S
Sudhakar Velamoor
Publications - 4
Citations - 279
Sudhakar Velamoor is an academic researcher. The author has contributed to research in topics: Login & File area network. The author has an hindex of 4, co-authored 4 publications receiving 279 citations.
Papers
More filters
Patent
Customizable secure data exchange environment
Kevin L. Mccarthy,Jerry Lee Meyer,Sudhakar Velamoor,David Scott Lindsay,Visal Chandrakant Acharya,Benedict Robert Dsilva,Paul Tearnen,Peter Wenzel,John Held,Charlie Weiblen,Ganesh Kannan,Madhavi Parimi,Selom Harry Azuma,Himali Mahajan,Dario R. Lirio,Michael Joseph Waluk,John Landy,Fahim Siddiqui,Christopher Todd Ford,Margin Vora,Matthew A. Porzio,Harshal Morparia,Yana Nikolayeva,Tony Yip,Mayank Choudhary,Liviu Rozin,Ronald W. Hovsepian,John William Giudice,Vedang Shailesh Purohit,Wasif Qayyum Awan,Peter W. Cleary +30 more
TL;DR: In this article, a secure data exchange system that includes a data management facility and a plurality of data storage nodes is described, where the data is stored by a user of a first entity and comprises content and metadata.
Patent
Digital rights management through virtual container partitioning
Sudhakar Velamoor,Fahim Siddiqui +1 more
TL;DR: In this paper, the authors described improved capabilities for securely sharing documents among users within separate business entities, comprising providing a virtual container control facility, on a computing device with an operating system, and at least one virtual container where commands from the operating system for saving, copying, and printing of computer files are restricted for users other than unrestricted users.
Patent
Offline file access
TL;DR: In this article, improved capabilities are described for providing secure offline computer content access, comprising at a server-based file access facility connected to a network and to a secure database, storing a data file as an encrypted data file along with a plurality of encryption keys in the secure database.
Patent
System and method for managing collaboration in a networked secure exchange environment
TL;DR: In this article, improved capabilities are described for securely viewing computer data content, such as documents, presentations, spreadsheets, emails, blog entries, texts, and the like, wherein a secure exchange server is controlled by an intermediate business entity, and access to retention restricted computer data contents is granted to a user of a second business entity when the secure Exchange Server receives appropriate login authentication data.