Attachment and embedded object positioning validation

    公开(公告)号:US11888798B2

    公开(公告)日:2024-01-30

    申请号:US17458633

    申请日:2021-08-27

    Applicant: VMWARE, INC.

    CPC classification number: H04L51/08 H04L51/212 H04L51/224 H04L67/306

    Abstract: Disclosed are various approaches for validating a relevance or an accuracy associated with an item being attached to a message or inserted inline with the text of the message or other type of document. An addition of the item (e.g., attachment, hyperlink, embedded image, etc.) to the message being generated by a sender can be detected. Message keywords associated with the message content and item keywords associated with the item content can be identified following an analysis of the message content and item content. The message keywords and item keywords can be compared to determine a likelihood of a mismatch between the item and the message. Upon determining a potential mismatch and prior to the message being sent to a recipient, a notification identifying the likelihood of the mismatch is presented to the sender.

    SHARING SECURED FILES AMONG APPLICATIONS USING AN OPERATING SYSTEM FRAMEWORK

    公开(公告)号:US20240028754A1

    公开(公告)日:2024-01-25

    申请号:US17964951

    申请日:2022-10-13

    Applicant: VMWARE, INC.

    CPC classification number: G06F21/6218

    Abstract: Disclosed are mechanisms that enable secure file sharing between applications using an operating system framework. In some examples, an extension map is received by a client device. The extension map relates a file extension to an alias file extension. A management software development kit (SDK) is used by an application. The management SDK identifies that the application originates a file comprising the file extension, stores the file as an extension-aliased file by changing its file extension to the alias file extension according to the extension map. The extension-aliased file is transferred to a recipient application using a file sharing utility of an operating system of the client device.

    SECURE BLOCK CLONING ON RESILIENT FILE SYSTEMS
    126.
    发明公开

    公开(公告)号:US20240028720A1

    公开(公告)日:2024-01-25

    申请号:US17979065

    申请日:2022-11-02

    Applicant: VMWARE, INC.

    CPC classification number: G06F21/565 G06F21/57

    Abstract: To implement secure block cloning on file systems that support block cloning, a computer security application is executed on a computer system deploying a file system that supports block cloning. The computer security application receives a block cloning command to clone a source file to a target file. Before the computer system executes the block cloning command, the computer security application identifies a trust status associated with the source file. The trust status is identified by looking up a base inventory that stores trust data associated with multiple files stored on the file system. The multiple files include the source file. Based on the trust status associated with the source file, the computer security application determines that the trust status associated with the source file is trustworthy. In response to determining that the source file is trustworthy, the computer security application applies the trust status associated with the source file to the target file.

    AUTOMATIC DISCOVERY OF APPLICATION RESOURCES FOR APPLICATION BACKUP IN A CONTAINER ORCHESTRATION PLATFORM

    公开(公告)号:US20240028484A1

    公开(公告)日:2024-01-25

    申请号:US17976898

    申请日:2022-10-31

    Applicant: VMWARE, INC.

    CPC classification number: G06F11/1469 G06F11/1464 G06F11/1451

    Abstract: Computer-implemented methods, media, and systems for automatic discovery of application resources for application backup in a container orchestration platform (e.g., a Kubernetes system) are disclosed. In an example method, a pod of an application deployed in a container orchestration platform is identified. Then an owner object of the pod is determined. Resources mounted on the pod and on the owner object of the pod in the container orchestration platform are checked. Based on the pod, the owner object of the pod, and the resources mounted on the pod and on the owner object of the pod, a resource hierarchy of the application is constructed. A backup specification for backup of the application is identified. Based on the backup specification and the resource hierarchy of the application, resources of the application are backed up.

    METHOD FOR REUSING IDENTIFIERS TO IMPROVE PERFORMANCE OF OPEN AND CLOSE INPUT/OUTPUT REQUESTS FOR CLIENT DRIVE REDIRECTION

    公开(公告)号:US20240028369A1

    公开(公告)日:2024-01-25

    申请号:US17901268

    申请日:2022-09-01

    Applicant: VMware, Inc.

    CPC classification number: G06F9/45558 G06F9/4411 G06F2009/45579

    Abstract: A method of performing open and close input/output (I/O) requests targeting a directory of a client computing device includes the steps of: receiving a first I/O request to open the directory, from a driver of a host server, forwarding the first I/O request to the client computing device; in response to the first I/O request, receiving an identifier (ID) of the directory from the client computing device and transmitting the ID to the driver; in response to receiving a second I/O request to close the directory, from the driver, storing the ID in a cache, and not forwarding the second I/O request to the client computing device; and in response to receiving a third I/O request to open the directory, from the driver, retrieving the ID from the cache, and transmitting the ID to the driver again.

    REMOTE EDGE VIRTUALIZATION MANAGEMENT
    129.
    发明公开

    公开(公告)号:US20240028368A1

    公开(公告)日:2024-01-25

    申请号:US17886885

    申请日:2022-08-12

    Applicant: VMware, Inc.

    Inventor: Tiejun Chen

    CPC classification number: G06F9/45558 G06F2009/45595

    Abstract: Aspects of remote edge virtualization management are described. An edge hypervisor shadow application is executed. The edge hypervisor shadow application acts as an Input/Output for an edge hypervisor that is IP inaccessible to a virtualization service. The edge hypervisor shadow application receives a hypertext transport protocol (HTTP) communication from the virtualization service. A Message Queue Telemetry Transport (MQTT) message is generated to include the HTTP request, and is published to an MQTT broker service, the MQTT message comprising the HTTP request.

Patent Agency Ranking