Patents by Inventor Arun Prasad Amarendran
Arun Prasad Amarendran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240143759Abstract: Backup data is leveraged to determine whether primary data has been encrypted by malware. The disclosed approach does not rely on recognizing particular malware instances or malware provenance, and thus can be applied to any body of data. Even a novel and previously unknown malware attack can be detected in this way. An illustrative data storage management system analyzes secondary copies it created over time, applies a multi-factor analysis to data recovered from the secondary copies and, based on the analysis, infers whether the primary data from which the secondary copies were created may be encrypted. The present approach uses successive versions of backup copies to find indicia of malware encryption, rather than trying to trace or identify the malware itself. Indicia of entropy correlate highly with encryption, such as encryption performed by malware attacks. Conversely, indicia of similarity correlate highly with lack of encryption of successive versions of documents.Type: ApplicationFiled: October 27, 2022Publication date: May 2, 2024Inventors: Jitin JINDAL, Arun Prasad AMARENDRAN, Chandan SINGH, Gopikannan VENUGOPALSAMY, Yongtao LIU
-
Patent number: 11940952Abstract: A system for providing user access to electronic mail includes an email client and an email server. The email client receives and communicates a user interaction with an email message The email server that receives the communication, determines whether the email message stored in a live database or in a backup storage. Upon determination that the email message is stored in a backup storage, the email server performs a message exchange with a backup storage system to perform the user-requested action.Type: GrantFiled: March 14, 2022Date of Patent: March 26, 2024Assignee: Commvault Systems, Inc.Inventors: Arun Prasad Amarendran, Jun H. Ahn, Tirthankar Chatterjee, Manas Bhikchand Mutha, Ho-Chi Chen, Prosenjit Sinha, Yongtao Liu
-
Publication number: 20240056482Abstract: Data recovery from a cyber-attack is expedited based on data storage management integration with cyber threat deception. A cyber threat detection and deception system analyzes a “deposit” placed by an attacker at a deception trap, identifies distinguishing attributes of the deposit, and determines which subset of real data assets may be at risk, preferably based on subnet/VLAN proximity to the attacker's deposit. By focusing immediate attention on the subset of at-risk assets, a data storage management system shortens the amount of time needed to identify safe copies and components and to prepare them for recovery. Storage operations involving the at-risk assets are suspended and users are not shown at-risk assets and cannot invoke recovery or copy operations for them. Without the focus on at-risk assets provided by the cyber threat detection and deception system, the data storage management system would take much longer to navigate its backup data stores.Type: ApplicationFiled: September 27, 2022Publication date: February 15, 2024Inventors: Paul IGNATIUS, Arun Prasad AMARENDRAN
-
Publication number: 20240056481Abstract: A cyber threat detection and deception system interoperates synergistically with a data storage management system. As a proxy for identifying crown jewels among many and diverse data assets in a network, the illustrative cyber threat detection and deception system uses service level information obtained from the data storage management system, e.g., RPO, RTO, append-only secondary storage, synthetic-full frequency, etc. The cyber threat detection and deception system emulates proprietary protocols used by storage management technologies such as the data storage management system, etc. By creating emulation traps and an emulation lexicon of these storage-related protocols, the illustrative cyber threat detection and deception system can create and execute cyber deception plans for the proprietary storage management assets.Type: ApplicationFiled: September 1, 2022Publication date: February 15, 2024Inventors: Paul IGNATIUS, Arun Prasad AMARENDRAN, Steven Michael PRESTON, Mori BENECH, Irina CHEKAREV, Indu Sekhar PEDDIBHOTLA, Manoj NAIR
-
Publication number: 20240012717Abstract: Protecting configuration data in a clustered container system may include, in some embodiments, protecting an ETCD data store in a Kubernetes cluster. A data storage management system addresses the unique needs of protecting an ETCD data store of a target Kubernetes cluster, as well as protecting non-ETCD data payloads. The illustrative data storage management system defines ETCD as a unique kind of workload. ETCD protection is integrated within the data storage management system, which automatically creates data structures and resources within the system for, and provides special-purpose features to protect, ETCD contents and associated security certificates. One of the special-purpose features deploys a temporary data transfer agent within the target Kubernetes cluster to safeguard an ETCD snapshot and transmit its contents, along with the security certificates, to a backup infrastructure that operates outside of the target Kubernetes cluster.Type: ApplicationFiled: August 4, 2022Publication date: January 11, 2024Inventors: Amit MITKAR, Srinivas Govind KUNDARAM, Shankarbabu BHAVANARUSHI, Arun Prasad AMARENDRAN, Rohit Himmatrao DIKKAR
-
