-
公开(公告)号:US20220028398A1
公开(公告)日:2022-01-27
申请号:US17016367
申请日:2020-09-09
Applicant: VMWARE, INC.
Inventor: SUMAN ALUVALA , Ramani Panchapakesan , Rohit Pradeep Shetty , Arjun Kochhar
Abstract: Systems and methods are provided for optimizing and securing an enterprise voice service accessed by an external voice assistant device. An enterprise voice assistant installed on a client device acts as an enterprise voice service for an external voice assistant device. The enterprise voice assistant receives a voice query from the external voice assistant device. The voice query is processed using a machine learning model to extract an intent and at least one slot. The extracted intent and at least one slot are used to determine whether a response to the voice query can be generated using local enterprise data that was previously received and stored by the client device from a management server. The response is generated based on the determination by using the local enterprise data or by sending the extracted intent and at least one slot to and receiving the response from the management server.
-
公开(公告)号:US20180337889A1
公开(公告)日:2018-11-22
申请号:US15684970
申请日:2017-08-24
Applicant: VMWARE, INC.
Inventor: RAMANI PANCHAPAKESAN , SUMAN ALUVALA , RAJNEESH KESAVAN , ARJUN KOCHHAR , PURAN CHAND
CPC classification number: H04L63/0272 , H04L9/14 , H04L63/105 , H04L63/166 , H04L63/18
Abstract: Disclosed are various examples for establishing encrypted channels or tunnels within a TCP or other communication session between a tunnel endpoint and tunnel client on a client device. A tunnel client on the client device can determine an encryption level based upon a bundle identifier of the application originating the network traffic, the destination of the network traffic, the category of the application, or other factors.
-
公开(公告)号:US20210144132A1
公开(公告)日:2021-05-13
申请号:US17157367
申请日:2021-01-25
Applicant: VMware, Inc.
Inventor: SUMAN ALUVALA , RAMANI PANCHAPAKESAN , RAJNEESH KESAVAN , ARJUN KOCHHAR
Abstract: Examples described herein include systems and methods for performing distributed encryption across multiple devices. An example method can include a first device discovering a second device that shares a network. The device can identify data to be sent to a server and calculate a checksum for that data. The device can then split the data into multiple portions and send a portion to the second device, along with a certificate associated with the server for encrypting the data. The first device can encrypt the portion of data it retained. The first device can receive an encrypted version of the second portion of the data sent to the second device. The first device can merge these two portions and send the merged encrypted data to the server, along with the checksum value. The server can decrypt the data and confirm that it reflects the original set of data.
-
公开(公告)号:US20190230065A1
公开(公告)日:2019-07-25
申请号:US15913942
申请日:2018-03-07
Applicant: VMWARE, INC.
Inventor: RAMANI PANCHAPAKESAN , SUMAN ALUVALA , NIRANJAN PARAMASHIVAIAH , MAHESH KAVATAGE , PAVAN RAJKUMAR RANGAIN , CRAIG FARLEY NEWELL
Abstract: Disclosed are various examples for establishing encrypted channels or tunnels within a TCP or other communication session between a tunnel endpoint and tunnel client, on a client device. A tunnel endpoint on the client device can determine an encryption key based upon whether a client device is in compliance with encryption policies of the enterprise.
-
公开(公告)号:US20220027855A1
公开(公告)日:2022-01-27
申请号:US17078121
申请日:2020-10-23
Applicant: VMWARE, INC.
Inventor: SUMAN ALUVALA , Arjun KOCHHAR , Pavan Rajkumar RANGAIN , Mahesh Ashok KAVATAGE
IPC: G06Q10/10 , H04L12/911 , H04L12/58 , G06F16/907 , G06F16/9032
Abstract: Systems and methods are included for improved interorganizational collaboration. An agent on a server can crawl through data files to identify keywords relating to a product. The agent can create tags and assign the keywords to the tags. The agent can crawl through user-related data files to identify potential support users. The support users can be mapped to tags in a database. A user interacting with a chat application can request help with the product. The agent can extract keywords from the request and use them to identify a tag. The agent can map the tag to support users and using an algorithm can select a support user to send the help request to. If the support user denies the request or does not respond, the agent can send the request to another support user. Once a support user accepts the request, the agent can connect the users.
-
公开(公告)号:US20190166107A1
公开(公告)日:2019-05-30
申请号:US15898670
申请日:2018-02-19
Applicant: VMWARE. INC.
