Patents by Inventor Arun Prasad
Arun Prasad has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12292974Abstract: Backup data is leveraged to determine whether primary data has been encrypted by malware. The disclosed approach does not rely on recognizing particular malware instances or malware provenance, and thus can be applied to any body of data. Even a novel and previously unknown malware attack can be detected in this way. An illustrative data storage management system analyzes secondary copies it created over time, applies a multi-factor analysis to data recovered from the secondary copies and, based on the analysis, infers whether the primary data from which the secondary copies were created may be encrypted. The present approach uses successive versions of backup copies to find indicia of malware encryption, rather than trying to trace or identify the malware itself. Indicia of entropy correlate highly with encryption, such as encryption performed by malware attacks. Conversely, indicia of similarity correlate highly with lack of encryption of successive versions of documents.Type: GrantFiled: October 27, 2022Date of Patent: May 6, 2025Assignee: Commvault Systems, Inc.Inventors: Jitin Jindal, Arun Prasad Amarendran, Chandan Singh, Gopikannan Venugopalsamy, Yongtao Liu
-
Patent number: 12265137Abstract: A method for use in a magnetic field sensor, including: in each of a plurality of calibration periods, generating a reference magnetic field based on a different one of a plurality of drive codes; storing, in a memory, a plurality of values of a reference magnetic field signal that is generated in response to the reference magnetic field, each of the values of the reference magnetic field signal being generated by sampling the reference magnetic field signal in a different one of the plurality of calibration periods; calculating a calibration gain coefficient based on the plurality of values of the reference magnetic field signal; and storing the calibration gain coefficient in the memory and using the calibration gain coefficient to adjust an output of the magnetic field sensor.Type: GrantFiled: November 18, 2022Date of Patent: April 1, 2025Assignee: Allegro MicroSystems, LLCInventors: Arun Prasad Javvaji, Craig S. Petrie
-
Publication number: 20250045397Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.Type: ApplicationFiled: August 12, 2024Publication date: February 6, 2025Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
-
Publication number: 20250039236Abstract: The disclosed cyber threat detection and deception system leverages metadata information collected by the data storage management system. Using the metadata collected by the data storage management system, the cyber threat detection and deception system analyzes that metadata to detect any anomalies. Once suspicious or abnormal behavior is detected in an asset, the cyber threat detection and deception system creates and deploys a cyber deception plan for that asset. The cyber deception plan is implemented by way of deploying sensors or emulation traps in any number of cyber-threat appliances within the data network. Lures or tokens are configured and deployed on the suspected assets themselves to redirect attackers to the emulation traps.Type: ApplicationFiled: December 29, 2023Publication date: January 30, 2025Applicant: Commvault Systems, Inc.Inventors: Paul IGNATIUS, Arun Prasad AMARENDRAN, Indu Sekhar PEDDIBHOTLA
-
Publication number: 20250021447Abstract: Protecting configuration data in a clustered container system may include, in some embodiments, protecting an ETCD data store in a Kubernetes cluster. A data storage management system addresses the unique needs of protecting an ETCD data store of a target Kubernetes cluster, as well as protecting non-ETCD data payloads. The illustrative data storage management system defines ETCD as a unique kind of workload. ETCD protection is integrated within the data storage management system, which automatically creates data structures and resources within the system for, and provides special-purpose features to protect, ETCD contents and associated security certificates. One of the special-purpose features deploys a temporary data transfer agent within the target Kubernetes cluster to safeguard an ETCD snapshot and transmit its contents, along with the security certificates, to a backup infrastructure that operates outside of the target Kubernetes cluster.Type: ApplicationFiled: September 27, 2024Publication date: January 16, 2025Applicant: Commvault Systems, Inc.Inventors: Amit Mitkar, Srinivas Govind KUNDARAM, Shankarbabu Bhavanarushi, Arun Prasad AMARENDRAN, Rohit Himmatrao DIKKAR
-
Publication number: 20240417902Abstract: A spunbond nonwoven fabric includes hollow polymeric multicomponent fibers. The spunbond nonwoven fabric has a thickness of at least 1 mm. The thickness of the spunbond nonwoven fabric is according to DIN EN ISO 9073-2:1997-02. The spunbond nonwoven fabric may have a thickness according to DIN 9073-2/1997 in the range of 1 to 25 mm.Type: ApplicationFiled: June 16, 2023Publication date: December 19, 2024Inventors: Arun Prasad VENUGOPAL, William HUANG, Walter TSENG, Huan Hsiang LIN, Pai Chien WEI, Kenta NAKANISHI
-
Publication number: 20240411615Abstract: An information management system includes a storage manager for managing backup and/or restore operations for one or more client computing devices. The storage manager may be in communication with a resource administrator of a computing resource cluster, wherein the resource administrator instantiates one or more computing pods using the computing resource cluster. The resource administrator may receive a request for computing resources from the storage manager and provision the computing pods based on the request. The resource administrator may then select a pre-configured container image from one or more pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system.Type: ApplicationFiled: July 8, 2024Publication date: December 12, 2024Applicant: Commvault Systems, Inc.Inventors: Manas Bhikchand MUTHA, Bhavyan Bharatkumar MEHTA, Arun Prasad AMARENDRAN, Prasad NARA, Jaya Rama Raju INAVOLU, Shankarbabu Bhavanarushi, Chandresh SHARMA
