Patents by Inventor Gosukonda Naga Venkata Satya Sudhakar

Gosukonda Naga Venkata Satya Sudhakar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 8447733
    Abstract: Techniques are presented for versioning file systems. Files and directories are versioned in a manner that permits the versions to be mounted on a device of a user. The original security restrictions that existed with the versions when they were versioned are retained with the mount. Moreover, the user can browse and access the versions via the mount using an existing file system of the user's device. Further, names for each of the versions include detailed information that reveals the relationship of each particular version to its parent version.
    Type: Grant
    Filed: December 3, 2007
    Date of Patent: May 21, 2013
    Assignee: Apple Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8396221
    Abstract: Techniques are presented for secure broadcasting and multicasting. Communications for multicasting and broadcasting are encrypted and decrypted using a secure communication key. The secure communication key is represented in a broadcast value that is sent to selected parties. The broadcast value represents the product of unique prime numbers and an additional number plus the secure communication key. Each party is represented by one of the unique prime numbers. Each party can acquire the secure communication key by dividing the broadcast value by its particular prime number to obtain a remainder, which is the secure communication key.
    Type: Grant
    Filed: August 30, 2007
    Date of Patent: March 12, 2013
    Assignee: Oracle International Corporation
    Inventors: Gosukonda Naga Venkata Satya Sudhakar, Ashwin Anand Shenvi
  • Publication number: 20130013562
    Abstract: Replication techniques are presented. According to an embodiment of a method, a node of a replicated storage network is assigned to be an owner of a data block to issue write memory block commands. The network includes at least two nodes including the node assigned to be the owner. If a read memory block command is received to read the data block, a read_lock is issued for the data block, the data block is read, and the read_lock for the data block is released. If a write memory block command is received to write new data to the data block, a write_lock is issued for the data block, the data block is written and a version associated with the data block is incremented, and the write_lock for the data block is released.
    Type: Application
    Filed: September 14, 2012
    Publication date: January 10, 2013
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8346719
    Abstract: Replication techniques are presented. According to an embodiment of a method, a node of a replicated storage network is assigned to be an owner of a data block to issue write memory block commands. The network includes at least two nodes including the node assigned to be the owner. If a read memory block command is received to read the data block, a read_lock is issued for the data block, the data block is read, and the read_lock for the data block is released. If a write memory block command is received to write new data to the data block, a write_lock is issued for the data block, the data block is written and a version associated with the data block is incremented, and the write_lock for the data block is released.
    Type: Grant
    Filed: October 5, 2007
    Date of Patent: January 1, 2013
    Assignee: Novell, Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8285759
    Abstract: Techniques for supporting disparate file systems are provided. A native file system is managed so as to be capable of supporting a protocol associated with access attempts to files of the file system, wherein the protocol is associated with a non-native and disparate file system. The files are managed, maintained, and served from the native file system to a plurality of similar and disparate operating systems and to similar and disparate file systems.
    Type: Grant
    Filed: April 22, 2008
    Date of Patent: October 9, 2012
    Assignee: Oracle International Corporation
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Publication number: 20120207301
    Abstract: Data encryption techniques are presented. According to an embodiment of a method, a cryptographic hash of unencrypted data for data block X?1 is generated, and a hash of an encryption key is generated. An initialization vector for data block X is generated using the cryptographic hash and the hash of the encryption key. Data block X?1 and data block X are logically contiguous and data block X?1 logically precedes data block X. Encryption data for data block X is generated from unencrypted data for data block X using the initialization vector.
    Type: Application
    Filed: April 27, 2012
    Publication date: August 16, 2012
    Inventors: Arul Selvan Ramasamy, Gosukonda Naga Venkata Satya Sudhakar
  • Publication number: 20120183145
    Abstract: Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.
    Type: Application
    Filed: March 30, 2012
    Publication date: July 19, 2012
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8189769
    Abstract: Data encryption techniques are presented. According to an embodiment of a method, a cryptographic hash of unencrypted data for data block X?1 is generated, and a hash of an encryption key is generated. An initialization vector for data block X is generated using the cryptographic hash and the hash of the encryption key. Data block X?1 and data block X are logically contiguous and data block X?1 logically precedes data block X. Encryption data for data block X is generated from unencrypted data for data block X using the initialization vector.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: May 29, 2012
    Assignee: Apple Inc.
    Inventors: Arul Selvan Ramasamy, Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8185884
    Abstract: System and method for offline management of software in VM images are described. In one embodiment, the method includes obtaining updation-related information from the software application and an operating system in which the software application runs while the software application is in an online mode, writing the updation-related information to a first set of files of a virtual machine (VM) image while the software application is in the online mode, reading the updation-related information from the first set of files of the VM image while the software application is in an offline mode; using the read updation-related information to update the software application while the software application is in the offline mode; and writing post-updation files to a second set of files of the VM image using the updation-related information read from the first set of files while the software application is in the offline mode.
    Type: Grant
    Filed: June 23, 2008
    Date of Patent: May 22, 2012
    Assignee: Novell, Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8176102
    Abstract: Systems and methods for extending and controlling access to a Common Information Model (CIM) are presented. According to an embodiment, access requests for a CIM object manager (CIMOM) pass through a CIM file system (CIMFS) where each access requested is authenticated. The CIMFS maintains and manages a hidden file system representing CIM classes and a CIM class hierarchy on a volume of storage. The structure, metadata, and values for the CIM classes, CIM object, and CIM providers are maintained in a hidden directory on the volume. This information is accessible via the CIMFS to use existing file system management operations.
