DISTRIBUTED PROFILE AND KEY MANAGEMENT
    5.
    发明申请

    公开(公告)号:US20190068568A1

    公开(公告)日:2019-02-28

    申请号:US15685094

    申请日:2017-08-24

    Applicant: VMware, Inc.

    Abstract: Disclosed are various examples for distributed profile and key management. In one example, a management service can generate a partially populated device profile and provide the partially populated device profile to a client application executable on a client device. The client application can generate a credential and insert the credential into the partially populated device profile to generate a fully populated device profile. The credential can be shared with at least one other client application on the client device. The management service can use the fully populated device profile to generate multiple profiles that rely on a single credential, such as a single X.509 security certificate.

    Distributed profile and key management

    公开(公告)号:US10992656B2

    公开(公告)日:2021-04-27

    申请号:US15685094

    申请日:2017-08-24

    Applicant: VMware, Inc.

    Abstract: Disclosed are various examples for distributed profile and key management. In one example, a management service can generate a partially populated device profile and provide the partially populated device profile to a client application executable on a client device. The client application can generate a credential and insert the credential into the partially populated device profile to generate a fully populated device profile. The credential can be shared with at least one other client application on the client device. The management service can use the fully populated device profile to generate multiple profiles that rely on a single credential, such as a single X.509 security certificate.

    Certificate pinning by a tunnel endpoint

    公开(公告)号:US10587582B2

    公开(公告)日:2020-03-10

    申请号:US15595254

    申请日:2017-05-15

    Applicant: VMware, Inc.

    Inventor: Jonathon Deriso

    Abstract: Disclosed are various approaches for implementing certificate pinning in a tunnel client on a client device. A tunnel client receives a connection request from an application executed by the client device to connect to a remote server. The tunnel client determines that the remote server corresponds to a known pinned host and then determines whether the remote server presents a certificate matching a pinned certificate for the known pinned host. If the presented certificate matches the pinned certificate, the tunnel client allows a connection to be established between the application and the remote server through a network tunnel between the tunnel client and a tunnel server.

Patent Agency Ranking