Patents by Inventor Brijesh Singh

Brijesh Singh has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240153060
    Abstract: The present disclosure is directed to devices and techniques for auto-qualifying images on new hardware or infrastructure configurations. The systems and methods include initiating an auto-qualification process for pre-testing one or more images registered within a bare metal system having one or more new infrastructure configurations, discovering all of the one or more images registered for use within the bare metal system, booting each of the one or more registered images into an isolated infrastructure having the one or more new infrastructure configurations, probing instances of each of the one or more registered images booted on the isolated infrastructure to determine stability of each of the one or more registered images on the one or more new infrastructure configurations, and marking each of the one or more registered images as stable or unstable.
    Type: Application
    Filed: November 7, 2022
    Publication date: May 9, 2024
    Applicant: Oracle International Corporation
    Inventors: Brijesh Singh, Eden Adogla
  • Publication number: 20240095042
    Abstract: Techniques are disclosed for deploying a computing resource (e.g., a service) in response to user input. A computer-implemented method can include operations of receiving (e.g., by a gateway computer of a cloud-computing environment) a request comprising an identifier for a computing component of the cloud-computing environment. The computing device receiving the request may determine whether the identifier exists in a routing table that is accessible to the computing device. If so, the request may be forwarded to the computing component. If not, the device may transmit an error code (e.g., to the user device that initiated the request) indicating the computing component is unavailable and a bootstrap request to a deployment orchestrator that is configured to deploy the requested computing component. Once deployed, the computing component may be added to a routing table such that subsequent requests can be properly routed to and processed by the computing component.
    Type: Application
    Filed: November 15, 2023
    Publication date: March 21, 2024
    Applicant: Oracle International Corporation
    Inventors: Eden Grail Adogla, Matthew Victor Rushton, Iliya Roitburg, Brijesh Singh
  • Patent number: 11861373
    Abstract: Techniques are disclosed for deploying a computing resource (e.g., a service) in response to user input. A computer-implemented method can include operations of receiving (e.g., by a gateway computer of a cloud-computing environment) a request comprising an identifier for a computing component of the cloud-computing environment. The computing device receiving the request may determine whether the identifier exists in a routing table that is accessible to the computing device. If so, the request may be forwarded to the computing component. If not, the device may transmit an error code (e.g., to the user device that initiated the request) indicating the computing component is unavailable and a bootstrap request to a deployment orchestrator that is configured to deploy the requested computing component. Once deployed, the computing component may be added to a routing table such that subsequent requests can be properly routed to and processed by the computing component.
    Type: Grant
    Filed: October 5, 2021
    Date of Patent: January 2, 2024
    Assignee: Oracle International Corporation
    Inventors: Eden Grail Adogla, Matthew Victor Rushton, Iliya Roitburg, Brijesh Singh
  • Publication number: 20230105901
    Abstract: Techniques are disclosed for deploying a computing resource (e.g., a service) in response to user input. A computer-implemented method can include operations of identifying a first set of computing components already deployed within the cloud-computing environment and identifying a second set of computing components available for deployment within the cloud-computing environment. A request for deployment may be subsequently received for one of the available computing components. A bootstrap request corresponding to the particular computing component requested may be transmitted to a deployment orchestrator, the deployment orchestrator being configured to deploy the particular computing component to the cloud-computing environment based at least in part on the bootstrap request. A user interface may present status indicators for each computing component (e.g., deployed, available, requested, etc.).
    Type: Application
    Filed: October 5, 2021
    Publication date: April 6, 2023
    Applicant: Oracle International Corporation
    Inventors: Eden Grail Adogla, Matthew Victor Rushton, Iliya Roitburg, Brijesh Singh
  • Publication number: 20230109231
    Abstract: Techniques are described for changing and customizing the functional behavior of a network virtualization device (NVD) using multiple different personalities. The disclosed techniques enable a network device such as an NVD to be configured and reconfigured during its lifetime to support different functional behaviors in an easy and convenient manner. In certain embodiments, this is accomplished through the use of personalities. During the lifetime of an NVD, different personalities may be associated with or bound to an NVD, where the personality bound to a NVD determines the capabilities or functional behavior of the NVD. By changing the personalities bound to an NVD, the functional behavior, characterized by a set of functions that the NVD can perform, can be changed.
