Patents by Inventor Jai Prakash
Jai Prakash has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11086995Abstract: Malware scanning for network-attached storage systems is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a file identification component that obtains an identifier for a target file stored by the data storage system; a lookup component that searches a scan status data structure for a malware scan result corresponding to the identifier for the target file; and a file access component that grants access to the target file in response to the lookup component obtaining the malware scan result from the scan status data structure and the malware scan result indicating that the target file contains no malware.Type: GrantFiled: April 30, 2018Date of Patent: August 10, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv Shankar Kumar, Jai Prakash Gahlot, Amit Kumar Chauhan
-
Patent number: 11086726Abstract: User-based recovery point objectives (RPOs) for disaster recovery are described herein. A method as described herein can include obtaining, by a device operatively coupled to a processor, transient information associated with a file stored by a data storage system; determining, by the device, whether the transient information associated with the file indicates that a condition for replicating the file has been met; and inserting, by the device, the file into a replication queue associated with the data storage system in response to a positive result of the determining.Type: GrantFiled: December 11, 2019Date of Patent: August 10, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv Shankar Kumar, Jai Prakash Gahlot
-
Publication number: 20210216568Abstract: Efficient configuration replication using a configuration change log is described herein. A method as described herein can include identifying, by a device operatively coupled to a processor, modified configurations from among a group of configurations associated with a first computing cluster; fetching, by the device, the modified configurations from the first computing cluster; and replicating, by the device, the modified configurations from the first computing cluster to a second computing cluster that is distinct from the first computing cluster and omitting replication of one or more unmodified configurations from among the group of configurations associated with the first computing cluster.Type: ApplicationFiled: January 14, 2020Publication date: July 15, 2021Inventors: Kaushik Gupta, Shiv Shankar Kumar, Jai Prakash Gahlot
-
Publication number: 20210182151Abstract: User-based recovery point objectives (RPOs) for disaster recovery are described herein. A method as described herein can include obtaining, by a device operatively coupled to a processor, transient information associated with a file stored by a data storage system; determining, by the device, whether the transient information associated with the file indicates that a condition for replicating the file has been met; and inserting, by the device, the file into a replication queue associated with the data storage system in response to a positive result of the determining.Type: ApplicationFiled: December 11, 2019Publication date: June 17, 2021Inventors: Shiv Shankar Kumar, Jai Prakash Gahlot
-
Publication number: 20210181945Abstract: User-based recovery point objectives (RPOs) for disaster recovery are described herein. A method as described herein can include obtaining, by a device operatively coupled to a processor, transient information associated with respective files stored by a data storage system; associating, by the device, the respective files with respective priority values based on the transient information; and queueing, by the device, the respective files for replication in an order defined by the priority values associated with the respective files.Type: ApplicationFiled: December 11, 2019Publication date: June 17, 2021Inventors: Shiv Shankar Kumar, Jai Prakash Gahlot
-
Patent number: 11023582Abstract: Identification and control of malicious users on a data storage system is described herein. A data storage system as described herein can include a file tracking component that records identities of users that have made at least one modification to a file stored on the data storage system, resulting in a set of recorded users; a user monitor component that increments respective malware counts associated with respective users of the set of recorded users in response to a malware scan of the file indicating that the file contains malware; and an access control component that restricts usage of the data storage system by a first user of the set of recorded users in response to a malware count associated with the first user exceeding a first threshold.Type: GrantFiled: December 19, 2018Date of Patent: June 1, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: Jai Prakash Gahlot, Amit Kumar Chauhan, Shiv Shankar Kumar
-
