Patents by Inventor Raja Charu Vikram Kakumani

Raja Charu Vikram Kakumani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240070257
    Abstract: A method is implemented by a controller executed on at least one processor. The method provides pre-authorized access to a robotic process automation for a resource associated with a job. The method includes causing, by the controller, the robotic process automation to assume a user identity during an authentication flow to enable access by the robotic process automation to a resource. The method includes issuing, by the controller, tokens to the robotic process automation during the authentication flow. The method includes enabling, by the controller via the tokens, the identity service that governs the resource to participate in operations of the controller to provide the pre-authorized access to the robotic process automation.
    Type: Application
    Filed: August 29, 2022
    Publication date: February 29, 2024
    Applicant: UiPath, Inc.
    Inventors: Arabela Elena Paslaru, Calin Popa, Radu Oancea, Sriram Vasudevan, Raja Charu Vikram Kakumani, Zawad Chowdhury
  • Publication number: 20230032516
    Abstract: Systems and methods for operating an RPA (robotic process automation) services delivery platform for implementing a plurality of RPA services on premises of a customer are provided. An installer for installing a plurality of RPA services on one or more computing systems located on premises of a customer is generating using the RPA services delivery platform. One or more of the plurality of RPA services installed on the one or more computing systems using the installer are maintained using the RPA services delivery platform.
    Type: Application
    Filed: September 28, 2021
    Publication date: February 2, 2023
    Applicant: UiPath, Inc.
    Inventors: Shashank SHRIVASTAVA, Rajiv CHODISETTI, Vlad STANCIU, Raja Charu Vikram KAKUMANI, Petre POPESCU
  • Patent number: 11303523
    Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions. The instructions may cause the processor to receive a call request for a cloud-based service and retrieve a first policy corresponding to the cloud-based service, the first policy identifying a policy reroute. The instructions may also cause the processor to determine which second policy of a plurality of second policies that corresponds to the policy reroute and retrieve the second policy that the corresponds to the policy reroute. The instructions may further cause the processor to apply the second policy on the cloud-based service and respond to the call request following the application of the second policy.
    Type: Grant
    Filed: December 7, 2018
    Date of Patent: April 12, 2022
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Prasanna Ramachandran, Raja Charu Vikram Kakumani, Brandon Brian Murdoch, Muhammad Omer Iqbal
  • Patent number: 10719618
    Abstract: A system includes a processor and a computer-readable medium configured to store instructions for execution by the processor. The instructions include receiving a first document corresponding to a first application hosted by a distributed computing provider. The instructions include parsing the first document into a first data structure according to a data structure definition. The data structure definition describes an inheritance property. The instructions include, in response to presence of a first inheritance property in the first data structure: identifying an inherited document based on the first inheritance property; obtaining the inherited document; reading the inherited document; determining inheritance permissions from the inherited document; and, in response to the inheritance permissions permitting the first document to inherit the inherited document, selectively modifying the first data structure based on the inherited document.
    Type: Grant
    Filed: March 8, 2018
    Date of Patent: July 21, 2020
    Assignee: MICROSOFT TECHNOLOGY LICENSING, LLC
    Inventors: Raja Charu Vikram Kakumani, John Erik Araya, Muhammad Omer Iqbal
  • Patent number: 10609082
    Abstract: Methods for composable user journeys for user authentication via an identity experience framework are performed by systems and apparatuses. Initiating a user authentication process for an application triggers application calls for dynamic invocation of a specific identity policy, required by the application, of a number of identity policies managed by a host of the identity experience framework. User interfaces defined by the identity policies are provided from the host to the application for interaction by the user and entry of identity information needed to authenticate the user according to specified verification providers. Identity claims and token requests are provided from the application to the host which then authenticates the identity claims via the verification providers and mints a token that includes the claims required by the application, according to the identity policy. The application consumes the token to complete the token request and allow the user access to the application.