    Type: Application
    Filed: September 9, 2022
    Publication date: April 6, 2023
    Applicant: Oracle International Corporation
    Inventors: Eden Adogla, Brijesh Singh
  • Publication number: 20230108661
    Abstract: Techniques are disclosed for deploying a computing resource (e.g., a service) in response to user input. A computer-implemented method can include operations of receiving (e.g., by a gateway computer of a cloud-computing environment) a request comprising an identifier for a computing component of the cloud-computing environment. The computing device receiving the request may determine whether the identifier exists in a routing table that is accessible to the computing device. If so, the request may be forwarded to the computing component. If not, the device may transmit an error code (e.g., to the user device that initiated the request) indicating the computing component is unavailable and a bootstrap request to a deployment orchestrator that is configured to deploy the requested computing component. Once deployed, the computing component may be added to a routing table such that subsequent requests can be properly routed to and processed by the computing component.
    Type: Application
    Filed: October 5, 2021
    Publication date: April 6, 2023
    Applicant: Oracle International Corporation
    Inventors: Eden Grail Adogla, Matthew Victor Rushton, Iliya Roitburg, Brijesh Singh
  • Publication number: 20230041806
    Abstract: Techniques are disclosed for efficient communications over a network path between an accelerator of a smart network interface card (smartNIC) and a remote programming data plane of a remote device. In one example, the accelerator receives an instruction to register a pairing between the accelerator and the remote programming data plane, and then stores registration data indicating the pairing. The accelerator then receives from the remote programming data plane a second instruction associated with processing one or more flows. The accelerator then stores instruction data corresponding to the second instruction based on confirming the registered pairing with the remote programming data plane. Subsequently, the accelerator receives a data packet and processes the data packet in accordance with the stored instruction data. In some embodiments, the accelerator may transmit packets to the pair remote programming data plane, for example, requesting further instructions associated with processing a packet.
    Type: Application
    Filed: August 4, 2021
    Publication date: February 9, 2023
    Applicant: Oracle International Corporation
    Inventor: Brijesh Singh
  • Publication number: 20230032441
    Abstract: Techniques are disclosed for a smart network interface card (smartNIC) performing a unified logging process. In one example, an accelerator of the smartNIC receives a packet that is a candidate for rejection, whereby the accelerator is configured to log traffic for authorized flows that are forwarded by the accelerator to another device. The accelerator transmits the packet to a programming data plane of the smartNIC for further processing. The programming data plane determines that the packet should not be forwarded by the smartNIC, and modifies the packet to include an instruction that instructs the accelerator to log the packet. The programming data plane then transmits the modified packet to the accelerator. Upon receiving the modified packet, the accelerator logs the packet to the unified log based on the instruction.
    Type: Application
    Filed: July 29, 2021
    Publication date: February 2, 2023
    Applicant: Oracle International Corporation
    Inventors: Brijesh Singh, Leonard Thomas Tracy
  • Publication number: 20230024408
    Abstract: Techniques are disclosed for utilizing control packets to manage flows by a smart network interface card (smartNIC). In one example, an accelerator determines that a cache entry is a candidate for removal, the cache entry being part of a cache that is managed by the accelerator, the cache entry storing flow state of a particular flow, the accelerator being responsible for forwarding packets associated with the particular flow based at least in part on the flow state, and the flow information formatted utilizing a particular header format. The accelerator generates an instruction to remove the cache entry of the particular flow from the cache based at least in part on receiving the determination that the cache entry is the candidate for removal. The accelerator removes the cache entry of the particular flow from the cache based at least in part on the instruction.
    Type: Application
    Filed: October 4, 2022
    Publication date: January 26, 2023
    Applicant: Oracle International Corporation
    Inventor: Brijesh Singh
  • Publication number: 20230013110
    Abstract: Improved network traffic flow processing techniques are described. In a network device providing multiple processing planes, each processing plane comprising multiple processing units, techniques are described that take advantage of flow affinity/locality principles such that the same processing component of a processing plane, which previously performed processing for a network flow, is used for performing subsequent processing for the same network flow. This enables faster processing of network traffic flows by the network device. In certain implementations, the techniques described herein can be implemented in a network virtualization device (NVD) that is configured to perform network virtualization functions.