Publication number: 20210112000Abstract: A packet forwarding network may include spine and leaf switches that forward network traffic between end hosts. The packet forwarding network may be implemented on multiple network racks in a rack-based system. A controller may control the underlying spine and leaf switches to form on-premise virtual private cloud (VPC) resources. In particular, the controller may form enterprise VPC (EVPC) tenants, each having a virtual router that performs routing between different segments within the corresponding EVPC tenant. The different segments may separately include web, application, and database servers, as end hosts. The controller may form a system VPC tenant having a virtual system router that performs routing between different EVPC tenants. A segment in an internal VPC tenant formed by the controller and/or an external VPC tenant formed by the controller may provide external network access for one or more of the EVPC tenants.Type: ApplicationFiled: July 21, 2020Publication date: April 15, 2021Inventors: Richard Forster, Kanzhe Jiang, Sudeep Modi, Shunjia Yu, Onkar Bhat, Ganesh Kasinathan, Zhao Dong, Weifan Fu, Jialiu Wang, Saadet Savas, Alan Hase, Alok Gupta, Prashant Gandhi, Chi Chong, Jai Prakash Shukla
-
Publication number: 20210081555Abstract: Filename-based malware pre-scanning is described herein. A method as described herein can include obtaining, by a device operatively coupled to a processor, a malware scan request for a first file in a directory of a file system, the first file having a first filename belonging to a filename sequence; appending, by the device, the first file to a first malware scan queue; and appending, by the device, respective second files in the directory to a second malware scan queue that is distinct from the first malware scan queue, wherein the respective second files are distinct from the first file and have respective second filenames belonging to the filename sequence.Type: ApplicationFiled: September 13, 2019Publication date: March 18, 2021Inventors: Avadut Mungre, Jai Prakash Gahlot, Shiv Shankar Kumar
-
Publication number: 20210081532Abstract: Filename-based malware pre-scanning is described herein. A method as described herein can include establishing sequential malware scanning for respective files in a first directory of a file system according to filenames of the respective files; comparing an elapsed time since a previous malware scan for a first file of the respective files in the first directory having a first filename in a filename sequence to a scan age threshold associated with a scheduled malware scan task for the first directory; and, in response to the elapsed time since the previous malware scan for the first file being determined to be less than the scan age threshold, removing the scheduled malware scan task with respect to the first file and at least one second file of the respective files in the first directory having respective second filenames in the filename sequence.Type: ApplicationFiled: September 13, 2019Publication date: March 18, 2021Inventors: Avadut Mungre, Jai Prakash Gahlot, Shiv Shankar Kumar
-
Patent number: 10938701Abstract: Efficient heartbeat with remote servers by network-attached storage (NAS) cluster nodes is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a node assignment component that generates assignments for NAS nodes resulting in respective associated NAS nodes, the assignments associating respective ones of the NAS nodes with respective distinct anti-malware servers, and a heartbeat messaging component that instructs the respective associated NAS nodes to transmit heartbeat request messages to the respective distinct anti-malware servers according to the assignments.Type: GrantFiled: July 19, 2018Date of Patent: March 2, 2021Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv Shankar Kumar, Jai Prakash Gahlot, Amit Kumar Chauhan
-
Patent number: 10922743Abstract: Systems, methods, and computer-readable media are described for performing actions based on user activation of custom user interface (“UI”) controls. A user of a networked computing service may activate a custom UI control by selecting the custom UI control (such as by touching the custom UI control displayed on a touchscreen display) to trigger the networked computing service to perform a predefined action associated with the custom UI control. In the event that the predefined action cannot be performed, the networked computing service may identify an alternative action that may be performed instead of the predefined action, optionally request user confirmation of the alternative action, and perform the alternative action.Type: GrantFiled: January 4, 2017Date of Patent: February 16, 2021Assignee: AMAZON TECHNOLOGIES, INC.Inventors: Stephan Josef Andrizzi, Jai Prakash Chabria, Nicole Dare, Kenneth DeLand, Nirav Praful Desai, Anindya Guha, Marc Hensley, Douglas James Herrington, Samuel Stevens Heyworth, Apoorva Iyer, Nitish Kumar, Hannah McClellan Richards, Amir Pelleg, Jessica Protasio, Daniel Benjamin Rausch, Laura Allison Ridlehoover, Jeffrey Rosenberg, Paul Warren Smart, Amirali Virani