    Type: Grant
    Filed: November 10, 2017
    Date of Patent: March 31, 2020
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Raja Charu Vikram Kakumani, Brandon Murdoch, Ronald Bjones, Muhammad O. Iqbal, Kim Cameron
  • Publication number: 20200099587
    Abstract: According to examples, an apparatus may include a processor and a memory on which is stored machine readable instructions. The instructions may cause the processor to receive a call request for a cloud-based service and retrieve a first policy corresponding to the cloud-based service, the first policy identifying a policy reroute. The instructions may also cause the processor to determine which second policy of a plurality of second policies that corresponds to the policy reroute and retrieve the second policy that the corresponds to the policy reroute. The instructions may further cause the processor to apply the second policy on the cloud-based service and respond to the call request following the application of the second policy.
    Type: Application
    Filed: December 7, 2018
    Publication date: March 26, 2020
    Applicant: Microsoft Technology Licensing, LLC
    Inventors: Prasanna Ramachandran, Raja Charu Vikram Kakumani, Brandon Brian Murdoch, Muhammad Omer Iqbal
  • Publication number: 20190354691
    Abstract: Systems and/or methods for deploying and implementing data loss prevention (DLP) policy definition that may encapsulate the requirements, control objectives and directives, and/or the definitions of sensitive data types as stipulated directly or indirectly by the regulatory policy are disclosed. In one embodiment, DLP policies may be identified by an organization to run on top of a set of electronic file systems (e.g., email systems, file systems, web servers and the like). Organizations and their administrators may implement a set of DLP policy instance which are derived from DLP policy templates. DLP policy templates may comprise both structure and meaning—and may acquire a given DLP policy by the replacement of parameterized expressions with desired parameter values. In another embodiment, the state of the DLP policy instance may change according to the lifecycle of the policy instance deployment.
    Type: Application
    Filed: June 19, 2019
    Publication date: November 21, 2019
    Inventors: Lynn AYRES, Jack KABAT, Raja Charu Vikram KAKUMANI, Mashuri LIBMAN, Benjamin STULL, Anatoly KORETSKY, Andrey SHUR, Joseph SCHULMAN
  • Publication number: 20190278929
    Abstract: A system includes a processor and a computer-readable medium configured to store instructions for execution by the processor. The instructions include receiving a first document corresponding to a first application hosted by a distributed computing provider. The instructions include parsing the first document into a first data structure according to a data structure definition. The data structure definition describes an inheritance property. The instructions include, in response to presence of a first inheritance property in the first data structure: identifying an inherited document based on the first inheritance property; obtaining the inherited document; reading the inherited document; determining inheritance permissions from the inherited document; and, in response to the inheritance permissions permitting the first document to inherit the inherited document, selectively modifying the first data structure based on the inherited document.
    Type: Application
    Filed: March 8, 2018
    Publication date: September 12, 2019
    Inventors: Raja Charu Vikram KAKUMANI, John Erik ARAYA, Muhammad Omer IQBAL
  • Patent number: 10372916
    Abstract: Systems and/or methods for deploying and implementing data loss prevention (DLP) policy definition that may encapsulate the requirements, control objectives and directives, and/or the definitions of sensitive data types as stipulated directly or indirectly by the regulatory policy are disclosed. In one embodiment, DLP policies may be identified by an organization to run on top of a set of electronic file systems (e.g., email systems, file systems, web servers and the like). Organizations and their administrators may implement a set of DLP policy instance which are derived from DLP policy templates. DLP policy templates may comprise both structure and meaning—and may acquire a given DLP policy by the replacement of parameterized expressions with desired parameter values. In another embodiment, the state of the DLP policy instance may change according to the lifecycle of the policy instance deployment.
