Patents by Inventor Bipin Tomar

Bipin Tomar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20230031741
    Abstract: Methods and systems for providing Quality of Service (QoS) in a cloud-based system are provided. One method includes assigning, by a micro-service, a workload identifier to a cloud volume created by a storage operating system in a cloud-based system; mapping, by the micro-service, the workload identifier to a volume identifier, the volume identifier generated by the storage operating system to identify the cloud volume; associating, by the micro-service, a policy with the cloud volume for providing QoS for the cloud volume; determining, by the micro-service, the workload identifier for the cloud volume from the volume identifier included in a request to store or retrieve data using the cloud volume; and assigning, by the micro-service, the workload identifier to a processing thread deployed by the storage operating system to process the request.
    Type: Application
    Filed: July 30, 2021
    Publication date: February 2, 2023
    Applicant: NETAPP, INC.
    Inventors: Bipin Tomar, Jawahar Tadipatri, Ranjit Baradwaj Nandagopal
  • Publication number: 20220405220
    Abstract: Systems and methods for an interconnect layer send queue reservation system are provided. In one example, a method involves performing a transfer of data (e.g., an NVLog) from a storage system to a secondary storage system. A send queue having a fixed number of slots is maintained within an interconnect layer interposed between a file system and a Remote Direct Memory Access (RDMA) layer of the storage system. The interconnect layer implements an application programming interface (API) for the reservation system. A deadlock situation is avoided by, during a suspendable phase of a write transaction, making a reservation for slots within the send queue via the reservation system for the transfer of data. When the reservation is successful, the write transaction proceeds with a modify phase, during which the reservation is consumed and the interconnect layer is caused to perform an RDMA operation to carry out the transfer of data.
    Type: Application
    Filed: October 15, 2021
    Publication date: December 22, 2022
    Inventors: Ping Zhou, Joseph Brown, JR., Peter Brown, Bipin Tomar
  • Publication number: 20220404980
    Abstract: Systems and methods are described for a cross-site high availability distributed storage system. According to one embodiment, a computer implemented method includes providing a remote direct memory access (RDMA) request for a RDMA stream, and generating, with an interconnect (IC) layer of the first storage node, multiple IC channels and associated IC requests for the RDMA request. The method further includes mapping an IC channel to a group of multiple transport layer sessions to split data traffic of the IC channel into multiple packets for the group of multiple transport layer sessions using an IC transport layer of the first storage node and assigning, with the IC transport layer, a unique transaction identification (ID) to each IC request and assigning a different data offset to each packet of a transport layer session.
    Type: Application
    Filed: March 11, 2022
    Publication date: December 22, 2022
    Inventors: Peter Brown, Houze Xu, Bipin Tomar, Joseph Brown, JR.
  • Patent number: 10210056
    Abstract: A method, non-transitory computer readable medium, and device that assists with caching filesystem metadata to a partner non-volatile random-access memory (NVRAM) includes caching metadata related to an incoming data modifying operation generated by a client computing device to at least one storage controller device in a cluster. A service interruption event that makes a data block present in the storage device of a hosting storage node inaccessible to the client computing device is determined for during the caching. The requested metadata block from the at least one NVRAM is retrieved when the service interruption event is determined. The cache is warmed using the retrieved metadata block from the at least one NVRAM.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: February 19, 2019
    Assignee: NetApp, Inc.
    Inventors: Ram Kesavan, Ananthan Subramanian, Aziz Gulbeden, Christian Compton, Jawahar Tadipatri, Bipin Tomar, Joseph Allen Brown, Jr.
  • Publication number: 20170286238
    Abstract: A method, non-transitory computer readable medium, and device that assists with caching filesystem metadata to a partner non-volatile random-access memory (NVRAM) includes caching metadata related to an incoming data modifying operation generated by a client computing device to at least one storage controller device in a cluster. A service interruption event that makes a data block present in the storage device of a hosting storage node inaccessible to the client computing device is determined for during the caching. The requested metadata block from the at least one NVRAM is retrieved when the service interruption event is determined. The cache is warmed using the retrieved metadata block from the at least one NVRAM.
