Patents by Inventor Deepika Dixit

Deepika Dixit has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11934277
    Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster distribution. In some embodiments, a server on a primary computing cluster receives an update to an object stored on the primary computing cluster and to be implemented by a secondary computing cluster. Furthermore, the server receives a request to distribute the object to the secondary computing cluster. The server further retrieves the object based on an object identifier or an identifier of the secondary computing cluster. Moreover, the server identifies the secondary computing cluster based on the object identifier or the identifier of the secondary computing cluster. The server then distributes the object to the secondary computing cluster via a persistent connection.
    Type: Grant
    Filed: October 13, 2021
    Date of Patent: March 19, 2024
    Assignee: Kasten, Inc.
    Inventors: Thomas Manville, Vaibhav Kamra, Deepika Dixit, Mark Severson, Onkar Bhat, Alex Vorbau
  • Patent number: 11886301
    Abstract: Disclosed herein are system, method, and computer program product embodiments for encryption key management. An embodiment operates by executing an initial non-backup instance of an application and generates a primary key using a cryptographic algorithm. The embodiment requests a customer to create a passphrase configured to encrypt and decrypt the primary key. The embodiment generates a derived key using a cryptographic algorithm and the customer passphrase as input. The embodiment then encrypts the primary key using the generated derived key and stores the encrypted primary key in a catalog.
    Type: Grant
    Filed: March 12, 2021
    Date of Patent: January 30, 2024
    Assignee: KASTEN, INC.
    Inventors: Deepika Dixit, Julio Lopez, Thomas Manville, Vaibhav Kamra
  • Publication number: 20230114129
    Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster boot-strapping. In some embodiments, a server residing on a primary computing cluster receives a first request to establish a temporary connection between the primary computing cluster and a secondary computing cluster. The server establishes the temporary connection between the primary computing cluster and the secondary computing cluster using the first set of credentials. Furthermore, the server receives a second request to establish a persistent connection between the primary computing cluster and the secondary computing cluster. The server establishes the persistent connection by transmitting a third request comprising the configuration settings to the secondary computing cluster thereby causing the secondary computing cluster to generate a second set of credentials corresponding to the primary computing cluster. The server receives and stores the second set of credentials.
    Type: Application
    Filed: October 8, 2021
    Publication date: April 13, 2023
    Applicant: Kasten, Inc.
    Inventors: Thomas MANVILLE, Deepika DIXIT, Mark SEVERSON, Onkar BHAT, Alex VORBAU
  • Publication number: 20230110527
    Abstract: Disclosed herein are system, method, and computer program product embodiments for role-based access control in multi-tenancy environments using cloud-native objects. An embodiment operates by executing an application in a cluster. The embodiment creates roles corresponding to a user or group of users. The embodiment defines a set of permissions for the roles. The embodiment binds the roles to native objects in a cloud orchestrator based on the set of permissions for the roles. The embodiment receives a first request from a user to log in. The embodiment transmits a request to authenticate the user. The embodiment receives a list of a set of permissions for the user. The embodiment causes a display of system assets on a user interface of a client device based on the list of the set of permissions for the user.
    Type: Application
    Filed: October 8, 2021
    Publication date: April 13, 2023
    Applicant: Kasten, Inc.
    Inventors: Onkar BHAT, Deepika DIXIT, Vaibhav KAMRA, Thomas MANVILLE
  • Publication number: 20230115993
    Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster distribution. In some embodiments, a server on a primary computing cluster receives an update to an object stored on the primary computing cluster and to be implemented by a secondary computing cluster. Furthermore, the server receives a request to distribute the object to the secondary computing cluster. The server further retrieves the object based on an object identifier or an identifier of the secondary computing cluster. Moreover, the server identifies the secondary computing cluster based on the object identifier or the identifier of the secondary computing cluster. The server then distributes the object to the secondary computing cluster via a persistent connection.
    Type: Application
    Filed: October 13, 2021
    Publication date: April 13, 2023
    Applicant: Kasten, Inc.
