Patents by Inventor Sagar Date
Sagar Date has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11962696Abstract: Systems and methods are described for removing unused encryption key files from a computing device. In an example, a key removal tool can identify three sets of keys to preserve. For the first set, the key removal tool can append a device identifier to known key names and add the resulting key file names to a whitelist. For the second set, the key removal tool can identify keys associated with certificates on the computing device and add their corresponding file names to the whitelist. The third set can correspond to keys created after a cutoff timestamp. The key removal tool can delete all key files with key file names not on the whitelist that were created before the cutoff timestamp.Type: GrantFiled: October 5, 2021Date of Patent: April 16, 2024Assignee: VMware, Inc.Inventors: Keith Robertson, Sagar Date
-
Publication number: 20230403302Abstract: Disclosed are various embodiments for managing the state of client devices using device-driven management workflows. The device-driven management workflow can be evaluated to determine a current state of the computing device, install software, and direct the computing device to watch at least one value stored in memory for a modification. When at the at least one value stored in memory is modified, the computing device can execute the device-driven management workflow to resolve a discrepancy between the expected state and the current state or perform a remedial action to prevent unwanted access to secure resources.Type: ApplicationFiled: June 8, 2022Publication date: December 14, 2023Inventors: Aditya Shrotri, Sagar Date, Kunal Ghosh, Rahul Parwani, Ryan Stallings, Huseyin Erenoglu
-
Patent number: 11743124Abstract: Examples described herein include systems and methods for deploying Data Loss Prevention (DLP) policies to user devices. An example method can include receiving a configuration specifying at least one DLP policy applicable to an application, along with an indication of an assignment group specifying users, or user devices, to which the DLP policy should apply. Information regarding the DLP policy and assignment group can be provided to an identity service and then synchronized with a second server that manages the application. The method can further include provisioning the application to a user device and instructing the user device to retrieve the DLP policy from the second server and implement it when executing the provisioned application.Type: GrantFiled: April 21, 2021Date of Patent: August 29, 2023Assignee: VMware, Inc.Inventors: Aditya Shrotri, Sagar Date
-
Publication number: 20230106183Abstract: Systems and methods are described for removing unused encryption key files from a computing device. In an example, a key removal tool can identify three sets of keys to preserve. For the first set, the key removal tool can append a device identifier to known key names and add the resulting key file names to a whitelist. For the second set, the key removal tool can identify keys associated with certificates on the computing device and add their corresponding file names to the whitelist. The third set can correspond to keys created after a cutoff timestamp. The key removal tool can delete all key files with key file names not on the whitelist that were created before the cutoff timestamp.Type: ApplicationFiled: October 5, 2021Publication date: April 6, 2023Inventors: Keith Robertson, Sagar Date
-
Patent number: 11443023Abstract: Disclosed are various examples for distributed profile and key management. In one example, a client device can include an agent application and a PIV-D application. The agent application can receive a partially populated device profile generated by a management service to configure a setting on the client device. The PIV-D application can generate a derived credential and provide the derived credential to the agent application. The agent application can modify the partially populated device profile to include the credential to create a fully populated device profile and configure the client device in accordance with the fully populated device profile.Type: GrantFiled: August 24, 2017Date of Patent: September 13, 2022Assignee: VMware, Inc.Inventors: Eugene Liderman, Jonathon Deriso, William Thomas Hooper, Sagar Date, Tejas Mehrotra, Stephen Turner, Amogh Datar, Dipanshu Gupta
-
Patent number: 11438177Abstract: Disclosed are various embodiments for securely distributing certificates or encryption keys. A management service can receive an enrollment request from a client device. The management service can then send a key request to a certificate provider, the key request comprising a user identifier. The management service can also send a skeleton payload to an enterprise gateway. In response, the management service can receive an encrypted profile from the enterprise gateway, the encrypted profile comprising the skeleton payload with an encryption key inserted by the enterprise gateway into the skeleton payload. Finally, the management service can send the encrypted profile to the client device.Type: GrantFiled: February 28, 2020Date of Patent: September 6, 2022Assignee: VMWARE, INC.Inventors: Jonathon Deriso, Sagar Date, Rahul Parwani
-
Publication number: 20210273920Abstract: Disclosed are various embodiments for securely distributing certificates or encryption keys. A management service can receive an enrollment request from a client device. The management service can then send a key request to a certificate provider, the key request comprising a user identifier. The management service can also send a skeleton payload to an enterprise gateway. In response, the management service can receive an encrypted profile from the enterprise gateway, the encrypted profile comprising the skeleton payload with an encryption key inserted by the enterprise gateway into the skeleton payload. Finally, the management service can send the encrypted profile to the client device.Type: ApplicationFiled: February 28, 2020Publication date: September 2, 2021Inventors: Jonathon Deriso, Sagar Date, Rahul Parwani, Jinsong Liu, Senthil Parthasarathy, Shravan Shantharam
