Patents by Inventor Harshal Patil

Harshal Patil has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20220197234
    Abstract: A method for commissioning a variable air volume (VAV) system is shown. The method includes receiving instructions via an application on a user interface, the instructions provided over a wireless communications network. The method further includes determining that a cold commissioning testing sequence has been completed for the VAV system. The method further includes, in response to determining that the cold commissioning testing sequence has been completed, initiating a hot commissioning testing sequence. The method further includes performing the hot commissioning testing sequence. The method further includes providing a report of the hot commissioning testing sequence to the user interface.
    Type: Application
    Filed: December 17, 2021
    Publication date: June 23, 2022
    Inventor: Harshal Patil
  • Patent number: 11354151
    Abstract: In an approach for securing container workloads, a processor encrypts workload binaries. A processor uploads the workload binaries to a software repository. A processor encrypts a workload definition. A processor replaces the workload definition with a mock workload definition. A processor references the encrypted workload definition in the mock workload definition. A processor submits the mock workload definition to a master node.
    Type: Grant
    Filed: February 12, 2020
    Date of Patent: June 7, 2022
    Assignee: International Business Machines Corporation
    Inventors: Harshal Patil, Pradipta Banerjee, Nitesh Konkar, Manjunath Kumatagi
  • Patent number: 11349663
    Abstract: Described are techniques for secure workload configuration including a method comprising receiving a workload definition file at a worker node and from a master node, where the workload definition file comprises an encrypted immutable definition, a partially immutable definition with a predefined range of values and a first value modified by the master node, and a variable definition with a second value modified by the master node. The method further comprises decrypting, by the worker node, the encrypted immutable definition to generate a decrypted immutable definition. The method further comprises verifying, by the worker node, that the first value satisfies the predefined range of values. The method further comprises, in response to decrypting the encrypted immutable definition and verifying that the first value satisfies the predefined range of values, executing a workload based on the workload definition file in a virtual computing environment.
    Type: Grant
    Filed: October 30, 2019
    Date of Patent: May 31, 2022
    Assignee: International Business Machines Corporation
    Inventors: Pradipta Banerjee, Harshal Patil
  • Patent number: 11175939
    Abstract: Method, apparatus, and computer program product are provided for dynamically changing containerized workload isolation in response to detection of a triggering factor. In some embodiments, workload is containerized using a default container runtime (e.g., runC) that spawns one or more cgroup-based containers on a compute node using resource limiting capabilities of the compute node's host kernel including cgroups and namespaces. In some embodiments, in response to a triggering factor, such as a host kernel vulnerability, at least some of the containerized workload is migrated from running in the one or more cgroup-based containers to one or more virtual machines (VMs) launched by a standby container runtime (e.g., runV). In some embodiments, the cgroups and namespaces of the one or more cgroup-based containers are live migrated, without service interruption, to one or more VM runtimes on the one or more VMs using CRIU—checkpoint/restore in userspace.
    Type: Grant
    Filed: May 9, 2019
    Date of Patent: November 16, 2021
    Assignee: International Business Machines Corporation
    Inventors: Manjunath Kumatagi, Harshal Patil, Pradipta Banerjee, Hemant Shaw
  • Publication number: 20210247994
    Abstract: In an approach for securing container workloads, a processor encrypts workload binaries. A processor uploads the workload binaries to a software repository. A processor encrypts a workload definition. A processor replaces the workload definition with a mock workload definition. A processor references the encrypted workload definition in the mock workload definition. A processor submits the mock workload definition to a master node.
    Type: Application
    Filed: February 12, 2020
    Publication date: August 12, 2021
    Inventors: Harshal Patil, PRADIPTA Banerjee, Nitesh Konkar, Manjunath Kumatagi
  • Publication number: 20210135871
    Abstract: Described are techniques for secure workload configuration including a method comprising receiving a workload definition file at a worker node and from a master node, where the workload definition file comprises an encrypted immutable definition, a partially immutable definition with a predefined range of values and a first value modified by the master node, and a variable definition with a second value modified by the master node. The method further comprises decrypting, by the worker node, the encrypted immutable definition to generate a decrypted immutable definition. The method further comprises verifying, by the worker node, that the first value satisfies the predefined range of values. The method further comprises, in response to decrypting the encrypted immutable definition and verifying that the first value satisfies the predefined range of values, executing a workload based on the workload definition file in a virtual computing environment.
    Type: Application
    Filed: October 30, 2019
    Publication date: May 6, 2021
    Inventors: PRADIPTA Banerjee, Harshal Patil
  • Publication number: 20200356397
    Abstract: Method, apparatus, and computer program product are provided for dynamically changing containerized workload isolation in response to detection of a triggering factor. In some embodiments, workload is containerized using a default container runtime (e.g., runC) that spawns one or more cgroup-based containers on a compute node using resource limiting capabilities of the compute node's host kernel including cgroups and namespaces. In some embodiments, in response to a triggering factor, such as a host kernel vulnerability, at least some of the containerized workload is migrated from running in the one or more cgroup-based containers to one or more virtual machines (VMs) launched by a standby container runtime (e.g., runV). In some embodiments, the cgroups and namespaces of the one or more cgroup-based containers are live migrated, without service interruption, to one or more VM runtimes on the one or more VMs using CRIU—checkpoint/restore in userspace.
    Type: Application
    Filed: May 9, 2019
    Publication date: November 12, 2020
    Inventors: Manjunath Kumatagi, Harshal Patil, Pradipta Banerjee, Hemant Shaw