Patents by Inventor Xinpi Du
Xinpi Du has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11750660Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.Type: GrantFiled: September 9, 2021Date of Patent: September 5, 2023Assignee: VMware, INC.Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
-
Publication number: 20210409452Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.Type: ApplicationFiled: September 9, 2021Publication date: December 30, 2021Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
-
Publication number: 20210397727Abstract: Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard.Type: ApplicationFiled: September 3, 2021Publication date: December 23, 2021Inventors: Xinpi Du, Ali Mohsin
-
Publication number: 20210297479Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: ApplicationFiled: June 4, 2021Publication date: September 23, 2021Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Patent number: 11128666Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.Type: GrantFiled: September 18, 2018Date of Patent: September 21, 2021Assignee: VMware, Inc.Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
-
Patent number: 11113420Abstract: Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard.Type: GrantFiled: March 27, 2018Date of Patent: September 7, 2021Assignee: VMware, Inc.Inventors: Xinpi Du, Ali Mohsin
-
Patent number: 11032363Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: GrantFiled: June 8, 2020Date of Patent: June 8, 2021Assignee: VMware, Inc.Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Publication number: 20200301752Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: ApplicationFiled: June 8, 2020Publication date: September 24, 2020Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Patent number: 10678606Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: GrantFiled: May 2, 2018Date of Patent: June 9, 2020Assignee: VMware, Inc.Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Publication number: 20200092335Abstract: Examples for detecting a compromised device are described. A set of threat detection rules can instruct an application on the client device how to detect whether the client device is compromised. The rules can be updated dynamically and without updating the application that is performing the compromise detection. The rules can be encoded in an interpreted scripting language and executed by a runtime environment that is embedded within the application.Type: ApplicationFiled: September 18, 2018Publication date: March 19, 2020Inventors: Simon Brooks, Daniel E. Zeck, Xinpi Du, Ali Mohsin, Kishore Sajja, Nikhil Mehta
-
Publication number: 20190340040Abstract: Examples described herein include systems and methods for synchronizing applications that target different software development kits (“SDK”). The system can execute a bridge application that registers an implementation of a content provider class. This allows the bridge application to communicate with a first application targeting a first SDK. The bridge application can also register to send and receive implicit broadcasts. After the bridge application verifies the request, it can broadcast to a second cluster of applications registered with an operating system to receive implicit broadcasts. Similarly, the bridge application can receive implicit broadcasts and synchronize those requests with a first cluster of applications by using the implemented content provider methods.Type: ApplicationFiled: May 2, 2018Publication date: November 7, 2019Inventors: Jayaprakash Mara, Xinpi Du, Sophat Nouv, Ravi Sarma, Ali Mohsin
-
Publication number: 20190303596Abstract: Disclosed are various examples for providing access to a clipboard based at least in part on one or more policies. Data is received from a client application. A permission associated with the client application is checked, the permission specifying that the client application is authorized to store data in a clipboard provided by an operating system of the computing device. In response, the data received from the client application is stored in the clipboard.Type: ApplicationFiled: March 27, 2018Publication date: October 3, 2019Inventors: Xinpi Du, Ali Mohsin
-
Patent number: 10430166Abstract: Disclosed are various approaches for injecting resources into wrapped applications. A computing device first obtains a compiled version of a target application package. The computing device then decompiles the compiled version of the target application package to generate a source code version of the target application package. Then, the computing device combines the source code version of the target application package with management component source code. Next, the computing device generates an application resource index. Subsequently, the computing device, modifies the management component source code based at least in part on the application resource index. Finally, the computing device compiles the combined source code version of the target application package and the management component source code to generate a managed application package.Type: GrantFiled: September 7, 2016Date of Patent: October 1, 2019Assignee: AIRWATCH LLCInventors: Sandeep Naga Kaipu, Xinpi Du, Supriya Saha, Dipanshu Gupta, Chaoting Xuan
-
Publication number: 20170286075Abstract: Disclosed are various approaches for injecting resources into wrapped applications. A computing device first obtains a compiled version of a target application package. The computing device then decompiles the compiled version of the target application package to generate a source code version of the target application package. Then, the computing device combines the source code version of the target application package with management component source code. Next, the computing device generates an application resource index. Subsequently, the computing device, modifies the management component source code based at least in part on the application resource index. Finally, the computing device compiles the combined source code version of the target application package and the management component source code to generate a managed application package.Type: ApplicationFiled: September 7, 2016Publication date: October 5, 2017Inventors: Sandeep Naga Kaipu, Xinpi Du, Supriya Saha, Dipanshu Gupta, Chaoting Xuan