-
公开(公告)号:US12216567B2
公开(公告)日:2025-02-04
申请号:US18361383
申请日:2023-07-28
Applicant: Ivanti, Inc.
Inventor: Paul Keith Branton , Jens Miltner
IPC: G06F11/36
Abstract: A method of evaluating a computer-implemented product that is deployed on one or more endpoints. The method includes identifying a first program and a second program of a product deployed on a first endpoint of multiple endpoints. The method includes implementing a diagnostic process at the first endpoint. The diagnostic process includes a first subroutine directed to the first program and a second subroutine directed to a second program. The subroutines each execute installation and functional parameter tests of the programs. Responsive to the first subroutine indicating that the first program is operational, the method includes outputting data that the first subroutine passed. Responsive to the second subroutine returning an unexpected result, the method includes outputting data indicating details of the unexpected result and implementing a remediation that modifies the second program or a condition at the first endpoint to mitigate the unexpected result.
-
公开(公告)号:US12126626B2
公开(公告)日:2024-10-22
申请号:US17477100
申请日:2021-09-16
Applicant: Ivanti, Inc.
Inventor: Retika Kumar , Tyler Dailey , Zach Durtschi
CPC classification number: H04L63/107 , H04L63/20 , H04W12/65
Abstract: A method of mobile device management (MDM) comprising scanning, by an optical reader of a first mobile device, an optical code. The optical code is generated based on a policy and a group that includes the first and a second mobile device. The optical code has encoded enrollment details of the policy. Responsive to the scanning, the method includes connecting to a computer interface on which an enrollment application is accessible and causing display of an enrollment page. The method includes receiving identification input entered into the enrollment page. In response to the identification input, the method includes automatically transferring the enrollment details and the identification input to the enrollment application. Based on the transfer, enrolling the first mobile device in a MDM system. Enrollment of the first mobile device includes enabling a set of functions of the first mobile device consistent with the policy of the group.
-
公开(公告)号:US12028330B2
公开(公告)日:2024-07-02
申请号:US17409218
申请日:2021-08-23
Applicant: Ivanti, Inc.
Inventor: Mark Tempel , Andrew Moravec
IPC: H04L9/40 , G06F21/44 , G06F21/60 , H04L67/1097
CPC classification number: H04L63/0823 , G06F21/44 , G06F21/604 , H04L63/0428 , H04L63/045 , H04L63/0464 , H04L63/06 , H04L63/061 , H04L67/1097
Abstract: A method by a management server is described. The method includes receiving a credentials request from a requesting management node. The credentials request includes a public key of the requesting management node. The method also includes determining whether the management server has credentials encrypted for the requesting management node in a local cache. The credentials are encrypted using the public key of the requesting management node and cannot be decrypted by the management server. The method further includes sending the encrypted credentials to the requesting management node when the management server has the encrypted credentials. The requesting management node can decrypt the encrypted credentials using a private key.
-
公开(公告)号:US12028204B2
公开(公告)日:2024-07-02
申请号:US18046136
申请日:2022-10-12
Applicant: Ivanti, Inc.
Inventor: Robin Rowe , Jack Smith
IPC: H04L12/00 , H04L41/0654 , H04L41/0681
CPC classification number: H04L41/0654 , H04L41/0681
Abstract: A method of identification and remediation of a mass event in a managed network. The method includes receiving a first report of an event occurring at a first endpoint of the managed network. In response, a first action is performed. The first action being initiated based on a repeating event trigger not being triggered. The method includes receiving a second report of the event occurring at a second endpoint. In response, the method includes determining whether a threshold that triggers the repeating event trigger is exceeded. The threshold being indicative of a mass event in the managed network. Responsive to the threshold being exceeded, the method includes triggering the repeating event trigger and performing a second automated resolution action in the managed network. The second action being different from the first action. Responsive to the threshold not being exceeded, the method includes performing the first action at the second endpoint.
-
公开(公告)号:US11928461B2
公开(公告)日:2024-03-12
申请号:US17573531
申请日:2022-01-11
Applicant: Ivanti, Inc.