-
Patent number: 10862922Abstract: Server selection for optimized malware scanning on network-attached storage systems is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a load determination component that determines respective available capacities of anti-malware servers based on loading information obtained from the anti-malware servers and a task assignment component that assigns a malware scan task to a selected anti-malware server of the anti-malware servers based on the respective available capacities of the anti-malware servers.Type: GrantFiled: July 3, 2018Date of Patent: December 8, 2020Assignee: EMC CORPORATIONInventors: Shiv Shankar Kumar, Jai Prakash Gahlot, Amit Kumar Chauhan
-
Patent number: 10848559Abstract: Malware scan status determination for network-attached storage systems is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a data creation component that creates a scan status data structure associated with a network-attached storage (NAS) device, the scan status data structure comprising respective records that indicate a file identifier and a malware scan status for respective files stored on the NAS device, and a data update component that updates a record in the scan status data structure corresponding to a target file stored on the NAS device in response to receiving a malware scan result for the target file.Type: GrantFiled: May 1, 2018Date of Patent: November 24, 2020Assignee: EMC IP Holding Company LLCInventors: Shiv Shankar Kumar, Jai Prakash Gahlot, Amit Kumar Chauhan
-
Patent number: 10812585Abstract: An adaptive connection policy for dynamic load balancing of client connections is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a watermarking component that defines operating ranges and connection policies for respective performance parameters associated with the data storage system, a performance monitoring component that tracks respective performances of computing nodes of the data storage system with respect to the respective performance parameters, and a policy selection component that selects a connection policy for a performance parameter of the respective performance parameters, resulting in a selected connection policy, in response to a performance of at least one computing node of the data storage system being outside of an operating range of the operating ranges for the performance parameter.Type: GrantFiled: July 31, 2018Date of Patent: October 20, 2020Assignee: EMC IP Holding Company LLCInventors: Shiv Shankar Kumar, Jai Prakash Gahlot, Amit Kumar Chauhan
-
Publication number: 20200272316Abstract: Systems, methods, and computer-readable media are described for creating custom user interface (“UP”) controls. A networked computing service may determine that an action performed by a user of the service is likely to be repeated, based on previous actions performed by the user and/or other users, parameters of the action including characteristics of an item associated with the action, and other criteria. The networked computing service may generate, or recommend generation of, a custom UI control that automates performance of the action. The networked computing service may automatically determine parameters of the action, and may determine alternative parameters and/or alternative actions if the action cannot be performed using the determined parameters. Custom UI controls may be associated with various computing devices and/or other electronic devices, and categories of custom UI controls may be determined and displayed.Type: ApplicationFiled: May 8, 2020Publication date: August 27, 2020Inventors: Stephan Josef Andrizzi, Kara Cavallaro, Jai Prakash Chabria, Nicole Dare, Kenneth DeLand, Nirav Praful Desai, Anindya Guha, Marc Hensley, Douglas James Herrington, Samuel Stevens Heyworth, Apoorva Iyer, Nitish Kumar, Hannah McClellan Richards, Jae Park, Amir Pelleg, Jessica Protasio, Daniel Benjamin Rausch, Laura Allison Ridlehoover, Jeffrey Rosenberg, John Shaw, Paul Warren Smart, Amirali Virani
-
Publication number: 20200201994Abstract: Priority scanning of files written by malicious users in a data storage system is described herein. A data storage system as described herein can include a user lookup component that obtains identities of users that have made at least one modification to a first file stored on the data storage system, resulting in a set of modifying users; a comparison component that compares respective modifying users of the set of modifying users to respective malicious users of a set of malicious users; and a scan priority component that, in response to the comparison component identifying at least one match between a modifying user of the set of modifying users and a malicious user of the set of malicious users, assigns a first scan priority to the first file that is higher than a second scan priority assigned to a second, different file stored on the data storage system.Type: ApplicationFiled: December 19, 2018Publication date: June 25, 2020Inventors: Jai Prakash Gahlot, Amit Kumar Chauhan, Shiv Shankar Kumar
