Patents by Inventor Jagadish Vasudeva

Jagadish Vasudeva has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240111870
    Abstract: A method, computing device, and non-transitory machine-readable medium for detecting malware attacks and mitigating data loss. In various embodiments, an agent is implemented in the operating system of a storage node to provide protection at the bottommost level in a data write path. The agent intercepts write requests and observes file events over time to detect anomalous behavior. For example, the agent may monitor incoming write requests and, when an incoming write request is detected, determine whether the file is associated with a malware attack risk based on an analysis of an encryption state of data in the file.
    Type: Application
    Filed: September 11, 2023
    Publication date: April 4, 2024
    Inventors: Jagadish Vasudeva, Prateeksha Varshney, Priya Sehgal, Mrinal K. Bhattacharjee, Amit Valjibhai Panara, Siddhartha Nandi
  • Publication number: 20230315691
    Abstract: Systems and methods for reducing read application in a virtual storage system are provided. According to one embodiment, heuristic data may be tracked and utilized in real-time by a file system of the virtual storage system at the level of granularity of a volume, thereby allowing a fast path flag to be enabled/disabled at a volume level during various phases of operation of a workload. The heuristic data for a given volume may be indicative of a correlation between (i) data blocks stored on the given volume being located within a compressible zone of a zoned checksum scheme and (ii) the respective data blocks containing compressed data and a corresponding checksum. Based on the heuristic data, read requests may be selectively directed to the read path (e.g., a fast path or a slow path) expected to mitigate read amplification when data compression is enabled for a zoned checksum scheme.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Inventors: Ritika, Jagadish Vasudeva, Vani Vully, Raj Kamal, Deepak Dangi, Parag Deshmukh
  • Publication number: 20230315315
    Abstract: Systems and methods for reducing read application in a virtual storage system are provided. According to one embodiment, read amplification is reduced when AZCS compression is being utilized by avoiding restarting of a read process via a slow path via a RAID layer of the virtual storage system when a data block associated with a read request and obtained via a first fast path read has been found not to be compressed. Instead, a second fast path read may be performed to obtain the corresponding checksum. Alternatively, or additionally, heuristics may be used to predict the odds of the data block being compressed. For example, when information encoded within a PVBN of the data block that identifies the PVBN as being within a compressed AZCS zone has shown to be sufficiently/insufficiently predictive of the data block being compressed, then a flag may be set to enable/disable fast path reads.
    Type: Application
    Filed: March 30, 2022
    Publication date: October 5, 2023
    Inventors: Ritika, Jagadish Vasudeva, Vani Vully, Raj Kamal, Deepak Dangi, Parag Deshmukh
  • Publication number: 20230297264
    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.
    Type: Application
    Filed: May 26, 2023
    Publication date: September 21, 2023
    Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
  • Patent number: 11755736
    Abstract: A method, computing device, and non-transitory machine-readable medium for detecting malware attacks and mitigating data loss. In various embodiments, an agent is implemented in the operating system of a storage node to provide protection at the bottommost level in a data write path. The agent intercepts write requests and observes file events over time to detect anomalous behavior. For example, the agent may monitor incoming write requests and, when an incoming write request is detected, determine whether the file is associated with a malware attack risk based on an analysis of an encryption state of data in the file.
    Type: Grant
    Filed: September 27, 2022
    Date of Patent: September 12, 2023
    Assignee: NETAPP, INC.
    Inventors: Jagadish Vasudeva, Prateeksha Varshney, Priya Sehgal, Mrinal K. Bhattacharjee, Amit Valjibhai Panara, Siddhartha Nandi
  • Patent number: 11662930
    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.
    Type: Grant
    Filed: February 21, 2022
    Date of Patent: May 30, 2023
    Assignee: NetApp, Inc.
    Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
  • Publication number: 20230024060
    Abstract: Systems and methods for supporting dynamic disk growth within a virtual storage appliance are provided. According to one embodiment, a portion of a logical size of respective hyperscale disks provided by a hyperscaler are provisioned for use by a virtual storage system as backing for respective file system disks. To accommodate growth, block numbers for the file system disks are pre-allocated within a sparse space of a contiguous sequence of block numbers corresponding to a number of blocks represented by the logical size. Metadata is maintained for the file system disks regarding a range of the pre-allocated block numbers that are available for use. Responsive to a triggering condition, the provisioned portion of a hyperscale disk is increased and subsequently, responsive to detecting a change in a size of the hyperscale disk by the virtual storage system, a size of the corresponding file system disk is updated within the metadata.
