Patents by Inventor Kalidas Balakrishnan
Kalidas Balakrishnan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11829346Abstract: A microservice or serverless process consistency check process comprising locating all the necessary metadata and data objects in the cloud by storing the data objects in the cloud and synchronously mirroring the metadata, which is separately stored in local storage, to the cloud. The process generates a list of data objects in the cloud as “Set A” and the list of metadata objects in the same prefix range as the data objects as “Set B.” The consistency check then verifies whether all objects in Set A are referred to by objects in set B. In the case where there are gaps between the sets, non-existent objects are marked as missing, and unreferenced objects are marked as orphan objects. The list of missing and orphan objects is then sent back to the backup server for analysis and further processing.Type: GrantFiled: March 3, 2022Date of Patent: November 28, 2023Assignee: EMC IP Holding Company LLCInventors: Shyam Burkule, Kalidas Balakrishnan, Ramprasad Chinthekindi
-
Patent number: 11677551Abstract: One example method includes receiving clear text data at a storage system, generating, at the storage system, a clear text data encryption key, requesting a key management system to encrypt the clear text data encryption key with a master key to create an encrypted data encryption key, and the requesting is performed by the storage system, receiving, at the storage system, the encrypted data encryption key from the key management system, encrypting, at the storage system, the clear text data with the clear text data encryption key to create encrypted data, and storing, together, the encrypted data and the encrypted data encryption key.Type: GrantFiled: October 30, 2020Date of Patent: June 13, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Senthil Ponnuswamy, Kalidas Balakrishnan, Mahadev Karadigudda
-
Patent number: 11500813Abstract: Embodiments of an instant recall process and system for long-term data stored on a cloud storage tier. Embodiments include saving a content handle of a file in a cloud storage tier as an extended attribute in a single file system namespace; moving the file from the cloud storage tier to an active storage tier for data processing; recalling the file from the active storage tier to the cloud storage tier upon completion of the data processing; using the content handle from hidden metadata for a working copy of the file; and saving a hash of a segment reference as part of the extended attribute.Type: GrantFiled: November 2, 2018Date of Patent: November 15, 2022Assignee: EMC IP Holding Company LLCInventors: Nitin Madan, Kedar Godbole, Srikant Viswanathan, Bhimsen Bhanjois, Kalyan Gunda, Kalidas Balakrishnan, Vivek Nambiar, Chetan Risbud
-
Reconstructing lost data objects by generating virtual user files from available tiers within a node
Patent number: 11494335Abstract: Embodiments of method and system are directed to a best effort method to reconstruct the corrupt files from available nodes or tiers and heal or repair the corrupt files. The method looks for the existence of fingerprints of the lost segments in available tiers on the nodes or across nodes within a cluster. The method discovers the copies of these missing segments, creates an Lp tree referring these discovered segments and creates a virtual file in the namespace. The file is then moved to the destination tier where the corruption exists, thus healing the corruption.Type: GrantFiled: October 25, 2019Date of Patent: November 8, 2022Assignee: EMC IP Holding Company LLCInventors: Ramprasad Chinthekindi, Shyam Burkule, Kalidas Balakrishnan, Kalyan C Gunda, Subrahmanyam Josyula -
Publication number: 20220283911Abstract: Data protection systems generate backups that may be stored in a namespace that includes an active tier and a cloud tier. Lost data in either tier can be reconstructed from the available tiers. Metadata can also be reconstructed from the data stored in the available tiers.Type: ApplicationFiled: March 5, 2021Publication date: September 8, 2022Inventors: Smriti Thakkar, Ramprasad N. Chinthekindi, Kalidas Balakrishnan, Kalyan C. Gunda
-
Patent number: 11392458Abstract: Embodiments of method and system are directed to a best effort method to reconstruct corrupt files from available nodes or tiers and heal or repair the corrupt files within a cluster of nodes. The method looks for the existence of fingerprints of the lost segments in available tiers on the nodes or across nodes within a cluster. The method discovers the copies of these missing segments, creates an Lp tree referring these discovered segments and creates a virtual file in the namespace. The file is then moved to the destination tier where the corruption exists, thus healing the corruption.Type: GrantFiled: October 25, 2019Date of Patent: July 19, 2022Assignee: EMC IP Holding Company LLCInventors: Ramprasad Chinthekindi, Shyam Burkule, Kalidas Balakrishnan, Kalyan C Gunda, Subrahmanyam Josyula