    Type: Application
    Filed: March 31, 2016
    Publication date: October 5, 2017
    Inventors: Ram Kesavan, Ananthan Subramanian, Aziz Gulbeden, Christian Compton, Jawahar Tadipatri, Bipin Tomar, Joseph Allen Brown, JR.
  • Patent number: 9171161
    Abstract: A trusted device having virtualized registers provides an extensible amount of storage for hash values and other information stored within a trusted device. The trusted device includes a buffer to which registers are virtualized to and from external storage, by encrypting the register values using a private device key. The registers may be platform control registers (PCRs) or other storage of the trusted device, which may be a trusted platform module (TPM). The registers are accessed in accordance with a register number. When the externally stored values are retrieved, they are decrypted and placed in the buffer. The buffer may implement a cache mechanism, such as a most recently used algorithm, so that encryption/decryption and fetch overhead is reduced. A register shadowing technique may be employed at boot time, to ensure that the trusted device is not compromised by tampering with the externally stored virtualized registers.
    Type: Grant
    Filed: November 9, 2006
    Date of Patent: October 27, 2015
    Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATION
    Inventors: Arun P. Anbalagan, Pruthvi P. Nataraj, Bipin Tomar
  • Patent number: 8612773
    Abstract: A network based installation management system that dynamically manages secure software installation on a client. The server is configured to determine the software required and prepare an appropriated response containing the list of software and an information file containing the respective attributes of the list of software. The server encoded this response and the encoded response is transmitted to the client. The client on receiving the response is configured to authenticate the response and install the encoded response after authentication. Highly accurate and reliable software installation using the network based installation management system may be achieved using a respective hardware element on the client and the server, which is configured to encode and decode a request and/or response suitably thereby providing a high level of security and trust in an un-trusted network environment.
    Type: Grant
    Filed: May 3, 2007
    Date of Patent: December 17, 2013
    Assignee: International Business Machines Corporation
    Inventors: Pruthvi Panyam Nataraj, Bipin Tomar, Arun Prasath Anbalagan, Eduardo Lazaro Reyes
  • Publication number: 20080276301
    Abstract: A network based installation management system that dynamically manages secure software installation on a client. The server is configured to determine the software required and prepare an appropriated response containing the list of software and an information file containing the respective attributes of the list of software. The server encoded this response and the encoded response is transmitted to the client. The client on receiving the response is configured to authenticate the response and install the encoded response after authentication. Highly accurate and reliable software installation using the network based installation management system may be achieved using a respective hardware element on the client and the server, which is configured to encode and decode a request and/or response suitably thereby providing a high level of security and trust in an un-trusted network environment.
    Type: Application
    Filed: May 3, 2007
    Publication date: November 6, 2008
    Inventors: Pruthvi Panyam Nataraj, Bipin Tomar, Arun Prasath Anbalagan, Eduardo Lazaro Reyes
  • Publication number: 20080114989
    Abstract: A trusted device having virtualized registers provides an extensible amount of storage for hash values and other information stored within a trusted device. The trusted device includes a buffer to which registers are virtualized to and from external storage, by encrypting the register values using a private device key. The registers may be platform control registers (PCRs) or other storage of the trusted device, which may be a trusted platform module (TPM). The registers are accessed in accordance with a register number. When the externally stored values are retrieved, they are decrypted and placed in the buffer. The buffer may implement a cache mechanism, such as a most recently used algorithm, so that encryption/decryption and fetch overhead is reduced. A register shadowing technique may be employed at boot time, to ensure that the trusted device is not compromised by tampering with the externally stored virtualized registers.
    Type: Application
    Filed: November 9, 2006
    Publication date: May 15, 2008
    Inventors: Arun P. Anbalagan, Pruthvi P. Nataraj, Bipin Tomar