Patents by Inventor Arsalan Ahmad
Arsalan Ahmad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12367183Abstract: A system receives a replication credential associated with a request to replicate a dataset to a destination partition of a cloud environment. The replication credential includes a destination identifier that identifies the destination partition as a destination for replicating the dataset. The system accesses a replication tag associated with the dataset that defines a replication policy for the dataset. The replication tag includes a destination key that identifies the destination as being a permissible destination for replicating the dataset in accordance with the replication policy. The system determines that replication is permissible based on successfully validating that the destination key corresponds to the destination partition identified by the destination identifier of the replication credential. Responsive to determining that replication is permissible, the system initiates a set of one or more operations to replicate the dataset to the destination partition.Type: GrantFiled: July 29, 2024Date of Patent: July 22, 2025Assignee: Oracle International CorporationInventors: Tony Long, Arsalan Ahmad
-
Publication number: 20250211592Abstract: A system determines a trigger condition for executing a security protocol transition with respect to an execution environment of a virtual cloud network. In response to determining the trigger condition, the system executes the security protocol transition while executing the execution environment. The security protocol transition includes terminating execution of a first security protocol and initiating execution of a second security protocol. The first security protocol includes utilizing a first authorization process to authorize a set of network entities to access a set of target resources. The second security protocol includes utilizing a second authorization process to authorize the set of network entities to access the set of target resources. The trigger condition indicates that one or more parameters associated with the virtual cloud network meets a set of transition criteria for executing the security protocol transition.Type: ApplicationFiled: December 20, 2023Publication date: June 26, 2025Applicant: Oracle International CorporationInventors: Tony Long, Karthik Venkatesh, Philip Ramsey, Arsalan Ahmad
-
Patent number: 12164540Abstract: A server can receive a request to subscribe to a data tenancy in an extended region. The server can determine a size of stored data records associated with the data tenancy in a home region to be replicated in the extended region. Based in part on the size of the stored data records, the server can open a new communication channel dedicated to replicating the stored data records from the first server in the home region to the second server in the extended region. The server can pull the stored data records from the first server in the home region, store the pulled data records on the second sever in the extended region. The server can receive updated data records over an established communication channel between the first server in the home region and the second server in the extended region and store the updated data records on the second server.Type: GrantFiled: November 3, 2020Date of Patent: December 10, 2024Assignee: Oracle International CorporationInventors: Arsalan Ahmad, Ashwin Kumar Vajantri, Vijay Kumar Agrawal, Pradyumna Reddy Vajja
-
Patent number: 12101377Abstract: The present embodiments relate to a CI replication service that can replicate domain data from IDCS control plane to data plane and to all subscribed regions of a domain. For instance, the CI replication service can provide replication of required resources of a domain for AuthN and AuthZ from an IDCS local region to other regions for high availability (e.g., to improve latency). The CI replication service can replicate the resources from a domain's home region to all subscribed regions for local availability of data for workloads running in those regions. Further, when a new region is subscribed for a domain, then the service can bootstrap that domain's data from home region before enabling that region for the domain.Type: GrantFiled: August 24, 2023Date of Patent: September 24, 2024Assignee: Oracle International CorporationInventors: Arsalan Ahmad, Pradyumna Reddy Vajja, Ashwin Kumar Vajantri, Nikhil Yograj Vaishnavi, Girish Yashawant Mande, Girish Nagaraja, Gregg Alan Wilson
-
Publication number: 20240137268Abstract: Approaches of reassigning a home region from a first data center to a second data center as requested by a customer are described herein. The home region is able to implement write operations to a domain, whereas other data centers cannot implement write operations to the domain. The customer can request the home region being reassigned to another data center such that the customer can utilize the other data center to implement write operations to the domain.Type: ApplicationFiled: December 18, 2023Publication date: April 25, 2024Applicant: Oracle International CorporationInventors: Arsalan Ahmad, Martinus Petrus Lambertus van den Dungen, Lokesh Gupta, Girish Nagaraja, Nikhil Yograj Vaishnavi