-
Publication number: 20220188293Abstract: A microservice or serverless process consistency check process comprising locating all the necessary metadata and data objects in the cloud by storing the data objects in the cloud and synchronously mirroring the metadata, which is separately stored in local storage, to the cloud. The process generates a list of data objects in the cloud as “Set A” and the list of metadata objects in the same prefix range as the data objects as “Set B.” The consistency check then verifies whether all objects in Set A are referred to by objects in set B. In the case where there are gaps between the sets, non-existent objects are marked as missing, and unreferenced objects are marked as orphan objects. The list of missing and orphan objects is then sent back to the backup server for analysis and further processing.Type: ApplicationFiled: March 3, 2022Publication date: June 16, 2022Inventors: Shyam Burkule, Kalidas Balakrishnan, Ramprasad Chinthekindi
-
Publication number: 20220141013Abstract: One example method includes receiving clear text data at a storage system, generating, at the storage system, a clear text data encryption key, requesting a key management system to encrypt the clear text data encryption key with a master key to create an encrypted data encryption key, and the requesting is performed by the storage system, receiving, at the storage system, the encrypted data encryption key from the key management system, encrypting, at the storage system, the clear text data with the clear text data encryption key to create encrypted data, and storing, together, the encrypted data and the encrypted data encryption key.Type: ApplicationFiled: October 30, 2020Publication date: May 5, 2022Inventors: Senthil Ponnuswamy, Kalidas Balakrishnan, Mahadev Karadigudda
-
Patent number: 11301454Abstract: A microservice or serverless process consistency check process comprising locating all the necessary metadata and data objects in the cloud by storing the data objects in the cloud and synchronously mirroring the metadata, which is separately stored in local storage, to the cloud. The process generates a list of data objects in the cloud as “Set A” and the list of metadata objects in the same prefix range as the data objects as “Set B.” The consistency check then verifies whether all objects in Set A are referred to by objects in set B. In the case where there are gaps between the sets, non-existent objects are marked as missing, and unreferenced objects are marked as orphan objects. The list of missing and orphan objects is then sent back to the backup server for analysis and further processing.Type: GrantFiled: October 18, 2019Date of Patent: April 12, 2022Assignee: EMC IP Holding Company LLCInventors: Shyam Burkule, Kalidas Balakrishnan, Ramprasad Chinthekindi
-
Patent number: 11093387Abstract: System generates data structure based on unique identifiers of objects in object storages and sets indicators in positions that correspond to hashes of unique identifiers of active objects. If a first number of regions of active data objects in first data storage and second number of regions of active data objects in second data storage each fail to satisfy data threshold, then system creates model identifying locations and sizes of regions of active data objects in first data storage and regions of active data objects in second data storage. System resets indicators in positions in data structure which correspond to hashes of unique identifiers of active data objects associated with model and enables remote storage to use model to copy regions of active data objects in first data storage and second data storage to third data storage, and to delete first data storage and second data storage.Type: GrantFiled: October 26, 2018Date of Patent: August 17, 2021Assignee: EMC IP Holding Company LLCInventors: Ramprasad Chinthekindi, Abhinav Duggal, Kalidas Balakrishnan, Fani Jenkins
-
RECONSTRUCTING LOST DATA OBJECTS BY GENERATING VIRTUAL USER FILES FROM AVAILABLE TIERS WITHIN A NODE
