Coordinating a distributed vulnerability network scan

    公开(公告)号:US11916950B1

    公开(公告)日:2024-02-27

    申请号:US17228027

    申请日:2021-04-12

    Applicant: VMware, Inc.

    CPC classification number: H04L63/1433

    Abstract: The disclosure provides an approach for coordinating a distributed vulnerability network scan. Embodiments include sending, by a computing node, a check-in message to a scanning coordinator, the check-in message indicating attributes of the computing node. Embodiments include receiving, by the computing node, a scan configuration message from the scanning coordinator, the scan configuration message comprising: scan timing information for the computing node; and a list of scanning targets for the computing node. Embodiments include determining, by the computing node, a scanning time window based on the scan timing information for the computing node. Embodiments include scanning, by the computing node, one or more scanning targets in the list of scanning targets for the computing node during the scanning time window.

    Application self-replication control

    公开(公告)号:US11693695B1

    公开(公告)日:2023-07-04

    申请号:US17228044

    申请日:2021-04-12

    Applicant: VMware, Inc.

    CPC classification number: G06F9/4875 H04L61/4511 H04L63/101

    Abstract: The disclosure provides an approach for controlling application self-replication in a network. Embodiments include determining, by a self-replicating application, one or more parameters related to a networking environment. Embodiments include applying, by the self-replicating application, one or more rules to the one or more parameters related to the networking environment. Embodiments include determining, by the self-replicating application, whether to replicate within the networking environment based on the applying of the one or more rules to the one or more parameters related to the networking environment.

    Proxy-enabled communication across network boundaries by self-replicating applications

    公开(公告)号:US11528317B1

    公开(公告)日:2022-12-13

    申请号:US17308696

    申请日:2021-05-05

    Applicant: VMware, Inc.

    Abstract: The disclosure provides an approach for cross-network communication by self-replicating applications. Embodiments include identifying, by a first instance of a self-replicating application on a first computing device having a first network connection to a parent component, a second computing device that is connected to the first computing device via a second network connection. Embodiments include self-replicating, by the first instance of the self-replicating application, across the second network connection to produce a second instance of the self-replicating application on the second computing device. Embodiments include initiating, by the first instance of the self-replicating application, a proxy tunnel on the first computing device. Embodiments include receiving, by the proxy tunnel, a first communication from the second instance of the self-replicating application via the second network connection. Embodiments include sending, by the proxy tunnel, based on the first communication, a second communication to the parent component via the first network connection.

    Dynamic certificate management in cryptographic agility frameworks

    公开(公告)号:US12166907B2

    公开(公告)日:2024-12-10

    申请号:US18360019

    申请日:2023-07-27

    Applicant: VMware, Inc.

    Abstract: The disclosure provides an approach for certificate management for cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a cryptographic request related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information associated with the cryptographic request. Embodiments include determining, by the cryptographic agility system, based on the cryptographic request, a certificate for authenticating a key related to the cryptographic technique. Embodiments include providing, by the cryptographic agility system, the certificate to an endpoint related to the cryptographic request for use in authenticating the key.

Patent Agency Ranking