Patents by Inventor Gosukonda Naga Venkata Satya Sudhakar
Gosukonda Naga Venkata Satya Sudhakar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20230367880Abstract: A self-contained validation process is initiated. For example, an application may contain code to initiate the self-contained validation process. The self-contained validation process comprises at least one of: a self-contained application validation process, a self-contained container validation process, a self-contained virtual machine validation process, and a self-contained hypervisor validation process. In response to initiating the self-contained validation process, the self-contained validation process requests a list of vulnerabilities associated with the self-contained validation process. The list of vulnerabilities associated with the self-contained validation process is received. For example, the received list of vulnerabilities may identify a security vulnerability in the application. An action taken based on the received list of vulnerabilities associated with the computer process. For example, the application may self-quarantine itself based on the received list of vulnerabilities.Type: ApplicationFiled: May 13, 2022Publication date: November 16, 2023Applicant: MICRO FOCUS LLCInventors: Gosukonda Naga Venkata Satya Sudhakar, Michael F. Angelo
-
Patent number: 9710400Abstract: Apparatus, systems, and methods may operate to restore an operational state of an associated virtual machine (VM) using encrypted information stored in encrypted memory locations. A single hypervisor may be used to encrypt and decrypt the information. Access may be permitted to a designated number of the encrypted memory locations only to a single application executed by the associated VM subject to the hypervisor. Access may be denied to any other application executed by the associated VM, or any other VM.Type: GrantFiled: January 6, 2014Date of Patent: July 18, 2017Assignee: Micro Focus Software Inc.Inventors: Pradeep Kumar Chaturvedi, Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 9563640Abstract: Techniques are presented for versioning files. Base files are acquired for files on a primary volume. At configurable points in time changes to the files are noted on different volumes, these changes are represented as deltas. The deltas are stored on an archive volume and represent versions and a version history for the files.Type: GrantFiled: October 5, 2007Date of Patent: February 7, 2017Assignee: Micro Focus Software Inc.Inventors: Gosukonda Naga Venkata Satya Sudhakar, Anirban Bhattacharjee
-
Patent number: 9530005Abstract: Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users.Type: GrantFiled: November 23, 2015Date of Patent: December 27, 2016Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20160132682Abstract: Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users.Type: ApplicationFiled: November 23, 2015Publication date: May 12, 2016Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 9262194Abstract: Apparatus, systems, and methods may operate to emulate a virtual device with bidirectional communication capability using a hypervisor. A virtual machine, started by the hypervisor, is capable of receiving hypervisor information from, and transmitting virtual machine information to the hypervisor via the bidirectional communication capability. Further activity may include detecting the existence of the hypervisor information by detecting a logical connection of the virtual device, and masking the existence of the virtual device from a virtual machine user inside the virtual machine. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: June 10, 2008Date of Patent: February 16, 2016Assignee: APPLE INC.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 9195836Abstract: Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users.Type: GrantFiled: September 12, 2013Date of Patent: November 24, 2015Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 9158779Abstract: Replication techniques are presented. According to an embodiment of a method, a node of a replicated storage network is assigned to be an owner of a data block to issue write memory block commands. The network includes at least two nodes including the node assigned to be the owner. If a read memory block command is received to read the data block, a read_lock is issued for the data block, the data block is read, and the read_lock for the data block is released. If a write memory block command is received to write new data to the data block, a write_lock is issued for the data block, the data block is written and a version associated with the data block is incremented, and the write_lock for the data block is released.Type: GrantFiled: September 14, 2012Date of Patent: October 13, 2015Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 9032163Abstract: Apparatus, systems, and methods may operate to assert a first semi-exclusive write lock with respect to a storage medium area by storing lock information when assertion of another semi-exclusive write lock with respect to the area is not detected. Additional activities may include writing data to the area by a writing entity that has asserted the first semi-exclusive write lock after determining the lock information has not changed, while substantially simultaneously de-asserting the first semi-exclusive write lock. Reading from the area may be determined as successful by determining that the semi-exclusive write lock was not asserted prior to or during the reading by checking the status of the lock information. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: September 22, 2010Date of Patent: May 12, 2015Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8880820Abstract: Techniques for using sparse files during snapshots are provided. Snapshots are managed and maintained for a source volume via sparse files. Metadata defines the sparse files and operations of a file system are used to create, define, and manipulate the metadata. When a write operation is detected during a snapshot, sparse files are used to copy the write operation before the write operation is performed on the source volume; the sparse files server as the snapshot data.Type: GrantFiled: September 8, 2010Date of Patent: November 4, 2014Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8806214Abstract: Apparatus, systems, and methods may operate to receive, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised message. Additional activities may include sending, from the TTP, an undisguised version of the disguised message to the receiver, and the receiver signature to a sender of the undisguised version, after determining that the receiver signature is valid. