Patents by Inventor Deepak Raghunath Attarde

Deepak Raghunath Attarde has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10264074
    Abstract: A method and system for providing information management of data from hosted services receives information management policies for a hosted account of a hosted service, requests data associated with the hosted account from the hosted service, receives data associated with the hosted account from the hosted service, and provides a preview version of the received data to a computing device. In some examples, the system indexes the received data to associate the received data with a user of an information management system, and/or provides index information related to the received data to the computing device.
    Type: Grant
    Filed: August 31, 2018
    Date of Patent: April 16, 2019
    Assignee: Commvault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Ho-Chi Chen, Deepak Raghunath Attarde, Hetalkumar N. Joshi
  • Publication number: 20190108341
    Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.
    Type: Application
    Filed: September 12, 2018
    Publication date: April 11, 2019
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20190109870
    Abstract: This application relates to ransomware detection and intelligent restore. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. When a potential ransomware attack is detected, a timestamp is recorded. If the client machine is indeed taken over by the ransomware attack, an intelligent restore operation can be performed such that the file system is automatically restored to a point in time prior to the infection by the ransomware attack using the recorded timestamp.
    Type: Application
    Filed: September 12, 2018
    Publication date: April 11, 2019
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20190108340
    Abstract: This application relates to ransomware detection. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine monitors the I/O activity in a file system. The software module records the number of times the files in the file system are modified, created, deleted, and renamed. The recorded number is compared against a threshold. If the number exceeds the threshold, the software module provides an alert to the user of the client machine that the client machine may be under a ransomware attack. In some embodiments, index data gathered as part of backup operations is utilized, either alone or in combination with the continuously monitored I/O activity data, to detect ransomware attacks.
    Type: Application
    Filed: September 12, 2018
    Publication date: April 11, 2019
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Patent number: 10255143
    Abstract: Systems and methods are provided herein for automatically configuring newly installed secondary storage computing devices and managing secondary storage computing devices when one or more become unavailable. For example, a storage manager can then detect the computing resources available to the newly installed secondary storage computing device, assign a role to the newly installed secondary storage computing device based on the detected computing resources, configure the newly installed secondary storage computing device with deduplication and storage policies used by the other secondary storage computing devices, re-partition secondary storage devices to allocate memory for the newly installed secondary storage computing device, and instruct other secondary storage computing devices to replicate their managed data such that the newly installed secondary storage computing device has access to the replicated data.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: April 9, 2019
    Assignee: Commvault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Jaidev Oppath Kochunni, Deepak Raghunath Attarde, Ramachandra Reddy Ankireddypalle
  • Publication number: 20190065490
    Abstract: Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files.
    Type: Application
    Filed: September 4, 2018
    Publication date: February 28, 2019
    Inventors: Paramasivam KUMARASAMY, Prakash VARADHARAJAN, Deepak Raghunath ATTARDE, Pavan Kumar Reddy BEDADALA, Satish Chandra KILARU
  • Patent number: 10191816
    Abstract: A storage system according to certain embodiments includes a client-side repository (CSR). The CSR may communicate with a client at a higher data transfer rate than the rate used for communication between the client and secondary storage. During copy operations, for instance, some or all of the data being backed up or otherwise copied to secondary storage is stored in the CSR. During restore operations, copies of the data stored in the CSR is accessed from the CSR instead of from secondary storage, improving performance. Remaining data blocks not stored in the CSR can be restored from secondary storage.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: January 29, 2019
    Assignee: Commvault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Deepak Raghunath Attarde, Hetalkumar N. Joshi
  • Publication number: 20190026305
    Abstract: A distributed, deduplicated storage system according to certain embodiments is arranged in a parallel configuration including multiple deduplication nodes. Deduplicated data is distributed across the deduplication nodes. The deduplication nodes can be networked together and communicate with one another according using a light-weight, customized communication scheme (e.g., a scheme based on FTP or HTTP). In some cases, deduplication management information including deduplication signatures and/or other metadata is stored separately from the deduplicated data in deduplication management nodes, improving performance and scalability.
    Type: Application
    Filed: January 19, 2018
    Publication date: January 24, 2019
    Inventors: Manoj Kumar VIJAYAN, Rajiv KOTTOMTHARAYIL, Deepak Raghunath ATTARDE
  • Publication number: 20190012328
    Abstract: An information management system can manage the removal of data block entries in a deduplicated data store using working copies of the data block entries residing in a local data store of a secondary storage computing device. The system can use the working copies to identify data blocks for removal. Once the deduplication database is updated with the changes to the working copies (e.g., using a transaction based update scheme), the system can query the deduplication database for the database entries identified for removal. Once identified, the system can remove the database entries identified for pruning and/or the corresponding deduplication data blocks from secondary storage.
    Type: Application
    Filed: June 27, 2018
    Publication date: January 10, 2019
    Inventors: Deepak Raghunath ATTARDE, Manoj Kumar VIJAYAN
  • Publication number: 20180375938
    Abstract: A method and system for providing information management of data from hosted services receives information management policies for a hosted account of a hosted service, requests data associated with the hosted account from the hosted service, receives data associated with the hosted account from the hosted service, and provides a preview version of the received data to a computing device. In some examples, the system indexes the received data to associate the received data with a user of an information management system, and/or provides index information related to the received data to the computing device.
    Type: Application
    Filed: August 31, 2018
    Publication date: December 27, 2018
    Inventors: Manoj Kumar Vijayan, Ho-Chi Chen, Deepak Raghunath Attarde, Hetalkumar N. Joshi
  • Publication number: 20180364914
    Abstract: A method and system for reducing storage requirements and speeding up storage operations by reducing the storage of redundant data includes receiving a request that identifies one or more data objects to which to apply a storage operation. For each data object, the storage system determines if the data object contains data that matches another data object to which the storage operation was previously applied. If the data objects do not match, then the storage system performs the storage operation in a usual manner. However, if the data objects do match, then the storage system may avoid performing the storage operation.