-
Patent number: 12135618Abstract: Protecting configuration data in a clustered container system may include, in some embodiments, protecting an ETCD data store in a Kubernetes cluster. A data storage management system addresses the unique needs of protecting an ETCD data store of a target Kubernetes cluster, as well as protecting non-ETCD data payloads. The illustrative data storage management system defines ETCD as a unique kind of workload. ETCD protection is integrated within the data storage management system, which automatically creates data structures and resources within the system for, and provides special-purpose features to protect, ETCD contents and associated security certificates. One of the special-purpose features deploys a temporary data transfer agent within the target Kubernetes cluster to safeguard an ETCD snapshot and transmit its contents, along with the security certificates, to a backup infrastructure that operates outside of the target Kubernetes cluster.Type: GrantFiled: August 4, 2022Date of Patent: November 5, 2024Assignee: Commvault Systems, Inc.Inventors: Amit Mitkar, Srinivas Govind Kundaram, Shankarbabu Bhavanarushi, Arun Prasad Amarendran, Rohit Himmatrao Dikkar
-
Publication number: 20240359423Abstract: A nonwoven laminate, consisting of, in order (A) to (C), a spunbond nonwoven layer (A) including fibres, which include polyethylene terephthalate and copolyester, an optional spunbond nonwoven layer (B) including fibres, which include polyethylene terephthalate and copolyester, the nonwoven layer (B) having a higher copolyester content than nonwoven layer (A), and a needled staple fibre nonwoven layer (C). The needled staple fiber nonwoven layer (C) includes monocomponent polyethylene terephthalate staple fibres, and multicomponent staple fibres, which include at least a polyethylene terephthalate component and a copolyester component. Layers (A), (B) and (C) are each melt-bonded to at least one other layer of the layers (A), (B) and (C).Type: ApplicationFiled: April 25, 2024Publication date: October 31, 2024Inventors: Arun Prasad VENUGOPAL, Aleksander JOVANOVIC
-
Patent number: 12123397Abstract: The disclosure relates to a method of operating a wind power plant, and related power plant controller and wind power plant. The method comprises determining a first active power at a first operating point and applying a first limit value for a reactive power limit. The method further comprises determining a second active power at a second operating point. The method further comprises, responsive to determining that the second active power meets one or more active power conditions referenced to the first active power, applying a second limit value for the reactive power limit. Applying the second limit value comprises limiting a ramp rate of the reactive power limit. The method further comprises generating control signals for one or more wind turbines to control a collective reactive power output of the wind power plant in accordance with the reactive power limit.Type: GrantFiled: December 6, 2021Date of Patent: October 22, 2024Assignee: VESTAS WIND SYSTEMS A/SInventors: Rubin Panni, Kouroush Nayebi, Jesurathinam Arockia Arun Prasad
-
Patent number: 12093386Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.Type: GrantFiled: February 11, 2021Date of Patent: September 17, 2024Assignee: Commvault Systems, Inc.Inventors: PurnaChandra Sekhar Bedhapudi, Sri Karthik Bhagi, Deepak Raghunath Attarde, Arun Prasad Amarendran, Amit Bhaskar Ausarkar, Mrityunjay Upadhyay
-
Publication number: 20240256670Abstract: After completion of a backup job, the illustrative system performs a threat analysis of the freshly generated backup copies. Each copy is restored at a secure storage area. The system scans the restored data using, preferably, a signature-based malware scanning engine. If the scan finds malware infection or some other unsafe condition, a tracking index is updated to indicate that the copy is unsafe, and the secondary copy is quarantined. The quarantine prevents the copy from being restored to the production environment, and from acting as a source for other copies. The system iterates, scanning preceding versions of the copy, updating the index, and quarantining, until a clean or uninfected copy is found. The clean copy is so indexed. Responsive to a restore request, the illustrative system automatically restores the clean copy and skips over the infected copy/copies, preferably without asking the requesting user for input or approval.Type: ApplicationFiled: December 8, 2023Publication date: August 1, 2024Applicant: Commvault Systems, Inc.Inventors: Jitin JINDAL, Arun Prasad AMARENDRAN, Raghuveer SAGAR, David M. CUNNINGHAM, Vijayan THANASEKARAN
-
Patent number: 12033004Abstract: An information management system includes a storage manager for managing backup and/or restore operations for one or more client computing devices. The storage manager may be in communication with a resource administrator of a computing resource cluster, wherein the resource administrator instantiates one or more computing pods using the computing resource cluster. The resource administrator may receive a request for computing resources from the storage manager and provision the computing pods based on the request. The resource administrator may then select a pre-configured container image from one or more pre-configured container images based on the computing resource request, wherein the pre-configured container image configures a computing pod to create secondary copies of primary data from a particular primary data source of the information management system.Type: GrantFiled: October 22, 2021Date of Patent: July 9, 2024Assignee: Commvault Systems, Inc.Inventors: Manas Bhikchand Mutha, Bhavyan Bharatkumar Mehta, Arun Prasad Amarendran, Prasad Nara, Jaya Rama Raju Inavolu, Shankarbabu Bhavanarushi, Chandresh Sharma
