Patents by Inventor Anbazhagan Mani

Anbazhagan Mani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11824984
    Abstract: Aspects of the invention include loading an image of a virtual server onto a boot partition of a trusted execution environment (TEE), wherein a first key is embedded in the image. A second key is received from an end customer of an application. Data is received from an independent software vendor (ISV) of the application, wherein the data includes a third key. The second key and the third key are combined inside the TEE to create a fourth key. An available memory space in an independent memory device is encrypted using the fourth key to create a secure data volume. Encrypted data is stored in the secure data volume.
    Type: Grant
    Filed: January 11, 2022
    Date of Patent: November 21, 2023
    Assignee: International Business Machines Corporation
    Inventors: Angel Nunez Mencias, Nicolas Maeding, Peter Morjan, Dirk Herrendoerfer, James Robert Magowan, Anbazhagan Mani
  • Patent number: 11726953
    Abstract: One or more computer processors to receive an object to store in a cloud storage environment, wherein the cloud storage environment includes a default storage policy. The one or more processors determine whether the object includes a foreign policy as an attribute of metadata associated with the object. The one or more processors, responsive to determining the object includes the foreign policy as an attribute of the metadata associated with the object, determine whether the foreign policy includes storage rules that differ from the default storage policy of the cloud storage environment, and the one or more processors, responsive to determining the storage rules included in the foreign policy of the metadata of the object differ from the default storage policy of the cloud storage environment, store the object based on the storage rules of the foreign policy, and ignore the default storage policy of the cloud storage environment.
    Type: Grant
    Filed: July 15, 2020
    Date of Patent: August 15, 2023
    Assignee: International Business Machines Corporation
    Inventors: Dileep Dixith, Chhavi Agarwal, Anbazhagan Mani, Abhishek Jain
  • Publication number: 20230224156
    Abstract: Aspects of the invention include loading an image of a virtual server onto a boot partition of a trusted execution environment (TEE), wherein a first key is embedded in the image. A second key is received from an end customer of an application. Data is received from an independent software vendor (ISV) of the application, wherein the data includes a third key. The second key and the third key are combined inside the TEE to create a fourth key. An available memory space in an independent memory device is encrypted using the fourth key to create a secure data volume. Encrypted data is stored in the secure data volume.
    Type: Application
    Filed: January 11, 2022
    Publication date: July 13, 2023
    Inventors: Angel Nunez Mencias, Nicolas Maeding, Peter Morjan, Dirk Herrendoerfer, James Robert Magowan, ANBAZHAGAN Mani
  • Patent number: 11645237
    Abstract: A computer-implemented method according to one embodiment includes receiving, at a virtual file system, replicated data from a physical file system, transferring the replicated data from the virtual file system to cloud storage, and providing access to the replicated data in response to an unavailability of the physical file system, utilizing the virtual file system and the cloud storage.
    Type: Grant
    Filed: May 10, 2018
    Date of Patent: May 9, 2023
    Assignee: International Business Machines Corporation
    Inventors: Anbazhagan Mani, Subramaniyan Nallasivam, Ravindra Sure, Rishika Kedia
  • Patent number: 11438381
    Abstract: For migrating data to a remote data repository based on the security protocol capabilities of the remote data repository, a storage module identifies a security profile of a file residing in an on-premise data repository, where the security profile comprises security protocol requirements, matches the identified security profile with an entry in a list of one or more remote data repository providers, each entry comprising a security protocol capability of a corresponding remote data repository provider, and migrates, in response to finding a match of the identified security profile and the identified security protocol capability, the file to the matched remote data repository provider.
    Type: Grant
    Filed: January 22, 2019
    Date of Patent: September 6, 2022
    Assignee: International Business Machines Corporation
    Inventors: Sachin C. Punadikar, Sasikanth Eda, Anbazhagan Mani, Chhavi Agarwal, Archana Ravindar
  • Publication number: 20220276988
    Abstract: Provided are a computer program product, system, and method for replicating and migrating files to secondary storage sites. Files in a fileset at the primary storage site are migrated to a file container, wherein data for the files migrated to the file container is distributed among the secondary storage sites. File metadata for each of the migrated files is updated to include access information on the migrated file in the file container. Data for the migrated files is deleted in a local storage. The file metadata for the migrated files is replicated to the secondary storage sites over the network to store in filesets at the secondary storage sites without replicating file data for the migrated files to store in the filesets the secondary storage sites.
