Patents by Inventor SUSHILVAS VASAVAN
SUSHILVAS VASAVAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11659076Abstract: Disclosed are various embodiments for initiating execution of an application using trigger characters. In one embodiment, a computing device detects an entry of a trigger character in an input field of a first user interface presented by a first application. The input field is specified for detection of the individual trigger character based on a trigger rule for the first application. The computing device then identifies a string following the trigger character. The computing device then determines that the string matches a name of a second application installed on the computing device based on a list of applications installed on the computing device. The computing device then initiates execution of the second application. Subsequently, the computing device switches from the first user interface to a second user interface presented by the second application.Type: GrantFiled: July 2, 2021Date of Patent: May 23, 2023Assignee: AirWatch LLCInventors: Sachin Vas, Sushilvas Vasavan
-
Publication number: 20220277272Abstract: The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages.Type: ApplicationFiled: May 13, 2022Publication date: September 1, 2022Inventors: SACHIN VAS, SUSHILVAS VASAVAN, RAMANI PANCHAPAKESAN, PAVITHRA NARAYANASWAMY
-
Patent number: 11361101Abstract: Disclosed are various examples for multi-party authentication and authentication. In one example, a user can gain access to secured data stored by a managed device based on the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.Type: GrantFiled: June 27, 2018Date of Patent: June 14, 2022Assignee: AirWatch LLCInventors: Sachin Vas, Ramani Panchapakesan, Vijaykumar Bhat, Sushilvas Vasavan
-
Patent number: 11334852Abstract: The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages.Type: GrantFiled: February 22, 2017Date of Patent: May 17, 2022Assignee: AirWatch LLCInventors: Sachin Vas, Sushilvas Vasavan, Ramani Panchapakesan, Pavithra Narayanaswamy
-
Publication number: 20210337059Abstract: Disclosed are various embodiments for initiating execution of an application using trigger characters. In one embodiment, a computing device detects an entry of a trigger character in an input field of a first user interface presented by a first application. The input field is specified for detection of the individual trigger character based on a trigger rule for the first application. The computing device then identifies a string following the trigger character. The computing device then determines that the string matches a name of a second application installed on the computing device based on a list of applications installed on the computing device. The computing device then initiates execution of the second application. Subsequently, the computing device switches from the first user interface to a second user interface presented by the second application.Type: ApplicationFiled: July 2, 2021Publication date: October 28, 2021Inventors: SACHIN VAS, SUSHILVAS VASAVAN
-
Patent number: 11076034Abstract: Disclosed are various embodiments for initiating execution of an application using trigger characters. A computing device detects an entry of a trigger character within a first user interface presented by a first application installed on the computing device. The computing device then identifies a string following the trigger character. The computing device then determines that the string matches a name of a second application installed on the computing device. The computing device then initiates execution of the second application. Subsequently, the computing device switches from the first user interface to a second user interface presented by the second application.Type: GrantFiled: January 27, 2017Date of Patent: July 27, 2021Assignee: AirWatch, LLCInventors: Sachin Vas, Sushilvas Vasavan
-
Patent number: 10579810Abstract: Examples of the present disclosure relate to providing policy-protected file access. Some examples involve a configuration profile that includes a credential. The credential permits access to a policy-protected file. Once installed, the configuration profile causes the second credential to be accessible by a file management application of the client device, but inaccessible by a user of the client device. A file management application provides access to the policy-protected file based on the second credential.Type: GrantFiled: October 22, 2018Date of Patent: March 3, 2020Assignee: AIRWATCH LLCInventors: Ramani Panchapakesan, Saurabh Agrawal, Suja Ramachandran, Sushilvas Vasavan
-
Patent number: 10542045Abstract: The secure management of attachments is described. In one example, a message is received by a device management computing environment from a client computing device. The message can include an addressee list, a resource locator to a file, and a schedule associated with an event, for example. The message is intended for distribution to a number of other client devices along with the file according to the addressee list. However, the file is not directly attached to the message. Instead, the distribution of and access to the file is managed separately and securely by the device management computing environment. The device management computing environment can cause the file to be accessible through the client devices using the resource locator based on the schedule associated with the event. Further, after the event, the device management computing environment can cause the file to be inaccessible and/or removed from the client devices.Type: GrantFiled: February 22, 2017Date of Patent: January 21, 2020Assignee: AIRWATCH LLCInventors: Sachin Vas, Sushilvas Vasavan, Ramani Panchapakesan, Pavithra Narayanaswamy
-