    Inventors: Thomas MANVILLE, Vaibhav KAMRA, Deepika DIXIT, Mark SEVERSON, Onkar BHAT, Alex VORBAU
  • Publication number: 20230113510
    Abstract: Disclosed herein are system, method, and computer program product embodiments for multi-cluster access. In some embodiments, the server receives a first request to bind one or more cluster roles associated with a user to each of one or more secondary computing clusters. The server binds the user's credentials with the one or more cluster roles corresponding to each of one or more secondary computing clusters. Furthermore, the server receives a second request for providing the user access to the primary computing cluster. Moreover, the server receives a third request from the user interface intended for at least one secondary computing cluster. The server forwards the third request to the at least one secondary computing cluster while impersonating at least one cluster role of the one or more cluster roles corresponding to the at least one secondary computing cluster.
    Type: Application
    Filed: October 8, 2021
    Publication date: April 13, 2023
    Applicant: Kasten, Inc.
    Inventors: Thomas MANVILLE, Vaibhav KAMRA, Deepika DIXIT, Onkar BHAT, Alex VORBAU
  • Publication number: 20220291999
    Abstract: Disclosed herein are system, method, and computer program product embodiments for encryption key management. An embodiment operates by executing an initial non-backup instance of an application and generates a primary key using a cryptographic algorithm. The embodiment requests a customer to create a passphrase configured to encrypt and decrypt the primary key. The embodiment generates a derived key using a cryptographic algorithm and the customer passphrase as input. The embodiment then encrypts the primary key using the generated derived key and stores the encrypted primary key in a catalog.
    Type: Application
    Filed: March 12, 2021
    Publication date: September 15, 2022
    Applicant: Veeam Software AG
    Inventors: Deepika DIXIT, Julio Lopez, Thomas Manville, Vaibhav Kamra
  • Publication number: 20220118131
    Abstract: The present invention discloses the device for a urinary catheter employing electromagnetic radiation and/or vibration transducer. The device comprises a clip-on (4) including a source of electromagnetic radiation (5) and/or a vibration transducer and a coupler (3) that allows electromagnetic radiation access from clip-on to the inside of the coupler. The combination of electromagnetic radiation and photo catalyst material may increase effectiveness for antimicrobial activity. The device aims at preventing the catheter-associated urinary tract infection caused by both intraluminal and extraluminal routes.
    Type: Application
    Filed: December 3, 2019
    Publication date: April 21, 2022
    Inventors: Nirmal KUMAR, Aniket Anand KULKARNI, Deepika DIXIT, Yasuyuki MATSUURA, Prashant JHA, Harpal SINGH, Hitender GAUTAM
  • Publication number: 20220031237
    Abstract: The invention provides systems, methods and computer program products for monitoring vascular perfusion in replanted tissue flaps. Specifically, the invention provides a non-invasive solution for monitoring of vascular perfusion at a site of tissue replantation, and that is capable of detecting problems in vascular perfusion and raising alarms in real times. The invention achieves the above function objectives by means of non-invasive sensors that continuously monitor selected parameters related to tissue condition. The monitored data parameters are used to determine a real time condition of replanted tissue.
    Type: Application
    Filed: December 2, 2019
    Publication date: February 3, 2022
    Inventors: Nirmal Kumar, Aniket Anand Kulkarni, Deepika Dixit, Yasuyuki Matsuura, Prashant Jha, Ashish Bichpuriya
  • Patent number: 10872099
    Abstract: An embodiment of a system for automatic data protection for virtual machines includes a processor configured to use storage attributes associated with a virtual machine to determine, for the virtual machine, a data protection priority. The processor is further configured to determine a recommendation of a data protection operation to be taken with respect to the virtual machine based at least in part on the determined data protection priority. The system further includes a memory coupled to the processor and configured to store the determined data protection priority.
    Type: Grant
    Filed: January 22, 2018
    Date of Patent: December 22, 2020
    Assignee: Tintri by DDN, Inc.
    Inventors: Geeta Gharpure, Alexandre Nichet, Deepika Dixit