Patents by Inventor Joji John
Joji John has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11960746Abstract: Technology described herein can be employed to automatically recommend a tiering policy for data storage of data at a data storage system, such as a cloud storage system. An example method can comprise determining, by a system comprising a processor, context information defining a data storage attribute applicable to data at a cloud storage system. The method can comprise, in response to determining the context information, generating, by the system, a tiering policy defining an element of tiering storage of data at the cloud storage system, wherein the tiering policy is based on the data storage attribute defined by the context information. The method also can comprise, in response to generating the tiering policy, outputting, by the system, the tiering policy to a storage device associated with a customer. The analysis can be performed using an artificial intelligence process, machine learning process or a combination thereof.Type: GrantFiled: January 25, 2022Date of Patent: April 16, 2024Assignee: DELL PRODUCTS, L.P.Inventors: Rohit Talukdar, Rekha Ms, Joji John, Pradyot Mishra
-
Patent number: 11902271Abstract: Two-way secure channels are provided between multiple services across service groups, where the certification is performed by a certificate authority associated with one of the service groups. One method comprises a first service providing a first handshake communication with a first token to a second service, wherein the first service obtains the first token by authenticating with an identity and access management service having a first certificate signed by a certificate authority, wherein the first handshake communication succeeds when the second service has a second certificate signed by the certificate authority, and wherein the second service obtains a second token by authenticating with the identity and access management service. The first service receives a second handshake communication from the second service with the second token.Type: GrantFiled: April 7, 2021Date of Patent: February 13, 2024Assignee: EMC IP Holding Company LLCInventors: Anurag Sharma, Yedidia Atzmony, Shoham Levy, Joji John, Eric Dequin
-
Publication number: 20230236751Abstract: Technology described herein can be employed to automatically recommend a tiering policy for data storage of data at a data storage system, such as a cloud storage system. An example method can comprise determining, by a system comprising a processor, context information defining a data storage attribute applicable to data at a cloud storage system. The method can comprise, in response to determining the context information, generating, by the system, a tiering policy defining an element of tiering storage of data at the cloud storage system, wherein the tiering policy is based on the data storage attribute defined by the context information. The method also can comprise, in response to generating the tiering policy, outputting, by the system, the tiering policy to a storage device associated with a customer. The analysis can be performed using an artificial intelligence process, machine learning process or a combination thereof.Type: ApplicationFiled: January 25, 2022Publication date: July 27, 2023Inventors: Rohit Talukdar, Rekha MS, Joji John, Pradyot Mishra
-
Patent number: 11595358Abstract: Two-way secure channels are provided between two parties to a communication with certification being provided by one party. One method comprises providing, by a first entity that provides a certificate authority, a first signed certificate to a second entity, wherein the first signed certificate is signed by the certificate authority and wherein the second entity generates a first request to sign a second certificate generated by the second entity, wherein the first request is generated by the second entity using a first credential generated by the second entity; receiving, from the second entity, (i) the first request to sign the second certificate, and (ii) the first signed certificate; and providing, in response to the certificate authority verifying the first signed certificate, a second signed certificate, signed by the certificate authority, to the second entity; wherein one or more additional communications between the first entity and the second entity use the two-way channel.Type: GrantFiled: April 7, 2021Date of Patent: February 28, 2023Assignee: EMC IP Holding Company LLCInventors: Anurag Sharma, Yedidia Atzmony, Shoham Levy, Joji John, Eric Dequin
-
Publication number: 20220329584Abstract: Two-way secure channels are provided between multiple services across service groups, where the certification is performed by a certificate authority associated with one of the service groups. One method comprises a first service providing a first handshake communication with a first token to a second service, wherein the first service obtains the first token by authenticating with an identity and access management service having a first certificate signed by a certificate authority, wherein the first handshake communication succeeds when the second service has a second certificate signed by the certificate authority, and wherein the second service obtains a second token by authenticating with the identity and access management service. The first service receives a second handshake communication from the second service with the second token.Type: ApplicationFiled: April 7, 2021Publication date: October 13, 2022Inventors: Anurag Sharma, Yedidia Atzmony, Shoham Levy, Joji John, Eric Dequin
-
Publication number: 20220329570Abstract: Two-way secure channels are provided between two parties to a communication with certification being provided by one party. One method comprises providing, by a first entity that provides a certificate authority, a first signed certificate to a second entity, wherein the first signed certificate is signed by the certificate authority and wherein the second entity generates a first request to sign a second certificate generated by the second entity, wherein the first request is generated by the second entity using a first credential generated by the second entity; receiving, from the second entity, (i) the first request to sign the second certificate, and (ii) the first signed certificate; and providing, in response to the certificate authority verifying the first signed certificate, a second signed certificate, signed by the certificate authority, to the second entity; wherein one or more additional communications between the first entity and the second entity use the two-way channel.Type: ApplicationFiled: April 7, 2021Publication date: October 13, 2022Inventors: Anurag Sharma, Yedidia Atzmony, Shoham Levy, Joji John, Eric Dequin
-
Patent number: 11151090Abstract: Techniques for managing snapshots of a storage object in a data storage system based on the data churn delta between the latest snapshot and the current data of the storage object. The techniques include, having specified minimum and maximum data loss tolerances for a parent object, creating successive snapshots of the parent object, each snapshot being created at a scheduled time interval or a time when the minimum data loss tolerance has been reached/exceeded. The techniques include obtaining the total data churn between the latest snapshot and the parent data, and determining whether the total data churn has reached or exceeded the maximum data loss tolerance. The techniques include, having determined that the total data churn has reached or exceeded the maximum data loss tolerance, retaining only those snapshots that have not exceeded the maximum data loss tolerance, and discarding all snapshots that have exceeded the maximum data loss tolerance.Type: GrantFiled: October 17, 2019Date of Patent: October 19, 2021Assignee: EMC IP Holding Company LLCInventors: Srinivasa Chamarthy, Animesh Singh, Joji John, Vetrivel M
-
Publication number: 20210117390Abstract: Techniques for managing snapshots of a storage object in a data storage system based on the data churn delta between the latest snapshot and the current data of the storage object. The techniques include, having specified minimum and maximum data loss tolerances for a parent object, creating successive snapshots of the parent object, each snapshot being created at a scheduled time interval or a time when the minimum data loss tolerance has been reached/exceeded. The techniques include obtaining the total data churn between the latest snapshot and the parent data, and determining whether the total data churn has reached or exceeded the maximum data loss tolerance. The techniques include, having determined that the total data churn has reached or exceeded the maximum data loss tolerance, retaining only those snapshots that have not exceeded the maximum data loss tolerance, and discarding all snapshots that have exceeded the maximum data loss tolerance.Type: ApplicationFiled: October 17, 2019Publication date: April 22, 2021Inventors: Srinivasa Chamarthy, Animesh Singh, Joji John, Vetrivel M