Patents by Inventor Sudhakar Pasupuleti
Sudhakar Pasupuleti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11080104Abstract: Activating an extension includes opening a first compose application by a first computing device. A composed document is received, and an extension is activated in response to the document. The extension may be activated as the document is being composed.Type: GrantFiled: September 30, 2019Date of Patent: August 3, 2021Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Andrew Salamatov, Jason Todd Henderson, Oleg Ouliankine, Pretish Abraham, Philip Yue-Leung Chan, Kee Hyuk Park, Shivani Chaturvedi, Sudhakar Pasupuleti, Paul Virag, Angela So, Chia-Wei Chang
-
Publication number: 20200026584Abstract: Activating an extension includes opening a first compose application by a first computing device. A composed document is received, and an extension is activated in response to the document. The extension may be activated as the document is being composed.Type: ApplicationFiled: September 30, 2019Publication date: January 23, 2020Applicant: Microsoft Technology Licensing, LLCInventors: Andrew Salamatov, Jason Henderson, Oleg Ouliankine, Pretish Abraham, Philip Yue-Leung Chan, Kee Hyuk Park, Shivani Chaturvedi, Sudhakar Pasupuleti, Paul Virag, Angela So, Chia-Wei Chang
-
Patent number: 10430254Abstract: Activating an extension includes opening a first compose application by a first computing device. A composed document is received, and an extension is activated in response to the document. The extension may be activated as the document is being composed.Type: GrantFiled: January 5, 2017Date of Patent: October 1, 2019Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Andrew Salamatov, Jason Henderson, Oleg Ouliankine, Pretish Abraham, Philip Yue-Leung Chan, Kee Hyuk Park, Shivani Chaturvedi, Sudhakar Pasupuleti, Paul Virag, Angela So, Chia-Wei Chang
-
Patent number: 9672079Abstract: Activating an extension includes opening a first compose application by a first computing device. A composed document is received, and an extension is activated in response to the document. The extension may be activated as the document is being composed.Type: GrantFiled: November 25, 2013Date of Patent: June 6, 2017Assignee: Microsoft Technology Licensing, LLCInventors: Andrew Salamatov, Jason Henderson, Oleg Ouliankine, Pretish Abraham, Philip Yue-Leung Chan, Kee Hyuk Park, Shivani Chaturvedi, Sudhakar Pasupuleti, Paul Virag, Angela So, Chia-Wei Chang
-
Publication number: 20170116006Abstract: Activating an extension includes opening a first compose application by a first computing device. A composed document is received, and an extension is activated in response to the document. The extension may be activated as the document is being composed.Type: ApplicationFiled: January 5, 2017Publication date: April 27, 2017Inventors: Andrew Salamatov, Jason Henderson, Oleg Ouliankine, Pretish Abraham, Philip Yue-Leung Chan, Kee Hyuk Park, Shivani Chaturvedi, Sudhakar Pasupuleti, Paul Virag, Angela So, Chia-Wei Chang
-
Patent number: 9521119Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.Type: GrantFiled: October 14, 2015Date of Patent: December 13, 2016Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
-
Publication number: 20160036781Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.Type: ApplicationFiled: October 14, 2015Publication date: February 4, 2016Inventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
-
Patent number: 9239817Abstract: A web extension is managed through a manifest file. An application managing the web extension receives attributes of the extension from a developer or metadata of the extension. A pointer to the web extension is inserted into the attributes. The pointer can be used as a link to activate the web extension. The attributes are stored in a manifest file formatted in extensible markup language (XML). The functionality of the web extension is managed based on the manifest file.Type: GrantFiled: November 20, 2012Date of Patent: January 19, 2016Assignee: Microsoft Technology Licensing, LLCInventors: David Claux, Patrick Conlan, Rolando Jimenez Salgado, Warren Byrne, Andrew Salamatov, Carlos Brito, Oleg Ouliankine, Oleg Ovanesyan, Jason Henderson, Ben Sack, Steve Clagg, Sudhakar Pasupuleti
-
Patent number: 9185091Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.Type: GrantFiled: September 28, 2012Date of Patent: November 10, 2015Assignee: MICROSOFT TECHNOLOGY LICENSING, LLCInventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
-
Publication number: 20150150028Abstract: Activating an extension includes opening a first compose application by a first computing device. A composed document is received, and an extension is activated in response to the document. The extension may be activated as the document is being composed.Type: ApplicationFiled: November 25, 2013Publication date: May 28, 2015Inventors: Andrew Salamatov, Jason Henderson, Oleg Ouliankine, Pretish Abraham, Philip Yue-Leung Chan, Kee Hyuk Park, Shivani Chaturvedi, Sudhakar Pasupuleti, Paul Virag, Angela So, Chia-Wei Chang
-
Publication number: 20130283139Abstract: A web extension is managed through a manifest file. An application managing the web extension receives attributes of the extension from a developer or metadata of the extension. A pointer to the web extension is inserted into the attributes. The pointer can be used as a link to activate the web extension. The attributes are stored in a manifest file formatted in extensible markup language (XML). The functionality of the web extension is managed based on the manifest file.Type: ApplicationFiled: November 20, 2012Publication date: October 24, 2013Applicant: Microsoft CorporationInventors: David Claux, Patrick Conlan, Ronaldo Jimenez Salgado, Warren Byrne, Andrew Salamatov, Carlos Brito, Oleg Ouliankine, Oleg Ovanesyan, Jason Henderson, Ben Sack, Steve Clagg, Sudhakar Pasupuleti
-
Publication number: 20130024911Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.Type: ApplicationFiled: September 28, 2012Publication date: January 24, 2013Applicant: Microsoft CorporationInventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
-
Patent number: 8286223Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.Type: GrantFiled: July 8, 2005Date of Patent: October 9, 2012Assignee: Microsoft CorporationInventors: Anthony M. Leibovitz, Mark C. Schurman, Mudit Goel, Paul G. Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek P. Kamath, Wei Zheng, Xuemei Bao
-
Publication number: 20070016939Abstract: Software for managing access control functions in a network. The software includes a host that receives access control commands or information and calls one or more methods. The methods perform access control functions and communicate access control results or messages to be transmitted. The host may be installed in a network peer seeking access to the network or in a server controlling access to the network. When installed in a peer, the host receives commands and exchanges information with a supplicant. When installed in an access control server, the host receives commands and exchanges information with an authenticator. The host has a flexible architecture that enables multiple features, such as allowing the same methods to be used for authentication by multiple supplicants, providing ready integration of third party access control software, simplifying network maintenance by facilitating upgrades of authenticator software and enabling access control functions other than peer authentication.Type: ApplicationFiled: July 8, 2005Publication date: January 18, 2007Applicant: Microsoft CorporationInventors: Anthony Leibovitz, Mark Schurman, Mudit Goel, Paul Mayfield, Sudhakar Pasupuleti, Taroon Mandhana, Vivek Kamath, Wei Zheng, Xuemei Bao