Patents by Inventor Ajai JOY
Ajai JOY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12244657Abstract: Techniques for transitioning between message infrastructure platforms are disclosed. A platform manager transmits a data stream using a first message infrastructure platform. A platform monitor monitors transmission characteristics associated with the transmission of the data stream using the first message infrastructure platform. A platform selector selects a second message infrastructure platform based on the transmission characteristics. A platform transitioner transitions from transmitting the data stream using the first message infrastructure platform to transmitting the data stream using the second message infrastructure platform seamlessly.Type: GrantFiled: March 15, 2023Date of Patent: March 4, 2025Assignee: Oracle International CorporationInventors: Ajai Joy, Balaji Krishnan
-
Publication number: 20240314183Abstract: Techniques for transitioning between message infrastructure platforms are disclosed. A platform manager transmits a data stream using a first message infrastructure platform. A platform monitor monitors transmission characteristics associated with the transmission of the data stream using the first message infrastructure platform. A platform selector selects a second message infrastructure platform based on the transmission characteristics. A platform transitioner transitions from transmitting the data stream using the first message infrastructure platform to transmitting the data stream using the second message infrastructure platform seamlessly.Type: ApplicationFiled: March 15, 2023Publication date: September 19, 2024Applicant: Oracle International CorporationInventors: Ajai Joy, Balaji Krishnan
-
Patent number: 11528293Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.Type: GrantFiled: July 23, 2020Date of Patent: December 13, 2022Assignee: Oracle International CorporationInventors: Ajai Joy, Sarat Aramandla
-
Publication number: 20200358809Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.Type: ApplicationFiled: July 23, 2020Publication date: November 12, 2020Applicant: Oracle International CorporationInventors: Ajai Joy, Sarat Aramandla
-
Patent number: 10785248Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.Type: GrantFiled: March 22, 2017Date of Patent: September 22, 2020Assignee: Oracle International CorporationInventors: Ajai Joy, Sarat Aramandla
-
Patent number: 10404736Abstract: Systems, methods, and other embodiments associated with placing a virtual machine or workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing the hosts to identify a set of candidate hosts. Each candidate host is analyzed and a threat score is calculated for each candidate host that is indicative of a degree of vulnerability of the candidate host to information-security threats. The corresponding threat scores from the candidate hosts are compared and a host with a lowest threat score is selected, and the virtual machine is placed on the selected host. Thereafter, the selected host is reanalyzed to calculate an updated threat score based at least in part upon the placement of the virtual machine, and in response to determining that the updated threat score exceeds a threshold, the virtual machine is moved to a different host.Type: GrantFiled: December 3, 2018Date of Patent: September 3, 2019Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Ajai Joy, Sarat C. Aramandla
-
Publication number: 20190116200Abstract: Systems, methods, and other embodiments associated with placing a virtual machine or workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing the hosts to identify a set of candidate hosts. Each candidate host is analyzed and a threat score is calculated for each candidate host that is indicative of a degree of vulnerability of the candidate host to information-security threats. The corresponding threat scores from the candidate hosts are compared and a host with a lowest threat score is selected, and the virtual machine is placed on the selected host. Thereafter, the selected host is reanalyzed to calculate an updated threat score based at least in part upon the placement of the virtual machine, and in response to determining that the updated threat score exceeds a threshold, the virtual machine is moved to a different host.Type: ApplicationFiled: December 3, 2018Publication date: April 18, 2019Inventors: Ajai JOY, Sarat C. ARAMANDLA
-
Patent number: 10148684Abstract: Systems, methods, and other embodiments associated with placing a workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing hosts to identify a first host and a second host determined to meet resource requirements of the workload. The example method may also include analyzing the first host to calculate a first threat score, and analyzing the second host to calculate a second threat score. The example method may also include selecting a host with a lowest threat score and placing the workload on the selected host. The example method may also include reanalyzing the selected host to calculate an updated threat score. The example method may also include in response to determining that the updated threat score exceeds a threshold threat score, moving the workload to a third host.Type: GrantFiled: January 27, 2017Date of Patent: December 4, 2018Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Ajai Joy, Sarat C. Aramandla
-
Publication number: 20180278642Abstract: Techniques for routing a request based on a vulnerability in a processing node are disclosed. A vulnerability analyzer determines a set of detected vulnerabilities in each of a set of processing nodes. Based on the detected vulnerabilities, the vulnerability analyzer determines a respective vulnerability score for each processing node. A routing engine receives a request to be processed by at least one of the set of processing nodes. The routing engine selects a particular node for processing the request based on the detected vulnerabilities in one or more of the set of processing nodes. The routing engine may select the particular node based on the vulnerability scores of the set of processing nodes. Additionally or alternatively, the routing engine may select the particular node based on whether the particular node includes any vulnerability that may be exploited by the request.Type: ApplicationFiled: March 22, 2017Publication date: September 27, 2018Applicant: Oracle International CorporationInventors: Ajai Joy, Sarat Aramandla
-
Publication number: 20180219899Abstract: Systems, methods, and other embodiments associated with placing a workload on one of a plurality of hosts are described. In one embodiment, a method includes analyzing hosts to identify a first host and a second host determined to meet resource requirements of the workload. The example method may also include analyzing the first host to calculate a first threat score, and analyzing the second host to calculate a second threat score. The example method may also include selecting a host with a lowest threat score and placing the workload on the selected host. The example method may also include reanalyzing the selected host to calculate an updated threat score. The example method may also include in response to determining that the updated threat score exceeds a threshold threat score, moving the workload to a third host.Type: ApplicationFiled: January 27, 2017Publication date: August 2, 2018Inventors: Ajai JOY, Sarat C. ARAMANDLA
-
Patent number: 9535737Abstract: In a general aspect, a computer-implemented method can include provisioning a virtual network on a hypervisor server. The method can also include querying the hypervisor server to determine an allowable range for a number of virtual ports of a first port group of a virtual switch implemented on the hypervisor server, the first port group being associated with the virtual network. The method can further include provisioning at least one virtual machine on the virtual network including assigning a respective virtual port of the first port group to the virtual machine. The method can still further include monitoring usage of the virtual ports of the first port group and, in response to the usage of the virtual ports of the first port group exceeding a threshold, instructing the hypervisor server to provision a second port group on the virtual switch, the second port group being associated with the virtual network.Type: GrantFiled: January 30, 2015Date of Patent: January 3, 2017Assignee: BladeLogic, Inc.Inventor: Ajai Joy
-
Publication number: 20160224363Abstract: In a general aspect, a computer-implemented method can include provisioning a virtual network on a hypervisor server. The method can also include querying the hypervisor server to determine an allowable range for a number of virtual ports of a first port group of a virtual switch implemented on the hypervisor server, the first port group being associated with the virtual network. The method can further include provisioning at least one virtual machine on the virtual network including assigning a respective virtual port of the first port group to the virtual machine. The method can still further include monitoring usage of the virtual ports of the first port group and, in response to the usage of the virtual ports of the first port group exceeding a threshold, instructing the hypervisor server to provision a second port group on the virtual switch, the second port group being associated with the virtual network.Type: ApplicationFiled: January 30, 2015Publication date: August 4, 2016Inventor: Ajai JOY