Patents by Inventor Daniel E. Zeck

Daniel E. Zeck has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10887180
    Abstract: Disclosed are various examples for Internet of Things (IoT) device discovery and deployment. In some embodiments, a device identifier is received from an IoT device. The IoT device is determined, based on the device identifier, to be associated with a device account with a management service. An enrollment of the IoT device is performed. A capabilities declaration is received from the IoT device. IoT device instructions are determined based on the capabilities declaration. IoT device instructions are transmitted to the IoT device, causing it to perform a capability specified in the capabilities declaration.
    Type: Grant
    Filed: November 14, 2018
    Date of Patent: January 5, 2021
    Assignee: VMWARE, INC.
    Inventors: Stephen Turner, Daniel E. Zeck, Simon Brooks
  • Patent number: 10855669
    Abstract: Disclosed are various approaches for relaying and caching authentication credentials. A single sign-on (SSO) token is received, the SSO token representing a user account authenticated with an identity manager. An authentication request is then sent to a service that is federated with the identity manager in response to receipt of the SSO token, the authentication request including the SSO token. An access token is received in response to the authentication request, the access token providing access to the service for the user account authenticated with the identity manager for a predefined period of time. The access token and a link between the access token and the SSO token are then cached.
    Type: Grant
    Filed: May 3, 2018
    Date of Patent: December 1, 2020
    Assignee: VMware, Inc.
    Inventors: David Shaw, Daniel E. Zeck, Robert Worsnop
  • Patent number: 10855670
    Abstract: Disclosed are various approaches for polling federated services for notifications. A request for an access token for a federated service is sent to an authentication service. The access token for the federated service is received from the authentication service. A query is sent to the federated service for a notification, the query comprising the access token. The notification is received from the federated service.
    Type: Grant
    Filed: May 3, 2018
    Date of Patent: December 1, 2020
    Assignee: VMware, Inc.
    Inventors: David Shaw, Daniel E. Zeck, Robert Worsnop
  • Publication number: 20200314085
    Abstract: Disclosed are various approaches for workflow service back end integration. In some examples, a data request is received. The request is associated with a network service. A single sign-on (SSO) token is received. The SSO token represents a user account authenticated with an identity manager. Authentication data for the network service is identified based on the SSO token. The authentication data can specify an authentication site of the network service. A navigation action is automatically performed on the authentication site. The requested data is received. A command to present on a client device the data is transmitted to the client device.
    Type: Application
    Filed: March 29, 2019
    Publication date: October 1, 2020
    Inventors: Daniel E. Zeck, David Shaw, Robert Worsnop, John Ryan Bard
  • Publication number: 20200314087
    Abstract: Disclosed are various approaches for workflow service back end integration. In some examples, an event is detected. The event is associated with an enterprise. A workflow action to perform is identified based on event. A user account is identified using at least one of the workflow action and the event. A command to present the workflow action is transmitted to a client device. A user indication to perform the workflow action is identified. Authentication data for the network service is identified based on a single sign-on (SSO) token associated with the user account. The workflow action is automatically performed using the network service. An authentication with the network service is completed based on the authentication data.
    Type: Application
    Filed: March 29, 2019
    Publication date: October 1, 2020
    Inventors: Daniel E. Zeck, David Shaw, Robert Worsnop, John Ryan Bard
  • Publication number: 20200314086
    Abstract: Disclosed are various approaches for workflow service back end integration. In some examples, a service request is identified. The service request is associated with a network service. A single sign-on (SSO) token is received. The SSO token represents a user account authenticated with an identity manager. Authentication data for the network service is identified based on the SSO token. A hosting location of a connector for the network service is identified based on the authentication data. An authentication header is appended to the service request. The service request with the authentication header is transmitted to the connector.
    Type: Application
    Filed: March 29, 2019
    Publication date: October 1, 2020
    Inventors: Daniel E. Zeck, David Shaw, Robert Worsnop, John Ryan Bard
  • Publication number: 20200153697
    Abstract: Disclosed are various examples for Internet of Things (IoT) device discovery and deployment. In some embodiments, a device identifier is received from an IoT device. The IoT device is determined, based on the device identifier, to be associated with a device account with a management service. An enrollment of the IoT device is performed. A capabilities declaration is received from the IoT device. IoT device instructions are determined based on the capabilities declaration. IoT device instructions are transmitted to the IoT device, causing it to perform a capability specified in the capabilities declaration.
