-
公开(公告)号:US12032985B2
公开(公告)日:2024-07-09
申请号:US17245229
申请日:2021-04-30
Applicant: VMware, Inc.
CPC classification number: G06F9/45558 , G06F8/65 , G06F9/44505 , G06F9/54 , H04L9/3247 , G06F2009/45575 , G06F2009/45587 , G06F9/547
Abstract: Examples of enterprise management using managed virtual machines are described. Virtual machine files can be extracted from a virtual machine package and stored on a host device. The virtual machine files can include a managed virtual machine configuration file, an NVRAM file, and a virtual disk file, as well as other files. A digital signature of the managed virtual machine package can be verified. The digital signature can be based on the managed virtual machine configuration file, the NVRAM file, and a virtual disk file. The managed virtual machine can be added to a virtual machine inventory of the host desktop hypervisor and executed.
-
公开(公告)号:US20220350629A1
公开(公告)日:2022-11-03
申请号:US17245234
申请日:2021-04-30
Applicant: VMware, Inc.
Abstract: Examples of enterprise management using managed virtual machines are described. A guest management agent executed within a managed virtual machine receives a command to update a user context configuration of the managed virtual machine from a management service. The command to update the user context configuration of the managed virtual machine is transferred through an inter-process communication (IPC) channel from the guest management agent within the managed virtual machine to a host management agent executed on the host device outside the managed virtual machine. The command to update the user context configuration of the managed virtual machine is implemented using a host desktop hypervisor.
-
公开(公告)号:US20220113987A1
公开(公告)日:2022-04-14
申请号:US17068076
申请日:2020-10-12
Applicant: VMware, Inc.
Inventor: Stephen Jonathan Parry-Barwick , Lili Wang , Hua Fiona Zhang , Maria Matelle Sy
IPC: G06F9/445 , G06F9/451 , G06F3/0482 , G06F21/62 , G06F21/51
Abstract: Disclosed are various examples of intelligent provisioning management. An application launch is detected from a client device. An application launch policy is identified. Device parameters are identified and mapped to an application access type according to the application launch policy. The application is accessed according to the application access type.
-
公开(公告)号:US20220350631A1
公开(公告)日:2022-11-03
申请号:US17245243
申请日:2021-04-30
Applicant: VMware, Inc.
IPC: G06F9/455
Abstract: Examples of enterprise management using managed virtual machines are described. A host user context configuration can be received from a host management agent. The host user context configuration can include one or more policies. A managed virtual machine user context configuration can be received from a guest management agent within a managed virtual machine. A portion of the host user context configuration can be processed using a translation matrix to identify a configuration service provider (CSP)-based profile that is mapped to a policy from the host user context configuration. A command to enforce the CSP-based profile on the managed virtual machine can be transmitted.
-
公开(公告)号:US20220350630A1
公开(公告)日:2022-11-03
申请号:US17245239
申请日:2021-04-30
Applicant: VMware, Inc.
Abstract: Examples of enterprise management using managed virtual machines (VMs) are described. In one example, a virtual machine base image is validated to comply with a plurality of managed virtual machine packaging rules of a management service. Managed virtual machine configuration parameters are written to a managed virtual machine configuration file of a managed virtual machine. The managed virtual machine includes a management component that implements instructions from a management service. A managed virtual machine package file is generated to include the managed virtual machine configuration file and enterprise-specific enterprise resources identified from the management service based on the enterprise identifier.
-
公开(公告)号:US10740038B2
公开(公告)日:2020-08-11
申请号:US16105650
申请日:2018-08-20
Applicant: VMware, Inc.
Inventor: Michael John Wookey , Paul Adam Ryman , Maria Matelle Tarroza , Mallikharjuna Reddy Deva , Stephen Jonathan Parry-Barwick
IPC: G06F3/06 , G06F9/455 , G06F16/188
Abstract: Embodiments described herein are related to performing virtual application delivery. In some embodiments, a method includes accessing, at a computing device, a datastore comprising a first virtual disk file mapped to a plurality of virtual disk files separate from the first virtual disk file, wherein each of the plurality of virtual disk files comprises at least one application stored thereon. The method further includes receiving, at the computing device, one or more operations for accessing the first virtual disk file, the one or more operations corresponding to a first application stored on a second virtual disk file of the plurality of virtual disk files. The method further includes redirecting the one or more operations for accessing the first virtual disk file to the second virtual disk file.
