-
公开(公告)号:US20190065725A1
公开(公告)日:2019-02-28
申请号:US15685299
申请日:2017-08-24
Applicant: VMware, Inc.
Inventor: Eugene Liderman , Jonathon Deriso , William Thomas Hooper , Sagar Date , Tejas Mehrotra , Stephen Turner , Amogh Datar , Dipanshu Gupta
Abstract: Disclosed are various examples for distributed profile and key management. In one example, a client device can include an agent application and a PIV-D application. The agent application can receive a partially populated device profile generated by a management service to configure a setting on the client device. The PIV-D application can generate a derived credential and provide the derived credential to the agent application. The agent application can modify the partially populated device profile to include the credential to create a fully populated device profile and configure the client device in accordance with the fully populated device profile.
-
公开(公告)号:US20180152440A1
公开(公告)日:2018-05-31
申请号:US15365585
申请日:2016-11-30
Applicant: VMware, Inc.
Inventor: Yogesh Govind Hande , Shravan Shantharam , Kalyan Regula , Varun Murthy , Bhuvanesh Shanmuga Sundaram , Jonathon Deriso
CPC classification number: H04L63/0815 , H04L9/0894 , H04L9/3213 , H04L9/3242 , H04L63/0435
Abstract: Disclosed are various approaches for providing single sign-on capabilities for a user on a client device. A user's credentials can be authenticated by an identity provider application. The identity provider application can facilitate single sign-on capabilities for browser-based applications and native applications on the client device.
-
公开(公告)号:US20220353327A1
公开(公告)日:2022-11-03
申请号:US17866053
申请日:2022-07-15
Applicant: VMware, Inc.
Inventor: Jonathon Deriso , Saransh Bhatnagar , Rahul Parwani , Brian Link , Mohan Guttikonda , Satish Venkatakrishnan
IPC: H04L67/1074 , H04L41/0604 , H04L67/306 , H04L67/01 , H04L67/104
Abstract: Disclosed are various embodiments for recognizing state changes in client devices and managing the state of client devices using device-driven management workflows. A computing device can receive a state of a client device. The computing device can then determine if the received state matches an expected, compliant state of the client device. When the computing device determines that the received state does not match the expected state, the computing device can identify a remedial workflow that would bring the client device into compliance. The computing device can send the remedial workflow and an instruction to run the remedial workflow to the client device.
-
公开(公告)号:US10320771B2
公开(公告)日:2019-06-11
申请号:US15365524
申请日:2016-11-30
Applicant: VMware, Inc.
Inventor: Yogesh Govind Hande , Shravan Shantharam , Kalyan Regula , Varun Murthy , Bhuvanesh Shanmuga Sundaram , Jonathon Deriso
IPC: H04L29/06
Abstract: Disclosed are various approaches for providing single sign-on capabilities for a user on a client device. A user's credentials can be authenticated by an identity provider application. The identity provider application can facilitate single sign-on capabilities for browser-based applications and native applications on the client device.
-
公开(公告)号:US20190068568A1
公开(公告)日:2019-02-28
申请号:US15685094
申请日:2017-08-24
Applicant: VMware, Inc.
Inventor: Eugene Liderman , Jonathon Deriso , William Thomas Hooper , Sagar Date , Tejas Mehrotra , Stephen Turner , Amogh Datar , Dipanshu Gupta
Abstract: Disclosed are various examples for distributed profile and key management. In one example, a management service can generate a partially populated device profile and provide the partially populated device profile to a client application executable on a client device. The client application can generate a credential and insert the credential into the partially populated device profile to generate a fully populated device profile. The credential can be shared with at least one other client application on the client device. The management service can use the fully populated device profile to generate multiple profiles that rely on a single credential, such as a single X.509 security certificate.
-
公开(公告)号:US11443023B2
公开(公告)日:2022-09-13
申请号:US15685299
申请日:2017-08-24
Applicant: VMware, Inc.
Inventor: Eugene Liderman , Jonathon Deriso , William Thomas Hooper , Sagar Date , Tejas Mehrotra , Stephen Turner , Amogh Datar , Dipanshu Gupta
Abstract: Disclosed are various examples for distributed profile and key management. In one example, a client device can include an agent application and a PIV-D application. The agent application can receive a partially populated device profile generated by a management service to configure a setting on the client device. The PIV-D application can generate a derived credential and provide the derived credential to the agent application. The agent application can modify the partially populated device profile to include the credential to create a fully populated device profile and configure the client device in accordance with the fully populated device profile.
-
公开(公告)号:US10992656B2
公开(公告)日:2021-04-27
申请号:US15685094
申请日:2017-08-24
Applicant: VMware, Inc.
Inventor: Eugene Liderman , Jonathon Deriso , William Thomas Hooper , Sagar Date , Tejas Mehrotra , Stephen Turner , Amogh Datar , Dipanshu Gupta
Abstract: Disclosed are various examples for distributed profile and key management. In one example, a management service can generate a partially populated device profile and provide the partially populated device profile to a client application executable on a client device. The client application can generate a credential and insert the credential into the partially populated device profile to generate a fully populated device profile. The credential can be shared with at least one other client application on the client device. The management service can use the fully populated device profile to generate multiple profiles that rely on a single credential, such as a single X.509 security certificate.
-
公开(公告)号:US10587582B2
公开(公告)日:2020-03-10
申请号:US15595254
申请日:2017-05-15
Applicant: VMware, Inc.
Inventor: Jonathon Deriso
Abstract: Disclosed are various approaches for implementing certificate pinning in a tunnel client on a client device. A tunnel client receives a connection request from an application executed by the client device to connect to a remote server. The tunnel client determines that the remote server corresponds to a known pinned host and then determines whether the remote server presents a certificate matching a pinned certificate for the known pinned host. If the presented certificate matches the pinned certificate, the tunnel client allows a connection to be established between the application and the remote server through a network tunnel between the tunnel client and a tunnel server.
-
公开(公告)号:US10262146B2
公开(公告)日:2019-04-16
申请号:US15380458
申请日:2016-12-15
Applicant: VMware, Inc.
Inventor: Yogesh Govind Hande , Shravan Shantharam , Kalyan Regula , Varun Murthy , Bhuvanesh Shanmuga Sundaram , Jonathon Deriso , Raymond Welch
Abstract: Disclosed are various approaches for a secure communication session between applications installed on a client device. The secure communication session can be provided over an insecure operating system application programming interface (API). By exchanging session information and encryption data, communications over the insecure API can be secured.
-
10.
公开(公告)号:US20180173884A1
公开(公告)日:2018-06-21
申请号:US15380458
申请日:2016-12-15
Applicant: VMware, Inc.
Inventor: Yogesh Govind Hande , Shravan Shantharam , Kalyan Regula , Varun Murthy , Bhuvanesh Shanmuga Sundaram , Jonathon Deriso , Raymond Welch
CPC classification number: G06F21/606 , G06F21/602 , H04L9/0822 , H04L67/146
Abstract: Disclosed are various approaches for a secure communication session between applications installed on a client device. The secure communication session can be provided over an insecure operating system application programming interface (API). By exchanging session information and encryption data, communications over the insecure API can be secured.
-
-
-
-
-
-
-
-
-