Inventor: Terry Courtney , David Edgar , Vida Sirmeniene , Simon Oldfield
Abstract: An embodiment includes a method of software utilization evaluation in a managed network. The method includes receiving a software parameter for a software implemented by a managed device in a managed network. The method includes obtaining status data of the software on the device. The status data indicating whether the software is in use at the device at a time. The method includes aggregating the status data to determine a software usage of the software at the device. Responsive to the software usage being below a usage threshold, the method includes generating software management action. The usage threshold being based on the software parameter. Responsive to a state at a management device, the method includes implementing the software management action to remotely modify at least one aspect of the managed device.
-
公开(公告)号:US20240069531A1
公开(公告)日:2024-02-29
申请号:US18458610
申请日:2023-08-30
Applicant: Ivanti, Inc.
Inventor: Travis Peters , David Brugneaux , Laurent Gabardos , Ian Hughes
IPC: G05B19/418
CPC classification number: G05B19/41855
Abstract: A method may include obtaining a first sensor input signal and converting the first sensor input signal to a second sensor input signal having a common data format based on one or more data conversion rules. The method may include appending the second sensor input signal with a variable that describes information relating to the first sensor input signal. The method may include broadcasting the second sensor input signal in the common data format to one or more data storages and sending an instruction to actuate warehouse operations to one or more receiving systems based on the one or more data storages to which the second sensor input signal is broadcast. The method may include controlling one or more operations of a warehouse based on the instruction to actuate warehouse operations.
-
公开(公告)号:US11853739B2
公开(公告)日:2023-12-26
申请号:US17508748
申请日:2021-10-22
Applicant: Ivanti, Inc.
Inventor: Sean McDonald , Johnathan Gohde , Jaremie Romer
Abstract: A method of automated software management includes importing update metadata consumed from an update list describing cybersecurity vulnerabilities and product updates. Based on the update metadata, the method includes generating an initial update list including outstanding product updates for endpoints included in a managed network. The method includes discovering products of an endpoint of the managed network. Based on discovered products, the method includes generating an endpoint-specific inventory including product metadata of the products loaded on the endpoint. The method includes identifying an unnecessary product update of the outstanding product updates not related to the discovered products. The method includes filtering the unnecessary product update from the initial update list to generate a modified update list including a subset of outstanding product updates and omitting the unnecessary product update. The method includes distributing only the subset of outstanding product updates of the modified update list to the managed endpoint.
-
公开(公告)号:US11783394B2
公开(公告)日:2023-10-10
申请号:US17500830
申请日:2021-10-13
Applicant: Ivanti, Inc.
Inventor: Christopher J. Goettl , Darci Taylor , James Sferas , Josh Kilts , David Brylyn , Rex McMillan
IPC: G06Q30/06 , G06Q30/0601
CPC classification number: G06Q30/0601
Abstract: A method of product update analysis and management includes receiving metadata of a product update related to a code change of an application on an endpoint of a managed network. The method includes scraping posts related to the product update from two different internet websites. The method includes aggregating the posts from the internet websites. The method includes quantifying a social volume from the aggregated posts. The social volume being a measure of discussion related to the product update. The method includes extracting content from the aggregated posts. Based on the extracted content, the method includes summarizing the posts into a collection of terms or phrases representative of a topic of the posts. The method includes causing display of an indication of the social volume and the collection of terms or phrases. The method includes implementing the product update to affect a change in program code at the application.
-
公开(公告)号:US11698977B1
公开(公告)日:2023-07-11
申请号:US17098074
申请日:2020-11-13
Applicant: Ivanti, Inc.
Inventor: Benjamin Anthony Mixon-Baca , Srinivas Mukkamala
CPC classification number: G06F21/577 , G06N20/00 , G06F2221/033
Abstract: A method and/or computer software for estimating the probability that a software weakness will be used in an exploit and/or malware and the probability that the developed exploit and/or malware will result in a compromise.
-
公开(公告)号:US11620372B2
公开(公告)日:2023-04-04
申请号:US16906915
申请日:2020-06-19
Applicant: Ivanti, Inc.
Inventor: Suresh Kumar Batchu
Abstract: Techniques are disclosed to provide application extension-based authentication on a device under third party management. In various embodiments, a unique identifier associated with an authentication app is stored on the device. An app extension framework that enables a native app to request, via an app extension associated with the authentication app, access to a service with which the native app is associated is provided. The authentication app is configured to use the unique identifier to determine a security posture of the device and to grant or deny access to the service based at least in part on the security posture of the device.
-
-
-
-
-
-
-
-
-