-
Patent number: 11876613Abstract: Approaches of reassigning a home region from a first data center to a second data center as requested by a customer are described herein. The home region is able to implement write operations to a domain, whereas other data centers cannot implement write operations to the domain. The customer can request the home region being reassigned to another data center such that the customer can utilize the other data center to implement write operations to the domain.Type: GrantFiled: October 27, 2022Date of Patent: January 16, 2024Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Arsalan Ahmad, Martinus Petrus Lambertus van den Dungen, Lokesh Gupta, Girish Nagaraja, Nikhil Yograj Vaishnavi
-
Publication number: 20230403323Abstract: The present embodiments relate to a CI replication service that can replicate domain data from IDCS control plane to data plane and to all subscribed regions of a domain. For instance, the CI replication service can provide replication of required resources of a domain for AuthN and AuthZ from an IDCS local region to other regions for high availability (e.g., to improve latency). The CI replication service can replicate the resources from a domain's home region to all subscribed regions for local availability of data for workloads running in those regions. Further, when a new region is subscribed for a domain, then the service can bootstrap that domain's data from home region before enabling that region for the domain.Type: ApplicationFiled: August 24, 2023Publication date: December 14, 2023Applicant: Oracle International CorporationInventors: Arsalan Ahmad, Pradyumna Reddy Vajja, Ashwin Kumar Vajantri, Nikhil Yograj Vaishnavi, Girish Yashawant Mande, Girish Nagaraja, Gregg Alan Wilson
-
Patent number: 11785082Abstract: The present embodiments relate to a CI replication service that can replicate domain data from IDCS control plane to data plane and to all subscribed regions of a domain. For instance, the CI replication service can provide replication of required resources of a domain for AuthN and AuthZ from an IDCS local region to other regions for high availability (e.g., to improve latency). The CI replication service can replicate the resources from a domain's home region to all subscribed regions for local availability of data for workloads running in those regions. Further, when a new region is subscribed for a domain, then the service can bootstrap that domain's data from home region before enabling that region for the domain.Type: GrantFiled: June 3, 2022Date of Patent: October 10, 2023Assignee: ORACLE INTERNATIONAL CORPORATIONInventors: Arsalan Ahmad, Pradyumna Reddy Vajja, Ashwin Kumar Vajantri, Nikhil Yograj Vaishnavi, Girish Yashawant Mande, Girish Nagaraja, Gregg Alan Wilson
-
Publication number: 20230132987Abstract: Approaches of reassigning a home region from a first data center to a second data center as requested by a customer are described herein. The home region is able to implement write operations to a domain, whereas other data centers cannot implement write operations to the domain. The customer can request the home region being reassigned to another data center such that the customer can utilize the other data center to implement write operations to the domain.Type: ApplicationFiled: October 27, 2022Publication date: May 4, 2023Applicant: Oracle International CorporationInventors: Arsalan Ahmad, Martinus Petrus Lambertus Van den Dungen, Lokesh Gupta, Girish Nagaraja, Nikhil Yograi Vaishavi
-
Publication number: 20230140149Abstract: An approach of performing data center failover using an address that indicates a backup data center. The address includes common names indicating a data center with a domain and a backup datacenter with a replica of the domain. A cloud service provider can receive the address, establish a connection with an available data center, and failover to the backup data center if the data center with the connection becomes unavailable.Type: ApplicationFiled: October 27, 2022Publication date: May 4, 2023Applicant: Oracle International CorporationInventors: Gregg Alan Wilson, Martinus Petrus Lambertus van den Dungen, Arsalan Ahmad, Robert Lee Tesch, II, Girish Nagaraja, Lokesh Gupta, Nikhil Yograj Vaishnavi
-
Publication number: 20230101337Abstract: The present embodiments relate to a CI replication service that can replicate domain data from IDCS control plane to data plane and to all subscribed regions of a domain. For instance, the CI replication service can provide replication of required resources of a domain for AuthN and AuthZ from an IDCS local region to other regions for high availability (e.g., to improve latency). The CI replication service can replicate the resources from a domain's home region to all subscribed regions for local availability of data for workloads running in those regions. Further, when a new region is subscribed for a domain, then the service can bootstrap that domain's data from home region before enabling that region for the domain.Type: ApplicationFiled: June 3, 2022Publication date: March 30, 2023Applicant: Oracle International CorporationInventors: Arsalan Ahmad, Pradyumna Reddy Vajja, Ashwin Kumar Vajantri, Nikhil Yograj Vaishnavi, Girish Yashawant Mande, Girish Nagaraja, Gregg Alan Wilson
