Swansea, SC, United States of America

Akshar Rawal



 

Average Co-Inventor Count = 3.0

ph-index = 1

Forward Citations = 1(Granted Patents)


Company Filing History:


Years Active: 2022

Loading Chart...
Loading Chart...
Loading Chart...
1 patent (USPTO):Explore Patents

Title: Akshar Rawal: Innovator in Security Workflow Automation

Introduction

Akshar Rawal is a notable inventor based in Swansea, SC (US). He has made significant contributions to the field of security automation through his innovative patent. His work focuses on enhancing the efficiency and security of distributed systems.

Latest Patents

Akshar Rawal holds a patent titled "Systems and method for automating security workflows in a distributed system using encrypted task requests." This patent outlines methods and systems for automating the execution of workflows by integrating security applications within a distributed system. The system includes an application server in a first cloud that receives triggers to execute workflows, which consist of tasks to be executed on devices in a second cloud. The application server sends requests to a task queue module, which manages the task requests and facilitates their processing by workers in the second cloud. This innovative approach ensures secure and efficient task execution, yielding valuable results.

Career Highlights

Akshar Rawal is currently employed at Thomson Reuters Enterprise Centre GmbH, where he continues to develop and refine his innovative ideas. His work at this esteemed organization allows him to collaborate with other talented professionals in the field.

Collaborations

Some of Akshar's coworkers include Vishal Parikh and William Stuart Ratner. Their collaboration fosters a creative environment that encourages the development of cutting-edge solutions in security automation.

Conclusion

Akshar Rawal's contributions to the field of security workflow automation demonstrate his commitment to innovation and excellence. His patent reflects a significant advancement in the integration of security applications within distributed systems.

This text is generated by artificial intelligence and may not be accurate.
Please report any incorrect information to support@idiyas.com
Loading…