-
Publication number: 20210273817Abstract: Disclosed are various embodiments for securely distributing certificates or encryption keys. A management service can receive an enrollment request from a client device. The management service can then send a key request to a certificate provider, the key request comprising a user identifier. The management service can also send a skeleton payload to an enterprise gateway. In response, the management service can receive an encrypted profile from the enterprise gateway, the encrypted profile comprising the skeleton payload with an encryption key inserted by the enterprise gateway into the skeleton payload. Finally, the management service can send the encrypted profile to the client device.Type: ApplicationFiled: February 28, 2020Publication date: September 2, 2021Inventors: Jonathon Deriso, Sagar Date, Rahul Parwani
-
Publication number: 20210243085Abstract: Examples described herein include systems and methods for deploying Data Loss Prevention (DLP) policies to user devices. An example method can include receiving a configuration specifying at least one DLP policy applicable to an application, along with an indication of an assignment group specifying users, or user devices, to which the DLP policy should apply. Information regarding the DLP policy and assignment group can be provided to an identity service and then synchronized with a second server that manages the application. The method can further include provisioning the application to a user device and instructing the user device to retrieve the DLP policy from the second server and implement it when executing the provisioned application.Type: ApplicationFiled: April 21, 2021Publication date: August 5, 2021Inventors: Aditya Shrotri, Sagar Date
-
Patent number: 11012309Abstract: Examples described herein include systems and methods for deploying Data Loss Prevention (DLP) policies to user devices. An example method can include receiving a configuration specifying at least one DLP policy applicable to an application, along with an indication of an assignment group specifying users, or user devices, to which the DLP policy should apply. Information regarding the DLP policy and assignment group can be provided to an identity service and then synchronized with a second server that manages the application. The method can further include provisioning the application to a user device and instructing the user device to retrieve the DLP policy from the second server and implement it when executing the provisioned application.Type: GrantFiled: June 4, 2018Date of Patent: May 18, 2021Assignee: VMware, Inc.Inventors: Aditya Shrotri, Sagar Date
-
Patent number: 10992656Abstract: Disclosed are various examples for distributed profile and key management. In one example, a management service can generate a partially populated device profile and provide the partially populated device profile to a client application executable on a client device. The client application can generate a credential and insert the credential into the partially populated device profile to generate a fully populated device profile. The credential can be shared with at least one other client application on the client device. The management service can use the fully populated device profile to generate multiple profiles that rely on a single credential, such as a single X.509 security certificate.Type: GrantFiled: August 24, 2017Date of Patent: April 27, 2021Assignee: VMWARE, INC.Inventors: Eugene Liderman, Jonathon Deriso, William Thomas Hooper, Sagar Date, Tejas Mehrotra, Stephen Turner, Amogh Datar, Dipanshu Gupta
-
Publication number: 20190372849Abstract: Examples described herein include systems and methods for deploying Data Loss Prevention (DLP) policies to user devices. An example method can include receiving a configuration specifying at least one DLP policy applicable to an application, along with an indication of an assignment group specifying users, or user devices, to which the DLP policy should apply. Information regarding the DLP policy and assignment group can be provided to an identity service and then synchronized with a second server that manages the application. The method can further include provisioning the application to a user device and instructing the user device to retrieve the DLP policy from the second server and implement it when executing the provisioned application.Type: ApplicationFiled: June 4, 2018Publication date: December 5, 2019Inventors: Aditya Shrotri, Sagar Date
-
Patent number: 10411906Abstract: Disclosed are various examples of securely distributing certificates to client devices. A uniform resource locator (URL) is sent to a client device, wherein the URL represents an address from which the client device can request a user certificate. A certificate for a registration authority is sent to the client device, wherein the certificate comprises a first public key and a first private key. A certificate signing request (CSR) received from the client device at the URL is decrypted, wherein the CSR is encrypted with the first public key. The CSR is validated based at least in part on the URL sent to the client device. The user certificate is then sent to the client device.Type: GrantFiled: April 16, 2018Date of Patent: September 10, 2019Assignee: AIRWATCH LLCInventors: Sridhara Babu Kommireddy, Sagar Date, Priti Marappan, Charles David Berndt
-
