Patents by Inventor George Mathew
George Mathew has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12365911Abstract: This invention relates to compositions and methods for modifying Brassinosteroid Insensitive-1 (BRI1) genes in plants by introducing at least one mutation in a region of the BRI1 gene encoding the kinase domain, optionally to improve yield traits. The invention further relates to a mutated BRI1 gene, a modified BRI1 polypeptide, and plants having increased improved yield traits produced using the methods and compositions of the invention.Type: GrantFiled: August 11, 2022Date of Patent: July 22, 2025Assignee: Pairwise Plants Services, Inc.Inventors: Nicholas Bate, Lolita George Mathew, Devin O'Connor
-
Publication number: 20250231842Abstract: Cluster nodes are allowed to start transactions involving modifications to multiple entities by locking a current entity for a current modification associated with a transaction, but not locking a subsequent entity for a subsequent modification associated with the same transaction. Undo log records are generated to allow the modifications to be rolled back. When a lock being held by a first node for a first transaction involving a modification made to an entity is requested by a second node for a second transaction involving the same entity, an undo record is persisted to a log to allow the modification to be rolled back, the lock being held by the first node is revoked and provided to the second node. Upon a determination that the first node has crashed before the first transaction could be committed, the log is replayed to undo the modification made by the first node.Type: ApplicationFiled: January 11, 2024Publication date: July 17, 2025Inventors: George Mathew, Shashikanth Lakshmikantha
-
Patent number: 12362916Abstract: Techniques are described for providing data such as, for example, keys, connection identifiers, and hashes to network devices using a secure database in order to facilitate client devices remaining connected or reconnecting with network sites when the client device moves among networks and to prevent replay attacks. For example, a method may include receiving, by a network device of a first network, encrypted traffic destined for a network site via the first network from a client device. The method may also include retrieving, by the network device from a database, data related to a previously established connection via a second network of the client device to the network site. In configurations, the data is received by the database from a proxy on the client device. The method may further include based at least in part on the data, passing, by the network device, the encrypted traffic to the network site.Type: GrantFiled: September 24, 2021Date of Patent: July 15, 2025Assignee: Cisco Technology, Inc.Inventors: George Mathew Koikara, Apoorv Raj, Shibin Kandacheri Veedu
-
Patent number: 12359215Abstract: This invention relates to compositions and methods for modifying Ubiquitin Binding Peptidase (DA1) genes in plants, optionally to improve yield traits. The invention further relates to plants having increased improved yield traits produced using the methods and compositions of the invention.Type: GrantFiled: August 29, 2022Date of Patent: July 15, 2025Assignee: Pairwise Plants Services, Inc.Inventors: Lolita George Mathew, Xiaoyu Zhang
-
Publication number: 20250208954Abstract: Page keys are formed in a key-value store (KVS) storing metadata of a filesystem. Page keys identify pages of trees within which namespaces of logical partitions are held. Leaf pages include first and second full keys for each file. First full keys index inodes. Second full keys index filenames. Inode keys are formed in the KVS. Inode keys identify inodes of the files. Metadata is embedded into the page and inode keys such that each page key includes an identifier of a logical partition, an identifier of a snapshot taken of a namespace of the logical partition, and a page number to a page tree holding the namespace. Each inode key includes the logical partition identifier, the snapshot identifier, and an inode number of an inode to a file. Upon damage to the namespace, queries are conducted of the KVS and the namespace is recovered based on the query results.Type: ApplicationFiled: December 22, 2023Publication date: June 26, 2025Inventors: George Mathew, Charles Hickey, Murthy Mamidi
-
Publication number: 20250200012Abstract: One or more embodiments of the invention relates to a method of managing a file system, by using a cluster that includes an enhanced file system redirector proxy (FSRP) node and at least one namespace access node. The method may include obtaining, by the enhanced FSRP node, a request from a client, and in response to the request: performing a translation of the request to a cluster-readable format to obtain a cluster-readable request, determining a namespace access node of the cluster to service the cluster-readable request, sending the cluster-readable request to the namespace access node, obtaining confirmation of servicing of the cluster-readable request from the namespace access node, and providing a file handle to the client based on the confirmation of the servicing.Type: ApplicationFiled: December 19, 2023Publication date: June 19, 2025Inventors: Viral Kirtikumar Mehta, George Mathew, Poornima Gupte, Omkar Anand Ekbote
