US 12,149,563 B2
Applying device policies using a management token
Avinash Agarwal, Bangalore (IN); and Sivasubramaniam Sivakumar, Bangalore (IN)
Assigned to Omnissa, LLC, Mountain View, CA (US)
Filed by VMware, Inc., Palo Alto, CA (US)
Filed on Mar. 30, 2022, as Appl. No. 17/708,250.
Application 17/708,250 is a continuation of application No. 15/666,619, filed on Aug. 2, 2017, granted, now 11,316,897.
Claims priority of application No. 201741017728 (IN), filed on May 19, 2017.
Prior Publication US 2022/0224727 A1, Jul. 14, 2022
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 29/06 (2006.01); H04L 9/08 (2006.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01); G06F 21/41 (2013.01)
CPC H04L 63/20 (2013.01) [H04L 9/088 (2013.01); H04L 9/3247 (2013.01); H04L 9/3271 (2013.01); H04L 63/0442 (2013.01); H04L 63/08 (2013.01); H04L 63/126 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A system for applying device policies, the system comprising:
at least one computing device comprising a processor and a memory; and
a management application executed by the at least one computing device by using the processor and the memory, the management application causing the at least one computing device to at least:
in response to a request for a management token, the request being provided to a management token generator, obtain the management token from the management token generator, wherein the device policies are embedded in the obtained management token;
validate the obtained management token and then extract the embedded device policies from the obtained management token;
apply the extracted device policies to the at least one computing device;
generate a response token in which a compliance status is embedded, of the at least one computing device with respect to the applied device policies;
provide the generated response token with the embedded compliance status, to the management token generator or to a security application separate from the management token generator;
after providing the generated response token to the management token generator or to the security application, obtain a release token from the management token generator; and
validate the obtained release token, and then, in response to the obtained release token, release the at least one computing device from the application of the extracted device policies.