Patents by Inventor Rajkumar Kannan
Rajkumar Kannan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11907199Abstract: Examples include a blockchain system associated with a distributed file system. Some examples include creating a block in the blockchain system for each action performed while performing a transaction in relation to a file stored in the distributed file system. The created block includes information identifying one or more of a signature of metadata of the file or a signature of data content of the file. Some examples include performing audit on a file, through a blockchain system, to validate consistency of the file.Type: GrantFiled: September 3, 2020Date of Patent: February 20, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Rajkumar Kannan, Aruna Srinivasa Murthy
-
Publication number: 20240045971Abstract: In some examples, scalable source code vulnerability remediation may include receiving source code that includes at least one vulnerability, and receiving remediated code that remediates the at least one vulnerability associated with the source code. At least one machine learning model may be trained to analyze a vulnerable code snippet of the source code. The vulnerable code snippet may correspond to the at least one vulnerability associated with the source code. The machine learning model may be trained to generate, for the vulnerable code snippet, a remediated code snippet to remediate the at least one vulnerability associated with the source code. The remediated code snippet may be validated based on an analysis of whether the remediated code snippet remediates the at least one vulnerability associated with the source code.Type: ApplicationFiled: November 4, 2021Publication date: February 8, 2024Applicant: Accenture Global Solutions LimitedInventors: Malek BEN SALEM, Mário Lauande LACROIX, Bai Chien KAO, Karthik RAJKUMAR KANNAN, Young Ki LEE
-
Patent number: 11868339Abstract: Examples include a blockchain system associated with a distributed file system, Some examples include retrieval, from the blockchain system, a latest block corresponding to a block signature of a reference block that corresponds to a file stored in the distributed file system. The latest block includes information identifying at least one of a latest location of the file, a signature of metadata of the file, or a tag associated with the file.Type: GrantFiled: June 4, 2020Date of Patent: January 9, 2024Assignee: Hewlett Packard Enterprise Development LPInventors: Rajkumar Kannan, Aruna Srinivasa Murthy
-
Patent number: 11803461Abstract: Examples include a blockchain system for managing and validating log files generated corresponding to transactions of a plurality of computing resources. Some examples include creating a block, in the blockchain system, corresponding to a log file generated corresponding to a transaction of a computing resource of the plurality of computing resources. Some examples include performing checksum validation of log files generated corresponding to transactions of a plurality of computing resources, using a blockchain system.Type: GrantFiled: September 3, 2020Date of Patent: October 31, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Rajkumar Kannan, Aruna Srinivasa Murthy
-
Patent number: 11734232Abstract: Example implementations relate to identifying file system objects of a file system for generating an initial baseline of the file system. In an example, an inode table of the file system is retrieved. Modes included in the inode table correspond respectively to file system objects of the file system. Attributes, including an object identifier and a time attribute, are extracted from each of the inodes of the inode table. A compilation of the object identifiers from the extracted attributes are provided to a service that generates the initial baseline of the file system using the compilation.Type: GrantFiled: July 11, 2019Date of Patent: August 22, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Priya Pappanaickenpalayam Muthuswamy, Rajkumar Kannan, Anoop Kumar Raveendran
-
Publication number: 20230126588Abstract: A method may include sending, to a provisioning service and by an application executing on a virtual machine, a local authentication token for a user of the virtual machine. The provisioning service may use the local authentication token to generate a portable access token. The method may further include receiving, from the provisioning service, the portable access token, and launching, by the application and for the user, a session in a web service by sending the portable access token to an application programming interface (API) of the web service.Type: ApplicationFiled: March 24, 2021Publication date: April 27, 2023Inventors: Frederik Siegmund, RajKumar Kannan, Waikhom Imocha Singh
-
Patent number: 11537596Abstract: A method includes registering a type of data file. Registering the type of data file includes storing metadata describing the type of data file, the metadata including a file storage service and a parser for the type of data file. The method includes receiving a first data file of the type from a first domain, the first data file having raw data, storing the first data file, storing one or more access rules and a lineage of the first data file, parsing the first data file using the parser to generate a content from the raw data, storing the content separately from the raw data, providing the first data file and the content to a search service, and automatically updating one or more second data files from one or more other domains based on the content of the first data file using the search service and the lineage.Type: GrantFiled: June 22, 2020Date of Patent: December 27, 2022Assignee: Schlumberger Technology CorporationInventors: Hrvoje Markovic, Hans Eric Klumpen, RajKumar Kannan