    Type: Application
    Filed: May 17, 2022
    Publication date: September 1, 2022
    Inventors: Robert B. Basham, Anbazhagan Mani, Rishika Kedia, Harold J. Roberson, II
  • Patent number: 11341103
    Abstract: Provided are a computer program product, system, and method for replicating and migrating files to secondary storage sites. Files in a fileset at the primary storage site are migrated to a file container, wherein data for the files migrated to the file container is distributed among the secondary storage sites. File metadata for each of the migrated files is updated to include access information on the migrated file in the file container. Data for the migrated files is deleted in a local storage. The file metadata for the migrated files is replicated to the secondary storage sites over the network to store in filesets at the secondary storage sites without replicating file data for the migrated files to store in the filesets the secondary storage sites.
    Type: Grant
    Filed: August 4, 2017
    Date of Patent: May 24, 2022
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Robert B. Basham, Anbazhagan Mani, Rishika Kedia, Harold J. Roberson, II
  • Publication number: 20220019553
    Abstract: One or more computer processors to receive an object to store in a cloud storage environment, wherein the cloud storage environment includes a default storage policy. The one or more processors determine whether the object includes a foreign policy as an attribute of metadata associated with the object. The one or more processors, responsive to determining the object includes the foreign policy as an attribute of the metadata associated with the object, determine whether the foreign policy includes storage rules that differ from the default storage policy of the cloud storage environment, and the one or more processors, responsive to determining the storage rules included in the foreign policy of the metadata of the object differ from the default storage policy of the cloud storage environment, store the object based on the storage rules of the foreign policy, and ignore the default storage policy of the cloud storage environment.
    Type: Application
    Filed: July 15, 2020
    Publication date: January 20, 2022
    Inventors: Dileep Dixith, Chhavi Agarwal, Anbazhagan Mani, Abhishek Jain
  • Patent number: 11188984
    Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.
    Type: Grant
    Filed: May 6, 2019
    Date of Patent: November 30, 2021
    Assignee: International Business Machines Corporation
    Inventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan
  • Publication number: 20210208952
    Abstract: A computer-implemented method according to one aspect includes determining and storing characteristics of a plurality of cloud vendors; dividing a workload into a plurality of logical stages; determining characteristics of each of the plurality of logical stages; and for each of the plurality of logical stages, assigning the logical stage to one of the plurality of cloud vendors, based on a comparison of the characteristics of the plurality of cloud vendors to the characteristics of the logical stage.
    Type: Application
    Filed: January 2, 2020
    Publication date: July 8, 2021
    Inventors: Abhishek Jain, Sasikanth Eda, Dileep Dixith, Sandeep Ramesh Patil, Anbazhagan Mani
  • Patent number: 10956042
    Abstract: A computer-implemented method according to one embodiment includes identifying data stored within a first virtual storage tier of a storage system, analyzing one or more characteristics of the data, and conditionally transferring the data from the first virtual storage tier of the storage system to a second virtual storage tier of the storage system, based on the analyzing.
    Type: Grant
    Filed: December 6, 2017
    Date of Patent: March 23, 2021
    Assignee: International Business Machines Corporation
    Inventors: Rishika Kedia, Anbazhagan Mani, Ranjith Rajagopalan Nair, Subramaniyan Nallasivam
  • Patent number: 10887416
    Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a proxy server for hybrid geo-dispersed erasure coding (EC). Responsive to receiving from an application server a request to write an object, the proxy server in a first storage site splits the object into a plurality of EC slices. The proxy server stores a first EC slice in a first storage device via a storage server local to the proxy server. The proxy server stores a plurality of remaining EC slices in a cache storage local to the proxy server. Responsive to determining that network access is available to disperse the plurality of slices among a plurality of geographically distributed storage sites, the proxy server copies the plurality of remaining EC slices to the plurality of geographically distributed storage sites using geo-dispersed erasure coding.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: January 5, 2021
    Assignee: International Business Machines Corporation
    Inventors: Sasikanth Eda, Anbazhagan Mani, Sandeep R. Patil, Ramakrishna Vadla
  • Patent number: 10831615
    Abstract: Methods and systems for automated regulation compliance for backing up and restoring in a storage environment are provided. A system for providing automated regulation compliance for backing up and restoring in a storage environment includes an analyzer module that determines if a storage system complies with regulations. The system includes a converter module that converts the storage system to comply with the regulations in response to determining that the storage system does not comply with the regulations. The system includes a validator module that validates that the converted storage system complies with the regulations.