-
Publication number: 20230101303Abstract: In some aspects, an authentication service may divide authentication data into one or more data stripes, the authentication data including at least one of: user identifier (userID); group identifier (groupID); group membership; client identifier (clientID); dynamic group (DG) membership; or dynamic group identifier. The authentication service may store the one or more data stripes in one or more databases, the databases being contained in a host machine of a fleet, where the fleet contains one or more host machines. The authentication service may update the databases from the data stripe via a background thread. Numerous other aspects are described.Type: ApplicationFiled: September 29, 2022Publication date: March 30, 2023Applicant: Oracle International CorporationInventors: Venkata Rama Prasad Tammana, Kedar Nitin Mishra, Matthew Hoover, Girish Nagaraja, Arsalan Ahmad
-
Publication number: 20220138220Abstract: A server can receive a request to subscribe to a data tenancy in an extended region. The server can determine a size of stored data records associated with the data tenancy in a home region to be replicated in the extended region. Based in part on the size of the stored data records, the server can open a new communication channel dedicated to replicating the stored data records from the first server in the home region to the second server in the extended region. The server can pull the stored data records from the first server in the home region, store the pulled data records on the second sever in the extended region. The server can receive updated data records over an established communication channel between the first server in the home region and the second server in the extended region and store the updated data records on the second server.Type: ApplicationFiled: November 3, 2020Publication date: May 5, 2022Applicant: Oracle International CorporationInventors: Arsalan Ahmad, Ashwin Kumar Vajantri, Vijay Kumar Agrawal, Pradyuma Reddy Vajja
-
Patent number: 11269679Abstract: Distributed transactions are performed over a collection of servers operating as replicas of a data set, where a successful transaction involves meeting a quorum count of replicas that locally commit the transaction. However, performance constraints of data sets and consuming applications may vary (e.g., sensitivity to latency, scalability, and/or consistency), and the performance characteristics of the server set may be partly determined by the transactional commitment and quorum selection. The distributed transaction may be applied by designating the replicas as a set of followers and a leader that initiates the transaction and receives acknowledgments of local commits by each follower. On condition of the acknowledgments meeting a quorum count for the data set according to the performance characteristics of the application, the leader locally commits the transaction and delivers a result.Type: GrantFiled: May 4, 2018Date of Patent: March 8, 2022Assignee: Microsoft Technology Licensing, LLCInventors: Karthik Raman, Arsalan Ahmad, Momin Mahmoud Al-Ghosien, Padma Priya Aradhyula Bhavani, Rajeev Sudhakar Bhopi, Junyan Guo, Ji Huang, Atul Katiyar, Hemant Kumar, Sujit Vattathil Kuruvilla, Ovidiu Constantin Platon, Venkata Sivaramakrishna Ramadugu, Ankur Savailal Shah, Pankaj Sharma, Dharma Shukla, Shreshth Singhal, Shireesh Kumar Thota
-
Patent number: 10970269Abstract: Data services are often provided with consistency guarantees of either strong consistency models, comprising uniform wall-clock consistency, or eventual consistency models, where temporary logical inconsistency is guaranteed to be resolved only after full data propagation. However, the performance characteristics of contemporary services often require an intermediate consistency model, where some aspects of the service have specific consistency expectations and other aspects of the service are flexible, such as bounded staleness (e.g., a maximum delay in reaching consistency); session consistency (e.g., individual sessions remain logically consistent, but ordering may vary across sessions); and prefix consistency (e.g., each view during a session is logically consistent, but ordering may vary between session views).Type: GrantFiled: May 29, 2018Date of Patent: April 6, 2021Assignee: Microsoft Technology Licensing, LLCInventors: Karthik Raman, Arsalan Ahmad, Momin Mahmoud Al-Ghosien, Mohammad Derakhshani, Madhan Gajendran, Ji Huang, Kiran Kumar Kolli, Sujit Vattathil Kuruvilla, Liang Li, Denis Rystsov, Pankaj Sharma, Dharma Shukla, Hari Sudan Sundar, Shireesh Kumar Thota, Swarnim Vyas
-
