Patents by Inventor SUSHILVAS VASAVAN

SUSHILVAS VASAVAN has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220277272
    Abstract: The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages.
    Type: Application
    Filed: May 13, 2022
    Publication date: September 1, 2022
    Inventors: SACHIN VAS, SUSHILVAS VASAVAN, RAMANI PANCHAPAKESAN, PAVITHRA NARAYANASWAMY
  • Publication number: 20210337059
    Abstract: Disclosed are various embodiments for initiating execution of an application using trigger characters. In one embodiment, a computing device detects an entry of a trigger character in an input field of a first user interface presented by a first application. The input field is specified for detection of the individual trigger character based on a trigger rule for the first application. The computing device then identifies a string following the trigger character. The computing device then determines that the string matches a name of a second application installed on the computing device based on a list of applications installed on the computing device. The computing device then initiates execution of the second application. Subsequently, the computing device switches from the first user interface to a second user interface presented by the second application.
    Type: Application
    Filed: July 2, 2021
    Publication date: October 28, 2021
    Inventors: SACHIN VAS, SUSHILVAS VASAVAN
  • Publication number: 20180307858
    Abstract: Disclosed are various examples for multi-party authentication and authentication. In one example, a user can gain access to secured data stored by a managed device based on the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.
    Type: Application
    Filed: June 27, 2018
    Publication date: October 25, 2018
    Inventors: SACHIN VAS, RAMANI PANCHAPAKESAN, VIJAYKUMAR BHAT, SUSHILVAS VASAVAN
  • Publication number: 20180167399
    Abstract: The secure management of attachments is described. In one example, files are identified for attachment to a message through a secure content application extension. Rather than directly attaching the files to the message, a resource locator or link to the files is generated, and the resource locator is inserted into the message. The message is then forwarded for distribution to client devices based on an addressee list for the message. The distribution of and access to the files is managed separately by a management service. The management service can notify the client devices to retrieve the files based on a file access schedule. At each of the client devices, users can access the files through a secure content file application extension using the resource locator during the file access schedule. Thus, the files are distributed through secure content file applications and not as direct attachments to messages.
    Type: Application
    Filed: February 22, 2017
    Publication date: June 14, 2018
    Inventors: SACHIN VAS, SUSHILVAS VASAVAN, RAMANI PANCHAPAKESAN, PAVITHRA NARAYANASWAMY
  • Publication number: 20170124342
    Abstract: Examples of the present disclosure relate to protecting tiles with an information rights policy. Files can be protected as specified by a content policy associated with the file. The content policy can specify whether the file should be protected while at rest on a device as well as when the file is shared with another user of an enterprise.
    Type: Application
    Filed: December 22, 2015
    Publication date: May 4, 2017
    Inventors: RAMANI PANCHAPAKESAN, SAURABH AGRAWAL, SUJA RAMACHANDRAN, SUSHILVAS VASAVAN
  • Publication number: 20170039388
    Abstract: Disclosed are various examples for multi-party authentication and authentication. In one example, a user who forgets a password can gain access to secured data stored by a managed device by way of an authorization by one or more other users. This access can be granted even if the managed device is in an off-line mode or if a management server cannot be reached. In another example, access to secured data can depend upon authorization by a minimum quantity of other users. The authorization can involve an explicit approval or disapproval. Alternatively, the authorization can correspond to the presence of the minimum quantity of other users within a threshold proximity of the user who desires access.
    Type: Application
    Filed: October 9, 2015
    Publication date: February 9, 2017
    Inventors: SACHIN VAS, RAMANI PANCHAPAKESAN, VIJAYKUMAR BHAT, SUSHILVAS VASAVAN