Inc.
Inventor: Simon Brooks , Daniel E. Zeck , Xinpi Du , Ali Mohsin , Kishore Sajja , Nikhil Mehta
Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
-
公开(公告)号:US10678606B2
公开(公告)日:2020-06-09
申请号:US15969188
申请日:2018-05-02
Applicant: VMware, Inc.
Inventor: Jayaprakash Mara , Xinpi Du , Sophat Nouv , Ravi Sarma , Ali Mohsin
Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.
-
公开(公告)号:US20200092335A1
公开(公告)日:2020-03-19
申请号:US16134542
申请日:2018-09-18
Applicant: VMware, Inc.
Inventor: Simon Brooks , Daniel E. Zeck , Xinpi Du , Ali Mohsin , Kishore Sajja , Nikhil Mehta
Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
-
公开(公告)号:US20210397727A1
公开(公告)日:2021-12-23
申请号:US17466062
申请日:2021-09-03
Applicant: VMware, Inc.
Inventor: Xinpi Du , Ali Mohsin
Abstract: Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard.
-
-
-
-
-
-
-
-
-