Patents by Inventor Hardik Vohra

Hardik Vohra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11086727
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: August 10, 2021
    Assignee: RUBRIK, INC.
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani
  • Patent number: 11074143
    Abstract: A data management and storage (DMS) cluster of peer DMS nodes manages data backup and disaster recovery using a service level agreement. The backup data can be replicated from a primary compute infrastructure to the secondary compute infrastructure. For example, primary snapshots of virtual machines of the application in the primary compute infrastructure are generated, and provided to the secondary compute infrastructure. If the primary compute infrastructure is lost, the secondary compute infrastructure is initialized to replicate the primary compute infrastructure. Applications that were running in the primary compute infrastructure can failover to run in the secondary compute infrastructure. The replicated backup data is used to facilitate the migration. During a failover, the primary snapshots are deployed in the secondary compute infrastructure as virtual machines.
    Type: Grant
    Filed: October 5, 2018
    Date of Patent: July 27, 2021
    Assignee: Rubrik, Inc.
    Inventors: Zhicong Wang, Benjamin Travis Meadowcroft, Biswaroop Palit, Hardik Vohra, Mudit Malpani
  • Patent number: 11061601
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: July 13, 2021
    Assignee: RUBRIK, INC.
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani
  • Publication number: 20200349028
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaara Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani
  • Publication number: 20200349022
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani
  • Publication number: 20200348956
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani
  • Publication number: 20200349031
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani
  • Publication number: 20200349030
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani, Abhishek Modi
  • Publication number: 20200348955
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani
  • Publication number: 20200349029
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani, Abhishek Modi
  • Publication number: 20200349021
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani
  • Publication number: 20200349018
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani
  • Publication number: 20200348842
    Abstract: Example embodiments relate generally to systems and methods for continuous data protection (CDP) and more specifically to an input and output (I/O) filtering framework and log management system to seek a near-zero recovery point objective (RPO).
    Type: Application
    Filed: April 30, 2019
    Publication date: November 5, 2020
    Inventors: Benjamin Travis Meadowcroft, Li Ding, Shaomin Chen, Hardik Vohra, Arijit Banerjee, Abhay Mitra, Kushaagra Goyal, Arnav Gautum Mishra, Samir Rishi Chaudhry, Suman Swaroop, Kunal Sean Munshani, Mudit Malpani
  • Publication number: 20200110675
    Abstract: A data management and storage (DMS) cluster of peer DMS nodes manages data backup and disaster recovery using a service level agreement. The backup data can be replicated from a primary compute infrastructure to the secondary compute infrastructure. For example, primary snapshots of virtual machines of the application in the primary compute infrastructure are generated, and provided to the secondary compute infrastructure. If the primary compute infrastructure is lost, the secondary compute infrastructure is initialized to replicate the primary compute infrastructure. Applications that were running in the primary compute infrastructure can failover to run in the secondary compute infrastructure. The replicated backup data is used to facilitate the migration. During a failover, the primary snapshots are deployed in the secondary compute infrastructure as virtual machines.
    Type: Application
    Filed: October 5, 2018
    Publication date: April 9, 2020
    Inventors: Zhicong Wang, Benjamin Travis Meadowcroft, Biswaroop Palit, Hardik Vohra, Mudit Malpani
  • Publication number: 20200050518
    Abstract: A data management and storage (DMS) cluster of peer DMS nodes manages migration of an application between a primary compute infrastructure and a secondary compute infrastructure. The secondary compute infrastructure may be a failover environment for the primary compute infrastructure. Primary snapshots of virtual machines of the application in the primary compute infrastructure are generated, and provided to the secondary compute infrastructure. During a failover, the primary snapshots are deployed in the secondary compute infrastructure as virtual machines. Secondary snapshots of the virtual machines are generated, where the secondary snapshots are incremental snapshots of the primary snapshots. In failback, the secondary snapshots are provided to the primary compute infrastructure, where they are combined with the primary snapshots into construct a current state of the application, and the application is deployed in the current state by deploying virtual machines on the primary compute infrastructure.
    Type: Application
    Filed: October 22, 2019
    Publication date: February 13, 2020
    Inventors: Zhicong Wang, Benjamin Meadowcroft, Biswaroop Palit, Atanu Chakraborty, Hardik Vohra, Abhay Mitra, Saurabh Goyal, Sanjari Srivastava, Swapnil Agarwal, Rahil Shah, Mudit Malpani, Janmejay Singh, Ajay Arvind Bhave, Prateek Pandey
  • Publication number: 20200019424
    Abstract: An example method of managing and storing data includes pulling and saving a first snapshot of a first state of a target machine running on a cloud service and creating a first virtual machine (VM) package associated with the first snapshot. The first VM package sufficient to instantiate a VM emulating the target machine with the first state on an on-premise destination VM platform. The method includes pulling and saving a second snapshot of a second state of the target machine, wherein the second state occurs after the first state. A second VM package is created and associated with the second snapshot, the second VM package sufficient to instantiate the VM emulating the target machine with the second state on the destination VM platform. The second VM package is created by updating the first VM package according to differences between the first snapshot and the second snapshot.
