Managing voice applications within a digital workspace

    公开(公告)号:US12088588B2

    公开(公告)日:2024-09-10

    申请号:US18327687

    申请日:2023-06-01

    Applicant: VMware, Inc.

    Abstract: Disclosed are various embodiments for managing voice-driven application. In one embodiment, among others, a system includes a computing device and program instructions. The program instructions can cause the computing device to initiate a management session between a voice application service and a management service based on receiving a first request from the voice application service. The program instructions can cause the computing device to initiate an application session between a voice-driven application and the management service based at least in part on a second request received from the voice application service. The program instructions can cause the computing device to enforce a compliance policy on a data request for the voice-driven application. The data response can be transmitted to the voice application. The voice application service can provide the data response to the client device for playback.

    Trusted firmware verification
    44.
    发明授权

    公开(公告)号:US12086257B2

    公开(公告)日:2024-09-10

    申请号:US16857971

    申请日:2020-04-24

    Applicant: VMware, Inc.

    Abstract: Disclosed are various examples for verification and management of firmware for client devices enrolled with a management service of an enterprise. The firmware verification includes a verification process using multiple checkpoints for determining whether status responses associated with firmware installed on and received from a managed client device can be trusted. The multiple checkpoints can include verifying certificate data, signature data, and an exit code included in status responses received from managed devices. In the event that one of the verification steps fails, the device can be considered compromised and subject to various compliance actions. The compliance actions can include limiting access to enterprise data, limiting access to one or more applications, wiping a device clean to reset the devices to the original factory settings, sending a notification to an enterprise administrator providing an indication of the detected compromise, and other types of compliance actions.

    System and method for checking reputations of executable files using file origin analysis

    公开(公告)号:US12086234B2

    公开(公告)日:2024-09-10

    申请号:US17507825

    申请日:2021-10-22

    Applicant: VMWARE, INC.

    CPC classification number: G06F21/52 G06F2221/033

    Abstract: System and method for checking reputations of executable files in an endpoint device use an integrity verification on an executable file being scanned to determine whether the executable file has been unaltered since being installed in the endpoint device. When the executable file has been determined to be unaltered since being installed in the endpoint device, a file origin analysis is executed on the executable file based on a vendor identifier for the executable file to determine whether the executable file is from an approved source. When the executable file is determined to be from an approved source, an output is produced that indicates that the executable file has an approved reputation.

    ACCOUNTABLE DECENTRALIZED ANONYMOUS PAYMENTS
    46.
    发明公开

    公开(公告)号:US20240265373A1

    公开(公告)日:2024-08-08

    申请号:US18160110

    申请日:2023-01-26

    Applicant: VMware, Inc.

    CPC classification number: G06Q20/3678 G06Q20/389 G06Q20/4014

    Abstract: Disclosed are examples of accountable decentralized anonymous payment systems and methods. One such method comprises storing, in a digital wallet, a digital coin that has been signed by a bank computing device; rerandomizing the digital coin and a coin signature to produce a new version of the digital coin that is anonymous with respect to an owner of the digital coin; sending the new version of the digital coin to a recipient computing device; computing a nullifier for the new version of the digital coin using a pseuodorandom function over a serial number of the digital coin; sending the nullifier for the new version of the digital coin to the bank computing device; and providing the bank computing device a zero knowledge proof that a value of the nullifier for the new version of the digital coin is correct and is the same as a nullifier of the digital coin.

    DISTRIBUTED FILE SYSTEM ON TOP OF A HYBRID B-EPSILON TREE

    公开(公告)号:US20240256510A1

    公开(公告)日:2024-08-01

    申请号:US18160742

    申请日:2023-01-27

    Applicant: VMware, Inc.

    CPC classification number: G06F16/2246 G06F16/182

    Abstract: A distributed file system operating over a plurality of hosts is built on top of a tree structure having a root node, internal nodes, and leaf nodes. Each host maintains at least one node and non-leaf nodes are allocated buffers according to a workload of the distributed file system. A write operation is performed by inserting write data into one of the nodes of the tree structure having a buffer. A read operation is performed by traversing the tree structure down to a leaf node that stores read target data, collecting updates to the read target data, which are stored in buffers of the traversed nodes, applying the updates to the read target data, and returning the updated read target data as read data.

    ALERTING AND REMEDIATING AGENTS AND MANAGED APPLIANCES IN A MULTI-CLOUD COMPUTING SYSTEM

    公开(公告)号:US20240248833A1

    公开(公告)日:2024-07-25

    申请号:US18158414

    申请日:2023-01-23

    Applicant: VMware, Inc.

    CPC classification number: G06F11/3664

    Abstract: An example method of alerting and remediation in a multi-cloud computing system having a public cloud in communication with a data center includes: receiving, at remediation and troubleshooting software executing in the public cloud, event and log information generated by endpoint software executing in the data center during operation thereof; generating, at the remediation and troubleshooting software, an incident in response to the event and log information; sending, by a remediation and troubleshooting service (RTS) of the remediation and troubleshooting software in response to the incident, a remediation task to a coordinator agent over a message fabric, the coordinator agent executing in an agent platform appliance of the data center; and executing, by the coordinator agent, remediation of the endpoint software according to the remediation task.

    CROSS-CLOUD WORKLOAD PORTABILITY ACROSS CLOUD PROVIDERS

    公开(公告)号:US20240248769A1

    公开(公告)日:2024-07-25

    申请号:US18099653

    申请日:2023-01-20

    Applicant: VMware, Inc.

    Inventor: Fernando Escobar

    CPC classification number: G06F9/5077 G06Q30/0645 G06F2209/503 G06Q2220/12

    Abstract: The present disclosure relates to moving workloads between cloud providers. A traceability application can receive a request to register a workload from a first virtualization service associated with a first cloud computing environment. To register the workload, the traceability application can generate an identification token in a distributed data store and an asset record corresponding to the identification token. The identification token can uniquely identify the workload among a plurality of workloads associated with a plurality of cloud computing environments. The traceability application can detect a migration of the VM from the first virtualization service associated with the first cloud computing environment to a second virtualization service associated with the second cloud computing environment. The traceability application can cause a transfer of an ownership of the identification token from the first virtualization service to the second virtualization service. The traceability application can update the asset record to reflect the transfer of the ownership of the identification token from the first virtualization service to the second virtualization service.

Patent Agency Ranking