-
公开(公告)号:US11671415B2
公开(公告)日:2023-06-06
申请号:US16922569
申请日:2020-07-07
Applicant: VMware, Inc.
IPC: H04L9/40 , G06F3/0481 , G06F21/36
CPC classification number: H04L63/08 , G06F3/0481 , G06F21/36 , H04L63/0428 , H04L63/062 , H04L63/10 , H04L63/1416
Abstract: Systems and methods are included for creating an assured record of a user interaction. An application on a user device can receive an agreement. The agreement can include a specification with instructions for assuring the user interaction. The application can pass the agreement to an assured module installed in the application. The assured module can present the agreement to a user in an interface. The assured module can receive user input indicating acceptance or rejection of the agreement. The assured module can generate a confirmation file that confirms the user interaction. The assured module can sign the confirmation file with a digital signature that can be used by other entities to verify the authenticity of the confirmation file.
-
公开(公告)号:US11509537B2
公开(公告)日:2022-11-22
申请号:US17140593
申请日:2021-01-04
Applicant: VMware, Inc.
Inventor: Stephen Turner , Daniel E. Zeck , Simon Brooks
IPC: H04L41/12 , H04L9/40 , H04L67/12 , G06F3/0484 , G06F3/0482
Abstract: Disclosed are various examples for Internet of Things (IoT) device discovery and deployment. In some embodiments, a device identifier is received from an IoT device. The IoT device is determined, based on the device identifier, to be associated with a device account with a management service. An enrollment of the IoT device is performed. A capabilities declaration is received from the IoT device. IoT device instructions are determined based on the capabilities declaration. IoT device instructions are transmitted to the IoT device, causing it to perform a capability specified in the capabilities declaration.
-
公开(公告)号:US20210289002A1
公开(公告)日:2021-09-16
申请号:US17331709
申请日:2021-05-27
Applicant: VMware, Inc.
Inventor: Eugene Liderman , Stephen Turner , Simon Brooks
IPC: H04L29/06
Abstract: Disclosed are various examples that relate to adjusting a stringency of offline policy restrictions based on a situational context of a computing device. In one example, a system can receive an offline restriction policy for an application. The system can identify a request to execute an application during the offline period of time. A situational context of the computing device can be determined. A first application restriction can be enforced for the application on the computing device based on the identification of the computing device being in the offline period of time and the situational context. A change in the situational context of the computing device can be identified during the offline period of time based on a detection of a second condition. A second application restriction can be enforced for the application on the computing device during the offline period of time.
-
公开(公告)号:US11108556B2
公开(公告)日:2021-08-31
申请号:US16004013
申请日:2018-06-08
Applicant: VMware, Inc.
Inventor: Eugene Liderman , Stephen Louis Turner , Simon Brooks
Abstract: Aspects of secure inter-application data communications are described. In one example, a first application executing on a computing device obtains an identity certificate. The identity certificate can include a unique identifier of the computing device and a public key of the first application. To obtain the public keys of other applications executing on the computing device, the first application can query a management computing environment using the identity certificate. Once the computing device is authenticated by the management computing environment, the management computing environment can store the public key of the first application and return any public keys of other applications executing on the computing device. Once the public keys have been exchanged between the applications, the applications can encrypt and sign data packages for secure data communications between each other.
-
公开(公告)号:US11050791B2
公开(公告)日:2021-06-29
申请号:US16019950
申请日:2018-06-27
Applicant: VMware, Inc.
Inventor: Eugene Liderman , Stephen Turner , Simon Brooks
IPC: H04L29/06
Abstract: Disclosed are various examples that relate to adjusting a stringency of offline policy restrictions based on a situational context of a computing device. In one example, a system can receive an offline restriction policy for an application. The offline restriction policy comprises one or more rules that are associated with one or more actions. The system can cause the one or more actions to be performed during an offline period of time in an instance in which one of the rules is satisfied. The offline period of time representing time periods when the system does not have a network connection with a management system. The system can cause a first authentication action to be performed in an instance in which a first condition of the system satisfies a first rule. The system can also cause a second authentication action to be performed in an instance in which a second condition of the system satisfies a second rule.
-
-
-
-