    Type: Application
    Filed: September 8, 2021
    Publication date: January 26, 2023
    Inventors: Mrinal K. Bhattacharjee, Jagadish Vasudeva, Sateesh Kumar Pola
  • Patent number: 11475132
    Abstract: A method, computing device, and non-transitory machine-readable medium for detecting malware attacks and mitigating data loss. In various embodiments, an agent is implemented in the operating system of a storage node to provide protection at the bottommost level in a data write path. The agent intercepts write requests and observes file events over time to detect anomalous behavior. For example, the agent may monitor incoming write requests and, when an incoming write request is detected, determine whether the file is associated with a malware attack risk based on an analysis of an encryption state of data in the file. If the file is associated with a malware attack risk, an entry for the file is added to a file log. The agent may analyze the chi-square values for data written to the files, the file log, and the file format to determine whether a malware attack is underway.
    Type: Grant
    Filed: July 29, 2020
    Date of Patent: October 18, 2022
    Assignee: NETAPP, INC.
    Inventors: Jagadish Vasudeva, Prateeksha Varshney, Priya Sehgal, Mrinal K. Bhattacharjee, Amit Valjibhai Panara, Siddhartha Nandi
  • Publication number: 20220200452
    Abstract: Techniques and mechanisms for determining a delivery of power by a programmable power supply. In an embodiment, controller circuitry of a platform receives an indication that a load of the platform is to transition to a particular operational mode. Based on a power requirement of the operational mode, the controller circuitry identifies a mode of voltage regulation which is to be provided with converter circuitry of the platform. The controller circuitry signals that a programmable power supply, which is coupled to the platform, is to output a supply voltage at a level which is based on an amount of power loss associated with the mode of voltage regulation. In another embodiment, the controller circuitry identifies the mode of voltage regulation based on an amount of charge which is currently stored by a battery of the platform.
    Type: Application
    Filed: December 23, 2020
    Publication date: June 23, 2022
    Applicant: Intel Corporation
    Inventors: Tarakesava Reddy Koki, Vinaya Kumar Chandrasekhara, Aiswarya Pious, Nirmala Bailur, Jagadish Vasudeva Singh
  • Publication number: 20220171557
    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.
    Type: Application
    Filed: February 21, 2022
    Publication date: June 2, 2022
    Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
  • Publication number: 20220085718
    Abstract: A buck-boost converter having dual-folded bootstrap for driver metal oxide semiconductor (DrMOS) device that, in addition to the traditional bootstrap capacitors, include folded bootstrap capacitors that cross-couple inductor nodes to the two sets of DrMOS switches. The DrMOS switches can be n-type or p-type, and can be replaced with driver Gallium Nitride (DrGaN) devices.
    Type: Application
    Filed: September 16, 2020
    Publication date: March 17, 2022
    Applicant: Intel Corporation
    Inventors: Jagadish Vasudeva Singh, Ankur Mishra, Naveen G, Arvind S
  • Patent number: 11256433
    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.
    Type: Grant
    Filed: March 15, 2019
    Date of Patent: February 22, 2022
    Assignee: NetApp, Inc.
    Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
  • Publication number: 20210334374
    Abstract: A method, a computing device, and a non-transitory machine-readable medium for detecting malware attacks (e.g., ransomware attacks) and mitigating data loss. In one or more embodiments, an agent is implemented in the operating system of a storage node to provide protection at the bottommost level in a data write path. The agent intercepts write requests and observes file events over time to detect anomalous behavior. For example, the agent may monitor incoming write requests and, when an incoming write request is detected, determine whether the file is associated with a malware attack risk based on an analysis of an encryption state of data in the file. If the file associated with a malware attack risk, an entry for the file is added to a file log. The agent may analyze the chi-square values for data written to the files, the file log, and the file format to determine whether a malware attack is underway.
    Type: Application
    Filed: July 29, 2020
    Publication date: October 28, 2021
    Inventors: Jagadish Vasudeva, Prateeksha Varshney, Priya Sehgal, Mrinal K. Bhattacharjee, Amit Valjibhai Panara, Siddhartha Nandi
  • Patent number: 11126235
    Abstract: A first apparatus is disclosed, including: a detection circuitry to detect a first voltage level of reference current received from a second apparatus, where the second apparatus is to provide the reference current at a second voltage level; and a controller to negotiate a power transmission agreement with the second apparatus for transmission of power from the second apparatus to the first apparatus, based at least in part on a difference between the first voltage level and the second voltage level.