-
Patent number: 12328308Abstract: Techniques and architecture are described for protecting non-http and TCP/UDP applications in a zero trust network access (ZTNA)/web virtual private network (VPN) environment by establishing a secure communication channel between a native application and an application server providing an application service. More particularly, the present disclosure describes techniques and architecture that leverage the firewall wherein a thin client on a client device enables a client desktop, establishes a secure channel from a native application, e.g., the client desktop, to the firewall, and acts as a proxy.Type: GrantFiled: June 24, 2024Date of Patent: June 10, 2025Assignee: Cisco Technology, Inc.Inventors: George Mathew Koikara, Pruthvi Panyam Nataraj, Naveen Gujje, Sujith Rs, Pranav Balakumar
-
Publication number: 20250138857Abstract: A first event sent from a service belonging to a distributed data management application for one or more other services is received. The service and one or more other services are hosted across nodes of the cluster and the service is a sending service. The first event, including a first membership list listing services that are currently members of the cluster, is broadcast to each service in the cluster. A second event is received indicating that a new service belonging to the application has joined the cluster. The second event, including a second membership list listing services that are currently members of the cluster, is broadcast to each service in the cluster. The second membership list includes the new service. The sending service identifies the new service by comparing the first and second membership lists and determines whether the new service should be sent the first event.Type: ApplicationFiled: October 30, 2023Publication date: May 1, 2025Inventors: George Mathew, Shefali Gautam
-
Patent number: 12271763Abstract: Embodiments for performing load balancing in a filesystem of a distributed network comprising worker nodes accessing shared resources that are controlled by distributed locks to grant and prevent access from clients, by assigning a range of directory entries to each worker node, and providing feedback from each worker node to a load balancer to expose an internal state of acquired resources and other parameters of each worker node. In response to periodic updates of the directory ranges to be collocated, the system maintains directory ranges in each worker so that complete subtrees of the directory tree fit in a single range assigned to a worker. Upon receipt of a client request to access a data asset, the load balancer selects the most optimum worker to satisfy the request based on the worker internal states and other parameters.Type: GrantFiled: April 22, 2022Date of Patent: April 8, 2025Assignee: Dell Products L.P.Inventors: George Mathew, Mukesh K. Sharma, Murthy V. Mamidi
-
Patent number: 12248686Abstract: System creates mapping of storage intent, defined for digital asset, to primary storage tier, of primary storage tiers in primary protection storage system, that matches storage intent. System receives request to store copy of digital asset, and stores the copy with storage intent in primary storage tier, based on mapping of storage intent to primary storage tier. System identifies expanded group of storage tiers comprising primary storage tiers combined with additional storage tier. If additional storage tier matches storage intent more than primary storage tier matches storage intent, which is mapped to primary storage tier, system changes mapping of storage intent to primary storage tier into mapping of storage intent, defined for digital asset, to additional storage tier. System relocates each copy of digital asset, based on mapping of storage intent to primary storage tier, to additional storage tier, based on mapping of storage intent to additional storage tier.Type: GrantFiled: May 16, 2023Date of Patent: March 11, 2025Assignee: Dell Products L.P.Inventors: Anand Rudrabhatla, George Mathew, Jehuda Shemer
-
Mapping service level agreements for backup systems to multiple storage tiers in a clustered network
