Patents by Inventor Arun Prasad Amarendran

Arun Prasad Amarendran has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190278744
    Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.
    Type: Application
    Filed: May 28, 2019
    Publication date: September 12, 2019
    Inventor: Arun Prasad Amarendran
  • Publication number: 20190278748
    Abstract: A system for providing user access to electronic mail includes an email client and an email server. The email client receives and communicates a user interaction with an email message. The email server that receives the communication, determines whether the email message stored in a live database or in a backup storage. Upon determination that the email message is stored in a backup storage, the email server performs a message exchange with a backup storage system to perform the user-requested action.
    Type: Application
    Filed: May 29, 2019
    Publication date: September 12, 2019
    Inventors: Arun Prasad Amarendran, Jun H. Ahn, Tirthankar Chatterjee, Manas Bhikchand Mutha, Ho-Chi Chen, Prosenjit Sinha, Yongtao Liu
  • Patent number: 10372672
    Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.
    Type: Grant
    Filed: July 12, 2016
    Date of Patent: August 6, 2019
    Assignee: Commvault Systems, Inc.
    Inventor: Arun Prasad Amarendran
  • Patent number: 10324897
    Abstract: A system for providing user access to electronic mail includes an email client and an email server. The email client receives and communicates a user interaction with an email message The email server that receives the communication, determines whether the email message stored in a live database or in a backup storage. Upon determination that the email message is stored in a backup storage, the email server performs a message exchange with a backup storage system to perform the user-requested action.
    Type: Grant
    Filed: January 27, 2015
    Date of Patent: June 18, 2019
    Assignee: Commvault Systems, Inc.
    Inventors: Arun Prasad Amarendran, Jun H. Ahn, Tirthankar Chatterjee, Manas Bhikchand Mutha, Ho-chi Chen, Prosenjit Sinha, Yongtao Liu
  • Publication number: 20190108340
    Abstract: This application relates to ransomware detection. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine monitors the I/O activity in a file system. The software module records the number of times the files in the file system are modified, created, deleted, and renamed. The recorded number is compared against a threshold. If the number exceeds the threshold, the software module provides an alert to the user of the client machine that the client machine may be under a ransomware attack. In some embodiments, index data gathered as part of backup operations is utilized, either alone or in combination with the continuously monitored I/O activity data, to detect ransomware attacks.
    Type: Application
    Filed: September 12, 2018
    Publication date: April 11, 2019
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20190108341
    Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.
    Type: Application
    Filed: September 12, 2018
    Publication date: April 11, 2019
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20190109870
    Abstract: This application relates to ransomware detection and intelligent restore. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. When a potential ransomware attack is detected, a timestamp is recorded. If the client machine is indeed taken over by the ransomware attack, an intelligent restore operation can be performed such that the file system is automatically restored to a point in time prior to the infection by the ransomware attack using the recorded timestamp.
    Type: Application
    Filed: September 12, 2018
    Publication date: April 11, 2019
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20180270290
    Abstract: A method and system for remotely executing commands at a client computing device. The method comprises receiving a selection of commands to transmit to a group of client computing devices via a webserver. The group of client computing devices, as well as the selected commands, are associated with a group identifier. The method validates access privileges of the administrator to transmit the selected commands to the group of client computing devices. Upon receipt of the selected commands, the webserver transmits the selected commands to at least one registered proxy server. The registered proxy server then determines one or more client identifiers associated with the group identifier. Each client identifier is assigned to a client computing device. Upon receipt of the selected commands, the registered proxy server transmits the selected commands to client computing devices in the group of client computing devices matching the determined client identifiers.
    Type: Application
    Filed: March 13, 2018
    Publication date: September 20, 2018
    Inventors: Prosenjit Sinha, Sangeetha Janakiraman, Arun Prasad Amarendran, Tirthankar Chatterjee
  • Patent number: 9984006
    Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.
    Type: Grant
    Filed: June 23, 2017
    Date of Patent: May 29, 2018
    Assignee: Commvault Systems, Inc.