    Type: Application
    Filed: November 14, 2018
    Publication date: May 14, 2020
    Inventors: Stephen Turner, Daniel E. Zeck, Simon Brooks
  • Publication number: 20200092335
    Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
  • Publication number: 20190342281
    Abstract: Disclosed are various approaches for polling federated services for notifications. A request for an access token for a federated service is sent to an authentication service. The access token for the federated service is received from the authentication service. A query is sent to the federated service for a notification, the query comprising the access token. The notification is received from the federated service.
    Type: Application
    Filed: May 3, 2018
    Publication date: November 7, 2019
    Inventors: David Shaw, Daniel E. Zeck, Robert Worsnop
  • Publication number: 20190342280
    Abstract: Disclosed are various approaches for relaying and caching authentication credentials. A single sign-on (SSO) token is received, the SSO token representing a user account authenticated with an identity manager. An authentication request is then sent to a service that is federated with the identity manager in response to receipt of the SSO token, the authentication request including the SSO token. An access token is received in response to the authentication request, the access token providing access to the service for the user account authenticated with the identity manager for a predefined period of time. The access token and a link between the access token and the SSO token are then cached.
    Type: Application
    Filed: May 3, 2018
    Publication date: November 7, 2019
    Inventors: David Shaw, Daniel E. Zeck, Robert Worsnop
  • Publication number: 20150312364
    Abstract: A communications system including a plurality of mobile user computing devices, and a service provider subsystem for enabling communications between any of the mobile user computing devices and enterprise network systems. The service provider subsystem has a plurality of clusters strategically distributed across at least one geographical region and interconnected by a global services bus. Each of the clusters includes a plurality of nodes interconnected to a distributed memory storage bus. Each of the nodes includes a service manager module for monitoring services available to the node, a service access point module for enabling communications between the node and enterprise network systems, a client access point module for enabling communications between the node and at least one of the mobile user computing devices, and a message control point module for managing communications between the client access point module and the service access point module.
    Type: Application
    Filed: July 7, 2015
    Publication date: October 29, 2015
    Inventors: Paul R. Bayliss, Robert A. Cohen, Gareth O. Collins, Kai Y. Yip, Daniel E. Zeck
  • Publication number: 20140115030
    Abstract: A communications system including a plurality of mobile user computing devices, and a service provider subsystem for enabling communications between any of the mobile user computing devices and enterprise network systems. The service provider subsystem has a plurality of clusters strategically distributed across at least one geographical region and interconnected by a global services bus. Each of the clusters includes a plurality of nodes interconnected to a distributed memory storage bus. Each of the nodes includes a service manager module for monitoring services available to the node, a service access point module for enabling communications between the node and enterprise network systems, a client access point module for enabling communications between the node and at least one of the mobile user computing devices, and a message control point module for managing communications between the client access point module and the service access point module.
    Type: Application
    Filed: October 18, 2012
    Publication date: April 24, 2014
    Inventors: Paul R. Bayliss, Robert A. Cohen, Gareth O. Collins, Kai Y. Yip, Daniel E. Zeck
  • Patent number: 5990933
    Abstract: In a multipoint control unit for conferencing audiovisual terminals, conference participants are greeted with audio and video welcome messages and then placed in an automated queue. The automated queue is a holding queue from which a conference operator can select the next available conference participant in the queue and conduct a subconference. Apparatus in the multipoint control unit includes a memory for storing video data and a processor coupled to the memory for controlling playback of the video data to a connected terminal during conference setup.
    Type: Grant
    Filed: March 22, 1999
    Date of Patent: November 23, 1999
    Assignee: VideoServer, Inc.
    Inventors: Daniel F. Ozone, Christopher L. Dischino, Nelson Shen, Vilas V. Bhade, Tak Szeto, Brittain S. McKinley, Peter J. Donovan, Daniel E. Zeck, Charles F. Sharkey
  • Patent number: 5886734
    Abstract: In a multipoint control unit for conferencing audiovisual terminals, conference participants are greeted with audio and video welcome messages and then placed in an automated queue. The automated queue is a holding queue from which a conference operator can select the next available conference participant in the queue and conduct a subconference. Apparatus in the multipoint control unit includes a memory for storing video data and a processor coupled to the memory for controlling playback of the video data to a connected terminal during conference setup.
    Type: Grant
    Filed: January 28, 1997
    Date of Patent: March 23, 1999
    Assignee: VideoServer, Inc.
    Inventors: Daniel F. Ozone, Christopher L. Dischino, Nelson Shen, Vilas V. Bhade, Tak Szeto, Brittain S. McKinley, Peter J. Donovan, Daniel E. Zeck, Charles F. Sharkey