-
公开(公告)号:US12118377B2
公开(公告)日:2024-10-15
申请号:US17245243
申请日:2021-04-30
Applicant: VMware, Inc.
IPC: G06F9/455
CPC classification number: G06F9/45558 , G06F9/45545 , G06F2009/45562 , G06F2009/4557 , G06F2009/45587
Abstract: Examples of enterprise management using managed virtual machines are described. A host user context configuration can be received from a host management agent. The host user context configuration can include one or more policies. A managed virtual machine user context configuration can be received from a guest management agent within a managed virtual machine. A portion of the host user context configuration can be processed using a translation matrix to identify a configuration service provider (CSP)-based profile that is mapped to a policy from the host user context configuration. A command to enforce the CSP-based profile on the managed virtual machine can be transmitted.
-
公开(公告)号:US20230275918A1
公开(公告)日:2023-08-31
申请号:US18315049
申请日:2023-05-10
Applicant: VMware, Inc.
Inventor: Kar-Fai Tse , Chaoting Xuan , Ravish Chawla , Erich Stuntebeck , Stephen Jonathan Parry-Barwick
IPC: H04L9/40 , H04L41/0604 , H04L41/0813 , H04L43/0817 , H04L41/147 , H04W12/37 , H04W12/121 , H04L41/149
CPC classification number: H04L63/1425 , H04L63/1416 , H04L63/1441 , H04L41/0627 , H04L63/20 , H04L41/0813 , H04L63/102 , H04L43/0817 , H04L41/147 , H04W12/37 , H04W12/121 , H04L41/149 , H04L43/16
Abstract: Disclosed are various approaches for automating the detection and identification of anomalous devices in a management service. Device check-ins are received by a management service and housed in a data store. The quantity of device check-ins over various time periods can be analyzed using various approaches to identify anomalous devices.
-
公开(公告)号:US11687348B2
公开(公告)日:2023-06-27
申请号:US17068076
申请日:2020-10-12
Applicant: VMware, Inc.
Inventor: Stephen Jonathan Parry-Barwick , Lili Wang , Hua Fiona Zhang , Maria Matelle Sy
IPC: G06F9/445 , G06F9/451 , G06F21/62 , G06F21/51 , G06F3/0482
CPC classification number: G06F9/4451 , G06F3/0482 , G06F9/452 , G06F21/51 , G06F21/629 , G06F2221/2141
Abstract: Disclosed are various examples of intelligent provisioning management. An application launch is detected from a client device. An application launch policy is identified. Device parameters are identified and mapped to an application access type according to the application launch policy. The application is accessed according to the application access type.
-
公开(公告)号:US11652832B2
公开(公告)日:2023-05-16
申请号:US16918033
申请日:2020-07-01
Applicant: VMware, Inc.
Inventor: Kar-Fai Tse , Chaoting Xuan , Ravish Chawla , Erich Stuntebeck , Stephen Jonathan Parry-Barwick
IPC: H04L9/40 , H04L41/0604 , H04L41/0813 , H04L43/0817 , H04L41/147 , H04W12/37 , H04W12/121 , H04L41/149 , H04L43/16 , H04L43/10 , H04L43/0876 , H04L43/028
CPC classification number: H04L63/1425 , H04L41/0627 , H04L41/0813 , H04L41/147 , H04L41/149 , H04L43/0817 , H04L63/102 , H04L63/1416 , H04L63/1441 , H04L63/20 , H04W12/121 , H04W12/37 , H04L43/028 , H04L43/0876 , H04L43/10 , H04L43/16
Abstract: Disclosed are various approaches for automating the detection and identification of anomalous devices in a management service. Device check-ins are received by a management service and housed in a data store. The quantity of device check-ins over various time periods can be analyzed using various approaches to identify anomalous devices.
-
-
-
-
-
-
-
-
-