Patent number: 12229017Abstract: Embodiments are described for providing backup resources in a multi-tier network, by providing a plurality of different storage devices, each with different operating characteristics and costs for storage of data assets, and organizing the storage devices into a plurality of tiers based on respective operating characteristics, such as based on performance versus cost parameters. Certain Service Level Agreements (SLAs) dictating storage requirements for each of the data assets to a backup program are provided to the backup system, and a mapper maps each SLA to one or more tiers of the plurality of tiers based on the storage requirements of a respective SLA to the operating characteristics of each tier.Type: GrantFiled: January 27, 2023Date of Patent: February 18, 2025Assignee: Dell Products L.P.Inventors: Philip Shilane, Chegu Vinod, George Mathew, Abhinav Duggal -
Patent number: 12216547Abstract: Described is a system (and method) that maintains deduplication efficiency when storing data within a clustered data storage environment that implements a global namespace. To provide such a capability, the system may obtain granular data source identifying information from a client system that provides data to be backed-up by a backup component. The data source identifying information may take the form of a placement tag that is associated with the received data. The backup component may then provide such placement tags when providing the backup data to the clustered storage system. The placement tags may then be used to intelligently distribute backup files to particular storage nodes of the clustered storage system to improve deduplication efficiency.Type: GrantFiled: August 21, 2019Date of Patent: February 4, 2025Assignee: EMC IP Holding Company LLCInventors: Abhishek Rajimwale, George Mathew, Murthy Mamidi, Donna Barry Lewis
-
Publication number: 20250036442Abstract: A cluster event management module that is deployed in a container orchestration service of a distributed (clustered) network that has multiple running services. The CEM receives and queues events that affect membership changes and system resource (services, nodes, pods) availability, and notifies current subscribed members in so that appropriate action can be taken with respect to their own services and resources. The CEM provides notifications such that events are delivered in the order of generation, all subscribers see the same sequence of events, each event is processed in a hierarchical order across all subscribers in a way that ensures that no event is missed and reliability of event notification is maintained.Type: ApplicationFiled: July 26, 2023Publication date: January 30, 2025Inventors: Shefali Gautam, George Mathew
-
Publication number: 20250023915Abstract: Techniques and architecture are described for eliminating double encryption in zero-trust network access authenticated sessions. The techniques include an endpoint client-based proxy of a network receiving, from a browser, a request to access a protected private service. The endpoint client-based proxy pauses access of the browser to the protected private service and establishes a transport layer security (TLS) connection between the endpoint client-based proxy and a zero-trust network access (ZTNA) gateway. The ZTNA gateway determines whether the protected private service uses a secure transport mechanism and establishes either a null cipher encrypted tunnel between at least the endpoint client-based proxy and the ZTNA gateway or a non-null cipher encrypted tunnel between at least the endpoint client-based proxy and the ZTNA gateway. The endpoint client-based proxy resumes access of the browser to the protected private service.Type: ApplicationFiled: July 10, 2023Publication date: January 16, 2025Inventors: George Mathew Koikara, Pruthvi Panyam Nataraj, Naveen Gujje
-
Publication number: 20250004853Abstract: Files in a file system are assigned to front-end instances. The files are represented by segment trees. Similarity groups are assigned to back-end instances. The similarity groups include segments at a lower-level of the segment trees. The front-end instances are responsible for operations involving an upper-level of the segment trees. The back-end instances are responsible for operations involving the lower-level of the segment trees. Upon a failure of an instance, an attempt is made to restart the failed instance. If the restart is successful, file and similarity group assignments are retained. If the restart is not successful, file assignments are redistributed to other front-end instances when the failed instance is a front-end instance, and similarity group assignments are redistributed to other back-end instances when the failed instance is a back-end instance.Type: ApplicationFiled: September 14, 2024Publication date: January 2, 2025Inventors: Philip Shilane, Abhinav Duggal, George Mathew
-
