Patents by Inventor Daniel James BEVERIDGE

Daniel James BEVERIDGE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11960501
    Abstract: User profiles of remote desktops are managed in a crash-consistent manner. When a user logs into a remote desktop, metadata of the user profile is loaded from persistent storage while registry settings and files of the user profile are loaded asynchronously with respect to the login. During the remote desktop session, snapshots of the remote desktop image in persistent storage are generated periodically, and a change log that indicates changes to the user profile is created therefrom. The user profile stored in persistent storage is updated lazily using the change log at opportunistic times after snapshot generation. When the user logs out of the remote desktop, the user profile stored in the persistent storage is updated with any additional changes to the user profile by extracting the changes from the copy-on-write cache associated with the most recent snapshot.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: April 16, 2024
    Assignee: VMware, Inc.
    Inventors: Scott Howard Davis, Daniel James Beveridge, Jonathan Clark, Blake Watts
  • Publication number: 20240080207
    Abstract: The disclosure provides an approach for certificate management for cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a cryptographic request related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information associated with the cryptographic request. Embodiments include determining, by the cryptographic agility system, based on the cryptographic request, a certificate for authenticating a key related to the cryptographic technique. Embodiments include providing, by the cryptographic agility system, the certificate to an endpoint related to the cryptographic request for use in authenticating the key.
    Type: Application
    Filed: July 27, 2023
    Publication date: March 7, 2024
    Inventors: Marc Wayne BROTHERSON, Mark BENSON, Daniel James BEVERIDGE, Sean HUNTLEY, Akeem JENKINS, David OTT
  • Patent number: 11924343
    Abstract: The disclosure provides an approach for cryptographic agility. Embodiments include establishing, by a proxy component associated with a cryptographic agility system, a first secure connection with an application. Embodiments include receiving, by the proxy component, via the first secure connection, a communication from the application directed to an endpoint. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information related to the communication. Embodiments include establishing, by the proxy component, a second secure connection with the endpoint based on the cryptographic technique. Embodiments include transmitting, by the proxy component, a secure communication to the endpoint via the second secure connection based on the communication.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: March 5, 2024
    Assignee: VMware, Inc.
    Inventors: Akeem Jenkins, Mark Benson, Daniel James Beveridge, Marc Wayne Brotherson, Sean Huntley, David Ott
  • Publication number: 20240061731
    Abstract: This disclosure relates generally to configuring a legacy application or service with a reconfigurable cryptographic provider capable of leveraging many different cryptographic algorithms, protocols or functions. The application or service can be configured with the reconfigurable cryptographic provider by redirecting cryptographic API calls intended for a linked static shared cryptographic library or provider to a cryptographic adapter configured to emulate responses provided by the linked static shared cryptographic library. A cryptographic adapter is also described and is configured to generate abstracted versions of the cryptographic API calls and pass them on to the reconfigurable cryptographic provider, which selects and implements an appropriate cipher solution based on the abstracted cryptographic API calls.
    Type: Application
    Filed: November 16, 2022
    Publication date: February 22, 2024
    Inventors: SEAN JAMES HUNTLEY, Vasantha Kumar Dhanasekar, David E. Ott, Daniel James Beveridge
  • Patent number: 11892981
    Abstract: Disclosed are various examples for downloading data objects by enforcing a threshold amount of allocated data. In one example, among others, an application downloads a first subset of the files from a remote file management system. A user interface displays file system entries that represent the first subset of downloaded files and a second subset of undownloaded files from the remote file management system. The application detects an event for a respective file system entry associated with a respective file from the second subset of undownloaded files. The respective file is downloaded from the remote management system.
    Type: Grant
    Filed: May 8, 2020
    Date of Patent: February 6, 2024
    Assignee: AirWatch LLC
    Inventors: Gerard Murphy, Daniel James Beveridge, Blake Watts, Nicholas Grivas
  • Publication number: 20240020107
    Abstract: The technology disclosed herein enables deployment of updates to computing systems connected to a Wide Area Network (WAN). In a particular example, a method includes identifying an update to be performed on computing systems connected to a Wide Area Network (WAN) and identifying first attributes of a first computing system of the computing systems. The method further includes determining an update time in which the update should be performed at the first computing system based on the first attributes relative to other attributes of other ones of the computing systems. The method also includes performing the update at the first computing system at the update time.
    Type: Application
    Filed: July 13, 2022
    Publication date: January 18, 2024
    Inventors: Daniel James Beveridge, Erol Aygar
  • Patent number: 11818278
    Abstract: The disclosure provides an approach for certificate management for cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a cryptographic request related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information associated with the cryptographic request. Embodiments include determining, by the cryptographic agility system, based on the cryptographic request, a certificate for authenticating a key related to the cryptographic technique. Embodiments include providing, by the cryptographic agility system, the certificate to an endpoint related to the cryptographic request for use in authenticating the key.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: November 14, 2023
    Assignee: VMWARE, INC.
