Patents by Inventor Amit Bhaskar

Amit Bhaskar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10474542
    Abstract: Recovery points can be used for replicating a virtual machine and reverting the virtual machine to a different state. A filter driver can monitor and capture input/output commands between a virtual machine and a virtual machine disk. The captured input/output commands can be used to create a recovery point. The recovery point can be associated with a bitmap that may be used to identify data blocks that have been modified between two versions of the virtual machine. Using this bitmap, a virtual machine may be reverted or restored to a different state by replacing modified data blocks and without replacing the entire virtual machine disk.
    Type: Grant
    Filed: March 16, 2018
    Date of Patent: November 12, 2019
    Assignee: Commvault Systems, Inc.
    Inventors: Amit Mitkar, Andrei Erofeev, Amit Bhaskar Ausarkar, Ajay Venkat Nagrale
  • Publication number: 20190108340
    Abstract: This application relates to ransomware detection. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine monitors the I/O activity in a file system. The software module records the number of times the files in the file system are modified, created, deleted, and renamed. The recorded number is compared against a threshold. If the number exceeds the threshold, the software module provides an alert to the user of the client machine that the client machine may be under a ransomware attack. In some embodiments, index data gathered as part of backup operations is utilized, either alone or in combination with the continuously monitored I/O activity data, to detect ransomware attacks.
    Type: Application
    Filed: September 12, 2018
    Publication date: April 11, 2019
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20190109870
    Abstract: This application relates to ransomware detection and intelligent restore. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. When a potential ransomware attack is detected, a timestamp is recorded. If the client machine is indeed taken over by the ransomware attack, an intelligent restore operation can be performed such that the file system is automatically restored to a point in time prior to the infection by the ransomware attack using the recorded timestamp.
    Type: Application
    Filed: September 12, 2018
    Publication date: April 11, 2019
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20190108341
    Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.
    Type: Application
    Filed: September 12, 2018
    Publication date: April 11, 2019
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20180276083
    Abstract: Recovery points can be used for replicating a virtual machine and reverting the virtual machine to a different state. A filter driver can monitor and capture input/output commands between a virtual machine and a virtual machine disk. The captured input/output commands can be used to create a recovery point. The recovery point can be associated with a bitmap that may be used to identify data blocks that have been modified between two versions of the virtual machine. Using this bitmap, a virtual machine may be reverted or restored to a different state by replacing modified data blocks and without replacing the entire virtual machine disk.
    Type: Application
    Filed: March 16, 2018
    Publication date: September 27, 2018
    Inventors: Amit Mitkar, Andrei Erofeev, Amit Bhaskar Ausarkar, Ajay Venkat Nagrale
  • Publication number: 20180276084
    Abstract: Recovery points can be used for replicating a virtual machine and reverting the virtual machine to a different state. A filter driver can monitor and capture input/output commands between a virtual machine and a virtual machine disk. The captured input/output commands can be used to create a recovery point. The recovery point can be associated with a bitmap that may be used to identify data blocks that have been modified between two versions of the virtual machine. Using this bitmap, a virtual machine may be reverted or restored to a different state by replacing modified data blocks and without replacing the entire virtual machine disk.
    Type: Application
    Filed: March 16, 2018
    Publication date: September 27, 2018
    Inventors: Amit MITKAR, Andrei EROFEEV, Amit Bhaskar AUSARKAR, Ajay Venkat NAGRALE
  • Publication number: 20180275913
    Abstract: Recovery points can be used for replicating a virtual machine and reverting the virtual machine to a different state. A filter driver can monitor and capture input/output commands between a virtual machine and a virtual machine disk. The captured input/output commands can be used to create a recovery point. The recovery point can be associated with a bitmap that may be used to identify data blocks that have been modified between two versions of the virtual machine. Using this bitmap, a virtual machine may be reverted or restored to a different state by replacing modified data blocks and without replacing the entire virtual machine disk.
    Type: Application
    Filed: March 16, 2018
    Publication date: September 27, 2018
    Inventors: Amit MITKAR, Andrei EROFEEV, Amit Bhaskar AUSARKAR, Ajay Venkat NAGRALE
  • Publication number: 20180276085
    Abstract: Recovery points can be used for replicating a virtual machine and reverting the virtual machine to a different state. A filter driver can monitor and capture input/output commands between a virtual machine and a virtual machine disk. The captured input/output commands can be used to create a recovery point. The recovery point can be associated with a bitmap that may be used to identify data blocks that have been modified between two versions of the virtual machine. Using this bitmap, a virtual machine may be reverted or restored to a different state by replacing modified data blocks and without replacing the entire virtual machine disk.
    Type: Application
    Filed: March 16, 2018
    Publication date: September 27, 2018
    Inventors: Amit MITKAR, Andrei EROFEEV, Amit Bhaskar AUSARKAR, Ajay Venkat NAGRALE
  • Publication number: 20180276022
    Abstract: Recovery points can be used for replicating a virtual machine and reverting the virtual machine to a different state. A filter driver can monitor and capture input/output commands between a virtual machine and a virtual machine disk. The captured input/output commands can be used to create a recovery point. The recovery point can be associated with a bitmap that may be used to identify data blocks that have been modified between two versions of the virtual machine. Using this bitmap, a virtual machine may be reverted or restored to a different state by replacing modified data blocks and without replacing the entire virtual machine disk.
    Type: Application
    Filed: March 16, 2018
    Publication date: September 27, 2018
    Inventors: Amit MITKAR, Andrei EROFEEV, Amit Bhaskar AUSARKAR, Ajay Venkat NAGRALE
  • Publication number: 20160140651
    Abstract: A method and apparatus for validating models is provided where pre-validation of at least one model specific for at least one risk type is performed followed by validation of the model. The validation includes both quantitative and qualitative validation using various tests, approaches, and other criterion. The results of the validation operations are compiled and reported in a validation report.
    Type: Application
    Filed: November 13, 2014
    Publication date: May 19, 2016
    Inventors: Srinivas Prasad Va, Rahul Goyal, Animesh Mandal, Manish Chopra, Amit Bhaskar