-
公开(公告)号:US10904230B2
公开(公告)日:2021-01-26
申请号:US15898670
申请日:2018-02-19
Applicant: VMWARE, INC.
Inventor: Suman Aluvala , Ramani Panchapakesan , Rajneesh Kesavan , Arjun Kochhar
Abstract: Examples described herein include systems and methods for performing distributed encryption across multiple devices. An example method can include a first device discovering a second device that shares a network. The device can identify data to be sent to a server and calculate a checksum for that data. The device can then split the data into multiple portions and send a portion to the second device, along with a certificate associated with the server for encrypting the data. The first device can encrypt the portion of data it retained. The first device can receive an encrypted version of the second portion of the data sent to the second device. The first device can merge these two portions and send the merged encrypted data to the server, along with the checksum value. The server can decrypt the data and confirm that it reflects the original set of data.
-
公开(公告)号:US20200228365A1
公开(公告)日:2020-07-16
申请号:US16247674
申请日:2019-01-15
Applicant: VMware, Inc.
Inventor: Ramani Panchapakesan , Suman Aluvala
IPC: H04L12/28
Abstract: Disclosed are various examples for dynamically generating and implementing scenario profiles for a network of devices, including IoT devices. A managed device can receive a dynamically generated scenario profile that defines tasks to be performed by the device for a given scenario. The device can also receive a scenario message that is broadcasted to all managed devices in a network and identifies an occurrence of a given scenario. If the device determines that the device is an intended recipient of the scenario message, the device can identify the scenario profile associated with the given scenario and perform the tasks defined by the scenario profile. The scenario profile can be modified and/or updated based on event data associated with the device.
-
23.
公开(公告)号:US11824965B2
公开(公告)日:2023-11-21
申请号:US17667188
申请日:2022-02-08
Applicant: VMWARE, INC.
Inventor: Suman Aluvala , Craig Farley Newell , Amit Kumar Yadav , Pavan Rajkumar Rangain , Rohit Pradeep Shetty
CPC classification number: H04L69/22 , H04L12/4633 , H04L12/4641 , H04L63/0272 , H04L69/16 , H04L69/326 , H04W88/18
Abstract: The technology disclosed herein enables packet handling based on user information included in packet headers. In a particular embodiment, a method provides, in a gateway to a network environment, establishing a first connection with a first connection endpoint outside of the network environment. The first connection is established based on authentication of user information received from the first connection endpoint. The method further provides adding the user information to a packet header of one or more first packets carrying a request to establish a second connection between the gateway and a second connection endpoint within the network environment. Also, the method provides transferring the one or more first packets towards the second connection endpoint.
-
公开(公告)号:US11672004B2
公开(公告)日:2023-06-06
申请号:US17397335
申请日:2021-08-09
Applicant: VMware, Inc.
Inventor: Rohit Pradeep Shetty , Suman Aluvala , Ramani Panchapakesan
CPC classification number: H04W72/56 , H04B7/18502 , H04W16/18 , H04W24/08 , H04W84/005 , H04W84/18
Abstract: Described herein are methods and systems for dynamically optimizing a Flying Ad-Hoc Network (“FANET”). A server that manages the FANET can receive information relating to the network activity of user devices connected to the FANET. Examples of the type of information included can include the user devices' locations, network connection quality, and network traffic volume dedicated to a Unified Endpoint Management (“UEM”) system of an enterprise. The server can analyze the network activity information based on a set of rules to prioritize the user devices connected to the FANET. The server can instruct unmanned aerial vehicles (“UAVs”) in the FANET to reposition themselves to provide the best connection for higher priority user devices.
-
公开(公告)号:US11516202B2
公开(公告)日:2022-11-29
申请号:US16790776
申请日:2020-02-14
Applicant: VMWARE, INC.
Inventor: Arjun Kochhar , Suman Aluvala , Amit Yadav , Shree Harsha Shedigumme
Abstract: Disclosed are various approaches for facilitating single sign-on (SSO) for third-party services that are accessible through messages (e.g., email) received by a user. A user can receive a message that includes an embedded URL or link that opens in a third-party service that requires authentication. Instead of requiring the user to enter authentication credentials for accessing the third-party service, a tunnel service can be used to intercept requests for authentication and redirect the requests to an identity manager that can issue a SSO token following an authentication of the user and device. Upon supplying the third-party service with the SSO token, the user can access the content associated with the third-party service without entering authentication credentials.
-
公开(公告)号:US11418584B2
公开(公告)日:2022-08-16
申请号:US16785672
申请日:2020-02-10
Applicant: VMWARE, INC.
