| 11985129 |
Cloud policy enforcement based on network trust |
Ajit Singh, Vikas Mahajan, Amandeep Singh, Huiju Wu, David Creedy |
2024-05-14 |
| 11843577 |
Fingerprinting to identify devices and applications for use in management and policy in the cloud |
Ajit Singh, Abhinav Bansal, Thomas Evan Keiser, Jr., John O'Neil |
2023-12-12 |
| 11297058 |
Systems and methods using a cloud proxy for mobile device management and policy |
Ajit Singh, Tejus Gangadharappa |
2022-04-05 |
| 11134386 |
Device identification for management and policy in the cloud |
Ajit Singh, Abhinav Bansal |
2021-09-28 |
| 10986094 |
Systems and methods for cloud based unified service discovery and secure availability |
Purvi Desai, Vikas Mahajan, Abhinav Bansal, Ajit Singh, Sandeep Kumar |
2021-04-20 |
| 10903999 |
Protecting PII data from man-in-the-middle attacks in a network |
Ajit Singh |
2021-01-26 |
| 9935955 |
Systems and methods for cloud based unified service discovery and secure availability |
Purvi Desai, Vikas Mahajan, Abhinav Bansal, Ajit Singh, Sandeep Kumar |
2018-04-03 |