    Inventors: Arun Prasad Amarendran, Tirthankar Chatterjee, Yun Yuan, Yongtao Liu
  • Publication number: 20180107838
    Abstract: A backup or storage management system is provided that can secure data within a primary storage environment that stores data in an unsecured format. The storage management system can automatically analyze data received for backup from the primary storage environment and determine whether the data includes information that has been identified as sensitive and/or information that is determined within a threshold degree of probability to be sensitive. The storage management system can then modify the storage of the data that includes sensitive information at the primary storage environment, thereby enabling the data to be secured within the unsecured, or partially secured, primary storage environment. Advantageously, in certain embodiments, by securing data with sensitive information within an unsecured storage environment, embodiments disclosed herein can reduce the occurrences of a data breach or data leak.
    Type: Application
    Filed: October 13, 2016
    Publication date: April 19, 2018
    Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Chitra RAMASWAMY, Sandeep Naidu PAMIDIPARTHI
  • Publication number: 20180032446
    Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.
    Type: Application
    Filed: June 23, 2017
    Publication date: February 1, 2018
    Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Yun YUAN, Yongtao LIU
  • Patent number: 9727491
    Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: August 8, 2017
    Assignee: Commvault Systems, Inc.
    Inventors: Arun Prasad Amarendran, Tirthankar Chatterjee, Yun Yuan, Yongtao Liu
  • Patent number: 9720849
    Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.
    Type: Grant
    Filed: June 28, 2016
    Date of Patent: August 1, 2017
    Assignee: Commvault Systems, Inc.
    Inventors: Arun Prasad Amarendran, Tirthankar Chatterjee, Yun Yuan, Yongtao Liu
  • Patent number: 9639529
    Abstract: A complete document management system is disclosed. Accordingly, systems and methods for managing data associated with a data storage component coupled to multiple computers over a network are disclosed. Systems and methods for managing data associated with a data storage component coupled to multiple computers over a network are further disclosed. Additionally, systems and methods for accessing documents available through a network, wherein the documents are stored on one or more data storage devices coupled to the network, are disclosed.
    Type: Grant
    Filed: December 23, 2013
    Date of Patent: May 2, 2017
    Assignee: Commvault Systems, Inc.
    Inventors: Anand Prahlad, Srinivas Kavuri, Rajiv Kottomtharayil, Arun Prasad Amarendran, Brian Brockway, Marcus S. Muller, Andreas May
  • Publication number: 20170004142
    Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.
    Type: Application
    Filed: July 12, 2016
    Publication date: January 5, 2017
    Inventor: Arun Prasad AMARENDRAN
  • Publication number: 20160306751
    Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.
    Type: Application
    Filed: June 29, 2016
    Publication date: October 20, 2016
    Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Yun YUAN, Yongtao LIU
  • Publication number: 20160306984
    Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.
    Type: Application
    Filed: June 28, 2016
    Publication date: October 20, 2016
    Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Yun YUAN, Yongtao LIU
  • Patent number: 9418149
    Abstract: A method of summarizing data files includes implementing, at a server, a storage event for a data file, analyzing the data file and creating a summary of the data file, and storing the summary linked to the data file.
    Type: Grant
    Filed: October 9, 2014
    Date of Patent: August 16, 2016
    Assignee: COMMVAULT SYSTEMS, INC.
    Inventor: Arun Prasad Amarendran
  • Patent number: 9405928
    Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.
    Type: Grant
    Filed: September 17, 2014
    Date of Patent: August 2, 2016
    Assignee: Commvault Systems, Inc.
    Inventors: Arun Prasad Amarendran, Tirthankar Chatterjee, Yun Yuan, Yongtao Liu
  • Publication number: 20160078245
    Abstract: Data storage systems are disclosed for automatically generating encryption rules based on a set of training files that are known to include sensitive information. The system may use a number of heuristic algorithms to generate one or more encryption rules for determining whether a file includes sensitive information. Further, the system may apply the heuristic algorithms to the content of the files, as determined by using natural language processing algorithms, to generate the encryption rules. Moreover, systems are disclosed that are capable of automatically determining whether to encrypt a file based on the generated encryption rules. The content of the file may be determined using natural language processing algorithms and then the encryption rules may be applied to the content of the file to determine whether to encrypt the file.
    Type: Application
    Filed: September 17, 2014
    Publication date: March 17, 2016
    Inventors: Arun Prasad AMARENDRAN, Tirthankar CHATTERJEE, Yun YUAN, Yongtao LIU