Inventor: SUMAN ALUVALA , RAMANI PANCHAPAKESAN , RAJNEESH KESAVAN , ARJUN KOCHHAR
Abstract: Examples described herein include systems and methods for performing distributed encryption across multiple devices. An example method can include a first device discovering a second device that shares a network. The device can identify data to be sent to a server and calculate a checksum for that data. The device can then split the data into multiple portions and send a portion to the second device, along with a certificate associated with the server for encrypting the data. The first device can encrypt the portion of data it retained. The first device can receive an encrypted version of the second portion of the data sent to the second device. The first device can merge these two portions and send the merged encrypted data to the server, along with the checksum value. The server can decrypt the data and confirm that it reflects the original set of data.
-
公开(公告)号:US20210211422A1
公开(公告)日:2021-07-08
申请号:US16801197
申请日:2020-02-26
Applicant: VMWARE, INC.
Inventor: ROHIT PRADEEP SHETTY , SUMAN ALUVALA
Abstract: Disclosed are various aspects of voice skill session lifetime management. In some examples, a session extension request is received. The session extension request extends a voice skill session of a voice-activated device. A personal client device is identified based on the session extension request. A command to emit an ultrasonic pulse is transmitted to the personal client device.
-
公开(公告)号:US20210209710A1
公开(公告)日:2021-07-08
申请号:US16794265
申请日:2020-02-19
Applicant: VMWARE, INC.
Inventor: ROHIT PRADEEP SHETTY , ERICH PETER STUNTEBECK , RAMANI PANCHAPAKESAN , SUMAN ALUVALA , CHAOTING XUAN
Abstract: Disclosed are various examples for audio data leak prevention using user and device contexts. In some examples, a voice assistant device can be connected to a remote service that provides enterprise data to be audibly emitted by the voice assistant device. In response to a request for the enterprise data being received from the voice assistant device, an audio signal can be generated that audibly broadcasts the enterprise data. The audio signal can be generated to audibly redact at least a portion of the enterprise data based at least in part on a mode of operation of the voice assistant device. The voice assistant device can be directed to emit the enterprise data through a playback of the audio signal.
-
公开(公告)号:US20180337887A1
公开(公告)日:2018-11-22
申请号:US15641354
申请日:2017-07-05
Applicant: VMWARE, INC.
Inventor: SUMAN ALUVALA , Ramani Panchapakesan , Niranjan Paramashivaiah , Mahesh Kavatage , Pavan Rajkumar Rangain
IPC: H04L29/06 , H04L12/46 , H04L12/66 , H04L12/851 , H04L12/911
CPC classification number: H04L63/029 , H04L12/4633 , H04L12/4641 , H04L12/66 , H04L47/24 , H04L47/2433 , H04L47/245 , H04L47/2475 , H04L47/825 , H04L63/0272 , H04L63/0281 , H04L63/166 , H04L67/322
Abstract: Disclosed are various examples for prioritizing application traffic through network tunnels between a client device and a tunnel endpoint. Network traffic is received from each of a plurality of applications executed by the client device. It is determined that the network traffic of a first application of the plurality of applications is associated with a lower priority than the network traffic of a second application of the plurality of applications. A bandwidth allocation to the network traffic of the first application is limited in the encrypted tunnel as compared to a bandwidth al location to the network traffic of the second application in the encrypted tunnel according to the lower priority. The network traffic of each of the plurality of applications is forwarded through the encrypted tunnel to the tunnel endpoint
-
公开(公告)号:US20230344811A1
公开(公告)日:2023-10-26
申请号:US18216367
申请日:2023-06-29
Applicant: VMware, Inc.
Inventor: SUMAN ALUVALA , RAMANI PANCHAPAKESAN , RAJNEESH KESAVAN , ARJUN KOCHHAR
CPC classification number: H04L63/0485 , G06F21/64 , H04L9/3247 , H04L9/3268 , H04L63/123 , H04L9/3263 , H04L9/0894 , H04L2209/80
Abstract: Examples described herein include systems and methods for performing distributed encryption across multiple devices. An example method can include a first device discovering a second device that shares a network. The device can identify data to be sent to a server and calculate a checksum for that data. The device can then split the data into multiple portions and send a portion to the second device, along with a certificate associated with the server for encrypting the data. The first device can encrypt the portion of data it retained. The first device can receive an encrypted version of the second portion of the data sent to the second device. The first device can merge these two portions and send the merged encrypted data to the server, along with the checksum value. The server can decrypt the data and confirm that it reflects the original set of data.
-
-
-
-
-
-
-
-
-