    Type: Grant
    Filed: March 9, 2016
    Date of Patent: August 6, 2019
    Assignee: Microsoft Technology Licensing, LLC
    Inventors: Lynn Ayres, Jack Kabat, Raja Charu Vikram Kakumani, Mashuri Libman, Benjamin Stull, Anatoly Koretsky, Andrey Shur, Joseph Schulman
  • Publication number: 20190149579
    Abstract: Methods for composable user journeys for user authentication via an identity experience framework are performed by systems and apparatuses. Initiating a user authentication process for an application triggers application calls for dynamic invocation of a specific identity policy, required by the application, of a number of identity policies managed by a host of the identity experience framework. User interfaces defined by the identity policies are provided from the host to the application for interaction by the user and entry of identity information needed to authenticate the user according to specified verification providers. Identity claims and token requests are provided from the application to the host which then authenticates the identity claims via the verification providers and mints a token that includes the claims required by the application, according to the identity policy. The application consumes the token to complete the token request and allow the user access to the application.
    Type: Application
    Filed: November 10, 2017
    Publication date: May 16, 2019
    Inventors: Raja Charu Vikram Kakumani, Brandon Murdoch, Ronald Bjones, Muhammad O. Iqbal, Kim Cameron
  • Publication number: 20190149531
    Abstract: Methods for composable user journeys for user authentication via an identity experience framework are performed by systems and apparatuses. Initiating a user authentication process for an application triggers application calls for dynamic invocation of a specific identity policy, required by the application, of a number of identity policies managed by a host of the identity experience framework. User interfaces defined by the identity policies are provided from the host to the application for interaction by the user and entry of identity information needed to authenticate the user according to specified verification providers. Identity claims and token requests are provided from the application to the host which then authenticates the identity claims via the verification providers and mints a token that includes the claims required by the application, according to the identity policy. The application consumes the token to complete the token request and allow the user access to the application.
    Type: Application
    Filed: November 10, 2017
    Publication date: May 16, 2019
    Inventors: Raja Charu Vikram Kakumani, Brandon Murdoch, Ronald Bjones, Muhammad O. Iqbal, Kim Cameron
  • Publication number: 20190005007
    Abstract: A cloud service can be merged with a client content to provide an integrated user experience. A user interface associated with a client may be accessed. In response to accessing the user interface associated with the client, redirect instructions to navigate to a cloud service may be received. In response to receiving redirect instructions, navigation to the cloud service may be performed. In response to navigating to the cloud service, merger code may be received from the cloud service. In response to receiving the merger code, content data associated with the client may be retrieved based on the received merger code, and service content associated with the cloud service may be generated. Additionally, in response to receiving the merger code, the generated service content may be merged with the retrieved client content data into a single document, and the single document may be set to be rendered for use.
    Type: Application
    Filed: June 30, 2017
    Publication date: January 3, 2019
    Inventors: Raja Charu Vikram KAKUMANI, Brandon MURDOCH
  • Publication number: 20120051657
    Abstract: Similarity is determined between documents based on a method for identifying documents that are likely to be based on another document. The method can include the determination of a containment coefficient, which can indicate when a template document is a subset or substantially a subset of another document. Based on this determination, an appropriate document management action can be taken, such as implementing a security policy or modifying the display of messages from a user interface.
    Type: Application
    Filed: August 30, 2010
    Publication date: March 1, 2012
    Applicant: MICROSOFT CORPORATION
    Inventors: Charles Lamanna, Raja Charu Vikram Kakumani, Vidyaraman Sankaranarayanan, Arnd Christian König
  • Patent number: 7653879
    Abstract: A contextually sensitive user interface for defining an e-mail message handling rule is provided. The user interface includes one or more user interface objects for specifying conditions for the rule and one or more user interface objects for defining the actions to be performed if the specified conditions are met. The conditions that are displayed within the user interface for selection are chosen, at least in part, based upon the context in which a request to create the e-mail handling rule is received. The displayed conditions may be based, in part, upon the contexts of reading an e-mail message, creating an e-mail message, creating an alert subscription, or selecting a user name.
    Type: Grant
    Filed: September 16, 2003
    Date of Patent: January 26, 2010
    Assignee: Microsoft Corporation
    Inventors: Chaitanya Dev Sareen, Paul Daley, Radu Bacioiu, Christopher Cameron White, Michael Philip Arcuri, Raja Charu Vikram Kakumani, Julie Madhusoodanan