    Type: Application
    Filed: September 26, 2022
    Publication date: January 19, 2023
    Applicant: Oracle International Corporation
    Inventor: Brijesh Singh
  • Patent number: 11533622
    Abstract: Systems and methods include, in a cloud node executing a security service, causing a mobile device to perform a validation check to determine if the mobile device is any of fake, counterfeit, jailbroken, and rooted; responsive to successful validation, allowing traffic to and from the mobile device through the security service; and responsive to unsuccessful validation, preventing traffic to and from the mobile device through the security service. The systems and methods can further include, prior to the causing, requiring the mobile device to install and launch an application, wherein registration with the security service requires the application; and performing the validation check via the application and a fake check service.
    Type: Grant
    Filed: May 30, 2019
    Date of Patent: December 20, 2022
    Assignee: Zscaler, Inc.
    Inventors: Sreedhar Pampati, David Creedy, Brijesh Singh
  • Patent number: 11496599
    Abstract: Techniques are disclosed for utilizing control packets to manage flows by a smart network interface card (smartNIC). In one example, an accelerator of the smartNIC determines that a cache entry of a cache that is managed by the accelerator is a candidate for removal. The cache entry stores flow state of a particular flow. The accelerator generates a control packet that includes flow information of the particular flow that is formatted utilizing a particular header format, the flow information operable for generating a hash that indexes to the cache entry. The accelerator includes an instruction within the control packet that requests a programming data plane of the smartNIC to provide instructions for removing the cache entry from the cache. Upon receiving the control packet, the programming data plane generates and transmits a second instruction to the accelerator for removing the cache entry from the cache.
    Type: Grant
    Filed: April 29, 2021
    Date of Patent: November 8, 2022
    Assignee: Oracle International Corporation
    Inventor: Brijesh Singh
  • Publication number: 20220353339
    Abstract: Techniques are disclosed for utilizing control packets to manage flows by a smart network interface card (smartNIC). In one example, an accelerator of the smartNIC determines that a cache entry of a cache that is managed by the accelerator is a candidate for removal. The cache entry stores flow state of a particular flow. The accelerator generates a control packet that includes flow information of the particular flow that is formatted utilizing a particular header format, the flow information operable for generating a hash that indexes to the cache entry. The accelerator includes an instruction within the control packet that requests a programming data plane of the smartNIC to provide instructions for removing the cache entry from the cache. Upon receiving the control packet, the programming data plane generates and transmits a second instruction to the accelerator for removing the cache entry from the cache.
    Type: Application
    Filed: April 29, 2021
    Publication date: November 3, 2022
    Applicant: Oracle International Corporation
    Inventor: Brijesh Singh
  • Publication number: 20220353197
    Abstract: Techniques are disclosed for processing flows by a smart network interface card (smartNIC) based on modifying a packet. In one example, a smartNIC accelerator receives a packet from a first port of the smartNIC, the first port being connected to a splitter device that splits a first data path into a second data path and a third data path, and the packet arriving at the first port via the second data path. The accelerator modifies the packet to indicate that the packet arrived at the first port via the second data path. The accelerator inserts the modified packet into a queue that is associated with both the second data path and the third data path. A programming data plane of the smartNIC receives and then processes the modified packet based on determining that the packet arrived at the first port via the second data path.
    Type: Application
    Filed: April 29, 2021
    Publication date: November 3, 2022
    Applicant: Oracle International Corporation
    Inventor: Brijesh Singh
  • Publication number: 20220327007
    Abstract: Techniques are disclosed for migrating one or more services from an edge device to a cloud computing environment. In one example, a migration service receives a request to migrate a first set of services from the edge device to the cloud computing environment. The migration service identifies a hardware profile of a computing device (or devices) of the cloud computing environment that matches the edge device, and then configures the computing device to execute a second set of services that corresponds to the first set of services. The migration service establishes a communication channel between the edge device and the computing device, and then executes a set of migration operations such that the second set of services is configured to execute as the first set of services. The computing device may operate in a virtual bootstrap environment or dedicated region of the cloud computing environment.