Publication number: 20190065725Abstract: Disclosed are various examples for distributed profile and key management. In one example, a client device can include an agent application and a PIV-D application. The agent application can receive a partially populated device profile generated by a management service to configure a setting on the client device. The PIV-D application can generate a derived credential and provide the derived credential to the agent application. The agent application can modify the partially populated device profile to include the credential to create a fully populated device profile and configure the client device in accordance with the fully populated device profile.Type: ApplicationFiled: August 24, 2017Publication date: February 28, 2019Inventors: Eugene Liderman, Jonathon Deriso, William Thomas Hooper, Sagar Date, Tejas Mehrotra, Stephen Turner, Amogh Datar, Dipanshu Gupta
-
Publication number: 20190068568Abstract: Disclosed are various examples for distributed profile and key management. In one example, a management service can generate a partially populated device profile and provide the partially populated device profile to a client application executable on a client device. The client application can generate a credential and insert the credential into the partially populated device profile to generate a fully populated device profile. The credential can be shared with at least one other client application on the client device. The management service can use the fully populated device profile to generate multiple profiles that rely on a single credential, such as a single X.509 security certificate.Type: ApplicationFiled: August 24, 2017Publication date: February 28, 2019Inventors: Eugene Liderman, Jonathon Deriso, William Thomas Hooper, Sagar Date, Tejas Mehrotra, Stephen Turner, Amogh Datar, Dipanshu Gupta
-
Publication number: 20180234257Abstract: Disclosed are various examples of securely distributing certificates to client devices. A uniform resource locator (URL) is sent to a client device, wherein the URL represents an address from which the client device can request a user certificate. A certificate for a registration authority is sent to the client device, wherein the certificate comprises a first public key and a first private key. A certificate signing request (CSR) received from the client device at the URL is decrypted, wherein the CSR is encrypted with the first public key. The CSR is validated based at least in part on the URL sent to the client device. The user certificate is then sent to the client device.Type: ApplicationFiled: April 16, 2018Publication date: August 16, 2018Inventors: Sridhara Babu Kommireddy, Sagar Date, Priti Marappan, Charles David Berndt
-
Patent number: 10027491Abstract: Disclosed are approaches for distributing credentials using derived credentials, such as by relaying a simple certificate enrollment protocol (SCEP) payload. A computing device configures a device profile corresponding to a client device. The device profile can include a SCEP payload. The computing device later receives an override for the SCEP payload from a broker service. In response, the computing device creates a copy of the device profile that includes the override for the SCEP payload. The computing device then sends the copy of the device profile to the client device.Type: GrantFiled: March 30, 2016Date of Patent: July 17, 2018Assignee: AIRWATCH LLCInventors: Urvashi Goverdhan, Sagar Date, Kiran Rohankar, Gaurav Halbe, Sridhara Babu Kommireddy, Daniel Quintas
-
Patent number: 9979553Abstract: Disclosed are various examples of securely distributing certificates to client devices. A uniform resource locator (URL) is sent to a client device, wherein the URL represents an address from which the client device can request a user certificate. A certificate for a registration authority is sent to the client device, wherein the certificate comprises a first public key and a first private key. A certificate signing request (CSR) received from the client device at the URL is decrypted, wherein the CSR is encrypted with the first public key. The CSR is validated based at least in part on the URL sent to the client device. The user certificate is then sent to the client device.Type: GrantFiled: August 6, 2015Date of Patent: May 22, 2018Assignee: AIRWATCH LLCInventors: Sridhara Babu Kommireddy, Sagar Date, Priti Marappan, Charles David Berndt
-
Patent number: 9894103Abstract: Some embodiments provide novel methods for processing remote-device data messages in a network based on data-message attributes from a remote device management (RDM) system. For instance, the method of some embodiments identifies a set of RDM attributes associated with a data message, and then performs one or more service operations based on identified RDM attribute set.Type: GrantFiled: November 1, 2015Date of Patent: February 13, 2018Assignee: NICIRA, INC.Inventors: Leung Tao Kwok, Sulay Shah, Craig Newell, Adam Rykowski, Sridhar Kommireddy, Utkarsh Singh, Sagar Date, Kausum Kumar, Anirban Sengupta, Srinivas Nimmagadda, Jayant Jain, Uday Masurekar, Ravishankar Chamarajnagar
-
Publication number: 20170288883Abstract: Disclosed are approaches for distributing credentials using derived credentials, such as by relaying a simple certificate enrollment protocol (SCEP) payload. A computing device configures a device profile corresponding to a client device. The device profile can include a SCEP payload. The computing device later receives an override for the SCEP payload from a broker service. In response, the computing device creates a copy of the device profile that includes the override for the SCEP payload. The computing device then sends the copy of the device profile to the client device.Type: ApplicationFiled: March 30, 2016Publication date: October 5, 2017Inventors: Urvashi Goverdhan, Sagar Date, Kiran Rohankar, Gaurav Halbe, Sridhara Babu Kommireddy, Daniel Quintas