Patents by Inventor Akeem Jenkins
Akeem Jenkins has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240080207Abstract: The disclosure provides an approach for certificate management for cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a cryptographic request related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information associated with the cryptographic request. Embodiments include determining, by the cryptographic agility system, based on the cryptographic request, a certificate for authenticating a key related to the cryptographic technique. Embodiments include providing, by the cryptographic agility system, the certificate to an endpoint related to the cryptographic request for use in authenticating the key.Type: ApplicationFiled: July 27, 2023Publication date: March 7, 2024Inventors: Marc Wayne BROTHERSON, Mark BENSON, Daniel James BEVERIDGE, Sean HUNTLEY, Akeem JENKINS, David OTT
-
Patent number: 11924343Abstract: The disclosure provides an approach for cryptographic agility. Embodiments include establishing, by a proxy component associated with a cryptographic agility system, a first secure connection with an application. Embodiments include receiving, by the proxy component, via the first secure connection, a communication from the application directed to an endpoint. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information related to the communication. Embodiments include establishing, by the proxy component, a second secure connection with the endpoint based on the cryptographic technique. Embodiments include transmitting, by the proxy component, a secure communication to the endpoint via the second secure connection based on the communication.Type: GrantFiled: July 26, 2021Date of Patent: March 5, 2024Assignee: VMware, Inc.Inventors: Akeem Jenkins, Mark Benson, Daniel James Beveridge, Marc Wayne Brotherson, Sean Huntley, David Ott
-
Patent number: 11916950Abstract: The disclosure provides an approach for coordinating a distributed vulnerability network scan. Embodiments include sending, by a computing node, a check-in message to a scanning coordinator, the check-in message indicating attributes of the computing node. Embodiments include receiving, by the computing node, a scan configuration message from the scanning coordinator, the scan configuration message comprising: scan timing information for the computing node; and a list of scanning targets for the computing node. Embodiments include determining, by the computing node, a scanning time window based on the scan timing information for the computing node. Embodiments include scanning, by the computing node, one or more scanning targets in the list of scanning targets for the computing node during the scanning time window.Type: GrantFiled: April 12, 2021Date of Patent: February 27, 2024Assignee: VMware, Inc.Inventors: Sean Huntley, Akeem Jenkins, Marc Wayne Brotherson
-
Patent number: 11902353Abstract: The disclosure provides an approach for cross-network communication by self-replicating applications. Embodiments include identifying, by a first instance of a self-replicating application on a first computing device having a first network connection to a parent component, a second computing device that is connected to the first computing device via a second network connection. Embodiments include self-replicating, by the first instance of the self-replicating application, across the second network connection to produce a second instance of the self-replicating application on the second computing device. Embodiments include initiating, by the first instance of the self-replicating application, a proxy tunnel on the first computing device. Embodiments include receiving, by the proxy tunnel, a first communication from the second instance of the self-replicating application via the second network connection.Type: GrantFiled: November 14, 2022Date of Patent: February 13, 2024Assignee: VMware, Inc.Inventors: Akeem Jenkins, Sean Huntley, Marc Wayne Brotherson
-
Patent number: 11818278Abstract: The disclosure provides an approach for certificate management for cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a cryptographic request related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information associated with the cryptographic request. Embodiments include determining, by the cryptographic agility system, based on the cryptographic request, a certificate for authenticating a key related to the cryptographic technique. Embodiments include providing, by the cryptographic agility system, the certificate to an endpoint related to the cryptographic request for use in authenticating the key.Type: GrantFiled: July 26, 2021Date of Patent: November 14, 2023Assignee: VMWARE, INC.Inventors: Marc Wayne Brotherson, Mark Benson, Daniel James Beveridge, Sean Huntley, Akeem Jenkins, David Ott
-
Patent number: 11693695Abstract: The disclosure provides an approach for controlling application self-replication in a network. Embodiments include determining, by a self-replicating application, one or more parameters related to a networking environment. Embodiments include applying, by the self-replicating application, one or more rules to the one or more parameters related to the networking environment. Embodiments include determining, by the self-replicating application, whether to replicate within the networking environment based on the applying of the one or more rules to the one or more parameters related to the networking environment.Type: GrantFiled: April 12, 2021Date of Patent: July 4, 2023Assignee: VMWARE, INC.Inventors: Sean Huntley, Marc Wayne Brotherson, Akeem Jenkins
-
Publication number: 20230078581Abstract: The disclosure provides an approach for cross-network communication by self-replicating applications. Embodiments include identifying, by a first instance of a self-replicating application on a first computing device having a first network connection to a parent component, a second computing device that is connected to the first computing device via a second network connection. Embodiments include self-replicating, by the first instance of the self-replicating application, across the second network connection to produce a second instance of the self-replicating application on the second computing device. Embodiments include initiating, by the first instance of the self-replicating application, a proxy tunnel on the first computing device. Embodiments include receiving, by the proxy tunnel, a first communication from the second instance of the self-replicating application via the second network connection.Type: ApplicationFiled: November 14, 2022Publication date: March 16, 2023Inventors: Akeem JENKINS, Sean HUNTLEY, Marc Wayne BROTHERSON