Patent number: 12182289Abstract: A fencing service receives a cluster message based on a first service's removal from membership in a first node in a cluster, and generates an access key based on a generation identifier in the cluster message. The fencing service sends the access key to a shared storage, thereby enabling the shared storage to create signing keys based on the access key, and which are used to validate signed requests to access resources stored by the shared storage. A second service in a second node in the cluster receives the cluster message, and generates the access key based on the generation identifier. The second service accesses a resource previously accessed by the first service, by generating a signing key based on the access key and a request to access the resource stored by the shared storage, and then sending the request signed by the signing key to the shared storage.Type: GrantFiled: June 30, 2022Date of Patent: December 31, 2024Assignee: Dell Products L.P.Inventors: George Mathew, Abhinav Duggal, Senthil Ponnuswamy, Mahadev Karadigudda
-
Patent number: 12169635Abstract: A system creates a mapping of a storage intent, defined for a digital asset, to one of the primary storage tiers, in a primary protection storage system, which matches the storage intent. The system receives a request to store a copy of the digital asset and stores the copy with the storage intent in the primary storage tier, based on the mapping of the storage intent to the primary storage tier. Upon receiving a request to replicate the copy of the digital asset, the system creates a mapping of the storage intent to one of the secondary storage tiers, in a secondary protection storage system, which matches the storage intent. The system replicates each copy of the digital asset, which is stored in the primary storage tier, and the storage intent to the secondary storage tier, based on the mapping of the storage intent to the secondary storage tier.Type: GrantFiled: May 11, 2023Date of Patent: December 17, 2024Assignee: Dell Products L.P.Inventors: Anand Rudrabhatla, George Mathew, Jehuda Shemer
-
Patent number: 12164469Abstract: Embodiments are described for migrating data and load balancing in a multi-domain network having a clustered network partitioned into a number of separate domains. Each domain contains resources like processors and memory, as well as deduplication and compression services. A single global namespace for the network is presented by combining all of the namespaces in the domains. A multi-domain manager component with an analytics engine facilitates analytics-driven migration of data among nodes in different domains, and a load balancer component monitors environmental operating conditions of each node in the clustered network, detects nodes having operating conditions exceeding defined tolerances, and migrates data and processes from nodes exceeding the defined tolerances to other nodes not exceeding the defined tolerances.Type: GrantFiled: January 27, 2023Date of Patent: December 10, 2024Assignee: Dell Products L.P.Inventors: Philip Shilane, Chegu Vinod, George Mathew, Abhinav Duggal
-
Patent number: 12158816Abstract: A distributed and deduplicating file system that stores backup metadata to object storage is described. A node, in a cluster of nodes, receives backup data associated with a write operation to back up a data file, and identifies metadata associated with deduplicated data by deduplicating the backup data. If the access frequency associated with the metadata is greater than or equal to an access threshold, and the size of the metadata is less than or equal to a storage threshold, the cluster writes the metadata to each of the memory devices corresponding to the nodes in the cluster. If the access frequency associated with the metadata is less than the access threshold, or the size of the metadata is more than the storage threshold, the node writes information which includes the metadata to an object storage that stores data objects for the nodes in the cluster.Type: GrantFiled: September 23, 2022Date of Patent: December 3, 2024Assignee: Dell Products, L.P.Inventors: Philip Shilane, Abhinav Duggal, George Mathew, Chegu Vinod
-
Publication number: 20240385756Abstract: System creates mapping of storage intent, defined for digital asset, to primary storage tier, of primary storage tiers in primary protection storage system, that matches storage intent. System receives request to store copy of digital asset, and stores the copy with storage intent in primary storage tier, based on mapping of storage intent to primary storage tier. System identifies expanded group of storage tiers comprising primary storage tiers combined with additional storage tier. If additional storage tier matches storage intent more than primary storage tier matches storage intent, which is mapped to primary storage tier, system changes mapping of storage intent to primary storage tier into mapping of storage intent, defined for digital asset, to additional storage tier. System relocates each copy of digital asset, based on mapping of storage intent to primary storage tier, to additional storage tier, based on mapping of storage intent to additional storage tier.Type: ApplicationFiled: May 16, 2023Publication date: November 21, 2024Applicant: Dell Products L.P.Inventors: Anand Rudrabhatla, George Mathew, Jehuda Shemer