Patents by Inventor Anbazhagan Mani
Anbazhagan Mani has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11824984Abstract: Aspects of the invention include loading an image of a virtual server onto a boot partition of a trusted execution environment (TEE), wherein a first key is embedded in the image. A second key is received from an end customer of an application. Data is received from an independent software vendor (ISV) of the application, wherein the data includes a third key. The second key and the third key are combined inside the TEE to create a fourth key. An available memory space in an independent memory device is encrypted using the fourth key to create a secure data volume. Encrypted data is stored in the secure data volume.Type: GrantFiled: January 11, 2022Date of Patent: November 21, 2023Assignee: International Business Machines CorporationInventors: Angel Nunez Mencias, Nicolas Maeding, Peter Morjan, Dirk Herrendoerfer, James Robert Magowan, Anbazhagan Mani
-
Patent number: 11726953Abstract: One or more computer processors to receive an object to store in a cloud storage environment, wherein the cloud storage environment includes a default storage policy. The one or more processors determine whether the object includes a foreign policy as an attribute of metadata associated with the object. The one or more processors, responsive to determining the object includes the foreign policy as an attribute of the metadata associated with the object, determine whether the foreign policy includes storage rules that differ from the default storage policy of the cloud storage environment, and the one or more processors, responsive to determining the storage rules included in the foreign policy of the metadata of the object differ from the default storage policy of the cloud storage environment, store the object based on the storage rules of the foreign policy, and ignore the default storage policy of the cloud storage environment.Type: GrantFiled: July 15, 2020Date of Patent: August 15, 2023Assignee: International Business Machines CorporationInventors: Dileep Dixith, Chhavi Agarwal, Anbazhagan Mani, Abhishek Jain
-
Publication number: 20230224156Abstract: Aspects of the invention include loading an image of a virtual server onto a boot partition of a trusted execution environment (TEE), wherein a first key is embedded in the image. A second key is received from an end customer of an application. Data is received from an independent software vendor (ISV) of the application, wherein the data includes a third key. The second key and the third key are combined inside the TEE to create a fourth key. An available memory space in an independent memory device is encrypted using the fourth key to create a secure data volume. Encrypted data is stored in the secure data volume.Type: ApplicationFiled: January 11, 2022Publication date: July 13, 2023Inventors: Angel Nunez Mencias, Nicolas Maeding, Peter Morjan, Dirk Herrendoerfer, James Robert Magowan, ANBAZHAGAN Mani
-
Patent number: 11645237Abstract: A computer-implemented method according to one embodiment includes receiving, at a virtual file system, replicated data from a physical file system, transferring the replicated data from the virtual file system to cloud storage, and providing access to the replicated data in response to an unavailability of the physical file system, utilizing the virtual file system and the cloud storage.Type: GrantFiled: May 10, 2018Date of Patent: May 9, 2023Assignee: International Business Machines CorporationInventors: Anbazhagan Mani, Subramaniyan Nallasivam, Ravindra Sure, Rishika Kedia
-
Patent number: 11438381Abstract: For migrating data to a remote data repository based on the security protocol capabilities of the remote data repository, a storage module identifies a security profile of a file residing in an on-premise data repository, where the security profile comprises security protocol requirements, matches the identified security profile with an entry in a list of one or more remote data repository providers, each entry comprising a security protocol capability of a corresponding remote data repository provider, and migrates, in response to finding a match of the identified security profile and the identified security protocol capability, the file to the matched remote data repository provider.Type: GrantFiled: January 22, 2019Date of Patent: September 6, 2022Assignee: International Business Machines CorporationInventors: Sachin C. Punadikar, Sasikanth Eda, Anbazhagan Mani, Chhavi Agarwal, Archana Ravindar
-
Publication number: 20220276988Abstract: Provided are a computer program product, system, and method for replicating and migrating files to secondary storage sites. Files in a fileset at the primary storage site are migrated to a file container, wherein data for the files migrated to the file container is distributed among the secondary storage sites. File metadata for each of the migrated files is updated to include access information on the migrated file in the file container. Data for the migrated files is deleted in a local storage. The file metadata for the migrated files is replicated to the secondary storage sites over the network to store in filesets at the secondary storage sites without replicating file data for the migrated files to store in the filesets the secondary storage sites.Type: ApplicationFiled: May 17, 2022Publication date: September 1, 2022Inventors: Robert B. Basham, Anbazhagan Mani, Rishika Kedia, Harold J. Roberson, II
-
