Patents by Inventor Arun Prasad Amarendran
Arun Prasad Amarendran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20190278744Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.Type: ApplicationFiled: May 28, 2019Publication date: September 12, 2019Inventor: Arun Prasad Amarendran
-
Publication number: 20190278748Abstract: A system for providing user access to electronic mail includes an email client and an email server. The email client receives and communicates a user interaction with an email message. The email server that receives the communication, determines whether the email message stored in a live database or in a backup storage. Upon determination that the email message is stored in a backup storage, the email server performs a message exchange with a backup storage system to perform the user-requested action.Type: ApplicationFiled: May 29, 2019Publication date: September 12, 2019Inventors: Arun Prasad Amarendran, Jun H. Ahn, Tirthankar Chatterjee, Manas Bhikchand Mutha, Ho-Chi Chen, Prosenjit Sinha, Yongtao Liu
-
Patent number: 10372672Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.Type: GrantFiled: July 12, 2016Date of Patent: August 6, 2019Assignee: Commvault Systems, Inc.Inventor: Arun Prasad Amarendran
-
Patent number: 10324897Abstract: A system for providing user access to electronic mail includes an email client and an email server. The email client receives and communicates a user interaction with an email message The email server that receives the communication, determines whether the email message stored in a live database or in a backup storage. Upon determination that the email message is stored in a backup storage, the email server performs a message exchange with a backup storage system to perform the user-requested action.Type: GrantFiled: January 27, 2015Date of Patent: June 18, 2019Assignee: Commvault Systems, Inc.Inventors: Arun Prasad Amarendran, Jun H. Ahn, Tirthankar Chatterjee, Manas Bhikchand Mutha, Ho-chi Chen, Prosenjit Sinha, Yongtao Liu
-
Publication number: 20190108340Abstract: This application relates to ransomware detection. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine monitors the I/O activity in a file system. The software module records the number of times the files in the file system are modified, created, deleted, and renamed. The recorded number is compared against a threshold. If the number exceeds the threshold, the software module provides an alert to the user of the client machine that the client machine may be under a ransomware attack. In some embodiments, index data gathered as part of backup operations is utilized, either alone or in combination with the continuously monitored I/O activity data, to detect ransomware attacks.Type: ApplicationFiled: September 12, 2018Publication date: April 11, 2019Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
-
Publication number: 20190108341Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.Type: ApplicationFiled: September 12, 2018Publication date: April 11, 2019Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
-
Publication number: 20190109870Abstract: This application relates to ransomware detection and intelligent restore. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. When a potential ransomware attack is detected, a timestamp is recorded. If the client machine is indeed taken over by the ransomware attack, an intelligent restore operation can be performed such that the file system is automatically restored to a point in time prior to the infection by the ransomware attack using the recorded timestamp.Type: ApplicationFiled: September 12, 2018Publication date: April 11, 2019Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
-
Publication number: 20180270290Abstract: A method and system for remotely executing commands at a client computing device. The method comprises receiving a selection of commands to transmit to a group of client computing devices via a webserver. The group of client computing devices, as well as the selected commands, are associated with a group identifier. The method validates access privileges of the administrator to transmit the selected commands to the group of client computing devices. Upon receipt of the selected commands, the webserver transmits the selected commands to at least one registered proxy server. The registered proxy server then determines one or more client identifiers associated with the group identifier. Each client identifier is assigned to a client computing device. Upon receipt of the selected commands, the registered proxy server transmits the selected commands to client computing devices in the group of client computing devices matching the determined client identifiers.Type: ApplicationFiled: March 13, 2018Publication date: September 20, 2018Inventors: Prosenjit Sinha, Sangeetha Janakiraman, Arun Prasad Amarendran, Tirthankar Chatterjee
-
Patent number: 9984006Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.Type: GrantFiled: June 23, 2017Date of Patent: May 29, 2018Assignee: Commvault Systems, Inc.Inventors: Arun Prasad Amarendran, Tirthankar Chatterjee, Yun Yuan, Yongtao Liu
-
Publication number: 20180107838Abstract: A backup or storage management system is provided that can secure data within a primary storage environment that stores data in an unsecured format. The storage management system can automatically analyze data received for backup from the primary storage environment and determine whether the data includes information that has been identified as sensitive and/or information that is determined within a threshold degree of probability to be sensitive. The storage management system can then modify the storage of the data that includes sensitive information at the primary storage environment, thereby enabling the data to be secured within the unsecured, or partially secured, primary storage environment. Advantageously, in certain embodiments, by securing data with sensitive information within an unsecured storage environment, embodiments disclosed herein can reduce the occurrences of a data breach or data leak.Type: ApplicationFiled: October 13, 2016Publication date: April 19, 2018Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Chitra RAMASWAMY, Sandeep Naidu PAMIDIPARTHI
-
Publication number: 20180032446Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.Type: ApplicationFiled: June 23, 2017Publication date: February 1, 2018Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Yun YUAN, Yongtao LIU
-
Patent number: 9727491Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.Type: GrantFiled: June 29, 2016Date of Patent: August 8, 2017Assignee: Commvault Systems, Inc.Inventors: Arun Prasad Amarendran, Tirthankar Chatterjee, Yun Yuan, Yongtao Liu
-
Patent number: 9720849Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.Type: GrantFiled: June 28, 2016Date of Patent: August 1, 2017Assignee: Commvault Systems, Inc.Inventors: Arun Prasad Amarendran, Tirthankar Chatterjee, Yun Yuan, Yongtao Liu
-
Patent number: 9639529Abstract: A complete document management system is disclosed. Accordingly, systems and methods for managing data associated with a data storage component coupled to multiple computers over a network are disclosed. Systems and methods for managing data associated with a data storage component coupled to multiple computers over a network are further disclosed. Additionally, systems and methods for accessing documents available through a network, wherein the documents are stored on one or more data storage devices coupled to the network, are disclosed.Type: GrantFiled: December 23, 2013Date of Patent: May 2, 2017Assignee: Commvault Systems, Inc.Inventors: Anand Prahlad, Srinivas Kavuri, Rajiv Kottomtharayil, Arun Prasad Amarendran, Brian Brockway, Marcus S. Muller, Andreas May
-
Publication number: 20170004142Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.Type: ApplicationFiled: July 12, 2016Publication date: January 5, 2017Inventor: Arun Prasad AMARENDRAN
-
Publication number: 20160306751Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.Type: ApplicationFiled: June 29, 2016Publication date: October 20, 2016Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Yun YUAN, Yongtao LIU
-
Publication number: 20160306984Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.Type: ApplicationFiled: June 28, 2016Publication date: October 20, 2016Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Yun YUAN, Yongtao LIU
-
Patent number: 9418149Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.Type: GrantFiled: October 9, 2014Date of Patent: August 16, 2016Assignee: COMMVAULT SYSTEMS, INC.Inventor: Arun Prasad Amarendran
-
Patent number: 9405928Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.Type: GrantFiled: September 17, 2014Date of Patent: August 2, 2016Assignee: Commvault Systems, Inc.Inventors: Arun Prasad Amarendran, Tirthankar Chatterjee, Yun Yuan, Yongtao Liu
-
Publication number: 20160078245Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.Type: ApplicationFiled: September 17, 2014Publication date: March 17, 2016Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Yun YUAN, Yongtao LIU