Patents by Inventor Gosukonda Naga Venkata Satya Sudhakar
Gosukonda Naga Venkata Satya Sudhakar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 8447733Abstract: Techniques are presented for versioning file systems. Files and directories are versioned in a manner that permits the versions to be mounted on a device of a user. The original security restrictions that existed with the versions when they were versioned are retained with the mount. Moreover, the user can browse and access the versions via the mount using an existing file system of the user's device. Further, names for each of the versions include detailed information that reveals the relationship of each particular version to its parent version.Type: GrantFiled: December 3, 2007Date of Patent: May 21, 2013Assignee: Apple Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8396221Abstract: Techniques are presented for secure broadcasting and multicasting. Communications for multicasting and broadcasting are encrypted and decrypted using a secure communication key. The secure communication key is represented in a broadcast value that is sent to selected parties. The broadcast value represents the product of unique prime numbers and an additional number plus the secure communication key. Each party is represented by one of the unique prime numbers. Each party can acquire the secure communication key by dividing the broadcast value by its particular prime number to obtain a remainder, which is the secure communication key.Type: GrantFiled: August 30, 2007Date of Patent: March 12, 2013Assignee: Oracle International CorporationInventors: Gosukonda Naga Venkata Satya Sudhakar, Ashwin Anand Shenvi
-
Publication number: 20130013562Abstract: Replication techniques are presented. According to an embodiment of a method, a node of a replicated storage network is assigned to be an owner of a data block to issue write memory block commands. The network includes at least two nodes including the node assigned to be the owner. If a read memory block command is received to read the data block, a read_lock is issued for the data block, the data block is read, and the read_lock for the data block is released. If a write memory block command is received to write new data to the data block, a write_lock is issued for the data block, the data block is written and a version associated with the data block is incremented, and the write_lock for the data block is released.Type: ApplicationFiled: September 14, 2012Publication date: January 10, 2013Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8346719Abstract: Replication techniques are presented. According to an embodiment of a method, a node of a replicated storage network is assigned to be an owner of a data block to issue write memory block commands. The network includes at least two nodes including the node assigned to be the owner. If a read memory block command is received to read the data block, a read_lock is issued for the data block, the data block is read, and the read_lock for the data block is released. If a write memory block command is received to write new data to the data block, a write_lock is issued for the data block, the data block is written and a version associated with the data block is incremented, and the write_lock for the data block is released.Type: GrantFiled: October 5, 2007Date of Patent: January 1, 2013Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8285759Abstract: Techniques for supporting disparate file systems are provided. A native file system is managed so as to be capable of supporting a protocol associated with access attempts to files of the file system, wherein the protocol is associated with a non-native and disparate file system. The files are managed, maintained, and served from the native file system to a plurality of similar and disparate operating systems and to similar and disparate file systems.Type: GrantFiled: April 22, 2008Date of Patent: October 9, 2012Assignee: Oracle International CorporationInventor: Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20120207301Abstract: Data encryption techniques are presented. According to an embodiment of a method, a cryptographic hash of unencrypted data for data block X?1 is generated, and a hash of an encryption key is generated. An initialization vector for data block X is generated using the cryptographic hash and the hash of the encryption key. Data block X?1 and data block X are logically contiguous and data block X?1 logically precedes data block X. Encryption data for data block X is generated from unencrypted data for data block X using the initialization vector.Type: ApplicationFiled: April 27, 2012Publication date: August 16, 2012Inventors: Arul Selvan Ramasamy, Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20120183145Abstract: Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.Type: ApplicationFiled: March 30, 2012Publication date: July 19, 2012Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8189769Abstract: Data encryption techniques are presented. According to an embodiment of a method, a cryptographic hash of unencrypted data for data block X?1 is generated, and a hash of an encryption key is generated. An initialization vector for data block X is generated using the cryptographic hash and the hash of the encryption key. Data block X?1 and data block X are logically contiguous and data block X?1 logically precedes data block X. Encryption data for data block X is generated from unencrypted data for data block X using the initialization vector.Type: GrantFiled: October 31, 2007Date of Patent: May 29, 2012Assignee: Apple Inc.Inventors: Arul Selvan Ramasamy, Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8185884Abstract: System and method for offline management of software in VM images are described. In one embodiment, the method includes obtaining updation-related information from the software application and an operating system in which the software application runs while the software application is in an online mode, writing the updation-related information to a first set of files of a virtual machine (VM) image while the software application is in the online mode, reading the updation-related information from the first set of files of the VM image while the software application is in an offline mode; using the read updation-related information to update the software application while the software application is in the offline mode; and writing post-updation files to a second set of files of the VM image using the updation-related information read from the first set of files while the software application is in the offline mode.Type: GrantFiled: June 23, 2008Date of Patent: May 22, 2012Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8176102Abstract: Systems and methods for extending and controlling access to a Common