    Type: Application
    Filed: August 27, 2018
    Publication date: December 20, 2018
    Inventors: Anand Prahlad, Parag Gokhale, Rajiv Kottomtharayil, Manoj Kumar Vijayan, Deepak Raghunath Attarde
  • Publication number: 20180357132
    Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.
    Type: Application
    Filed: June 14, 2018
    Publication date: December 13, 2018
    Inventors: Chandrashekar Maranna, Manoj Kumar Vijayan, Abhishek Narulkar, Deepak Raghunath Attarde, Saurabh Agrawal
  • Publication number: 20180337995
    Abstract: According to various embodiments, systems and methods are provided that relate to shared access to Storage Area Networks (SAN) devices. In one embodiment, a Storage Area Network (SAN) host is provided, comprising: a server component: a first host bus adapter configured to be connected to a SAN client over a first SAN; a second host bus adapter configured to be connected to a SAN storage device over a second SAN; and wherein the server component is configured to manage a data block on the SAN storage device, receive a storage operation request from the SAN client through the first host bus adapter, and in response to the storage operation request, perform a storage operation on the data block, the storage operation being performed over the second SAN through the second host bus adapter.
    Type: Application
    Filed: April 12, 2018
    Publication date: November 22, 2018
    Inventors: Manoj Kumar VIJAYAN, Srikant VISWANATHAN, Deepak Raghunath ATTARDE, Varghese DEVASSY, Rajiv KOTTOMTHARAYIL
  • Publication number: 20180329635
    Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.
    Type: Application
    Filed: May 11, 2018
    Publication date: November 15, 2018
    Inventors: Manoj Kumar VIJAYAN, Saurabh AGRAWAL, Deepak Raghunath ATTARDE
  • Patent number: 10126973
    Abstract: A system according to certain embodiments associates a signature value corresponding to a data block with one or more data blocks and a reference to the data block to form a signature/data word corresponding to the data block. The system further logically organizes the signature/data words into a plurality of files each comprising at least one signature/data word such that the signature values are embedded in the respective file. The system according to certain embodiments reads a previously stored signature value corresponding to a respective data block for sending from a backup storage system having at least one memory device to a secondary storage system.
    Type: Grant
    Filed: March 29, 2017
    Date of Patent: November 13, 2018
    Assignee: Commvault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Deepak Raghunath Attarde
  • Patent number: 10108621
    Abstract: Techniques for enabling user search of content stored in a file archive include providing a search interface comprising a search rules portion and an action rules portion, receiving a file archive search criterion comprising at least one search rule, and searching the file archive using the search criterion. The techniques also include generating a set of files filtered using the search criterion and performing an action specified in the action rules portion on a file included in the set of files.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: October 23, 2018
    Assignee: Commvault Systems, Inc.
    Inventors: Paramasivam Kumarasamy, Prakash Varadharajan, Deepak Raghunath Attarde, Pavan Kumar Reddy Bedadala, Satish Chandra Kilaru
  • Patent number: 10075527
    Abstract: A method and system for providing information management of data from hosted services receives information management policies for a hosted account of a hosted service, requests data associated with the hosted account from the hosted service, receives data associated with the hosted account from the hosted service, and provides a preview version of the received data to a computing device. In some examples, the system indexes the received data to associate the received data with a user of an information management system, and/or provides index information related to the received data to the computing device.
    Type: Grant
    Filed: January 6, 2017
    Date of Patent: September 11, 2018
    Assignee: CommVault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Ho-Chi Chen, Deepak Raghunath Attarde, Hetalkumar N. Joshi
  • Patent number: 10061535
    Abstract: A method and system for reducing storage requirements and speeding up storage operations by reducing the storage of redundant data includes receiving a request that identifies one or more data objects to which to apply a storage operation. For each data object, the storage system determines if the data object contains data that matches another data object to which the storage operation was previously applied. If the data objects do not match, then the storage system performs the storage operation in a usual manner. However, if the data objects do match, then the storage system may avoid performing the storage operation.
    Type: Grant
    Filed: January 11, 2016
    Date of Patent: August 28, 2018
    Assignee: Commvault Systems, Inc.
    Inventors: Anand Prahlad, Parag Gokhale, Rajiv Kottomtharayil, Manoj Kumar Vijayan, Deepak Raghunath Attarde
  • Patent number: 10061663
    Abstract: Systems and methods are provided herein for automatically configuring newly installed secondary storage computing devices and managing secondary storage computing devices when one or more become unavailable. For example, a storage manager can then detect the computing resources available to the newly installed secondary storage computing device, assign a role to the newly installed secondary storage computing device based on the detected computing resources, configure the newly installed secondary storage computing device with deduplication and storage policies used by the other secondary storage computing devices, re-partition secondary storage devices to allocate memory for the newly installed secondary storage computing device, and instruct other secondary storage computing devices to replicate their managed data such that the newly installed secondary storage computing device has access to the replicated data.
    Type: Grant
    Filed: October 20, 2016
    Date of Patent: August 28, 2018
    Assignee: Commvault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Jaidev Oppath Kochunni, Deepak Raghunath Attarde, Ramachandra Reddy Ankireddypalle
  • Patent number: 10025672
    Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: July 17, 2018
    Assignee: COMMVAULT SYSTEMS, INC.
    Inventors: Chandrashekar Maranna, Manoj Kumar Vijayan, Abhishek Narulkar, Deepak Raghunath Attarde, Saurabh Agrawal