Publication number: 20190057219Abstract: Examples of the present disclosure relate to providing policy-protected file access. Some examples involve a configuration profile that includes a credential. The credential permits access to a policy-protected file. Once installed, the configuration profile causes the second credential to be accessible by a file management application of the client device, but inaccessible by a user of the client device. A file management application provides access to the policy-protected file based on the second credential.Type: ApplicationFiled: October 22, 2018Publication date: February 21, 2019Inventors: Ramani Panchapakesan, Saurabh Agrawal, Suja Ramachandran, Sushilvas Vasavan
-
Publication number: 20180307858Abstract: Disclosed are various examples for multi-party authentication and authentication. In one example, a user can gain access to secured data stored by a managed device based on the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.Type: ApplicationFiled: June 27, 2018Publication date: October 25, 2018Inventors: SACHIN VAS, RAMANI PANCHAPAKESAN, VIJAYKUMAR BHAT, SUSHILVAS VASAVAN
-
Patent number: 10108809Abstract: Examples of the present disclosure relate to protecting files with an information rights policy. Files can be protected as specified by a content policy associated with the file. The content policy can specify whether the file should be protected while at rest on a device as well as when the file is shared with another user of an enterprise.Type: GrantFiled: December 22, 2015Date of Patent: October 23, 2018Assignee: AIRWATCH LLCInventors: Ramani Panchapakesan, Saurabh Agrawal, Suja Ramachandran, Sushilvas Vasavan
-
Patent number: 10032044Abstract: Disclosed are various examples for multi-party authentication and authentication. In one example, a user who forgets a password can gain access to secured data stored by a managed device by way of an authorization by one or more other users. This access can be granted even if the managed device is in an off-line mode or if a management server cannot be reached. In another example, access to secured data can depend upon authorization by a minimum quantity of other users. The authorization can involve an explicit approval or disapproval. Alternatively, the authorization can correspond to the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.Type: GrantFiled: October 9, 2015Date of Patent: July 24, 2018Assignee: AIRWATCH LLCInventors: Sachin Vas, Ramani Panchapakesan, Vijaykumar Bhat, Sushilvas Vasavan
-
Publication number: 20180167399Abstract: The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages.Type: ApplicationFiled: February 22, 2017Publication date: June 14, 2018Inventors: SACHIN VAS, SUSHILVAS VASAVAN, RAMANI PANCHAPAKESAN, PAVITHRA NARAYANASWAMY
-
Publication number: 20180167400Abstract: The secure management of attachments is described. In one example, a message is received by a device management computing environment from a client computing device. The message can include an addressee list, a resource locator to a file, and a schedule associated with an event, for example. The message is intended for distribution to a number of other client devices along with the file according to the addressee list. However, the file is not directly attached to the message. Instead, the distribution of and access to the file is managed separately and securely by the device management computing environment. The device management computing environment can cause the file to be accessible through the client devices using the resource locator based on the schedule associated with the event. Further, after the event, the device management computing environment can cause the file to be inaccessible and/or removed from the client devices.Type: ApplicationFiled: February 22, 2017Publication date: June 14, 2018Inventors: SACHIN VAS, Sushilvas Vasavan, Ramani Panchapakesan, Pavithra Narayanaswamy
-
Publication number: 20180157390Abstract: Disclosed are various embodiments for initiating execution of an application using trigger characters. A computing device detects an entry of a trigger character within a first user interface presented by a first application installed on the computing device. The computing device then identifies a string following the trigger character. The computing device then determines that the string matches a name of a second application installed on the computing device. The computing device then initiates execution of the second application. Subsequently, the computing device switches from the first user interface to a second user interface presented by the second application.Type: ApplicationFiled: January 27, 2017Publication date: June 7, 2018Inventors: Sachin Vas, Sushilvas Vasavan
-
Publication number: 20170124342Abstract: Examples of the present disclosure relate to protecting tiles with an information rights policy. Files can be protected as specified by a content policy associated with the file. The content policy can specify whether the file should be protected while at rest on a device as well as when the file is shared with another user of an enterprise.Type: ApplicationFiled: December 22, 2015Publication date: May 4, 2017Inventors: RAMANI PANCHAPAKESAN, SAURABH AGRAWAL, SUJA RAMACHANDRAN, SUSHILVAS VASAVAN
-
Publication number: 20170039388Abstract: Disclosed are various examples for multi-party authentication and authentication. In one example, a user who forgets a password can gain access to secured data stored by a managed device by way of an authorization by one or more other users. This access can be granted even if the managed device is in an off-line mode or if a management server cannot be reached. In another example, access to secured data can depend upon authorization by a minimum quantity of other users. The authorization can involve an explicit approval or disapproval. Alternatively, the authorization can correspond to the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.Type: ApplicationFiled: October 9, 2015Publication date: February 9, 2017Inventors: SACHIN VAS, RAMANI PANCHAPAKESAN, VIJAYKUMAR BHAT, SUSHILVAS VASAVAN