-
Publication number: 20210133079Abstract: Examples include a blockchain system for managing and validating log files generated corresponding to transactions of a plurality of computing resources. Some examples include creating a block, in the blockchain system, corresponding to a log file generated corresponding to a transaction of a computing resource of the plurality of computing resources. Some examples include performing checksum validation of log files generated corresponding to transactions of a plurality of computing resources, using a blockchain system.Type: ApplicationFiled: September 3, 2020Publication date: May 6, 2021Inventors: Rajkumar Kannan, Aruna Srinivasa Murthy
-
Publication number: 20210124730Abstract: Examples include a blockchain system associated with a distributed file system. Some examples include creating a block in the blockchain system for each action performed while performing a transaction in relation to a file stored in the distributed file system. The created block includes information identifying one or more of a signature of metadata of the file or a signature of data content of the file. Some examples include performing audit on a file, through a blockchain system, to validate consistency of the file.Type: ApplicationFiled: September 3, 2020Publication date: April 29, 2021Inventors: Rajkumar Kannan, Aruna Srinivasa Murthy
-
Publication number: 20210124732Abstract: Examples include a blockchain system associated with a distributed file system, Some examples include retrieval, from the blockchain system, a latest block corresponding to a block signature of a reference block that corresponds to a file stored in the distributed file system. The latest block includes information identifying at least one of a latest location of the file, a signature of metadata of the file, or a tag associated with the file.Type: ApplicationFiled: June 4, 2020Publication date: April 29, 2021Inventors: Rajkumar Kannan, Aruna Srinivasa Murthy
-
Publication number: 20210049155Abstract: A method includes registering a type of data file. Registering the type of data file includes storing metadata describing the type of data file, the metadata including a file storage service and a parser for the type of data file. The method includes receiving a first data file of the type from a first domain, the first data file having raw data, storing the first data file, storing one or more access rules and a lineage of the first data file, parsing the first data file using the parser to generate a content from the raw data, storing the content separately from the raw data, providing the first data file and the content to a search service, and automatically updating one or more second data files from one or more other domains based on the content of the first data file using the search service and the lineage.Type: ApplicationFiled: June 22, 2020Publication date: February 18, 2021Inventors: Hrvoje Markovic, Hans Eric Klumpen, RajKumar Kannan
-
Publication number: 20200110729Abstract: Example implementations relate to identifying file system objects of a file system for generating an initial baseline of the file system. In an example, an inode table of the file system is retrieved. Modes included in the inode table correspond respectively to file system objects of the file system. Attributes, including an object identifier and a time attribute, are extracted from each of the inodes of the inode table. A compilation of the object identifiers from the extracted attributes are provided to a service that generates the initial baseline of the file system using the compilation.Type: ApplicationFiled: July 11, 2019Publication date: April 9, 2020Inventors: Priya Pappanaickenpalayam Muthuswamy, Rajkumar Kannan, Anoop Kumar Raveendran
-
Patent number: 10585762Abstract: To maintain files in a retained file system, a run-time error detection code (EDC) is generated for a retained file. The run-time EDC is generated on the basis of at least one of entire content and metadata of the retained file. Further, the run-time EDC is compared with a validation EDC associated with the retained file to identify a corruption of the retained file. The validation EDC is generated at an instance of placing the retained file in the retained FS. Furthermore, the validation EDC is based on at least one of entire content and metadata of the retained file. Based on the comparison, an original version of the retained file may is restored from a trusted backup system.Type: GrantFiled: October 7, 2014Date of Patent: March 10, 2020Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Arun Sankar, Jagadish Madhu, Ramesh Kannan Karuppasamy, Rajkumar Kannan
-
Publication number: 20200012802Abstract: Example implementations relate to a file system lock down. In an example, an audit log is produced from I/O events related to data placed on a storage medium and managed by a file system. The audit log is analyzed based on compliance policies to generate a control signal. A compliance enforcer integrated in an I/O path of the file system sends a file system lock down command directly to the file system in response to the control signal indicating that a compliance policy has been violated by at least one of the I/O events in the audit log.Type: ApplicationFiled: July 5, 2018Publication date: January 9, 2020Inventor: Rajkumar Kannan