    Type: Application
    Filed: January 21, 2022
    Publication date: October 13, 2022
    Applicant: Oracle International Corporation
    Inventors: Eden Grail Adogla, David Dale Becker, Maxim Baturin, Brijesh Singh, Iliya Roitburg, Abhishek Kar
  • Patent number: 10944769
    Abstract: Systems, methods, and other embodiments associated with performing intrusion detection on load balanced network traffic are described. In one embodiment, a method includes receiving, at a load balancer host, an encrypted data packet from a remote computer. A certificate established between the remote computer and a destination service being accessed by the remote computer is used by the load balancer host to decrypt the encrypted data packet to create an unencrypted data packet. The unencrypted data packet is routed to an intrusion detection system at the load balancer host. The intrusion detection system is controlled to execute intrusion detection upon the unencrypted data packet. A secure connection is established with the destination computing node. The unencrypted data packet is re-encrypted and transmitted over the network using the secure connection to the destination computing node.
    Type: Grant
    Filed: September 25, 2018
    Date of Patent: March 9, 2021
    Assignee: Oracle International Corporation
    Inventor: Brijesh Singh
  • Patent number: 10902014
    Abstract: Technologies are described herein for reducing network traffic when replicating memory data across hosts. The memory data stored in a main memory of the host computer is replicated to a main memory of a second host computer. Memory data from the local data storage of the second host computer and other hosts computers that is a duplicate of memory data from the main memory is identified. Instead of sending the memory data from the main memory that is duplicated, the duplicated memory is copied from the local storage of the second computer or from one or more of the other computers to the main memory of the second host computer.
    Type: Grant
    Filed: November 18, 2014
    Date of Patent: January 26, 2021
    Assignee: Amazon Technologies, Inc.
    Inventors: Eden Grail Adogla, Brijesh Singh
  • Publication number: 20200336913
    Abstract: Systems and methods include, in a cloud node executing a security service, causing a mobile device to perform a validation check to determine if the mobile device is any of fake, counterfeit, jailbroken, and rooted; responsive to successful validation, allowing traffic to and from the mobile device through the security service; and responsive to unsuccessful validation, preventing traffic to and from the mobile device through the security service. The systems and methods can further include, prior to the causing, requiring the mobile device to install and launch an application, wherein registration with the security service requires the application; and performing the validation check via the application and a fake check service.
    Type: Application
    Filed: May 30, 2019
    Publication date: October 22, 2020
    Inventors: Sreedhar Pampati, David Creedy, Brijesh Singh
  • Patent number: 10728167
    Abstract: Systems, methods, and other embodiments that interrupt multiple processors to process packets of a single flow are described. In one embodiment, a method includes maintaining a plurality of queues to hold interrupt requests created for packets received by a network device. Each queue is associated with a processor that will be interrupted by interrupt requests to process packets. The network device is configured to control how to queue interrupt requests created for a flow of packets. The network device is configured such that when a threshold number of interrupt requests created for the flow of packets have been inserted within a queue, subsequent interrupt requests created for subsequently received packets of the flow are inserted in a different queue. In this way, the network device is controlled to interrupt multiple processors for the flow of packets by queuing interrupt requests for the flow into different queues.
    Type: Grant
    Filed: August 10, 2018
    Date of Patent: July 28, 2020
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventor: Brijesh Singh
  • Publication number: 20200099703
    Abstract: Systems, methods, and other embodiments associated with performing intrusion detection on load balanced network traffic are described. In one embodiment, a method includes receiving, at a load balancer host, an encrypted data packet from a remote computer. A certificate established between the remote computer and a destination service being accessed by the remote computer is used by the load balancer host to decrypt the encrypted data packet to create an unencrypted data packet. The unencrypted data packet is routed to an intrusion detection system at the load balancer host. The intrusion detection system is controlled to execute intrusion detection upon the unencrypted data packet. A secure connection is established with the destination computing node. The unencrypted data packet is re-encrypted and transmitted over the network using the secure connection to the destination computing node.
    Type: Application
    Filed: September 25, 2018
    Publication date: March 26, 2020
    Inventor: Brijesh SINGH