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: April 7, 2011Date of Patent: August 12, 2014Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8767966Abstract: Techniques are presented for secure broadcasting and multicasting. Communications for multicasting and broadcasting are encrypted and decrypted using a secure communication key. The secure communication key is represented in a broadcast value that is sent to selected parties. The broadcast value represents the product of unique prime numbers and an additional number plus the secure communication key. Each party is represented by one of the unique prime numbers. Each party can acquire the secure communication key by dividing the broadcast value by its particular prime number to obtain a remainder, which is the secure communication key.Type: GrantFiled: February 22, 2013Date of Patent: July 1, 2014Assignee: Oracle International CorporationInventors: Gosukonda Naga Venkata Satya Sudhakar, Ashwin Anand Shenvi
-
Patent number: 8756535Abstract: Apparatus, systems, and methods may operate to execute a plurality of screen saver program instances to display a plurality of separately visible screen saver images using a single display device at substantially the same time. In some embodiments, some or all of the screen saver images are displayed in a plurality of non-overlapping display compartments. The images may be selectively assigned a dominant color, or color scheme. The compartments may have boundaries that can be selectively revised. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: November 17, 2008Date of Patent: June 17, 2014Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20140164791Abstract: Apparatus, systems, and methods may operate to restore an operational state of an associated virtual machine (VM) using encrypted information stored in encrypted memory locations. A single hypervisor may be used to encrypt and decrypt the information. Access may be permitted to a designated number of the encrypted memory locations only to a single application executed by the associated VM subject to the hypervisor. Access may be denied to any other application executed by the associated VM, or any other VM.Type: ApplicationFiled: January 6, 2014Publication date: June 12, 2014Applicant: Novell, Inc.Inventors: Pradeep Kumar Chaturvedi, Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8688989Abstract: Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.Type: GrantFiled: March 30, 2012Date of Patent: April 1, 2014Assignee: Apple Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20140019772Abstract: Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users.Type: ApplicationFiled: September 12, 2013Publication date: January 16, 2014Applicant: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8627112Abstract: Apparatus, systems, and methods may operate to allocating encrypted memory locations to store encrypted information, the information to be encrypted and decrypted using a single hypervisor. Further activity may include permitting access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor, and denying access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM. In some embodiments, the operational state of the associated VM may be restored using the encrypted information. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: March 30, 2010Date of Patent: January 7, 2014Assignee: Novell, Inc.Inventors: Pradeep Kumar Chaturvedi, Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8539229Abstract: Techniques for secure data management in a distributed environment are provided. A secure server includes a modified operating system that just allows a kernel application to access a secure hard drive of the secure server. The hard drive comes prepackaged with a service public and private key pair for encryption and decryption services with other secure servers of a network. The hard drive also comes prepackaged with trust certificates to authenticate the other secure servers for secure socket layer (SSL) communications with one another, and the hard drive comes with a data encryption key, which is used to encrypt storage of the secure server. The kernel application is used during data restores, data backups, and/or data versioning operations to ensure secure data management for a distributed network of users.Type: GrantFiled: April 28, 2008Date of Patent: September 17, 2013Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8458236Abstract: Systems and methods for managing systems using common information models (CIM) are presented. According to a method embodiment, CIM functions are provided, and a file system interface for the CIM functions is provided. An embodiment of a method receives file operation commands through a client interface and performs CIM functions corresponding to the received file operation commands based on a mapping of the file operation commands to the CIM functions.Type: GrantFiled: July 16, 2008Date of Patent: June 4, 2013Assignee: Oracle International CorporationInventors: Gosukonda Naga Venkata Satya Sudhakar, Ashwin Pankaj
-
Patent number: 8458477Abstract: Apparatus, systems, and methods may operate to compare a first hashed value of at least a first decryption key, the first decryption key received from a sender, to a second hashed value of at least a second decryption key that has been received as a signed value from a receiver. Further operations may include sending the first decryption key to the receiver and sending the signed value to the sender upon determining that the first hashed value matches the second hashed value. Additional apparatus, systems, and methods are disclosed.Type: GrantFiled: December 1, 2008Date of Patent: June 4, 2013Assignee: Novell, Inc.Inventors: Gosukonda Naga Venkata Satya Sudhakar, Stephen R Carter