    Type: Grant
    Filed: March 21, 2018
    Date of Patent: September 21, 2021
    Assignee: Intel Corporation
    Inventors: Jagadish Vasudeva Singh, Tarakesava Reddy Koki, Arvind Sundaram, Vinaya Kumar Chandrasekhara
  • Publication number: 20210218102
    Abstract: Techniques for battery retention are disclosed. In the illustrative embodiment, a thin polyurethane strap is used to hold a battery in place. The strap only requires a small amount of volume, allowing for a higher volume (and higher capacity) for the battery. In order to accommodate swelling, a computing device that has a battery held in place with such a strap can have an open area above the battery. The strap may have ridges to contact the battery and the component above the battery beyond the open area. If the battery swells, the ridges may be pressed down, accommodating the swelling battery.
    Type: Application
    Filed: March 26, 2021
    Publication date: July 15, 2021
    Inventors: Prasanna Pichumani, Jagadish Vasudeva Singh, Prakash Kurma Raju, Vinay Kumar Chandrasekhara, Arvind Sundaram, Naoki Matsumura
  • Publication number: 20200293212
    Abstract: Techniques are provided for aggregate inline deduplication and volume granularity encryption. For example, data that is exclusive to a volume of a tenant is encrypted using an exclusive encryption key accessible to the tenant. The exclusive encryption key of that tenant is inaccessible to other tenants. Shared data that has been deduplicated and shared between the volume and another volume of a different tenant is encrypted using a shared encryption key of the volume. The shared encryption key is made available to other tenants. In this way, data can be deduplicated across multiple volumes of different tenants of a storage environment, while maintaining security and data privacy at a volume level.
    Type: Application
    Filed: March 15, 2019
    Publication date: September 17, 2020
    Inventors: Srinivasan Narayanamurthy, Dnyaneshwar Nagorao Pawar, Jagadish Vasudeva, Parag Deshmukh, Siddhartha Nandi
  • Patent number: 10747284
    Abstract: An apparatus is provided which includes: an input/output (I/O) port to be coupled to a device external to the apparatus; a battery having an output node; a voltage regulator to selectively supply power from the I/O port to the battery, to charge the battery; and a switch coupled between the I/O port and the output node, wherein the switch is to selectively allow flow of current from the device to the output node by bypassing the voltage regulator.
    Type: Grant
    Filed: March 27, 2018
    Date of Patent: August 18, 2020
    Assignee: Intel Corporation
    Inventors: Tarakesava Reddy Koki, Jagadish Vasudeva Singh, Arvind Sundaram, Vinaya Kumar Chandrasekhara, Shobhit Chahar
  • Publication number: 20190305563
    Abstract: An apparatus is provided which includes: an input/output (I/O) port to be coupled to a device external to the apparatus; a battery having an output node; a voltage regulator to selectively supply power from the I/O port to the battery, to charge the battery; and a switch coupled between the I/O port and the output node, wherein the switch is to selectively allow flow of current from the device to the output node by bypassing the voltage regulator.
    Type: Application
    Filed: March 27, 2018
    Publication date: October 3, 2019
    Applicant: Intel Corporation
    Inventors: Tarakesava Reddy Koki, Jagadish Vasudeva Singh, Arvind Sundaram, Vinaya Kumar Chandrasekhara, Shobhit Chahar
  • Publication number: 20190294223
    Abstract: A first apparatus is disclosed, including: a detection circuitry to detect a first voltage level of reference current received from a second apparatus, where the second apparatus is to provide the reference current at a second voltage level; and a controller to negotiate a power transmission agreement with the second apparatus for transmission of power from the second apparatus to the first apparatus, based at least in part on a difference between the first voltage level and the second voltage level.
    Type: Application
    Filed: March 21, 2018
    Publication date: September 26, 2019
    Inventors: Jagadish Vasudeva Singh, Tarakesava Reddy Koki, Arvind Sundaram, Vinaya Kumar Chandrasekhara
  • Publication number: 20190034147
    Abstract: Methods and apparatus to detect user-facing screens of multi-screen devices are disclosed. An example computing device includes a touch point analyzer to detect a number of touch points on at least one of a first touchscreen and a second touchscreen of a multi-screen device in response to a trigger event. The example computing device includes a screen selector to designate one of the first and second touchscreens as an active screen and the other of the first and second touchscreens as an unused screen based on the number of touch points.
    Type: Application
    Filed: July 31, 2017
    Publication date: January 31, 2019
    Inventors: Tarakesava Reddy Koki, Jagadish Vasudeva Singh