Publication number: 20210124716Abstract: Embodiments of method and system are directed to a best effort method to reconstruct the corrupt files from available nodes or tiers and heal or repair the corrupt files. The method looks for the existence of fingerprints of the lost segments in available tiers on the nodes or across nodes within a cluster. The method discovers the copies of these missing segments, creates an Lp tree referring these discovered segments and creates a virtual file in the namespace. The file is then moved to the destination tier where the corruption exists, thus healing the corruption.Type: ApplicationFiled: October 25, 2019Publication date: April 29, 2021Inventors: Ramprasad Chinthekindi, Shyam Burkule, Kalidas Balakrishnan, Kalyan C. Gunda, Subrahmanyam Josyula -
Publication number: 20210124645Abstract: Embodiments of method and system are directed to a best effort method to reconstruct corrupt files from available nodes or tiers and heal or repair the corrupt files within a cluster of nodes. The method looks for the existence of fingerprints of the lost segments in available tiers on the nodes or across nodes within a cluster. The method discovers the copies of these missing segments, creates an Lp tree referring these discovered segments and creates a virtual file in the namespace. The file is then moved to the destination tier where the corruption exists, thus healing the corruption.Type: ApplicationFiled: October 25, 2019Publication date: April 29, 2021Inventors: Ramprasad Chinthekindi, Shyam Burkule, Kalidas Balakrishnan, Kalyan C Gunda, Subrahmanyam Josyula
-
Publication number: 20210117406Abstract: A microservice or serverless process consistency check process comprising locating all the necessary metadata and data objects in the cloud by storing the data objects in the cloud and synchronously mirroring the metadata, which is separately stored in local storage, to the cloud. The process generates a list of data objects in the cloud as “Set A” and the list of metadata objects in the same prefix range as the data objects as “Set B.” The consistency check then verifies whether all objects in Set A are referred to by objects in set B. In the case where there are gaps between the sets, non-existent objects are marked as missing, and unreferenced objects are marked as orphan objects. The list of missing and orphan objects is then sent back to the backup server for analysis and further processing.Type: ApplicationFiled: October 18, 2019Publication date: April 22, 2021Inventors: Shyam Burkule, Kalidas Balakrishnan, Ramprasad Chinthekindi
-
Patent number: 10831391Abstract: Embodiments are described for performing file restores from remote high-latency storage tiers by reading available data from a local low-latency tier in a deduplication appliance. A request to restore a previously segmented and deduplicated file can be received by a storage appliance from an application, each segment having a fingerprint. The name of the file can be looked up in an index on the storage appliance, and a first batch of fingerprints of segments of the file can be retrieved from the index. Each fingerprint can be looked up in metadata in the index to determine whether the segment corresponding to the fingerprint is available locally and therefore need not be retrieved locally. A list of local and remote prefetch segments is generated, and a prefetch request is generated for each list, if non-empty. Use of the prefetch scheme can be dynamically turned on or off.Type: GrantFiled: April 27, 2018Date of Patent: November 10, 2020Assignee: EMC IP HOLDING COMPANY LLCInventors: Nitin Madan, Srikant Viswanathan, Kedar Godbole, Kalyan C. Gunda, Kalidas Balakrishnan
-
Publication number: 20200142970Abstract: Embodiments of an instant recall process and system for long-term data stored on a cloud storage tier. Embodiments include saving a content handle of a file in a cloud storage tier as an extended attribute in a single file system namespace; moving the file from the cloud storage tier to an active storage tier for data processing; recalling the file from the active storage tier to the cloud storage tier upon completion of the data processing; using the content handle from hidden metadata for a working copy of the file; and saving a hash of a segment reference as part of the extended attribute.Type: ApplicationFiled: November 2, 2018Publication date: May 7, 2020Inventors: Nitin Madan, Kedar Godbole, Srikant Viswanathan, Bhimsen Bhanjois, Kalyan Gunda, Kalidas Balakrishnan, Vivek Nambiar, Chetan Risbud
-
