-
公开(公告)号:US11128666B2
公开(公告)日:2021-09-21
申请号:US16134542
申请日:2018-09-18
Applicant: VMware, Inc.
Inventor: Simon Brooks , Daniel E. Zeck , Xinpi Du , Ali Mohsin , Kishore Sajja , Nikhil Mehta
Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
-
公开(公告)号:US20200301752A1
公开(公告)日:2020-09-24
申请号:US16895877
申请日:2020-06-08
Applicant: VMWARE INC.
Inventor: Jayaprakash Mara , Xinpi Du , Sophat Nouv , Ravi Sarma , Ali Mohsin
Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.
-