-
Publication number: 20200201995Abstract: Identification and control of malicious users on a data storage system is described herein. A data storage system as described herein can include a file tracking component that records identities of users that have made at least one modification to a file stored on the data storage system, resulting in a set of recorded users; a user monitor component that increments respective malware counts associated with respective users of the set of recorded users in response to a malware scan of the file indicating that the file contains malware; and an access control component that restricts usage of the data storage system by a first user of the set of recorded users in response to a malware count associated with the first user exceeding a first threshold.Type: ApplicationFiled: December 19, 2018Publication date: June 25, 2020Inventors: Jai Prakash Gahlot, Amit Kumar Chauhan, Shiv Shankar Kumar
-
Patent number: 10688446Abstract: The present invention relates to a superhydrophilic biodegradable cross linked foam membrane and a process for preparation of said foam membrane from a seaweed polysaccharides by blending with amino biopolymers/amino acids/proteins/amino compounds followed by crosslinking with a naturally occurring cross linker, genipin. The foam membrane can be used as a substitute for synthetic membrane for varied applications including membrane separation for oil-water emulsions, oil-water mixtures and other aqueous-organic mixtures under ambient conditions. These foam membranes can be recycled and reused more than three times without considerable decrease in flux rate and stability. The separation methodology of the mixtures using the foam membrane of the present invention is gravity-driven and therefore, simple and energy-efficient.Type: GrantFiled: October 17, 2014Date of Patent: June 23, 2020Assignee: COUNCIL OF SCIENTIFIC & INDUSTRIAL RESEARCHInventors: Ramavatar Meena, Naresh Dharmashibhai Sanandiya, Jai Prakash Chaudhary, Dibyendu Mondal, Nataraj Sanna Kotrappanavar
-
Patent number: 10664146Abstract: Systems, methods, and computer-readable media are described for creating custom user interface (“UI”) controls. A networked computing service may determine that an action performed by a user of the service is likely to be repeated, based on previous actions performed by the user and/or other users, parameters of the action including characteristics of an item associated with the action, and other criteria. The networked computing service may generate, or recommend generation of, a custom UI control that automates performance of the action. The networked computing service may automatically determine parameters of the action, and may determine alternative parameters and/or alternative actions if the action cannot be performed using the determined parameters. Custom UI controls may be associated with various computing devices and/or other electronic devices, and categories of custom UI controls may be determined and displayed.Type: GrantFiled: January 4, 2017Date of Patent: May 26, 2020Assignee: Amazon Technologies, Inc.Inventors: Stephan Josef Andrizzi, Kara Cavallaro, Jai Prakash Chabria, Nicole Dare, Kenneth DeLand, Nirav Praful Desai, Anindya Guha, Marc Hensley, Douglas James Herrington, Samuel Stevens Heyworth, Apoorva Iyer, Nitish Kumar, Hannah McClellan Richards, Jae Park, Amir Pelleg, Jessica Protasio, Daniel Benjamin Rausch, Laura Allison Ridlehoover, Jeffrey Rosenberg, John Shaw, Paul Warren Smart, Amirali Virani
-
Publication number: 20200045106Abstract: An adaptive connection policy for dynamic load balancing of client connections is provided herein. A data storage system as described herein can include a memory that stores computer executable components and a processor that executes computer executable components stored in the memory. The computer executable components can include a watermarking component that defines operating ranges and connection policies for respective performance parameters associated with the data storage system, a performance monitoring component that tracks respective performances of computing nodes of the data storage system with respect to the respective performance parameters, and a policy selection component that selects a connection policy for a performance parameter of the respective performance parameters, resulting in a selected connection policy, in response to a performance of at least one computing node of the data storage system being outside of an operating range of the operating ranges for the performance parameter.Type: ApplicationFiled: July 31, 2018Publication date: February 6, 2020Inventors: Shiv Shankar Kumar, Jai Prakash Gahlot, Amit Kumar Chauhan