Publication number: 20240007505Abstract: An illustrative air-gapped data storage site for storing secure copies at the air-gapped storage site. Using specialized air-gapped media agents installed within the air-gapped storage pool site, the illustrative system, at an unpredictable time, establishes a one-way tunnel from secondary storage site to air-gapped site to receive backup copies of the data stored at primary site. In another embodiment, during disaster recovery, backup copies stored within the air-gapped site are replicated to a non-air gapped site (e.g., secondary storage pools) as “tertiary copies.” Those copies are then restored to the primary site in original application data formats for quick recovery. As restoration of data is complete, the tertiary copies are promoted to “secondary copies” to receive incremental backups.Type: ApplicationFiled: June 28, 2023Publication date: January 4, 2024Inventors: Satya Narayan MOHANTY, Hetal KAPADIA, Arun Prasad AMARENDRAN, Laskshmi N Prakash PARVATHAMVENKATAS
-
Publication number: 20230109690Abstract: An information management system includes a storage manager for managing backup and/or restore operations for one or more client computing devices. The storage manager may be in communication with a resource administrator of a computing resource cluster, wherein the resource administrator instantiates one or more computing pods using the computing resource cluster. The resource administrator may receive a request for computing resources from the storage manager and provision the computing pods based on the request. The resource administrator may then select a pre-configured container image from one or more pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system.Type: ApplicationFiled: October 22, 2021Publication date: April 13, 2023Inventors: Manas Bhikchand MUTHA, Bhavyan Bharatkumar MEHTA, Arun Prasad AMARENDRAN, Prasad NARA, Jaya Rama Raju INAVOLU, Shankarbabu BHAVANARUSHI, Chandresh SHARMA
-
Patent number: 11580066Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.Type: GrantFiled: May 4, 2021Date of Patent: February 14, 2023Assignee: Commvault Systems, Inc.Inventor: Arun Prasad Amarendran
-
Patent number: 11443061Abstract: A backup or storage management system is provided that can secure data within a primary storage environment that stores data in an unsecured format. The storage management system can automatically analyze data received for backup from the primary storage environment and determine whether the data includes information that has been identified as sensitive and/or information that is determined within a threshold degree of probability to be sensitive. The storage management system can then modify the storage of the data that includes sensitive information at the primary storage environment, thereby enabling the data to be secured within the unsecured, or partially secured, primary storage environment. Advantageously, in certain embodiments, by securing data with sensitive information within an unsecured storage environment, embodiments disclosed herein can reduce the occurrences of a data breach or data leak.Type: GrantFiled: December 5, 2019Date of Patent: September 13, 2022Assignee: Commvault Systems, Inc.Inventors: Arun Prasad Amarendran, Tirthankar Chatterjee, Chitra Ramaswamy, Sandeep Naidu Pamidiparthi
-
Publication number: 20220197865Abstract: A system for providing user access to electronic mail includes an email client and an email server. The email client receives and communicates a user interaction with an email message The email server that receives the communication, determines whether the email message stored in a live database or in a backup storage. Upon determination that the email message is stored in a backup storage, the email server performs a message exchange with a backup storage system to perform the user-requested action.Type: ApplicationFiled: March 14, 2022Publication date: June 23, 2022Inventors: Arun Prasad Amarendran, Jun H. Ahn, Tirthankar Chatterjee, Manas Bhikchand Mutha, Ho-Chi Chen, Prosenjit Sinha, Yongtao Liu
-
Publication number: 20220141168Abstract: Systems and methods that enable an information management system to utilize machine learning processes to modify and/or reconfigure presentation of mailbox contents, such as mail objects (e.g., email messages), are described. The systems and methods may provide data associated with mail objects to a machine learning system, which runs various machine learning processes using the mail object data. The machine learning processes may discover and/or identify connections between mail objects, such as connections between objects based on two or more objects sharing an associated product or service, an object being associated with a trending topic or issue, an object being associated and/or identified as having a relative high (or, low) priority, and so on.Type: ApplicationFiled: September 22, 2021Publication date: May 5, 2022Inventors: Manas Bhikchand MUTHA, Arun Prasad AMARENDRAN
-
Patent number: 11159469Abstract: Systems and methods that enable an information management system to utilize machine learning processes to modify and/or reconfigure presentation of mailbox contents, such as mail objects (e.g., email messages), are described. The systems and methods may provide data associated with mail objects to a machine learning system, which runs various machine learning processes using the mail object data. The machine learning processes may discover and/or identify connections between mail objects, such as connections between objects based on two or more objects sharing an associated product or service, an object being associated with a trending topic or issue, an object being associated and/or identified as having a relative high (or, low) priority, and so on.Type: GrantFiled: September 11, 2019Date of Patent: October 26, 2021Assignee: Commvault Systems, Inc.Inventors: Manas Bhikchand Mutha, Arun Prasad Amarendran
-
Publication number: 20210311908Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.Type: ApplicationFiled: May 4, 2021Publication date: October 7, 2021Inventor: Arun Prasad Amarendran
-
Publication number: 20210271758Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.Type: ApplicationFiled: February 11, 2021Publication date: September 2, 2021Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
