Patents by Inventor Biju Kunjukunju

Biju Kunjukunju has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8892869
    Abstract: The present invention relates to using digital certificates to allow network devices to authenticate themselves upon being accepted into and forming part of a communication network.
    Type: Grant
    Filed: December 23, 2008
    Date of Patent: November 18, 2014
    Assignee: Avaya Inc.
    Inventors: Dragan Grebovich, Kumara Das Karunakaran, Biju Kunjukunju
  • Publication number: 20100161969
    Abstract: The present invention relates to using digital certificates to allow network devices to authenticate themselves upon being accepted into and forming part of a communication network.
    Type: Application
    Filed: December 23, 2008
    Publication date: June 24, 2010
    Applicant: NORTEL NETWORKS LIMITED
    Inventors: Dragan Grebovich, Kumara Das Karunakaran, Biju Kunjukunju
  • Publication number: 20070169171
    Abstract: A technique for authenticating network users is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for authenticating network users. The method may comprise receiving, from a client device, a request for connection to a network. The method may also comprise evaluating a security context associated with the requested connection. The method may further comprise assigning the client device one or more access privileges based at least in part on the evaluation of the security context.
    Type: Application
    Filed: December 30, 2005
    Publication date: July 19, 2007
    Inventors: Ravi Kumar, Tal Lavian, Vasant Sahay, Nirmalendu Das, Biju Kunjukunju, David Levi, Philippe Michelet
  • Publication number: 20070150947
    Abstract: Increased security may be provided on an enterprise network by causing a central security server to administer security policy on the network. Agents in hosts on the network authenticate with the central security server to obtain policy information for that particular host user. The policy information may specify whether any special routing, processing, or other features, should occur in connection with particular classes of traffic or in connection with communications with particular other hosts or classes of hosts. In operation, the agents implement the policy by interfacing with the networking layer to cause the traffic to be routed via any other host/server on the network so that appropriate services may occur with respect to that traffic. Additionally, tunnels may be established so that traffic in-between hosts or between a host and server to be encrypted, compressed, or otherwise treated as specified in the policy.
    Type: Application
    Filed: December 22, 2005
    Publication date: June 28, 2007
    Applicant: Nortel Networks Limited
    Inventors: Rajesh Vijayakumar, Vibhu Vivek, Biju Kunjukunju, Niklas Hanberger
  • Publication number: 20070011725
    Abstract: A technique for providing secure network access is disclosed. In one particular exemplary embodiment, the technique may be realized as a method for providing secure network access. The method may comprise establishing a plurality of access zones in a network, wherein client devices assigned to different access zones have different access privileges and are isolated from one another. The method may also comprise assigning a client device to one of the plurality of access zones based on an assessment of a security context associated with the client device and a connection of the client device to the network.
    Type: Application
    Filed: December 30, 2005
    Publication date: January 11, 2007
    Inventors: Vasant Sahay, Biju Kunjukunju, Nirmalendu Das, Subhasree Mandal, David Levi, Manoj Guglani, Philippe Michelet, Ravi Kumar