-
Patent number: 10417181Abstract: Some examples describe a method for using location addressed storage as content addressed storage (CAS). A checksum of a file may be generated during transition of the file to a retained state. The generated checksum, which may represent a content address of the file, may be stored in a database. The database may be queried with the content address of the file to retrieve a location address of the file corresponding to the content address of the file. The location address of the file is used to provide access to the file in the file system.Type: GrantFiled: July 22, 2014Date of Patent: September 17, 2019Assignee: HEWLETT PACKARD ENTERPRISE DEVELOPMENT LPInventors: Ramesh Kannan Karuppusamy, Rajkumar Kannan
-
Publication number: 20190196919Abstract: To maintain files in a retained file system, a run-time error detection code (EDC) is generated for a retained file. The run-time EDC is generated on the basis of at least one of entire content and metadata of the retained file. Further, the run-time EDC is compared with a validation EDC associated with the retained file to identify a corruption of the retained file. The validation EDC is generated at an instance of placing the retained file in the retained FS. Furthermore, the validation EDC is based on at least one of entire content and metadata of the retained file. Based on the comparison, an original version of the retained file may is restored from a trusted backup system.Type: ApplicationFiled: February 26, 2019Publication date: June 27, 2019Inventors: Arun Sankar, Jagadish Madhu, Ramesh Kannan Karuppasamy, Rajkumar Kannan
-
Publication number: 20180189301Abstract: Some examples described herein relate to managing appendable state of an immutable file. In an example, a request may be received to append an immutable file. A determination may be made whether the request is a first request to append immutable file. In response to determination that the request is the first request to append the immutable file, immutable file may be modified from an original state to an appendable state, wherein immutable file is appendable during the appendable state. A time period may be defined for immutable file to remain in the appendable state. A determination may be made whether immutable file is accessed during the time period. In response to determination that immutable file is not accessed during the time period, immutable file may be reverted from the appendable state to the original state upon expiration of the time period.Type: ApplicationFiled: September 22, 2015Publication date: July 5, 2018Inventors: Rajkumar Kannan, Ramesh Kannan Karuppusamy, Arun Vishnu Pathanipadath Karthikeyan
-
Publication number: 20180137131Abstract: An example computing device includes a data storage device and a controller coupled to the data storage device. The data storage device includes a storage segment. The controller is to, in response to receiving a retention feature activation of the storage segment, compute a retention enabled time of the storage segment; in response to receiving a retention request associated with data in the storage segment, compute an absolute segment survival time based on the retention enabled time and compute a retention expiry time of the data based on the absolute segment survival time. The retention request is associated with a retention period. The controller is further to determine whether the retention period has lapsed based on the retention expiry time.Type: ApplicationFiled: June 3, 2015Publication date: May 17, 2018Inventors: Ramesh Kannan Karuppusamy, Arun Vishnu Pathanipadath Karthikeyan, Rajkumar Kannan
-
Publication number: 20170220426Abstract: To maintain files in a retained file system, a run-time error detection code (EDC) is generated for a retained file. The run-time EDC is generated on the basis of at least one of entire content and metadata of the retained file. Further, the run-time EDC is compared with a validation EDC associated with the retained file to identify a corruption of the retained file. The validation EDC is generated at an instance of placing the retained file in the retained FS. Furthermore, the validation EDC is based on at least one of entire content and metadata of the retained file. Based on the comparison, an original version of the retained file may is restored from a trusted backup system.Type: ApplicationFiled: October 7, 2014Publication date: August 3, 2017Inventors: Arun Sankar, Jagadish Madhu, Ramesh Kannan K, Rajkumar Kannan
-
Publication number: 20170193004Abstract: Some examples described herein relate to ensuring data integrity of a retained file upon replication. In an example, a checksum of a file may be generated upon transition of the file to a retained state in a source system. The file and the checksum of the file may then be replicated to a target system. Upon replication, a checksum of the replicated file may be generated in the target system. A determination may be made whether the checksum of the replicated file matches with the checksum of the file. If the checksum of the replicated file matches with the checksum of the file, an indication may be provided that the replicated file in the target system is a valid replica of the file retained in the source system.Type: ApplicationFiled: September 5, 2014Publication date: July 6, 2017Inventors: Ramesh Kannan KARUPPUSAMY, Rajkumar KANNAN, Jothivelavan SIVASHANMUGAM