    Type: Application
    Filed: July 15, 2019
    Publication date: January 16, 2020
    Inventors: Zhicong Wang, Benjamin Travis Meadowcroft, Biswaroop Palit, Mudit Malpani, Hardik Vohra
  • Publication number: 20190391883
    Abstract: A data management and storage (DMS) cluster of peer DMS nodes manages migration of an application between a primary compute infrastructure and a secondary compute infrastructure. The secondary compute infrastructure may be a failover environment for the primary compute infrastructure. Primary snapshots of virtual machines of the application in the primary compute infrastructure are generated, and provided to the secondary compute infrastructure. During a failover, the primary snapshots are deployed in the secondary compute infrastructure as virtual machines. Secondary snapshots of the virtual machines are generated, where the secondary snapshots are incremental snapshots of the primary snapshots. In failback, the secondary snapshots are provided to the primary compute infrastructure, where they are combined with the primary snapshots into construct a current state of the application, and the application is deployed in the current state by deploying virtual machines on the primary compute infrastructure.
    Type: Application
    Filed: June 25, 2018
    Publication date: December 26, 2019
    Inventors: Zhicong Wang, Benjamin Meadowcroft, Biswaroop Palit, Atanu Chakraborty, Hardik Vohra, Abhay Mitra, Saurabh Goyal, Sanjari Srivastava, Swapnil Agarwal, Rahil Shah, Mudit Malpani, Janmejay Singh, Ajay Arvind Bhave, Prateek Pandey
  • Publication number: 20190391880
    Abstract: A data management and storage (DMS) cluster of peer DMS nodes manages data of an application distributed across a set of machines of a compute infrastructure. A DMS node associates a set of machines with the application, and generates data fetch jobs for the set of machines for execution by multiple peer DMS nodes. The DMS node determining whether each of the data fetch jobs for the set of machines is ready for execution by the peer DMS nodes. In response to determining that each of the data fetch jobs is ready for execution, the peer DMS nodes execute the data fetch jobs to generate snapshots of the set of machines. The snapshots may be full or incremental snapshots, and collectively form a snapshot of the application.
    Type: Application
    Filed: June 25, 2018
    Publication date: December 26, 2019
    Inventors: Zhicong Wang, Benjamin Meadowcroft, Biswaroop Palit, Atanu Chakraborty, Hardik Vohra, Abhay Mitra, Saurabh Goyal, Sanjari Srivastava, Swapnil Agarwal, Rahil Shah, Mudit Malpani, Janmejay Singh, Ajay Arvind Bhave, Prateek Pandey
  • Publication number: 20190384494
    Abstract: A data management and storage (DMS) cluster of peer DMS nodes manages data of a tenant of a multi-tenant compute infrastructure. The compute infrastructure includes an envoy connecting the DMS cluster to virtual machines of the tenant executing on the compute infrastructure. The envoy provides the DMS cluster with access to the virtual tenant network and the virtual machines of the tenant connected via the virtual tenant network for DMS services such as data fetch jobs to generate snapshots of the virtual machines. The envoy sends the snapshot from the virtual machine to a peer DMS node via the connection for storage within the DMS cluster. The envoy provides the DMS cluster with secure access to authorized tenants of the compute infrastructure while maintaining data isolation of tenants within the compute infrastructure.
    Type: Application
    Filed: November 26, 2018
    Publication date: December 19, 2019
    Inventors: Abdul Jabbar Abdul Rasheed, Soham Mazumdar, Hardik Vohra, Mudit Malpani
  • Publication number: 20190384496
    Abstract: A data management and storage (DMS) cluster of peer DMS nodes manages data of a tenant of a multi-tenant compute infrastructure. The compute infrastructure includes an envoy connecting the DMS cluster to virtual machines of the tenant executing on the compute infrastructure. The envoy provides the DMS cluster with access to the virtual tenant network and the virtual machines of the tenant connected via the virtual tenant network for DMS services such as data fetch jobs to generate snapshots of the virtual machines. The envoy sends the snapshot from the virtual machine to a peer DMS node via the connection for storage within the DMS cluster. The envoy provides the DMS cluster with secure access to authorized tenants of the compute infrastructure while maintaining data isolation of tenants within the compute infrastructure.
    Type: Application
    Filed: June 28, 2019
    Publication date: December 19, 2019
    Inventors: ABDUL JABBAR ABDUL RASHEED, Soham Mazumdar, Hardik Vohra, Mudit Malpani