Patents by Inventor Ali Mohsin
Ali Mohsin has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11750660Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.Type: GrantFiled: September 9, 2021Date of Patent: September 5, 2023Assignee: VMware, INC.Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
-
Publication number: 20210409452Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.Type: ApplicationFiled: September 9, 2021Publication date: December 30, 2021Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
-
Publication number: 20210397727Abstract: Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard.Type: ApplicationFiled: September 3, 2021Publication date: December 23, 2021Inventors: Xinpi Du, Ali Mohsin
-
Publication number: 20210297479Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: ApplicationFiled: June 4, 2021Publication date: September 23, 2021Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Patent number: 11128666Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.Type: GrantFiled: September 18, 2018Date of Patent: September 21, 2021Assignee: VMware, Inc.Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
-
Patent number: 11113420Abstract: Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard.Type: GrantFiled: March 27, 2018Date of Patent: September 7, 2021Assignee: VMware, Inc.Inventors: Xinpi Du, Ali Mohsin
-
Patent number: 11032363Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: GrantFiled: June 8, 2020Date of Patent: June 8, 2021Assignee: VMware, Inc.Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Patent number: 10911408Abstract: A portal application can receive a listing of available applications in response to a request sent to a management server. The listing can include a plurality of attributes for each available application, such as the requirements for using the features of each application or a dependency upon another application. Based on the plurality of attributes received, the portal application can determine that a first application requires installation of a second application in order for the first application to provide additional functionality. The portal application can display icons corresponding to the available applications and display one or more UI elements, indicating that the first application requires installation of the second application. The portal application can also push the second application to the device and assist in installing and initializing the second application on the device.Type: GrantFiled: February 26, 2018Date of Patent: February 2, 2021Assignee: VMware, Inc.Inventors: Ujwal Naik, Soorya Rajasoorya, Nischit Shetty, Amit Yadav, Sanjay Satagopan, Sharath Chavva, Nidhi Aggarwal, Ryan Turner, Nikhil Mehta, Ali Mohsin
-
Patent number: 10848563Abstract: Examples herein describe systems and methods for on-device, application-specific compliance enforcement. An example method can include receiving, at a user device, an application having a compliance engine. The user device can also store a compliance rule that applies to the received application. The compliance rule can specify a condition and a remedial action for the application. The user device can execute the application. The application can determine, using the compliance engine within the application, whether the condition is present. The determination can be made regardless of whether the device has internet or cellular connectivity. Based on determining that the condition is present, the application can perform the remedial action.Type: GrantFiled: September 17, 2018Date of Patent: November 24, 2020Assignee: VMware, Inc.Inventors: Nikhil Mehta, Sanjay Satagopan, Ali Mohsin, Simon Brooks, Ryan Turner, Lucas Chen
-
Publication number: 20200301752Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: ApplicationFiled: June 8, 2020Publication date: September 24, 2020Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Patent number: 10678606Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: GrantFiled: May 2, 2018Date of Patent: June 9, 2020Assignee: VMware, Inc.Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Publication number: 20200092374Abstract: Examples herein describe systems and methods for on-device, application-specific compliance enforcement. An example method can include receiving, at a user device, an application having a compliance engine. The user device can also store a compliance rule that applies to the received application. The compliance rule can specify a condition and a remedial action for the application. The user device can execute the application. The application can determine, using the compliance engine within the application, whether the condition is present. The determination can be made regardless of whether the device has internet or cellular connectivity. Based on determining that the condition is present, the application can perform the remedial action.Type: ApplicationFiled: September 17, 2018Publication date: March 19, 2020Inventors: Nikhil Mehta, Sanjay Satagopan, Ali Mohsin, Simon Brooks, Ryan Turner, Lucas Chen
-
Publication number: 20200092335Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.Type: ApplicationFiled: September 18, 2018Publication date: March 19, 2020Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
-
Publication number: 20190340040Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: ApplicationFiled: May 2, 2018Publication date: November 7, 2019Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Publication number: 20190303596Abstract: Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard.Type: ApplicationFiled: March 27, 2018Publication date: October 3, 2019Inventors: Xinpi Du, Ali Mohsin
-
Publication number: 20190268306Abstract: A portal application can receive a listing of available applications in response to a request sent to a management server. The listing can include a plurality of attributes for each available application, such as the requirements for using the features of each application or a dependency upon another application. Based on the plurality of attributes received, the portal application can determine that a first application requires installation of a second application in order for the first application to provide additional functionality. The portal application can display icons corresponding to the available applications and display one or more UI elements, indicating that the first application requires installation of the second application. The portal application can also push the second application to the device and assist in installing and initializing the second application on the device.Type: ApplicationFiled: February 26, 2018Publication date: August 29, 2019Inventors: Ujwal Naik, Soorya Rajasoorya, Nischit Shetty, Amit Yadav, Sanjay Satagopan, Sharath Chavva, Nidhi Aggarwal, Ryan Turner, Nikhil Mehta, Ali Mohsin