Patents by Inventor Sharath Srikanth Chellappa

Sharath Srikanth Chellappa has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11449597
    Abstract: Example implementations relate to transposed passwords. A computing device may comprise a processing resource; and a memory resource storing machine-readable instructions to cause the processing resource to: receive an entered password; generate, based on the entered password, a transposed version of the entered password; compare the transposed version of the password to a stored password; and grant access based on the comparison.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: September 20, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Lavanya Bollam, Yashavantha Nagaraju, Sharath Srikanth Chellappa
  • Patent number: 11171953
    Abstract: A technique includes receiving a request from a first electronic device to connect to a network and receiving a first part from the first electronic device. The technique includes regulating onboarding of the first electronic device. Regulating the onboarding includes authenticating the first electronic device. Authenticating the first electronic device includes communicating with a plurality of electronic devices that are connected to the network to receive a set of second secret parts; constructing a first secret from the first secret part and the set of second secret parts; and comparing the first secret to a second secret. Regulating the onboarding of the first electronic device includes allowing the first electronic device to connect to the network based on a result of the comparison.
    Type: Grant
    Filed: November 26, 2018
    Date of Patent: November 9, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Sharath Srikanth Chellappa, Yashavantha Nagaraju Naguvanahalli, Dileep Bangalore Sridhara, Thomas M. Laffey
  • Publication number: 20200252267
    Abstract: A network switch may determine a prioritized set of state parameters for the network switch. The network switch may receiving an indication of a command and may, in response, determine whether the command is currently performable based at least in part on comparing a set of current state information of the network switch with the prioritized set of state parameters. The network switch may, in response to determining the command is not currently performable, re-determine, at a specified future time, whether the command will be performable at the specified future time based at least in part on comparing the set of state information of the network switch at the specified future time with the prioritized state of state parameters.
    Type: Application
    Filed: February 4, 2019
    Publication date: August 6, 2020
    Inventors: Sharath Srikanth Chellappa, Vikas Kumar Pareek, Yashavantha Nagaraju Naguvanahalli, Dhanesh Kumar Shanmuga Sundaram
  • Publication number: 20200125718
    Abstract: Example implementations relate to transposed passwords. A computing device may comprise a processing resource; and a memory resource storing machine-readable instructions to cause the processing resource to: receive an entered password; generate, based on the entered password, a transposed version of the entered password; compare the transposed version of the password to a stored password; and grant access based on the comparison.
    Type: Application
    Filed: October 22, 2018
    Publication date: April 23, 2020
    Inventors: Lavanya Bollam, Yashavantha Nagaraju, Sharath Srikanth Chellappa
  • Publication number: 20200059469
    Abstract: A technique includes receiving a request from a first electronic device to connect to a network and receiving a first part from the first electronic device. The technique includes regulating onboarding of the first electronic device. Regulating the onboarding includes authenticating the first electronic device. Authenticating the first electronic device includes communicating with a plurality of electronic devices that are connected to the network to receive a set of second secret parts; constructing a first secret from the first secret part and the set of second secret parts; and comparing the first secret to a second secret. Regulating the onboarding of the first electronic device includes allowing the first electronic device to connect to the network based on a result of the comparison.
    Type: Application
    Filed: November 26, 2018
    Publication date: February 20, 2020
    Inventors: Sharath Srikanth Chellappa, Yashavantha Nagaraju Naguvanahalli, Dileep Bangalore Sridhara, Thomas M. Laffey