Information Model (CIM) are presented. According to an embodiment, access requests for a CIM object manager (CIMOM) pass through a CIM file system (CIMFS) where each access requested is authenticated. The CIMFS maintains and manages a hidden file system representing CIM classes and a CIM class hierarchy on a volume of storage. The structure, metadata, and values for the CIM classes, CIM object, and CIM providers are maintained in a hidden directory on the volume. This information is accessible via the CIMFS to use existing file system management operations.Type: GrantFiled: September 18, 2008Date of Patent: May 8, 2012Assignee: Oracle International CorporationInventors: Ashwin Pankaj, Rajesh Ghiya, Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8171293Abstract: Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.Type: GrantFiled: May 9, 2006Date of Patent: May 1, 2012Assignee: Apple Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8145691Abstract: Techniques are presented for randomly generating bits. A seed is inverted and a non repeating portion of the resulting digits from the inversion are retained. The inverted seed is then raised to a power to acquire another non repeating portion or additional digits. This process is repeated for a desired number of iterations. The resulting digits are then selectively combined to generate a stream of randomly generated bits with an infinite period.Type: GrantFiled: August 23, 2006Date of Patent: March 27, 2012Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20120072692Abstract: Apparatus, systems, and methods may operate to assert a first semi-exclusive write lock with respect to a storage medium area by storing lock information when assertion of another semi-exclusive write lock with respect to the area is not detected. Additional activities may include writing data to the area by a writing entity that has asserted the first semi-exclusive write lock after determining the lock information has not changed, while substantially simultaneously de-asserting the first semi-exclusive write lock. Reading from the area may be determined as successful by determining that the semi-exclusive write lock was not asserted prior to or during the reading by checking the status of the lock information. Additional apparatus, systems, and methods are disclosed.Type: ApplicationFiled: September 22, 2010Publication date: March 22, 2012Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20120060005Abstract: Techniques for copying on write are provided. Snapshots are managed and maintained for a source volume via sparse files. Metadata defines the sparse files and operations of a file system are used to create, define, and manipulate the metadata.Type: ApplicationFiled: September 8, 2010Publication date: March 8, 2012Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 8095509Abstract: Techniques are presented for retaining security restrictions with file versioning. Files are versioned in such a manner that metadata including full directory paths and access restrictions are retained for each version of the file and enforced when each version is accessed. The files are versioned to hashed subdirectories for space and management efficiencies. In an embodiment, prior versions of a particular file are maintained as delta data structures while a most-recent version of that file is maintained in its full or complete data state.Type: GrantFiled: February 5, 2008Date of Patent: January 10, 2012Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20110246767Abstract: Apparatus, systems, and methods may operate to allocating encrypted memory locations to store encrypted information, the information to be encrypted and decrypted using a single hypervisor. Further activity may include permitting access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor, and denying access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM. In some embodiments, the operational state of the associated VM may be restored using the encrypted information. Additional apparatus, systems, and methods are disclosed.Type: ApplicationFiled: March 30, 2010Publication date: October 6, 2011Inventors: Pradeep Kumar Chaturvedi, Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 7996547Abstract: Techniques are presented for peer-to-peer (P2P) replicated backup and versioning. Peer clients register and share storage with one another for purposes of P2P data replication, data versioning, and/or data restoration via a P2P server. The P2P server also provides security and management between the peer clients. Moreover, the P2P sever can audit behaviors of the peer clients and take punitive actions against any of the peer clients that violate policy.Type: GrantFiled: June 4, 2010Date of Patent: August 9, 2011Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Publication number: 20110185170Abstract: Apparatus, systems, and methods may operate to receive, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised message. Additional activities may include sending, from the TTP, an undisguised version of the disguised message to the receiver, and the receiver signature to a sender of the undisguised version, after determining that the receiver signature is valid. Additional apparatus, systems, and methods are disclosed.Type: ApplicationFiled: April 7, 2011Publication date: July 28, 2011Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 7941406Abstract: Techniques are presented for snapshotting. Blocks associated with a storage volume are frozen from volatile access upon receipt of a snapshot request. Continued volatile access to the frozen blocks is permitted by transparently mapping each frozen block to an available block within the volume that is not associated with the snapshot. Volatile access continues on the available blocks.Type: GrantFiled: October 31, 2007Date of Patent: May 10, 2011Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar
-
Patent number: 7908490Abstract: Techniques are presented for synchronizing and archive-versioning encrypted files. Blocks of encrypted data are managed and metadata is maintained for the blocks. The metadata identifies a maximum number of blocks and an index or parameter string. The string includes transaction identifiers and relative block numbers. The metadata is used as parameter information to a hash algorithm along with a hash key to acquire a unique initialization vector for each block. Each initialization vector when supplied to a cipher service along with a particular block of data produces an encrypted version of the data supplied or supplies a decrypted version of the data supplied. The techniques are also applied to files being archived and versioned from a storage volume.Type: GrantFiled: October 5, 2007Date of Patent: March 15, 2011Assignee: Novell, Inc.Inventor: Gosukonda Naga Venkata Satya Sudhakar