-
Publication number: 20230058198Abstract: The disclosure provides an approach for cryptographic agility. Embodiments include receiving, by a cryptographic agility system associated with an application, a request to establish a secure communication session. Embodiments include, prior to establishing the secure communication session, selecting, by the cryptographic agility system, a first cryptographic technique and a second cryptographic technique for the secure communication session. Embodiments include, during the secure communication session, utilizing the first encryption technique for securely communicating a first set of data. Embodiments include determining that a condition has been met for switching from the first encryption technique to the second encryption technique. Embodiments include, based on the determining that the condition has been met, utilizing the second encryption technique for securely communication a second set of data.Type: ApplicationFiled: August 23, 2021Publication date: February 23, 2023Inventors: Sean HUNTLEY, Akeem JENKINS, Marc Wayne BROTHERSON, David OTT
-
Publication number: 20230026253Abstract: The disclosure provides an approach for cryptographic agility. Embodiments include receiving a request from an application for a cryptographic operation, wherein the request is associated with a computing device. Embodiments include determining one or more resource constraints related to the computing device. Embodiments include selecting, based on the one or more resource constraints, a cryptographic technique from a plurality of cryptographic techniques associated with indications of resource requirements. Embodiments include performing the cryptographic operation using the cryptographic technique. Embodiments include providing a response to the application based on performing the cryptographic operation.Type: ApplicationFiled: July 26, 2021Publication date: January 26, 2023Inventors: Daniel James BEVERIDGE, Mark BENSON, Marc Wayne BROTHERSON, Sean HUNTLEY, Akeem JENKINS, David OTT
-
Publication number: 20230026560Abstract: The disclosure provides an approach for certificate management for cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a cryptographic request related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information associated with the cryptographic request. Embodiments include determining, by the cryptographic agility system, based on the cryptographic request, a certificate for authenticating a key related to the cryptographic technique. Embodiments include providing, by the cryptographic agility system, the certificate to an endpoint related to the cryptographic request for use in authenticating the key.Type: ApplicationFiled: July 26, 2021Publication date: January 26, 2023Inventors: Marc Wayne BROTHERSON, Mark BENSON, Daniel James BEVERIDGE, Sean HUNTLEY, Akeem JENKINS, David OTT
-
Publication number: 20230022112Abstract: The disclosure provides an approach for auditable cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a request to perform a cryptographic operation related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique for performing the cryptographic operation based on contextual information associated with the request. Embodiments include performing, by the cryptographic agility system, the cryptographic operation using the cryptographic technique. Embodiments include writing, by the cryptographic agility system, data related to selecting the cryptographic technique to a secure digital ledger.Type: ApplicationFiled: July 26, 2021Publication date: January 26, 2023Inventors: Daniel James BEVERIDGE, Mark BENSON, Marc Wayne BROTHERSON, Sean HUNTLEY, Akeem JENKINS, David OTT
-
Publication number: 20230023529Abstract: The disclosure provides an approach for cryptographic agility. Embodiments include establishing, by a proxy component associated with a cryptographic agility system, a first secure connection with an application. Embodiments include receiving, by the proxy component, via the first secure connection, a communication from the application directed to an endpoint. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information related to the communication. Embodiments include establishing, by the proxy component, a second secure connection with the endpoint based on the cryptographic technique. Embodiments include transmitting, by the proxy component, a secure communication to the endpoint via the second secure connection based on the communication.Type: ApplicationFiled: July 26, 2021Publication date: January 26, 2023Inventors: Akeem JENKINS, Mark BENSON, Daniel James BEVERIDGE, Marc Wayne BROTHERSON, Sean HUNTLEY, David OTT
-
Patent number: 11528317Abstract: The disclosure provides an approach for cross-network communication by self-replicating applications. Embodiments include identifying, by a first instance of a self-replicating application on a first computing device having a first network connection to a parent component, a second computing device that is connected to the first computing device via a second network connection. Embodiments include self-replicating, by the first instance of the self-replicating application, across the second network connection to produce a second instance of the self-replicating application on the second computing device. Embodiments include initiating, by the first instance of the self-replicating application, a proxy tunnel on the first computing device. Embodiments include receiving, by the proxy tunnel, a first communication from the second instance of the self-replicating application via the second network connection.Type: GrantFiled: May 5, 2021Date of Patent: December 13, 2022Assignee: VMWARE, INC.Inventors: Akeem Jenkins, Sean Huntley, Marc Wayne Brotherson