-
Publication number: 20210258366Abstract: A method and system for remotely executing commands at a client computing device. The method comprises receiving a selection of commands to transmit to a group of client computing devices via a webserver. The group of client computing devices, as well as the selected commands, are associated with a group identifier. The method validates access privileges of the administrator to transmit the selected commands to the group of client computing devices. Upon receipt of the selected commands, the webserver transmits the selected commands to at least one registered proxy server. The registered proxy server then determines one or more client identifiers associated with the group identifier. Each client identifier is assigned to a client computing device. Upon receipt of the selected commands, the registered proxy server transmits the selected commands to client computing devices in the group of client computing devices matching the determined client identifiers.Type: ApplicationFiled: April 5, 2021Publication date: August 19, 2021Inventors: Prosenjit SINHA, Sangeetha JANAKIRAMAN, Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE
-
Patent number: 11036679Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.Type: GrantFiled: May 28, 2019Date of Patent: June 15, 2021Assignee: Commvault Systems, Inc.Inventor: Arun Prasad Amarendran
-
Patent number: 11032350Abstract: A method and system for remotely executing commands at a client computing device. The method comprises receiving a selection of commands to transmit to a group of client computing devices via a webserver. The group of client computing devices, as well as the selected commands, are associated with a group identifier. The method validates access privileges of the administrator to transmit the selected commands to the group of client computing devices. Upon receipt of the selected commands, the webserver transmits the selected commands to at least one registered proxy server. The registered proxy server then determines one or more client identifiers associated with the group identifier. Each client identifier is assigned to a client computing device. Upon receipt of the selected commands, the registered proxy server transmits the selected commands to client computing devices in the group of client computing devices matching the determined client identifiers.Type: GrantFiled: March 13, 2018Date of Patent: June 8, 2021Assignee: Commvault Systems, Inc.Inventors: Prosenjit Sinha, Sangeetha Janakiraman, Arun Prasad Amarendran, Tirthankar Chatterjee
-
Publication number: 20210026982Abstract: A content analysis system of an information management system can analyze data for one or more data governance tasks. The content analysis system can reduce the overhead on the information management system when identifying sensitive data by analyzing a portion of the data in the file without analyzing the entirety of the file. The content analysis system may reduce overhead by analyzing a portion of files that include structured data. If the portion of the file that includes structured data does not include sensitive data, it is often the case that the entire file excludes sensitive data. Thus, overhead can be reduced by analyzing the portion of the file instead of the entire file. Further, the content analysis system can modify an information management job based on the determination of the inclusion of sensitive data to comply with data protection and privacy rules.Type: ApplicationFiled: June 26, 2020Publication date: January 28, 2021Inventors: Arun Prasad Amarendran, Chirag Anand, Tirthankar Chatterjee, Tanmay Garg, Virakti Jain, Bhavyan Bharatkumar Mehta, Anh Hoang Nguyen, Karthikeyan Shanmugasundaram, Chandan Singh, Prosenjit Sinha, Praveen Veeramachaneni
-
Publication number: 20200184102Abstract: A backup or storage management system is provided that can secure data within a primary storage environment that stores data in an unsecured format. The storage management system can automatically analyze data received for backup from the primary storage environment and determine whether the data includes information that has been identified as sensitive and/or information that is determined within a threshold degree of probability to be sensitive. The storage management system can then modify the storage of the data that includes sensitive information at the primary storage environment, thereby enabling the data to be secured within the unsecured, or partially secured, primary storage environment. Advantageously, in certain embodiments, by securing data with sensitive information within an unsecured storage environment, embodiments disclosed herein can reduce the occurrences of a data breach or data leak.Type: ApplicationFiled: December 5, 2019Publication date: June 11, 2020Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Chitra RAMASWAMY, Sandeep Naidu PAMIDIPARTHI
-
Publication number: 20200084170Abstract: Systems and methods that enable an information management system to utilize machine learning processes to modify and/or reconfigure presentation of mailbox contents, such as mail objects (e.g., email messages), are described. The systems and methods may provide data associated with mail objects to a machine learning system, which runs various machine learning processes using the mail object data. The machine learning processes may discover and/or identify connections between mail objects, such as connections between objects based on two or more objects sharing an associated product or service, an object being associated with a trending topic or issue, an object being associated and/or identified as having a relative high (or, low) priority, and so on.Type: ApplicationFiled: September 11, 2019Publication date: March 12, 2020Inventors: Manas Bhikchand Mutha, Arun Prasad Amarendran