    Inventors: Marc Wayne Brotherson, Mark Benson, Daniel James Beveridge, Sean Huntley, Akeem Jenkins, David Ott
  • Patent number: 11709799
    Abstract: Embodiments provide for application-specific provisioning of files or registry keys. As applications are installed or launched, data is recorded by an application virtualization engine, and an index is created linking the recorded data to both the application and the underlying files or registry keys. As applications are requested (e.g., launched, updated, or the like), the application virtualization engine reveals various copies of file or registry keys to the application on demand or in accordance with a policy.
    Type: Grant
    Filed: June 9, 2016
    Date of Patent: July 25, 2023
    Assignee: VMware, Inc.
    Inventors: Fei Huang, Daniel James Beveridge
  • Patent number: 11693936
    Abstract: A system is described for authenticating a user on a client device using the user's mobile device and utilizing the audio channel. An authentication server receives a request from the client to initiate a session for the user, creates the session, and sends a session token back to the client along with a request for authentication. The client broadcasts an audio transmission containing the token to the mobile device over an audio channel using data-over-sound transmission. The mobile device receives the transmission via a microphone, obtains the token and the server identity from the transmission, and sends user credentials that are stored on the mobile device along with the token identifying the session directly to the authentication server. The server verifies the received credentials, confirms the token, and logs the user into the session.
    Type: Grant
    Filed: July 24, 2018
    Date of Patent: July 4, 2023
    Assignee: VMware, Inc.
    Inventors: Shengbo Teng, Wen Wang, Bin Guo, Wenping Fan, Tony Lu, Daniel James Beveridge
  • Publication number: 20230104102
    Abstract: This disclosure relates generally to configuring an application or service with reconfigurable cryptographic features taking the form of cryptographic algorithms, protocols or functions. The application or service can be configured with a cryptographic provider configured to receive abstracted cryptographic API calls and retrieve specific cryptographic features based on established cryptographic policies. This configuration allows for rapid updates to the cryptographic framework and for the cryptographic framework to be managed remotely in enterprise environments.
    Type: Application
    Filed: October 4, 2021
    Publication date: April 6, 2023
    Applicant: VMware, Inc.
    Inventors: Mark BENSON, Daniel James BEVERIDGE, Marc Wayne BROTHERSON, Sean James HUNTLEY, Akeem Lamar JENKINS, Dennis MOREAU, David E. OTT
  • Publication number: 20230107763
    Abstract: This relates generally to protecting adjustable cipher solutions using trusted execution mechanisms. An example method includes, at one or more electronic devices, receiving a request for configuring a cipher solution for one or more cryptographic operations, retrieving one or more cryptographic policies from a first module protected by a secure enclave within a trusted execution environment, accessing one or more libraries in accordance with the one or more cryptographic policies, attesting the one or more libraries by verifying attestation data associated with the one or more libraries within a second module protected by the secure enclave of the trusted execution environment, and configuring the cipher solution for the electronic device based on attesting the one or more libraries.
    Type: Application
    Filed: October 4, 2021
    Publication date: April 6, 2023
    Applicant: VMware, Inc.
    Inventors: David E. OTT, Mark BENSON, Daniel James BEVERIDGE, Marc Wayne BROTHERSON, Sean James HUNTLEY, Akeem Lamar JENKINS, Dennis MOREAU
  • Publication number: 20230109647
    Abstract: This relates generally to configuring and automatically selecting a cipher solution for secure communication. An example method includes, at an electronic device, receiving a request initiated by a requestor for one or more cryptographic operations, determining contextual information associated with the requestor, selecting a cipher solution for processing the request based on the contextual information and a policy engine, and processing the request for the one or more cryptographic operations by executing one or more cryptographic algorithms in accordance with the selected cipher solution.
    Type: Application
    Filed: October 4, 2021
    Publication date: April 6, 2023
    Applicant: VMware, Inc.
    Inventors: David E. OTT, Mark BENSON, Daniel James BEVERIDGE, Marc Wayne BROTHERSON, Sean James HUNTLEY, Akeem Lamar JENKINS, Dennis MOREAU
  • Patent number: 11604665
    Abstract: The current document is directed a resource-exchange system that facilitates resource exchange and sharing among computing facilities. The currently disclosed methods and systems employ efficient, distributed-search methods and subsystems within distributed computer systems that include large numbers of geographically distributed data centers to locate resource-provider computing facilities that match the resource needs of resource-consumer computing-facilities based on attribute values associated with the needed resources, the resource providers, and the resource consumers. The resource-exchange system monitors and controls resource exchanges on behalf of participants in the resource-exchange system in order to optimize resource usage within participant data centers and computing facilities.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: March 14, 2023
    Assignee: VMware, Inc.
    Inventors: Jivan Madtha, Daniel James Beveridge
  • Publication number: 20230026253
    Abstract: The disclosure provides an approach for cryptographic agility. Embodiments include receiving a request from an application for a cryptographic operation, wherein the request is associated with a computing device. Embodiments include determining one or more resource constraints related to the computing device. Embodiments include selecting, based on the one or more resource constraints, a cryptographic technique from a plurality of cryptographic techniques associated with indications of resource requirements. Embodiments include performing the cryptographic operation using the cryptographic technique. Embodiments include providing a response to the application based on performing the cryptographic operation.