-
Publication number: 20240193510Abstract: A method and system of automated person detection and notification is disclosed. Imaging data is received from at least one imaging device configured to provide a field-of-view of a predetermined area associated with a retail location. An image recognition process is implemented and configured to identify at least one person in the image data and an alert indicating at least one person is identified within the image data is generated. The alert is provided to at least one device registered to a predetermined user.Type: ApplicationFiled: February 21, 2024Publication date: June 13, 2024Inventors: Arun Prasad NAGARATHINAM, Sahana VIJAYKUMAR, Madhavan Kandhadai VASANTHAM, Shivang BHATT
-
Patent number: 12005692Abstract: The invention provides a nonwoven laminate, comprising in order (A) to (E): a spunbond nonwoven layer (A) comprising fibres, which comprise polyethylene terephthalate (PET) and copolyester; an optional spunbond nonwoven layer (B) comprising fibres, which comprise polyethylene terephthalate (PET) and copolyester, the nonwoven layer (B) having a higher copolyester content than nonwoven layer (A); a needled staple fibre nonwoven layer (C), comprising: monocomponent polyethylene terephthalate (PET) staple fibres (c1), and multicomponent staple fibres (c2), which comprise at least a polyethylene terephthalate (PET) component and a copolyester component; an optional spunbond nonwoven layer (D) comprising fibres, which comprise polyethylene terephthalate (PET) and copolyester, the nonwoven layer (D) having a higher copolyester content than nonwoven layer (E); a spunbond nonwoven layer (E) comprising fibres, which comprise polyethylene terephthalate (PET) and copolyester; wherein all layers are melt-bonded to each otType: GrantFiled: July 20, 2020Date of Patent: June 11, 2024Assignee: CARL FREUDENBERG KGInventors: Arun Prasad Venugopal, Gerhard Schoepping
-
Publication number: 20240168104Abstract: A method for use in a magnetic field sensor, including: in each of a plurality of calibration periods, generating a reference magnetic field based on a different one of a plurality of drive codes; storing, in a memory, a plurality of values of a reference magnetic field signal that is generated in response to the reference magnetic field, each of the values of the reference magnetic field signal being generated by sampling the reference magnetic field signal in a different one of the plurality of calibration periods; calculating a calibration gain coefficient based on the plurality of values of the reference magnetic field signal; and storing the calibration gain coefficient in the memory and using the calibration gain coefficient to adjust an output of the magnetic field sensor.Type: ApplicationFiled: November 18, 2022Publication date: May 23, 2024Applicant: Allegro MicroSystems, LLCInventors: Arun Prasad Javvaji, Craig S. Petrie
-
Patent number: 11976395Abstract: An embossed non-woven for the vehicle interior, includes: polyethylene terephthalate framework staple fibers; and polyethylene terephthalate binding staple fibers. A proportion of polyethylene terephthalate binding staple fibers is 5 to 50 wt. % based on a total weight of the non-woven. The polyethylene terephthalate binding staple fibers includes core/shell staple fibers. A shell of the core/shell staple fibers has low-melting co-polyethylene terephthalate having a melting point measured in accordance with DIN ISO 11357-3 (2013) in a range of 80° C. to 230° C.Type: GrantFiled: June 21, 2021Date of Patent: May 7, 2024Assignee: CARL FREUDENBERG KGInventors: Arun Prasad Venugopal, Dasa Urbanc, Andreja Jurjevcic, Angela Weik
-
Publication number: 20240143759Abstract: Backup data is leveraged to determine whether primary data has been encrypted by malware. The disclosed approach does not rely on recognizing particular malware instances or malware provenance, and thus can be applied to any body of data. Even a novel and previously unknown malware attack can be detected in this way. An illustrative data storage management system analyzes secondary copies it created over time, applies a multi-factor analysis to data recovered from the secondary copies and, based on the analysis, infers whether the primary data from which the secondary copies were created may be encrypted. The present approach uses successive versions of backup copies to find indicia of malware encryption, rather than trying to trace or identify the malware itself. Indicia of entropy correlate highly with encryption, such as encryption performed by malware attacks. Conversely, indicia of similarity correlate highly with lack of encryption of successive versions of documents.Type: ApplicationFiled: October 27, 2022Publication date: May 2, 2024Inventors: Jitin JINDAL, Arun Prasad AMARENDRAN, Chandan SINGH, Gopikannan VENUGOPALSAMY, Yongtao LIU
-
Patent number: D1027995Type: GrantFiled: April 23, 2021Date of Patent: May 21, 2024Assignee: Joiint Inc.Inventors: Arun Kumar Ponnusamy, Ramesh Babu Periya Samy, Arun Prasad Jaganathan
-
Patent number: D1029024Type: GrantFiled: April 23, 2021Date of Patent: May 28, 2024Assignee: Joiint Inc.Inventors: Arun Kumar Ponnusamy, Ramesh Babu Periya Samy, Arun Prasad Jaganathan