Patents by Inventor Ajai JOY

Ajai JOY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11528293
    Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.
    Type: Grant
    Filed: July 23, 2020
    Date of Patent: December 13, 2022
    Assignee: Oracle International Corporation
    Inventors: Ajai Joy, Sarat Aramandla
  • Publication number: 20200358809
    Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.
    Type: Application
    Filed: July 23, 2020
    Publication date: November 12, 2020
    Applicant: Oracle International Corporation
    Inventors: Ajai Joy, Sarat Aramandla
  • Patent number: 10785248
    Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.
    Type: Grant
    Filed: March 22, 2017
    Date of Patent: September 22, 2020
    Assignee: Oracle International Corporation
    Inventors: Ajai Joy, Sarat Aramandla
  • Patent number: 10404736
    Abstract: Systems, methods, and other embodiments associated with placing a virtual machine or workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing the hosts to identify a set of candidate hosts. Each candidate host is analyzed and a threat score is calculated for each candidate host that is indicative of a degree of vulnerability of the candidate host to information-security threats. The corresponding threat scores from the candidate hosts are compared and a host with a lowest threat score is selected, and the virtual machine is placed on the selected host. Thereafter, the selected host is reanalyzed to calculate an updated threat score based at least in part upon the placement of the virtual machine, and in response to determining that the updated threat score exceeds a threshold, the virtual machine is moved to a different host.
    Type: Grant
    Filed: December 3, 2018
    Date of Patent: September 3, 2019
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Ajai Joy, Sarat C. Aramandla
  • Publication number: 20190116200
    Abstract: Systems, methods, and other embodiments associated with placing a virtual machine or workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing the hosts to identify a set of candidate hosts. Each candidate host is analyzed and a threat score is calculated for each candidate host that is indicative of a degree of vulnerability of the candidate host to information-security threats. The corresponding threat scores from the candidate hosts are compared and a host with a lowest threat score is selected, and the virtual machine is placed on the selected host. Thereafter, the selected host is reanalyzed to calculate an updated threat score based at least in part upon the placement of the virtual machine, and in response to determining that the updated threat score exceeds a threshold, the virtual machine is moved to a different host.
    Type: Application
    Filed: December 3, 2018
    Publication date: April 18, 2019
    Inventors: Ajai JOY, Sarat C. ARAMANDLA
  • Patent number: 10148684
    Abstract: Systems, methods, and other embodiments associated with placing a workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing hosts to identify a first host and a second host determined to meet resource requirements of the workload. The example method may also include analyzing the first host to calculate a first threat score, and analyzing the second host to calculate a second threat score. The example method may also include selecting a host with a lowest threat score and placing the workload on the selected host. The example method may also include reanalyzing the selected host to calculate an updated threat score. The example method may also include in response to determining that the updated threat score exceeds a threshold threat score, moving the workload to a third host.
    Type: Grant
    Filed: January 27, 2017
    Date of Patent: December 4, 2018
    Assignee: ORACLE INTERNATIONAL CORPORATION
    Inventors: Ajai Joy, Sarat C. Aramandla
  • Publication number: 20180278642
    Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.
    Type: Application
    Filed: March 22, 2017
    Publication date: September 27, 2018
    Applicant: Oracle International Corporation
    Inventors: Ajai Joy, Sarat Aramandla
  • Publication number: 20180219899
    Abstract: Systems, methods, and other embodiments associated with placing a workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing hosts to identify a first host and a second host determined to meet resource requirements of the workload. The example method may also include analyzing the first host to calculate a first threat score, and analyzing the second host to calculate a second threat score. The example method may also include selecting a host with a lowest threat score and placing the workload on the selected host. The example method may also include reanalyzing the selected host to calculate an updated threat score. The example method may also include in response to determining that the updated threat score exceeds a threshold threat score, moving the workload to a third host.
    Type: Application
    Filed: January 27, 2017
    Publication date: August 2, 2018
    Inventors: Ajai JOY, Sarat C. ARAMANDLA
  • Patent number: 9535737
    Abstract: In a general aspect, a computer-implemented method can include provisioning a virtual network on a hypervisor server. The method can also include querying the hypervisor server to determine an allowable range for a number of virtual ports of a first port group of a virtual switch implemented on the hypervisor server, the first port group being associated with the virtual network. The method can further include provisioning at least one virtual machine on the virtual network including assigning a respective virtual port of the first port group to the virtual machine. The method can still further include monitoring usage of the virtual ports of the first port group and, in response to the usage of the virtual ports of the first port group exceeding a threshold, instructing the hypervisor server to provision a second port group on the virtual switch, the second port group being associated with the virtual network.
    Type: Grant
    Filed: January 30, 2015
    Date of Patent: January 3, 2017
    Assignee: BladeLogic, Inc.
    Inventor: Ajai Joy
  • Publication number: 20160224363
    Abstract: In a general aspect, a computer-implemented method can include provisioning a virtual network on a hypervisor server. The method can also include querying the hypervisor server to determine an allowable range for a number of virtual ports of a first port group of a virtual switch implemented on the hypervisor server, the first port group being associated with the virtual network. The method can further include provisioning at least one virtual machine on the virtual network including assigning a respective virtual port of the first port group to the virtual machine. The method can still further include monitoring usage of the virtual ports of the first port group and, in response to the usage of the virtual ports of the first port group exceeding a threshold, instructing the hypervisor server to provision a second port group on the virtual switch, the second port group being associated with the virtual network.
    Type: Application
    Filed: January 30, 2015
    Publication date: August 4, 2016
    Inventor: Ajai JOY