Patent number: 10536322Abstract: A service control manager manages one or more services on a computing device, such as creating processes that host the services, stopping the processes that host the services, and so forth. The service control manager also provides a request to a resource manager to reserve, monitor, and/or place limitations on resources for each of the one or more services. For example, the service control manager can request to be notified when resource usage by a service exceeds a resource usage threshold value. These resources are various resources of the computing device, such as a processor (CPU), memory, storage device input/output (I/O), network usage, and so forth. If the usage of a resource by a service satisfies the resource usage threshold value for that resource for that service, then the resource manager notifies the service control manager so the service control manager can take an appropriate remedial action.Type: GrantFiled: June 30, 2017Date of Patent: January 14, 2020Assignee: Microsoft Technology Licensing, LLCInventors: Mark Livschitz, Arsalan Ahmad, Alain Franck Gefflaut, Gregory J. Colombo
-
Publication number: 20190342188Abstract: Data services are often provided with consistency guarantees of either strong consistency models, comprising uniform wall-clock consistency, or eventual consistency models, where temporary logical inconsistency is guaranteed to be resolved only after full data propagation. However, the performance characteristics of contemporary services often require an intermediate consistency model, where some aspects of the service have specific consistency expectations and other aspects of the service are flexible, such as bounded staleness (e.g., a maximum delay in reaching consistency); session consistency (e.g., individual sessions remain logically consistent, but ordering may vary across sessions); and prefix consistency (e.g., each view during a session is logically consistent, but ordering may vary between session views).Type: ApplicationFiled: May 29, 2018Publication date: November 7, 2019Inventors: Karthik RAMAN, Arsalan AHMAD, Momin Mahmoud AL-GHOSIEN, Mohammad DERAKHSHANI, Madhan GAJENDRAN, Ji HUANG, Kiran Kumar KOLLI, Sujit Vattathil KURUVILLA, Liang LI, Denis RYSTSOV, Pankaj SHARMA, Dharma SHUKLA, Hari Sudan SUNDAR, Shireesh Kumar THOTA, Swarnim VYAS
-
Publication number: 20190340011Abstract: Distributed transactions are performed over a collection of servers operating as replicas of a data set, where a successful transaction involves meeting a quorum count of replicas that locally commit the transaction. However, performance constraints of data sets and consuming applications may vary (e.g., sensitivity to latency, scalability, and/or consistency), and the performance characteristics of the server set may be partly determined by the transactional commitment and quorum selection. The distributed transaction may be applied by designating the replicas as a set of followers and a leader that initiates the transaction and receives acknowledgments of local commits by each follower. On condition of the acknowledgments meeting a quorum count for the data set according to the performance characteristics of the application, the leader locally commits the transaction and delivers a result.Type: ApplicationFiled: May 4, 2018Publication date: November 7, 2019Inventors: Karthik Raman, Arsalan AHMAD, Momin Mahmoud AL-GHOSIEN, Padma Priya ARADHYULA BHAVANI, Rajeev Sudhakar BHOPI, Junyan GUO, Ji HUANG, Atul KATIYAR, Hemant KUMAR, Sujit Vattathil KURUVILLA, Ovidiu Constantin PLATON, Venkata Sivaramakrishna RAMADUGU, Ankur Savailal SHAH, Pankaj SHARMA, Dharma SHUKLA, Shreshth SINGHAL, Shireesh Kumar THOTA
-
Publication number: 20180205593Abstract: A service control manager manages one or more services on a computing device, such as creating processes that host the services, stopping the processes that host the services, and so forth. The service control manager also provides a request to a resource manager to reserve, monitor, and/or place limitations on resources for each of the one or more services. For example, the service control manager can request to be notified when resource usage by a service exceeds a resource usage threshold value. These resources are various resources of the computing device, such as a processor (CPU), memory, storage device input/output (I/O), network usage, and so forth. If the usage of a resource by a service satisfies the resource usage threshold value for that resource for that service, then the resource manager notifies the service control manager so the service control manager can take an appropriate remedial action.Type: ApplicationFiled: June 30, 2017Publication date: July 19, 2018Applicant: Microsoft Technology Licensing, LLCInventors: Mark Livschitz, Arsalan Ahmad, Alain Franck Gefflaut, Gregory J. Colombo
-
Patent number: 9628279Abstract: Various embodiments provide techniques and devices for protecting application secrets from operating system attacks. In some examples, applications execute with an isolated user mode of a secure execution environment, while relying on an operating system executing within a separate execution environment for resource management and system services. A proxy kernel can control access by the operating system to data associated with the secure execution environment. Further, the proxy kernel can act as a transparent interface between isolated user mode applications and the operating system during the provision of resource management and system services.Type: GrantFiled: September 30, 2014Date of Patent: April 18, 2017Assignee: Microsoft Technology Licensing, LLCInventors: David B. Probert, Jeff Engel, Arsalan Ahmad, Arun U. Kishan, Jonathan E. Lange