Patents by Inventor Deepika Dixit
Deepika Dixit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11934277Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster distribution. In some embodiments, a server on a primary computing cluster receives an update to an object stored on the primary computing cluster and to be implemented by a secondary computing cluster. Furthermore, the server receives a request to distribute the object to the secondary computing cluster. The server further retrieves the object based on an object identifier or an identifier of the secondary computing cluster. Moreover, the server identifies the secondary computing cluster based on the object identifier or the identifier of the secondary computing cluster. The server then distributes the object to the secondary computing cluster via a persistent connection.Type: GrantFiled: October 13, 2021Date of Patent: March 19, 2024Assignee: Kasten, Inc.Inventors: Thomas Manville, Vaibhav Kamra, Deepika Dixit, Mark Severson, Onkar Bhat, Alex Vorbau
-
Patent number: 11886301Abstract: Disclosed herein are system, method, and computer program product embodiments for encryption key management. An embodiment operates by executing an initial non-backup instance of an application and generates a primary key using a cryptographic algorithm. The embodiment requests a customer to create a passphrase configured to encrypt and decrypt the primary key. The embodiment generates a derived key using a cryptographic algorithm and the customer passphrase as input. The embodiment then encrypts the primary key using the generated derived key and stores the encrypted primary key in a catalog.Type: GrantFiled: March 12, 2021Date of Patent: January 30, 2024Assignee: KASTEN, INC.Inventors: Deepika Dixit, Julio Lopez, Thomas Manville, Vaibhav Kamra
-
Publication number: 20230114129Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster boot-strapping. In some embodiments, a server residing on a primary computing cluster receives a first request to establish a temporary connection between the primary computing cluster and a secondary computing cluster. The server establishes the temporary connection between the primary computing cluster and the secondary computing cluster using the first set of credentials. Furthermore, the server receives a second request to establish a persistent connection between the primary computing cluster and the secondary computing cluster. The server establishes the persistent connection by transmitting a third request comprising the configuration settings to the secondary computing cluster thereby causing the secondary computing cluster to generate a second set of credentials corresponding to the primary computing cluster. The server receives and stores the second set of credentials.Type: ApplicationFiled: October 8, 2021Publication date: April 13, 2023Applicant: Kasten, Inc.Inventors: Thomas MANVILLE, Deepika DIXIT, Mark SEVERSON, Onkar BHAT, Alex VORBAU
-
Publication number: 20230110527Abstract: Disclosed herein are system, method, and computer program product embodiments for role-based access control in multi-tenancy environments using cloud-native objects. An embodiment operates by executing an application in a cluster. The embodiment creates roles corresponding to a user or group of users. The embodiment defines a set of permissions for the roles. The embodiment binds the roles to native objects in a cloud orchestrator based on the set of permissions for the roles. The embodiment receives a first request from a user to log in. The embodiment transmits a request to authenticate the user. The embodiment receives a list of a set of permissions for the user. The embodiment causes a display of system assets on a user interface of a client device based on the list of the set of permissions for the user.Type: ApplicationFiled: October 8, 2021Publication date: April 13, 2023Applicant: Kasten, Inc.Inventors: Onkar BHAT, Deepika DIXIT, Vaibhav KAMRA, Thomas MANVILLE
-
Publication number: 20230115993Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster distribution. In some embodiments, a server on a primary computing cluster receives an update to an object stored on the primary computing cluster and to be implemented by a secondary computing cluster. Furthermore, the server receives a request to distribute the object to the secondary computing cluster. The server further retrieves the object based on an object identifier or an identifier of the secondary computing cluster. Moreover, the server identifies the secondary computing cluster based on the object identifier or the identifier of the secondary computing cluster. The server then distributes the object to the secondary computing cluster via a persistent connection.Type: ApplicationFiled: October 13, 2021Publication date: April 13, 2023Applicant: Kasten, Inc.Inventors: Thomas MANVILLE, Vaibhav KAMRA, Deepika DIXIT, Mark SEVERSON, Onkar BHAT, Alex VORBAU
-
Publication number: 20230113510Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster access. In some embodiments, the server receives a first request to bind one or more cluster roles associated with a user to each of one or more secondary computing clusters. The server binds the user's credentials with the one or more cluster roles corresponding to each of one or more secondary computing clusters. Furthermore, the server receives a second request for providing the user access to the primary computing cluster. Moreover, the server receives a third request from the user interface intended for at least one secondary computing cluster. The server forwards the third request to the at least one secondary computing cluster while impersonating at least one cluster role of the one or more cluster roles corresponding to the at least one secondary computing cluster.Type: ApplicationFiled: October 8, 2021Publication date: April 13, 2023Applicant: Kasten, Inc.Inventors: Thomas MANVILLE, Vaibhav KAMRA, Deepika DIXIT, Onkar BHAT, Alex VORBAU
-
Publication number: 20220291999Abstract: Disclosed herein are system, method, and computer program product embodiments for encryption key management. An embodiment operates by executing an initial non-backup instance of an application and generates a primary key using a cryptographic algorithm. The embodiment requests a customer to create a passphrase configured to encrypt and decrypt the primary key. The embodiment generates a derived key using a cryptographic algorithm and the customer passphrase as input. The embodiment then encrypts the primary key using the generated derived key and stores the encrypted primary key in a catalog.Type: ApplicationFiled: March 12, 2021Publication date: September 15, 2022Applicant: Veeam Software AGInventors: Deepika DIXIT, Julio Lopez, Thomas Manville, Vaibhav Kamra
-
Publication number: 20220118131Abstract: The present invention discloses the device for a urinary catheter employing electromagnetic radiation and/or vibration transducer. The device comprises a clip-on (4) including a source of electromagnetic radiation (5) and/or a vibration transducer and a coupler (3) that allows electromagnetic radiation access from clip-on to the inside of the coupler. The combination of electromagnetic radiation and photo catalyst material may increase effectiveness for antimicrobial activity. The device aims at preventing the catheter-associated urinary tract infection caused by both intraluminal and extraluminal routes.Type: ApplicationFiled: December 3, 2019Publication date: April 21, 2022Inventors: Nirmal KUMAR, Aniket Anand KULKARNI, Deepika DIXIT, Yasuyuki MATSUURA, Prashant JHA, Harpal SINGH, Hitender GAUTAM
-
Publication number: 20220031237Abstract: The invention provides systems, methods and computer program products for monitoring vascular perfusion in replanted tissue flaps. Specifically, the invention provides a non-invasive solution for monitoring of vascular perfusion at a site of tissue replantation, and that is capable of detecting problems in vascular perfusion and raising alarms in real times. The invention achieves the above function objectives by means of non-invasive sensors that continuously monitor selected parameters related to tissue condition. The monitored data parameters are used to determine a real time condition of replanted tissue.Type: ApplicationFiled: December 2, 2019Publication date: February 3, 2022Inventors: Nirmal Kumar, Aniket Anand Kulkarni, Deepika Dixit, Yasuyuki Matsuura, Prashant Jha, Ashish Bichpuriya
-
Patent number: 10872099Abstract: An embodiment of a system for automatic data protection for virtual machines includes a processor configured to use storage attributes associated with a virtual machine to determine, for the virtual machine, a data protection priority. The processor is further configured to determine a recommendation of a data protection operation to be taken with respect to the virtual machine based at least in part on the determined data protection priority. The system further includes a memory coupled to the processor and configured to store the determined data protection priority.Type: GrantFiled: January 22, 2018Date of Patent: December 22, 2020Assignee: Tintri by DDN, Inc.Inventors: Geeta Gharpure, Alexandre Nichet, Deepika Dixit