Patents by Inventor Deepak Sreenivas
Deepak Sreenivas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11418497Abstract: A system is provided for facilitating access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to receive data that is associated with the heightened authentication protocol is received at the cloud-based storage service. In response to the request, the request is authenticated based on the heightened authentication protocol. In response to authenticating the request, permission is granted for the application to receive the data that is associated with the heightened authentication protocol. In response to a locking of the data that is associated with the heightened authentication protocol, an indication that the data is unavailable is sent to the application.Type: GrantFiled: March 21, 2019Date of Patent: August 16, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Jyotsana Rathore, Jose A. Barreto, Kevin Andrew Chan, Deepak Sreenivas Pemmaraju, Robert C. Turner, Ronakkumar Desai, Patrick Moulhaud
-
Patent number: 11392711Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. A first request is received to access data stored at the cloud-based storage service, the data associated with a user account. The first request is authenticated based on a username and password associated with the user account. A second request is received for a file that is stored in an area associated with a heightened authentication protocol. The heightened authentication protocol is performed to authenticate the second request. In response to authenticating the second request, permission is granted to a temporary strong authentication state. The permission is to access the file that is stored in the area associated with the heightened authentication protocol.Type: GrantFiled: May 31, 2019Date of Patent: July 19, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Jyotsana Rathore, Kevin Andrew Chan, Gabriela Kornelia Kaczka, Deepak Sreenivas Pemmaraju, Robert C. Turner, Gregory P. Young, Jose A. Barreto, Daron Spektor
-
Patent number: 11361095Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. A first request is received to access data stored at the cloud-based storage service, the data associated with a user account. The first request is authenticated based on a username and password associated with the user account. A second request is received for a file that is stored in an area associated with a heightened authentication protocol. The heightened authentication protocol is performed to authenticate the second request. In response to authenticating the second request, permission is granted to a temporary strong authentication state. The permission is to access the file that is stored in the area associated with the heightened authentication protocol.Type: GrantFiled: May 31, 2019Date of Patent: June 14, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Jyotsana Rathore, Kevin Andrew Chan, Gabriela Kornelia Kaczka, Deepak Sreenivas Pemmaraju, Robert C. Turner, Gregory P. Young, Jose A. Barreto, Daron Spektor
-
Patent number: 11226983Abstract: Systems and methods for synchronizing data between an online data source and a client application. The method includes, in response to a change in a permission associated with a user to a protected data set included in a shared data space of the online data source, receiving, with the client application associated with the user, a protected data synchronization token issued by the online data source associated with the protected data set and downloading, with the client application, the protected data set included in the shared data space from the online data source to the client application using the protected data synchronization token without re-downloading a public data set included in the shared data space. After downloading the protected data set, the method includes synchronizing the shared data space, including the protected data set and the public data set, using a stored data space synchronization token.Type: GrantFiled: June 18, 2019Date of Patent: January 18, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Chih-Pin Kao, Xi Tong, Keping Zhao, Lin Wang, Gregory Powell Young, Deepak Sreenivas Pemmaraju
-
Publication number: 20200401600Abstract: Systems and methods for synchronizing data between an online data source and a client application. The method includes, in response to a change in a permission associated with a user to a protected data set included in a shared data space of the online data source, receiving, with the client application associated with the user, a protected data synchronization token issued by the online data source associated with the protected data set and downloading, with the client application, the protected data set included in the shared data space from the online data source to the client application using the protected data synchronization token without re-downloading a public data set included in the shared data space. After downloading the protected data set, the method includes synchronizing the shared data space, including the protected data set and the public data set, using a stored data space synchronization token.Type: ApplicationFiled: June 18, 2019Publication date: December 24, 2020Inventors: Chih-Pin KAO, Xi TONG, Keping ZHAO, Lin WANG, Gregory Powell YOUNG, Deepak Sreenivas PEMMARAJU
-
Publication number: 20200304481Abstract: A system is provided for facilitating access to data stored in a cloud-based storage service. Data associated with a user account is stored at the cloud-based storage service. A portion of the data is associated with a heightened authentication protocol. A request for an application to receive data that is associated with the heightened authentication protocol is received at the cloud-based storage service. In response to the request, the request is authenticated based on the heightened authentication protocol. In response to authenticating the request, permission is granted for the application to receive the data that is associated with the heightened authentication protocol. In response to a locking of the data that is associated with the heightened authentication protocol, an indication that the data is unavailable is sent to the application.Type: ApplicationFiled: March 21, 2019Publication date: September 24, 2020Inventors: Jyotsana RATHORE, Jose A. BARRETO, Kevin Andrew CHAN, Deepak Sreenivas PEMMARAJU, Robert C. TURNER, Ronakkumar DESAI, Patrick MOULHAUD
-
Publication number: 20200304511Abstract: A system is provided for controlling access to data stored in a cloud-based storage service. A first request is received to access data stored at the cloud-based storage service, the data associated with a user account. The first request is authenticated based on a username and password associated with the user account. A second request is received for a file that is stored in an area associated with a heightened authentication protocol. The heightened authentication protocol is performed to authenticate the second request. In response to authenticating the second request, permission is granted to a temporary strong authentication state. The permission is to access the file that is stored in the area associated with the heightened authentication protocol.Type: ApplicationFiled: May 31, 2019Publication date: September 24, 2020Inventors: Jyotsana RATHORE, Kevin Andrew CHAN, Gabriela Kornelia KACZKA, Deepak Sreenivas PEMMARAJU, Robert C. TURNER, Gregory P. YOUNG, Jose A. BARRETO, Daron SPEKTOR
-
Publication number: 20080034080Abstract: The invention relates to a policy translator for a telecommunication network. The system includes an interface between the policy translator and a policy repository storing existing policies for one or more telecommunication networks, an interface between the policy translator and one or more gateways over which interface the policy translator can receive from a gateway a request for a policy check (naming a source and destination network, the user and the service requested) and over which interface the policy translator can send a response after evaluating the request (“Permit”, “Permit, but Modify” or “Deny”), an interface between the policy translator and a subscriber database of a telecommunication network, an interface between the policy translator and a charging element for exchanging charging related information.Type: ApplicationFiled: August 2, 2007Publication date: February 7, 2008Applicant: NOKIA SIEMENS NETWORKS GMBH & COInventors: Sangeetha Chamaraj, Aditya Dhruva, Deepak Sreenivas