Rohit Koul
Rohit Koul, Jammu IN
Patent application number | Description | Published |
---|---|---|
20110107089 | METHODS AND SYSTEMS FOR IMPLEMENTING POLICY BASED TRUST MANAGEMENT - This disclosure describes, generally, methods and systems for implementing policy based trust management. The method includes receiving, at an host server, a trust request from a partner, and identifying, at the host server via a trust policy enforcer, parameters and attributes associated with the partner. The method further includes identifying, at the host server via the trust policy enforcer, parameters and attributes associated with the requested resource, and accessing, by the trust policy enforcer, a policy database. Furthermore, the method includes retrieving, by the trust policy enforcer, one or more trust policies associated with the requested resource, and based on the attributes and parameters of the partner, applying, by the trust policy enforcer, the one or more associated trust policies to the request. Further, the method includes based on conformity with the one or more trust policies, providing the partner with access to the requested resource. | 05-05-2011 |
Rohit Koul, Jammu And Kashmir IN
Patent application number | Description | Published |
---|---|---|
20110033033 | TECHNIQUES FOR CONTROLLING ACCESS TO TELECONFERENCES - Techniques for managing teleconferences. A plurality of people are associated with a plurality of identifiers such that each person is associated with at least one identifier. For each caller to a teleconference associated with a different identifier, authentication information is solicited from the caller. Authentication information is received from the caller in response to the solicitation and a determination, based on the received authentication information, is made whether the caller is associated with one of the identifiers. | 02-10-2011 |
20110035453 | AUTOMATIC RULES-BASED MESSAGING SYSTEM BASED ON ANALYSIS OF TEXT AND/OR ASSOCIATED METADATA - In one embodiment, a rule is received that specifies an action to perform based on text of any instant messages received. An input is received to change from a first mode to a second mode. The second mode may be a virtual offline mode in which rules may be applied to incoming instant messages. When an instant message is received, text of the instant message is recognized. For example, text in the body of the instant message or metadata is determined. The rule is applied to the recognized text to determine if an action for the rule should be performed. For example, if a certain phrase is detected, then an action may be performed. The actions may include pre-configured auto-responses, allowing display of the instant message for certain senders even if the user has indicated he/she is busy, or storing of the message for later delivery. | 02-10-2011 |
20110099235 | COLLATION OF MULTI-USER, MULTI-FORMAT, EMAIL COMMUNICATION WITH COMMON SUBJECT TITLES - A method includes monitoring, at a server, electronic messages transmitted across a network from any one of a group of participating users, determining if any of the electronic messages include any of a stored set of keywords, sending any electronic messages that include at least one keyword to a formatting module, extracting, at the formatting module, data relating to the keyword from the electronic message according to a previously-established rule stored in the network, and collating, at the formatting module, the data relating to the keyword into a second electronic message and transmitting the second electronic message to a supervising user. A system has a status server, the status server having a storage to store at least one group of participating users and at least one keyword associated with the group, a monitoring module to monitor electronic messages from the participating users to determine if the electronic messages contain the keyword, and a formatting module to receive electronic messages that contain the keyword, extract data related to the keyword and collate the data into a second electronic message. | 04-28-2011 |
20120042019 | TECHNIQUES FOR FILTERING SELECTIVE USERS IN DISTRIBUTION LISTS - Techniques, including systems and methods for distributing electronic messages, are disclosed. In an embodiment, information relating to a message thread is maintained. The information includes information identifying one or more members of a distribution list to be excluded from receiving messages in the message thread. When it has been determined to prevent distribution of the electronic message to one or more members of the distribution list, the electronic message is distributed to members of the distribution list excluding the one or more members to whom distribution is to be prevented. The distributed electronic message may identify the distribution list as an intended recipient. | 02-16-2012 |
Rohit Koul, Jammu (tawi) IN
Patent application number | Description | Published |
---|---|---|
20110060727 | HANDLING OF EXPIRED WEB PAGES - Information indicating a time of validity of content of a web page is maintained as meta data within the page itself. A content server, in response to receipt of a request for the web page, determines whether web page has expired. If the content is determined not to have expired, the content server forwards the web page to the requesting user without modification. However, if the content is determined to have expired, the content server adds a warning tag in the content section of the page specifying that the content has expired, and then forwards the page to the requesting user, thereby alert the user of the expiry. In addition, the content server may obtain an updated web page, which may then be provided in response to future requests for the web page. | 03-10-2011 |
20110154338 | TASK MANAGEMENT USING ELECTRONIC MAIL - A mail server based approach to task management. In an embodiment, a first user sends a task assignment email indicating a task sought to be assigned, a list of assignees and a list of recipients. The mail server forwards the email message to all the recipients, while maintaining information of a current status of the task. The assignees may send status updates and the current status is accordingly updated. The status information on the server can be accessed by various users. | 06-23-2011 |
20110166952 | FACILITATING DYNAMIC CONSTRUCTION OF CLOUDS - In an embodiment, a customer sends a set of requirements for a cloud to a cloud complier, which identifies vendors matching the set of requirements. Information on the matching set of vendors is provided to the customer, thereby enabling the customer to select desired vendors for constructing the cloud. | 07-07-2011 |
Rohit Koul, Bangalore IN
Patent application number | Description | Published |
---|---|---|
20090319623 | RECIPIENT-DEPENDENT PRESENTATION OF ELECTRONIC MESSAGES - A message originator, such as an author of an email, can designate “section access settings” which can selectively permit or deny access of portions of the email's content. Recipients who are not authorized may not exercise the access right upon the designated portion of content. For example, an access right may allow displaying a section of text in an email message only for specified recipients and not to other recipients. In a preferred embodiment, the entire email content, including restricted portions, is provided to all recipients, including unauthorized recipients. Unauthorized recipients are prevented from exercising the access right even though the restricted portion has been received. | 12-24-2009 |
20100332584 | POLICY-BASED USER CONTACTS LIST MANAGEMENT - Embodiments of the present invention enable policy-based management of a user contacts list. Applications of the present invention are its use in embodiments of Instant Messaging (IM) systems. During an IM session, a session owner may temporarily add a contact to an active contacts list for a duration determined by evaluating constraints from one or more policies associated with the contact. At IM session initialization, a session owner's persistently stored contacts and their associated policies are retrieved, and the policies are evaluated. An active contacts list for use during the IM session is generated from a subset of stored contacts for which all associated policy constraints are satisfied. In embodiments, the active contacts list may be updated during a session by re-evaluating the stored contacts and associated policies. In embodiments, an active contacts list is updated after addition of a new contact determined to have an associated enabled policy satisfied. | 12-30-2010 |