Patent number: 11341103Abstract: Provided are a computer program product, system, and method for replicating and migrating files to secondary storage sites. Files in a fileset at the primary storage site are migrated to a file container, wherein data for the files migrated to the file container is distributed among the secondary storage sites. File metadata for each of the migrated files is updated to include access information on the migrated file in the file container. Data for the migrated files is deleted in a local storage. The file metadata for the migrated files is replicated to the secondary storage sites over the network to store in filesets at the secondary storage sites without replicating file data for the migrated files to store in the filesets the secondary storage sites.Type: GrantFiled: August 4, 2017Date of Patent: May 24, 2022Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Robert B. Basham, Anbazhagan Mani, Rishika Kedia, Harold J. Roberson, II
-
Publication number: 20220019553Abstract: One or more computer processors to receive an object to store in a cloud storage environment, wherein the cloud storage environment includes a default storage policy. The one or more processors determine whether the object includes a foreign policy as an attribute of metadata associated with the object. The one or more processors, responsive to determining the object includes the foreign policy as an attribute of the metadata associated with the object, determine whether the foreign policy includes storage rules that differ from the default storage policy of the cloud storage environment, and the one or more processors, responsive to determining the storage rules included in the foreign policy of the metadata of the object differ from the default storage policy of the cloud storage environment, store the object based on the storage rules of the foreign policy, and ignore the default storage policy of the cloud storage environment.Type: ApplicationFiled: July 15, 2020Publication date: January 20, 2022Inventors: Dileep Dixith, Chhavi Agarwal, Anbazhagan Mani, Abhishek Jain
-
Patent number: 11188984Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.Type: GrantFiled: May 6, 2019Date of Patent: November 30, 2021Assignee: International Business Machines CorporationInventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan
-
Publication number: 20210208952Abstract: A computer-implemented method according to one aspect includes determining and storing characteristics of a plurality of cloud vendors; dividing a workload into a plurality of logical stages; determining characteristics of each of the plurality of logical stages; and for each of the plurality of logical stages, assigning the logical stage to one of the plurality of cloud vendors, based on a comparison of the characteristics of the plurality of cloud vendors to the characteristics of the logical stage.Type: ApplicationFiled: January 2, 2020Publication date: July 8, 2021Inventors: Abhishek Jain, Sasikanth Eda, Dileep Dixith, Sandeep Ramesh Patil, Anbazhagan Mani
-
Patent number: 10956042Abstract: A computer-implemented method according to one embodiment includes identifying data stored within a first virtual storage tier of a storage system, analyzing one or more characteristics of the data, and conditionally transferring the data from the first virtual storage tier of the storage system to a second virtual storage tier of the storage system, based on the analyzing.Type: GrantFiled: December 6, 2017Date of Patent: March 23, 2021Assignee: International Business Machines CorporationInventors: Rishika Kedia, Anbazhagan Mani, Ranjith Rajagopalan Nair, Subramaniyan Nallasivam
-
Patent number: 10887416Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a proxy server for hybrid geo-dispersed erasure coding (EC). Responsive to receiving from an application server a request to write an object, the proxy server in a first storage site splits the object into a plurality of EC slices. The proxy server stores a first EC slice in a first storage device via a storage server local to the proxy server. The proxy server stores a plurality of remaining EC slices in a cache storage local to the proxy server. Responsive to determining that network access is available to disperse the plurality of slices among a plurality of geographically distributed storage sites, the proxy server copies the plurality of remaining EC slices to the plurality of geographically distributed storage sites using geo-dispersed erasure coding.Type: GrantFiled: May 7, 2018Date of Patent: January 5, 2021Assignee: International Business Machines CorporationInventors: Sasikanth Eda, Anbazhagan Mani, Sandeep R. Patil, Ramakrishna Vadla
-
Patent number: 10831615Abstract: Methods and systems for automated regulation compliance for backing up and restoring in a storage environment are provided. A system for providing automated regulation compliance for backing up and restoring in a storage environment includes an analyzer module that determines if a storage system complies with regulations. The system includes a converter module that converts the storage system to comply with the regulations in response to determining that the storage system does not comply with the regulations. The system includes a validator module that validates that the converted storage system complies with the regulations.Type: GrantFiled: January 29, 2019Date of Patent: November 10, 2020Assignee: International Business Machines CorporationInventors: Robert B. Basham, Anbazhagan Mani, Harold J. Roberson, II, Dileep Dixith
-
Patent number: 10747458Abstract: Embodiments for managing data storage by one or more processors are described. An object is created with deduplicated content. A lookup is created, which includes a name of the object and at least one of an address location of the deduplicated content and a byte range of the deduplicated content. The object and the lookup are transferred from a first computing system to a second computing system.Type: GrantFiled: November 21, 2017Date of Patent: August 18, 2020Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Sasikanth Eda, Anbazhagan Mani, Sandeep Patil, Smita J. Raut