Inventor: Pavan Kumar Alagam Bhatta Ravindra , Pavan Rajkumar Rangain , Mahesh Ashok Kavatage , Suman Aluvala
IPC: H04L29/08 , H04L67/1008 , H04L67/1029 , H04L67/51 , H04L61/5007 , H04L49/35 , H04L49/00 , G06F9/455
Abstract: This disclosure describes various ways in which a client agent can be incorporated into multiple virtual machines of a server cluster to keep track of the location of each instance of services running on the server cluster and facilitate rapid connection of different services on the server cluster as needed. When a first service requests connection to a second service, a client agent co-located with the first service is able to forward the request to a virtual network interface card (VNIC) associated with the second service. The VNIC is configured to forward the request to an available instance of the second service. The location of the services are determined and stored on one or more service registries right after the service instances are instantiated, removing the need for a search when new requests are received.
-
公开(公告)号:US11082373B1
公开(公告)日:2021-08-03
申请号:US16815083
申请日:2020-03-11
Applicant: VMware, Inc.
Inventor: Arjun Kochhar , Suman Aluvala , Arvind Maan , Nitin Sethi , Ramesh Pilla , Shree Harsha Shedigumme
IPC: H04L12/721 , H04L12/26 , H04L29/06 , H04L29/08 , H04L12/58 , G06Q10/10 , G06F40/216 , G06F40/258 , G06F40/268 , H04N21/2662 , H04N21/845 , H04N21/2385 , H04N21/2343 , G06F15/173 , G06F15/16
Abstract: Disclosed are various approaches for dynamically creating content to present to a user based on an identified intent, or other context, associated with a message (e.g., email). A message that is received from a message server can be analyzed to identify the message content within the message prior to distributing to the recipient client device. Trained intent identification models can be applied to the identified message content to determine an intent, or other type of context, associated with the message. Upon identifying the intent, the message header can be modified to include the intent prior to forwarding the message to the recipient client device. The client device can then display a user interface including the message and a user interface element corresponding to a third-party service. The user interface element can be dynamically generated to include an action component that upon selection, triggers an action associated with the intent.
-
28.
公开(公告)号:US20210227056A1
公开(公告)日:2021-07-22
申请号:US16815037
申请日:2020-03-11
Applicant: VMWARE, INC.
Inventor: Suman Aluvala , Craig Farley Newell , Amit Kumar Yadav , Pavan Rajkumar Rangain , Rohit Pradeep Shetty
Abstract: The technology disclosed herein enables packet handling based on user information included in packet headers. In a particular embodiment, a method provides, in a gateway to a network environment, establishing a first connection with a first connection endpoint outside of the network environment. The method further provides identifying first user information associated with the first connection and adding the first user information to a packet header of one or more first packets associated with the first connection. Also, the method provides transferring the one or more first packets into the network environment.
-
公开(公告)号:US20210211521A1
公开(公告)日:2021-07-08
申请号:US16802601
申请日:2020-02-27
Applicant: VMWARE, INC.
Inventor: Suman Aluvala , Ramani Panchapakesan , Pushkal Maheshwari , Mahesh Ashok Kavatage , Pavan Rajkumar Rangain , Erich Peter Stuntebeck
Abstract: A first server can generate user profiles and receive requests from user devices for enrollment in a first server-managed system that includes user groups. The first server can provide a unique key to a user device during an enrolment process based on a user group the user device is assigned to. The first server can include an enrollment notification for the user device in a first notification transmitted to a messaging service. The messaging service can transmit a second notification to the user device, and the user device can request a user profile from a second server based on second server access information included in the second notification. The second server can use the unique key to access user profile information which it transmits to the user device based on the request. The user device can access the user profile from the profile information using the unique key.
-
公开(公告)号:US10587583B2
公开(公告)日:2020-03-10
申请号:US15641354
申请日:2017-07-05
Applicant: VMWARE, INC.
Inventor: Suman Aluvala , Ramani Panchapakesan , Niranjan Paramashivaiah , Mahesh Kavatage , Pavan Rajkumar Rangain
IPC: H04L29/06 , H04L12/46 , H04L12/66 , H04L12/851 , H04L12/911 , H04L12/859 , H04L29/08
Abstract: Disclosed are various examples for prioritizing application traffic through network tunnels between a client device and a tunnel endpoint. Network traffic is received from each of a plurality of applications executed by the client device. It is determined that the network traffic of a first application of the plurality of applications is associated with a lower priority than the network traffic of a second application of the plurality of applications. A bandwidth allocation to the network traffic of the first application is limited in the encrypted tunnel as compared to a bandwidth allocation to the network traffic of the second application in the encrypted tunnel according to the lower priority. The network traffic of each of the plurality of applications is forwarded through the encrypted tunnel to the tunnel endpoint.
-
-
-
-
-
-
-
-
-