Publication number: 20190332307Abstract: Embodiments are described for performing file restores from remote high-latency storage tiers by reading available data from a local low-latency tier in a deduplication appliance. A request to restore a previously segmented and deduplicated file can be received by a storage appliance from an application, each segment having a fingerprint. The name of the file can be looked up in an index on the storage appliance, and a first batch of fingerprints of segments of the file can be retrieved from the index. Each fingerprint can be looked up in metadata in the index to determine whether the segment corresponding to the fingerprint is available locally and therefore need not be retrieved locally. A list of local and remote prefetch segments is generated, and a prefetch request is generated for each list, if non-empty. Use of the prefetch scheme can be dynamically turned on or off.Type: ApplicationFiled: April 27, 2018Publication date: October 31, 2019Inventors: Nitin Madan, Srikant Viswanathan, Kedar Godbole, Kalyan C. Gunda, Kalidas Balakrishnan
-
Patent number: 9600679Abstract: Techniques for resource operation based on usage, sharing, and recommendations with modular authentication are provided. A resource space is associated with a principal. The resource space comprises resources local to a device of the principal and remote from the device. The resources presented in a merged view within a local file system and operating system of the device. In an embodiment, the device negotiates authentication with an intermediary for access to a legacy service where authentication is performed by the intermediary on behalf of the device, and the intermediary establishes an authentication session between the principal and the legacy service.Type: GrantFiled: April 27, 2012Date of Patent: March 21, 2017Assignee: Micro Focus Software Inc.Inventors: William Calero, Glen Davis, Richard Brian Fowler, Richard Lindstedt, Umadevi Santhanam, Kalyanasundaram Subramanivan, Krishna Mitter, Kalidas Balakrishnan, Mahabaleshwar Mallappa Asundi, Ramesh Sunder, Nithya Balachandran, Praveen Kumar Sivapuram, Anil Kumar, Mandhakini Subramanian
-
Publication number: 20120278873Abstract: Techniques for resource operation based on usage, sharing, and recommendations with modular authentication are provided. A resource space is associated with a principal. The resource space comprises resources local to a device of the principal and remote from the device. The resources presented in a merged view within a local file system and operating system of the device. In an embodiment, the device negotiates authentication with an intermediary for access to a legacy service where authentication is performed by the intermediary on behalf of the device, and the intermediary establishes an authentication session between the principal and the legacy service.Type: ApplicationFiled: April 27, 2012Publication date: November 1, 2012Inventors: William Calero, Glen Davis, Richard Brian Fowler, Richard Lindstedt, Umadevi Santhanam, Kalvanasundaram Subramanivan, Krishna Mitter, Kalidas Balakrishnan, Mahabaleshwar Mallappa Asundi, Ramesh Sunder, Nithya Balachandran, Praveen Kumar Sivapuram, Anil Kumar, Mandhakini Subramanian
-
Patent number: 8082227Abstract: Techniques for the session sensitive data backups and restores are presented. Data having a plurality of hard linked file references are backed up and restored once during a backup operation. Any modifications to the backed up data are noted as session-specific versions and also backed up once. The hard linked file references are maintained in a data structure and managed during backups to define associations to the backed up data and to the session-specific versions of the data. The data structure is also used during restores to re-establish desired hard linked file reference associations to either the backed up data or to a particular session-specific versions of the data.Type: GrantFiled: June 26, 2007Date of Patent: December 20, 2011Assignee: EMC CorporationInventors: Kalidas Balakrishnan, Shyamsundar Ranganathan
-
Publication number: 20110191291Abstract: Techniques for the session sensitive data backups and restores are presented. Data having a plurality of hard linked file references are backed up and restored once during a backup operation. Any modifications to the backed up data are noted as session-specific versions and also backed up once. The hard linked file references are maintained in a data structure and managed during backups to define associations to the backed up data and to the session-specific versions of the data. The data structure is also used during restores to re-establish desired hard linked file reference associations to either the backed up data or to a particular session -specific versions of the data.Type: ApplicationFiled: June 26, 2007Publication date: August 4, 2011Applicant: Novell, Inc.Inventors: Kalidas Balakrishnan, Shyamsundar Ranganathan