-
公开(公告)号:US20220353139A1
公开(公告)日:2022-11-03
申请号:US17509474
申请日:2021-10-25
Applicant: VMware, Inc.
Inventor: Karen J. Brems , Pedha Venka Reddy Gade , Jong Ho Won , Qiuxi Zhu , Nandakishore Mallapragada , Daniel E. Zeck
Abstract: Disclosed are various examples of device and management service integration using a device connector service that acts as a proxy. The device connector service can receive a device communication that is relayed by a device connector client executed on an edge device. The device communication includes device connector authentication data, and a device identifier for a device. The device communication is modified into a modified device communication that includes management service authentication data, and a management unique device identifier (UDID) that is different from the device identifier. The device connector service transmits the modified device communication to a management service.
-
公开(公告)号:US11265308B2
公开(公告)日:2022-03-01
申请号:US16369480
申请日:2019-03-29
Applicant: VMware, Inc.
Inventor: Daniel E. Zeck , David Shaw , Robert Worsnop , John Ryan Bard
IPC: H04L29/06
Abstract: Disclosed are various approaches for workflow service back end integration. In some examples, a data request is received. The request is associated with a network service. A single sign-on (SSO) token is received. The SSO token represents a user account authenticated with an identity manager. Authentication data for the network service is identified based on the SSO token. The authentication data can specify an authentication site of the network service. A navigation action is automatically performed on the authentication site. The requested data is received. A command to present on a client device the data is transmitted to the client device.
-
公开(公告)号:US20210409452A1
公开(公告)日:2021-12-30
申请号:US17470711
申请日:2021-09-09
Applicant: VMware, Inc.
Inventor: Simon Brooks , Daniel E. Zeck , Xinpi Du , Ali Mohsin , Kishore Sajja , Nikhil Mehta
Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
-
公开(公告)号:US20210126835A1
公开(公告)日:2021-04-29
申请号:US17140593
申请日:2021-01-04
Applicant: VMware, Inc.
Inventor: Stephen Turner , Daniel E. Zeck , Simon Brooks
Abstract: Disclosed are various examples for Internet of Things (IoT) device discovery and deployment. In some embodiments, a device identifier is received from an IoT device. The IoT device is determined, based on the device identifier, to be associated with a device account with a management service. An enrollment of the IoT device is performed. A capabilities declaration is received from the IoT device. IoT device instructions are determined based on the capabilities declaration. IoT device instructions are transmitted to the IoT device, causing it to perform a capability specified in the capabilities declaration.
-
公开(公告)号:US10887180B2
公开(公告)日:2021-01-05
申请号:US16190524
申请日:2018-11-14
Applicant: VMware, Inc.
Inventor: Stephen Turner , Daniel E. Zeck , Simon Brooks
IPC: H04L12/24 , H04L29/06 , H04L29/08 , G06F3/0484 , G06F3/0482
Abstract: Disclosed are various examples for Internet of Things (IoT) device discovery and deployment. In some embodiments, a device identifier is received from an IoT device. The IoT device is determined, based on the device identifier, to be associated with a device account with a management service. An enrollment of the IoT device is performed. A capabilities declaration is received from the IoT device. IoT device instructions are determined based on the capabilities declaration. IoT device instructions are transmitted to the IoT device, causing it to perform a capability specified in the capabilities declaration.
-
公开(公告)号:US20200314087A1
公开(公告)日:2020-10-01
申请号:US16369498
申请日:2019-03-29
Applicant: VMware, Inc.
Inventor: Daniel E. Zeck , David Shaw , Robert Worsnop , John Ryan Bard
IPC: H04L29/06 , H04L29/08 , G06F3/0482 , G06F3/0481
Abstract: Disclosed are various approaches for workflow service back end integration. In some examples, an event is detected. The event is associated with an enterprise. A workflow action to perform is identified based on event. A user account is identified using at least one of the workflow action and the event. A command to present the workflow action is transmitted to a client device. A user indication to perform the workflow action is identified. Authentication data for the network service is identified based on a single sign-on (SSO) token associated with the user account. The workflow action is automatically performed using the network service. An authentication with the network service is completed based on the authentication data.
-
公开(公告)号:US20200092335A1
公开(公告)日:2020-03-19
申请号:US16134542
申请日:2018-09-18
Applicant: VMware, Inc.
Inventor: Simon Brooks , Daniel E. Zeck , Xinpi Du , Ali Mohsin , Kishore Sajja , Nikhil Mehta
Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
-
-
-
-
-
-