    Type: Grant
    Filed: January 29, 2019
    Date of Patent: November 10, 2020
    Assignee: International Business Machines Corporation
    Inventors: Robert B. Basham, Anbazhagan Mani, Harold J. Roberson, II, Dileep Dixith
  • Patent number: 10747458
    Abstract: Embodiments for managing data storage by one or more processors are described. An object is created with deduplicated content. A lookup is created, which includes a name of the object and at least one of an address location of the deduplicated content and a byte range of the deduplicated content. The object and the lookup are transferred from a first computing system to a second computing system.
    Type: Grant
    Filed: November 21, 2017
    Date of Patent: August 18, 2020
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Sasikanth Eda, Anbazhagan Mani, Sandeep Patil, Smita J. Raut
  • Publication number: 20200241975
    Abstract: Methods and systems for automated regulation compliance for backing up and restoring in a storage environment are provided. A system for providing automated regulation compliance for backing up and restoring in a storage environment includes an analyzer module that determines if a storage system complies with regulations. The system includes a converter module that converts the storage system to comply with the regulations in response to determining that the storage system does not comply with the regulations. The system includes a validator module that validates that the converted storage system complies with the regulations.
    Type: Application
    Filed: January 29, 2019
    Publication date: July 30, 2020
    Inventors: Robert B. Basham, Anbazhagan Mani, Harold J. Roberson, II, Dileep Dixith
  • Publication number: 20200236141
    Abstract: For migrating data to a remote data repository based on the security protocol capabilities of the remote data repository, a storage module identifies a security profile of a file residing in an on-premise data repository, where the security profile comprises security protocol requirements, matches the identified security profile with an entry in a list of one or more remote data repository providers, each entry comprising a security protocol capability of a corresponding remote data repository provider, and migrates, in response to finding a match of the identified security profile and the identified security protocol capability, the file to the matched remote data repository provider.
    Type: Application
    Filed: January 22, 2019
    Publication date: July 23, 2020
    Inventors: Sachin C. Punadikar, Sasikanth Eda, Anbazhagan Mani, Chhavi Agarwal, Archana Ravindar
  • Publication number: 20190347338
    Abstract: A computer-implemented method according to one embodiment includes receiving, at a virtual file system, replicated data from a physical file system, transferring the replicated data from the virtual file system to cloud storage, and providing access to the replicated data in response to an unavailability of the physical file system, utilizing the virtual file system and the cloud storage.
    Type: Application
    Filed: May 10, 2018
    Publication date: November 14, 2019
    Inventors: Anbazhagan Mani, Subramaniyan Nallasivam, Ravindra Sure, Rishika Kedia
  • Publication number: 20190342418
    Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a proxy server for hybrid geo-dispersed erasure coding (EC). Responsive to receiving from an application server a request to write an object, the proxy server in a first storage site splits the object into a plurality of EC slices. The proxy server stores a first EC slice in a first storage device via a storage server local to the proxy server. The proxy server stores a plurality of remaining EC slices in a cache storage local to the proxy server. Responsive to determining that network access is available to disperse the plurality of slices among a plurality of geographically distributed storage sites, the proxy server copies the plurality of remaining EC slices to the plurality of geographically distributed storage sites using geo-dispersed erasure coding.
    Type: Application
    Filed: May 7, 2018
    Publication date: November 7, 2019
    Inventors: Sasikanth Eda, Anbazhagan Mani, Sandeep R. Patil, Ramakrishna Vadla
  • Patent number: 10467424
    Abstract: A filesystem command is sent by a first processor, and for synchronization by a second processor. The filesystem command is directed to a second object of a second filesystem that is synchronized with a first object of a first filesystem. An expression is sent by the first processor to the second filesystem, and for authentication by the second processor. The expression is generated based on a third object of the first filesystems that is synchronized with a fourth object of the second filesystem.
    Type: Grant
    Filed: October 12, 2017
    Date of Patent: November 5, 2019
    Assignee: International Business Machines Corporation
    Inventors: Anbazhagan Mani, Sandeep Patil, Sasikanth Eda, Dileep Dixith
  • Publication number: 20190259105
    Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.
    Type: Application
    Filed: May 6, 2019
    Publication date: August 22, 2019
    Inventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan