Secure demand-driven file distribution

    公开(公告)号:US10200489B2

    公开(公告)日:2019-02-05

    申请号:US15185732

    申请日:2016-06-17

    申请人: AirWatch LLC

    IPC分类号: G06F15/16 H04L29/08

    摘要: Computer networks for secure demand-driven file distribution are described. In one example, a client device receives a notification to check in for updates. In response, the client device checks in with a device services computing device on a computer network. The device services computing device determines a path list to certain cache computing devices on the computer network for receipt of the files, builds a markup file including the path list to the files, and transmits the markup file to the client device. The markup file can also include unique identifiers of the files and an encryption key for secure distribution of the files. Using the markup file, the client device can request the files, and the computer network is physically and logically arranged to distribute the files among the cache computing devices and to the client device in a secure and demand-driven manner.

    Auto tuning data anomaly detection

    公开(公告)号:US10515079B2

    公开(公告)日:2019-12-24

    申请号:US15190572

    申请日:2016-06-23

    申请人: AirWatch LLC

    摘要: Automatic tuning anomaly detection is described. The context metric keys are established during a training phase based on the surrounding context of data received from devices over time. Anomaly and tuning windows are also established for metric ranges of the context metric keys. After the training phase, incoming data is correlated against the keys to identify sets of the data associated with certain context metric keys. For any given context metric key, metric data values in the associated set of data fall either within or outside the metric range of the context metric key. If they fall outside the range for longer than the anomaly window, an alarm is raised. If they fall outside the range for longer than the tuning window, boundaries for the metric range are updated. Additionally, the contextual parameters of the context metric keys are also updated over time, as new data contexts appear.

    Auto tuning data anomaly detection

    公开(公告)号:US11442941B2

    公开(公告)日:2022-09-13

    申请号:US16709715

    申请日:2019-12-10

    申请人: AirWatch LLC

    摘要: Automatic tuning anomaly detection is described. The context metric keys are established during a training phase based on the surrounding context of data received from devices over time. Anomaly and tuning windows are also established for metric ranges of the context metric keys. After the training phase, incoming data is correlated against the keys to identify sets of the data associated with certain context metric keys. For any given context metric key, metric data values in the associated set of data fall either within or outside the metric range of the context metric key. If they fall outside the range for longer than the anomaly window, an alarm is raised. If they fall outside the range for longer than the tuning window, boundaries for the metric range are updated. Additionally, the contextual parameters of the context metric keys are also updated over time, as new data contexts appear.

    Secure demand-driven file distribution

    公开(公告)号:US11431826B2

    公开(公告)日:2022-08-30

    申请号:US16240221

    申请日:2019-01-04

    申请人: AirWatch LLC

    IPC分类号: H04L67/56 H04L67/10 H04L67/02

    摘要: Computer networks for secure demand-driven file distribution are described. In one example, a client device receives a notification to check in for updates. In response, the client device checks in with a device services computing device on a computer network. The device services computing device determines a path list to certain cache computing devices on the computer network for receipt of the files, builds a markup file including the path list to the files, and transmits the markup file to the client device. The markup file can also include unique identifiers of the files and an encryption key for secure distribution of the files. Using the markup file, the client device can request the files, and the computer network is physically and logically arranged to distribute the files among the cache computing devices and to the client device in a secure and demand-driven manner.

    SECURE DEMAND-DRIVEN FILE DISTRIBUTION
    5.
    发明申请

    公开(公告)号:US20190141155A1

    公开(公告)日:2019-05-09

    申请号:US16240221

    申请日:2019-01-04

    申请人: AirWatch LLC

    IPC分类号: H04L29/08

    摘要: Computer networks for secure demand-driven file distribution are described. In one example, a client device receives a notification to check in for updates. In response, the client device checks in with a device services computing device on a computer network. The device services computing device determines a path list to certain cache computing devices on the computer network for receipt of the files, builds a markup file including the path list to the files, and transmits the markup file to the client device. The markup file can also include unique identifiers of the files and an encryption key for secure distribution of the files. Using the markup file, the client device can request the files, and the computer network is physically and logically arranged to distribute the files among the cache computing devices and to the client device in a secure and demand-driven manner.

    SECURE DEMAND-DRIVEN FILE DISTRIBUTION
    6.
    发明申请

    公开(公告)号:US20170366346A1

    公开(公告)日:2017-12-21

    申请号:US15185732

    申请日:2016-06-17

    申请人: AirWatch LLC

    IPC分类号: H04L9/30 H04L29/08

    CPC分类号: H04L67/28 H04L67/02 H04L67/10

    摘要: Computer networks for secure demand-driven file distribution are described. In one example, a client device receives a notification to check in for updates. In response, the client device checks in with a device services computing device on a computer network. The device services computing device determines a path list to certain cache computing devices on the computer network for receipt of the files, builds a markup file including the path list to the files, and transmits the markup file to the client device. The markup file can also include unique identifiers of the files and an encryption key for secure distribution of the files. Using the markup file, the client device can request the files, and the computer network is physically and logically arranged to distribute the files among the cache computing devices and to the client device in a secure and demand-driven manner.