    Type: Grant
    Filed: September 18, 2008
    Date of Patent: May 8, 2012
    Assignee: Oracle International Corporation
    Inventors: Ashwin Pankaj, Rajesh Ghiya, Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8171293
    Abstract: Techniques for assuring a receiver's non repudiation of a communication are provided via cooperation with a secure device. A secure device operates within a local environment of a receiver and exchanges certificates with a sender via the receiver. The sender encrypts data in a communication with the receiver. Separately, the sender sends an encrypted version of a decryption key to the receiver. The receiver presents the encrypted version of the key to the secure device and the secure device supplies the decryption key for use by the receiver to decrypt the previously sent encrypted data.
    Type: Grant
    Filed: May 9, 2006
    Date of Patent: May 1, 2012
    Assignee: Apple Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8145691
    Abstract: Techniques are presented for randomly generating bits. A seed is inverted and a non repeating portion of the resulting digits from the inversion are retained. The inverted seed is then raised to a power to acquire another non repeating portion or additional digits. This process is repeated for a desired number of iterations. The resulting digits are then selectively combined to generate a stream of randomly generated bits with an infinite period.
    Type: Grant
    Filed: August 23, 2006
    Date of Patent: March 27, 2012
    Assignee: Novell, Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Publication number: 20120072692
    Abstract: Apparatus, systems, and methods may operate to assert a first semi-exclusive write lock with respect to a storage medium area by storing lock information when assertion of another semi-exclusive write lock with respect to the area is not detected. Additional activities may include writing data to the area by a writing entity that has asserted the first semi-exclusive write lock after determining the lock information has not changed, while substantially simultaneously de-asserting the first semi-exclusive write lock. Reading from the area may be determined as successful by determining that the semi-exclusive write lock was not asserted prior to or during the reading by checking the status of the lock information. Additional apparatus, systems, and methods are disclosed.
    Type: Application
    Filed: September 22, 2010
    Publication date: March 22, 2012
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Publication number: 20120060005
    Abstract: Techniques for copying on write are provided. Snapshots are managed and maintained for a source volume via sparse files. Metadata defines the sparse files and operations of a file system are used to create, define, and manipulate the metadata.
    Type: Application
    Filed: September 8, 2010
    Publication date: March 8, 2012
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 8095509
    Abstract: Techniques are presented for retaining security restrictions with file versioning. Files are versioned in such a manner that metadata including full directory paths and access restrictions are retained for each version of the file and enforced when each version is accessed. The files are versioned to hashed subdirectories for space and management efficiencies. In an embodiment, prior versions of a particular file are maintained as delta data structures while a most-recent version of that file is maintained in its full or complete data state.
    Type: Grant
    Filed: February 5, 2008
    Date of Patent: January 10, 2012
    Assignee: Novell, Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Publication number: 20110246767
    Abstract: Apparatus, systems, and methods may operate to allocating encrypted memory locations to store encrypted information, the information to be encrypted and decrypted using a single hypervisor. Further activity may include permitting access to a designated number of the encrypted memory locations to a single application executed by an associated virtual machine (VM) subject to the hypervisor, and denying access to the designated number of the encrypted memory locations to any other application executed by the associated VM, or any other VM. In some embodiments, the operational state of the associated VM may be restored using the encrypted information. Additional apparatus, systems, and methods are disclosed.
    Type: Application
    Filed: March 30, 2010
    Publication date: October 6, 2011
    Inventors: Pradeep Kumar Chaturvedi, Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 7996547
    Abstract: Techniques are presented for peer-to-peer (P2P) replicated backup and versioning. Peer clients register and share storage with one another for purposes of P2P data replication, data versioning, and/or data restoration via a P2P server. The P2P server also provides security and management between the peer clients. Moreover, the P2P sever can audit behaviors of the peer clients and take punitive actions against any of the peer clients that violate policy.
    Type: Grant
    Filed: June 4, 2010
    Date of Patent: August 9, 2011
    Assignee: Novell, Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Publication number: 20110185170
    Abstract: Apparatus, systems, and methods may operate to receive, at a trusted third party (TTP), a signed disguised message as a disguised receiver signature from a receiver that has signed a disguised message using a blind signature process to transform the disguised message into the signed disguised message. Additional activities may include sending, from the TTP, an undisguised version of the disguised message to the receiver, and the receiver signature to a sender of the undisguised version, after determining that the receiver signature is valid. Additional apparatus, systems, and methods are disclosed.
    Type: Application
    Filed: April 7, 2011
    Publication date: July 28, 2011
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 7941406
    Abstract: Techniques are presented for snapshotting. Blocks associated with a storage volume are frozen from volatile access upon receipt of a snapshot request. Continued volatile access to the frozen blocks is permitted by transparently mapping each frozen block to an available block within the volume that is not associated with the snapshot. Volatile access continues on the available blocks.
    Type: Grant
    Filed: October 31, 2007
    Date of Patent: May 10, 2011
    Assignee: Novell, Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar
  • Patent number: 7908490
    Abstract: Techniques are presented for synchronizing and archive-versioning encrypted files. Blocks of encrypted data are managed and metadata is maintained for the blocks. The metadata identifies a maximum number of blocks and an index or parameter string. The string includes transaction identifiers and relative block numbers. The metadata is used as parameter information to a hash algorithm along with a hash key to acquire a unique initialization vector for each block. Each initialization vector when supplied to a cipher service along with a particular block of data produces an encrypted version of the data supplied or supplies a decrypted version of the data supplied. The techniques are also applied to files being archived and versioned from a storage volume.
    Type: Grant
    Filed: October 5, 2007
    Date of Patent: March 15, 2011
    Assignee: Novell, Inc.
    Inventor: Gosukonda Naga Venkata Satya Sudhakar