| 10491583 |
Provisioning remote access points |
Manish Mehta, Santashil PalChaudhuri |
2019-11-26 |
| 9882909 |
System and method for application usage controls through policy enforcement |
Asif Awan, Chetan Kumar, Deepak Agarwal, Suman Maradani, Sunil G. V. Babu |
2018-01-30 |
| 9509746 |
Provisioning remote access points |
Manish Mehta, Santashil PalChaudhuri |
2016-11-29 |
| 9326145 |
System and method for application usage controls through policy enforcement |
Asif Awan, Chetan Kumar, Deepak Agarwal, Suman Maradani, Sunil G. V. Babu |
2016-04-26 |
| 8627423 |
Authorizing remote access points |
Santashil PalChaudhuri, Anupam Wadhawan, Manish Mehta |
2014-01-07 |
| 8316226 |
Adaptive transition between layer three and layer four network tunnels |
James Wood, David W. Young, Vamsi Anne, Vadim Egorov, Christopher N. Thomas |
2012-11-20 |
| 8095786 |
Application-specific network-layer virtual private network connections |
Christopher N. Thomas |
2012-01-10 |
| 8041960 |
Secure creation and management of device ownership keys |
Scott Kelly |
2011-10-18 |
| 7315862 |
Concurrent lock-free access to a record by write and read processes |
Richard Crump |
2008-01-01 |
| 7233579 |
Routing table for forwarding Internet Protocol (IP) packets through a communications network |
Richard Crump, Janet Doong |
2007-06-19 |