| 12341769 |
Automatic generation of network access policies |
Krishna Prabhakar, Rajarao Bhagya Prasad Nittur, Rajesh Kumar Ganapathy Achari, Madhusudhan Chitradurga Sethuram Setty, Venkatesh Ramachandran |
2025-06-24 |
| 11792193 |
Vendor agnostic captive portal authentication |
Rajesh Kumar Ganapathy Achari, Venkatesh Ramachandran, Pattabhi Attaluri, Bhagya Prasad Nittur, Antoni Milton |
2023-10-17 |
| 11418515 |
Multi-vendor support for network access control policies |
Rajesh Kumar Ganapathy Achari, Pattabhi Attaluri, Venkatesh Ramachandran, Bhagya Prasad Nittur, Antoni Milton |
2022-08-16 |
| 11228618 |
Seamless multi-vendor support for change of authorization through radius and other protocols |
Rajesh Kumar Ganapathy Achari, Venkatesh Ramachandran, Pattabhi Attaluri, Rajarao Bhagya Prasad Nittur, Antoni Milton |
2022-01-18 |
| 11212292 |
Network access control authorization process chaining |
Bhagya Prasad Nittur, Antoni Milton |
2021-12-28 |
| 11201864 |
Vendor agnostic captive portal authentication |
Rajesh Kumar Ganapathy Achari, Venkatesh Ramachandran, Pattabhi Attaluri, Bhagya Prasad Nittur, Antoni Milton |
2021-12-14 |
| 10805163 |
Identifying device types based on behavior attributes |
Sebastien Tandel, Rajesh Kumar Ganapathy Achari |
2020-10-13 |
| 10581827 |
Using application level authentication for network login |
Venkatraju Venkatanaranappa, Rajesh Kumar Ganapathy Achari, Santhosh Cheeniyil |
2020-03-03 |
| 10193878 |
Using application level authentication for network login |
Venkatraju Venkatanaranappa, Rajesh Kumar Ganapathy Achari, Santhosh Cheeniyil |
2019-01-29 |
| 9973378 |
Implementing gateway redundancy in a network |
Rangaprasad Sampath, Sudhir Kumar ChimakurthyOm |
2018-05-15 |
| 9866522 |
Method to control dynamic host configuration protocol pool exhaustion in dynamic network environments |
Avignan Chatterjee, Rajesh Kumar Ganapathy Achari, Srinivasan Jayarajan, Harsha Nagaraja, Venkatesh Ramachandran +2 more |
2018-01-09 |
| 9824193 |
Method for using mobile devices with validated user network identity as physical identity proof |
Rajesh Kumar Ganapathy Achari, Venkatesh Ramachandran, Venkatraju Venkatanaranappa |
2017-11-21 |
| 9590972 |
Application authentication using network authentication information |
Venkatraju Venkatanaranappa, Rajesh Kumar Ganapathy Achari, Santhosh Cheeniyil |
2017-03-07 |