-
Publication number: 20200241975Abstract: Methods and systems for automated regulation compliance for backing up and restoring in a storage environment are provided. A system for providing automated regulation compliance for backing up and restoring in a storage environment includes an analyzer module that determines if a storage system complies with regulations. The system includes a converter module that converts the storage system to comply with the regulations in response to determining that the storage system does not comply with the regulations. The system includes a validator module that validates that the converted storage system complies with the regulations.Type: ApplicationFiled: January 29, 2019Publication date: July 30, 2020Inventors: Robert B. Basham, Anbazhagan Mani, Harold J. Roberson, II, Dileep Dixith
-
Publication number: 20200236141Abstract: For migrating data to a remote data repository based on the security protocol capabilities of the remote data repository, a storage module identifies a security profile of a file residing in an on-premise data repository, where the security profile comprises security protocol requirements, matches the identified security profile with an entry in a list of one or more remote data repository providers, each entry comprising a security protocol capability of a corresponding remote data repository provider, and migrates, in response to finding a match of the identified security profile and the identified security protocol capability, the file to the matched remote data repository provider.Type: ApplicationFiled: January 22, 2019Publication date: July 23, 2020Inventors: Sachin C. Punadikar, Sasikanth Eda, Anbazhagan Mani, Chhavi Agarwal, Archana Ravindar
-
Publication number: 20190347338Abstract: A computer-implemented method according to one embodiment includes receiving, at a virtual file system, replicated data from a physical file system, transferring the replicated data from the virtual file system to cloud storage, and providing access to the replicated data in response to an unavailability of the physical file system, utilizing the virtual file system and the cloud storage.Type: ApplicationFiled: May 10, 2018Publication date: November 14, 2019Inventors: Anbazhagan Mani, Subramaniyan Nallasivam, Ravindra Sure, Rishika Kedia
-
Publication number: 20190342418Abstract: A mechanism is provided in a data processing system comprising at least one processor and at least one memory, the at least one memory comprising instructions which are executed by the at least one processor and configure the processor to implement a proxy server for hybrid geo-dispersed erasure coding (EC). Responsive to receiving from an application server a request to write an object, the proxy server in a first storage site splits the object into a plurality of EC slices. The proxy server stores a first EC slice in a first storage device via a storage server local to the proxy server. The proxy server stores a plurality of remaining EC slices in a cache storage local to the proxy server. Responsive to determining that network access is available to disperse the plurality of slices among a plurality of geographically distributed storage sites, the proxy server copies the plurality of remaining EC slices to the plurality of geographically distributed storage sites using geo-dispersed erasure coding.Type: ApplicationFiled: May 7, 2018Publication date: November 7, 2019Inventors: Sasikanth Eda, Anbazhagan Mani, Sandeep R. Patil, Ramakrishna Vadla
-
Patent number: 10467424Abstract: A filesystem command is sent by a first processor, and for synchronization by a second processor. The filesystem command is directed to a second object of a second filesystem that is synchronized with a first object of a first filesystem. An expression is sent by the first processor to the second filesystem, and for authentication by the second processor. The expression is generated based on a third object of the first filesystems that is synchronized with a fourth object of the second filesystem.Type: GrantFiled: October 12, 2017Date of Patent: November 5, 2019Assignee: International Business Machines CorporationInventors: Anbazhagan Mani, Sandeep Patil, Sasikanth Eda, Dileep Dixith
-
Publication number: 20190259105Abstract: A method, computer program product, and system performing a method that includes a processor(s) obtaining a digital document defining insurance parameters for utilization by a user of a portion of computing resources selected from a group of computing resources comprising the shared computing environment. The processor(s) generates, based on the digital document, parameters defining the portion of the computing resources and risk management rules reflecting guaranteed thresholds for utilization and performance of the portion of the computing resources defined in the digital document. The processor(s) configures a controller in the shared computing environment, based on the parameters and the risk management rules and obtains a notification of a failure in the portion of the computing resources in violation of the risk management rules and details of the failure to determine the extent and impact of the failure. The processor(s) automatically generates a claim package and transmits it to the administrator.Type: ApplicationFiled: May 6, 2019Publication date: August 22, 2019Inventors: Albee Jhoney, Hariharan Krishna, Anbazhagan Mani, Umasuthan Ramakrishnan