    Type: Application
    Filed: July 26, 2021
    Publication date: January 26, 2023
    Inventors: Daniel James BEVERIDGE, Mark BENSON, Marc Wayne BROTHERSON, Sean HUNTLEY, Akeem JENKINS, David OTT
  • Publication number: 20230022112
    Abstract: The disclosure provides an approach for auditable cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a request to perform a cryptographic operation related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique for performing the cryptographic operation based on contextual information associated with the request. Embodiments include performing, by the cryptographic agility system, the cryptographic operation using the cryptographic technique. Embodiments include writing, by the cryptographic agility system, data related to selecting the cryptographic technique to a secure digital ledger.
    Type: Application
    Filed: July 26, 2021
    Publication date: January 26, 2023
    Inventors: Daniel James BEVERIDGE, Mark BENSON, Marc Wayne BROTHERSON, Sean HUNTLEY, Akeem JENKINS, David OTT
  • Publication number: 20230023529
    Abstract: The disclosure provides an approach for cryptographic agility. Embodiments include establishing, by a proxy component associated with a cryptographic agility system, a first secure connection with an application. Embodiments include receiving, by the proxy component, via the first secure connection, a communication from the application directed to an endpoint. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information related to the communication. Embodiments include establishing, by the proxy component, a second secure connection with the endpoint based on the cryptographic technique. Embodiments include transmitting, by the proxy component, a secure communication to the endpoint via the second secure connection based on the communication.
    Type: Application
    Filed: July 26, 2021
    Publication date: January 26, 2023
    Inventors: Akeem JENKINS, Mark BENSON, Daniel James BEVERIDGE, Marc Wayne BROTHERSON, Sean HUNTLEY, David OTT
  • Publication number: 20230026560
    Abstract: The disclosure provides an approach for certificate management for cryptographic agility. Embodiments include receiving, by a cryptographic agility system, a cryptographic request related to an application. Embodiments include selecting, by the cryptographic agility system, a cryptographic technique based on contextual information associated with the cryptographic request. Embodiments include determining, by the cryptographic agility system, based on the cryptographic request, a certificate for authenticating a key related to the cryptographic technique. Embodiments include providing, by the cryptographic agility system, the certificate to an endpoint related to the cryptographic request for use in authenticating the key.
    Type: Application
    Filed: July 26, 2021
    Publication date: January 26, 2023
    Inventors: Marc Wayne BROTHERSON, Mark BENSON, Daniel James BEVERIDGE, Sean HUNTLEY, Akeem JENKINS, David OTT
  • Patent number: 11502972
    Abstract: The current document is directed a resource-exchange system that facilitates resource exchange and sharing among computing facilities. The currently disclosed methods and systems employ efficient, distributed-search methods and subsystems within distributed computer systems that include large numbers of geographically distributed data centers to locate resource-provider computing facilities that match the resource needs of resource-consumer computing-facilities based on attribute values associated with the needed resources, the resource providers, and the resource consumers. The resource-exchange system monitors and controls resource exchanges on behalf of participants in the resource-exchange system in order to optimize resource usage within participant data centers and computing facilities. By optimizing resource usage, the resource-exchange system drives participant data centers and computing facilities towards maximum operational efficiency.
    Type: Grant
    Filed: June 29, 2017
    Date of Patent: November 15, 2022
    Assignee: VMware, Inc.
    Inventors: Daniel James Beveridge, Ricky Trigalo, Joerg Lew
  • Patent number: 11368517
    Abstract: The current document is directed a resource-exchange system that facilitates resource exchange and sharing among computing facilities. The currently disclosed methods and systems employ efficient, distributed-search-based auction methods and subsystems within distributed computer systems that include large numbers of geographically distributed data centers to locate resource-provider computing facilities that match the resource needs of resource-consumer computing facilities. Multiple security methods and subsystems are employed to prevent unauthorized access to resource-exchange-system services, to secure resource-exchange-system-participant data from unauthorized access, and to prevent hosted virtual machines and other hosted computational entities from interfering with operation of native virtual machines and other native computational entities within hosting resource-provider computing facilities.
    Type: Grant
    Filed: December 5, 2017
    Date of Patent: June 21, 2022
    Assignee: VMware, Inc.
    Inventors: Daniel James Beveridge, Ricky Trigalo, Jivan Madtha, Anil Sharma, Joerg Lew
  • Patent number: 11099875
    Abstract: An adaptive virtual desktop architecture is provided. Application install or assignment is evaluated, such as by using heuristics to identify applications that may present compatibility problems. Upon determining that a newly installed application may have compatibility problems when associated with a non-persistent virtual desktop, a promotion to a persistent virtual desktop occurs.
    Type: Grant
    Filed: June 6, 2019
    Date of Patent: August 24, 2021
    Assignee: VMware, Inc.
    Inventors: Daniel James Beveridge, Yao Zhang, Jairam Choudhary