Patents by Inventor Kiran Kamath
Kiran Kamath has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250061187Abstract: Aspects of the disclosure provide continual backup verification for ransomware detection and recovery of fileless malicious logic. On an ongoing basis, even prior to detecting an attack within a production environment, each of a plurality of backup virtual machines (VMs) is executed in an isolation environment and subject to behavior monitoring to detect malicious logic (e.g., ransomware). If malicious logic is detected in a backup VM, an alert is generated and/or that backup VM is marked as unavailable for use as a restoration backup, in order to avoid re-infecting the production environment. In some examples, a backup VM with malicious logic is cleaned and returned to the pool of available backups that are suitable for use. Because the production environment is not burdened, in some examples, the probability of detection for finding malicious logic in the isolation environment is set higher than what is used in the production environment.Type: ApplicationFiled: August 18, 2023Publication date: February 20, 2025Inventors: Boris WEISSMAN, Kiran KAMATH, Juan Pablo CASARES-CHARLES, Piyush KOTHARI, Michael KOLECHKIN, Deepa SREEKUMAR, Mamta BHAVSAR
-
Publication number: 20250061199Abstract: Aspects of the disclosure accelerate recovery using a combination of local and remote backups. A backup selector identifies a latest unencrypted remote backup (e.g., created prior to an encrypted backup), a latest unencrypted local backup created prior to the latest unencrypted remote backup, and a penultimate unencrypted remote backup created prior to the latest unencrypted local backup. A restoration manager restores a local computing asset to the state of the latest unencrypted local backup. In a disaster recovery (DR) environment, two differences are generated: one between the latest unencrypted remote backup and the penultimate unencrypted remote backup and another between a newly-generated failback backup and the latest unencrypted remote backup. The two differences are sent to the restoration manager to roll the state of the local computing asset forward in two stages. This approach is faster and reduces egress charges in cloud-based DR environments.Type: ApplicationFiled: August 18, 2023Publication date: February 20, 2025Inventors: Boris Weissman, Sungjoon Ahn, Derek Uluski, Ashish Prajapati, Henry Dikeman, Kiran Kamath, Lakshmi Narayanan Bairavasundaram, Ilia Langouev
-
Publication number: 20240193049Abstract: A method for virtual computing instance remediation is provided. Some embodiments include retrieving a first backup of a virtual machine from storage, the first backup comprising configuration information and data of the virtual machine, the configuration information comprising network connectivity information in a first software defined data center (SDDC) running on a first set of host machines. Some embodiments include configuring a second SDDC running on a second set of host machines based on the configuration information, where the second SDDC is network isolated from the first SDDC and powering on the virtual machine from the first backup in the second SDDC. Some embodiments include sending, from the virtual machine to a security platform, behavior information of the virtual machine running in the second SDDC and determining, based on the behavior information, whether the virtual machine running in the second SDDC is infected with malware.Type: ApplicationFiled: December 13, 2022Publication date: June 13, 2024Inventors: Boris WEISSMAN, Bharath Kumar CHANDRASEKHAR, Kiran KAMATH, Piyush KOTHARI, Juan Pablo CASARES-CHARLES, Mamta BHAVSAR, Ryan Joseph TODD, Michael KOLECHKIN, David Aaron KRIEGER, Deepa SREEKUMAR, Sharath Nagaraj DWARAL, Kamala Narayan Balasubramanian SHARATH, Kedar THIAGARAJAN, Amol Abhay KHARE, Leena Shuklendu SOMAN, Mandar Kashinath NADGOUDA, Robert James SPEAKER
-
Patent number: 10552187Abstract: Methods and apparatus to manage configuration of policy-based hypervisors are disclosed. An example method includes generating, by executing an instruction with a processor, a specification for a target configuration of a host based on a policy-based profile, the policy-based profile describing a source configuration of a source host at a virtualization software level; applying, by executing an instruction with the processor, the specification to the target configuration; and in response to an update to the policy-based profile, updating, by executing an instruction with the processor, the target configuration to place the host in compliance with the updated policy-based profile.Type: GrantFiled: August 14, 2017Date of Patent: February 4, 2020Assignee: VMware Inc.Inventors: Jeffrey Hu, Kiran Kamath, Saurav Sen, Sandhya Kunnatur
-
Publication number: 20180011725Abstract: Methods and apparatus to manage configuration of policy-based hypervisors are disclosed. An example method includes generating, by executing an instruction with a processor, a specification for a target configuration of a host based on a policy-based profile, the policy-based profile describing a source configuration of a source host at a virtualization software level; applying, by executing an instruction with the processor, the specification to the target configuration; and in response to an update to the policy-based profile, updating, by executing an instruction with the processor, the target configuration to place the host in compliance with the updated policy-based profile.Type: ApplicationFiled: August 14, 2017Publication date: January 11, 2018Inventors: Jeffrey Hu, Kiran Kamath, Saurav Sen, Sandhya Kunnatur
-
Patent number: 9733959Abstract: At least one target configuration of a host at a virtualization software level is automatically assembled based on a source configuration. A policy-based profile describing the source configuration is processed. A configuration specification describing the target configuration is automatically created, based on the policy-based profile describing the source configuration. The configuration specification is automatically applied to target configurations, such that the target configurations are compliant with the policy-based profile.Type: GrantFiled: September 15, 2008Date of Patent: August 15, 2017Assignee: VMware, Inc.Inventors: Jeffrey Hu, Kiran Kamath, Saurav Sen, Sandhya Kunnatur
-
Patent number: 8954545Abstract: A method of determining compatibility of a virtual machine or virtual machine disk file with a host, including a storage host, is disclosed. A lookup matrix is created to provide a fast compatibility lookup. To create the lookup matrix, computing object properties are retrieved from each of the plurality of computing objects. The computing object properties include resource requirements of each of the plurality of computing objects. Further, host properties are retrieved from each of the plurality of hosts. The method further includes creating host logical groups of a subset of the plurality of hosts having substantially same host properties and creating a plurality of computing object logical groups of a subject of the plurality of computing objects having substantially same computing object properties. The lookup matrix answers whether each member of a selected computing object logical group can be transferred to a selected host logical group.Type: GrantFiled: December 17, 2012Date of Patent: February 10, 2015Assignee: VMware, Inc.Inventors: Kinshuk Govil, Kiran Kamath, Steven Michael Kusalo, Mark Russell Johnson
-
Patent number: 8359374Abstract: A method of determining compatibility of a virtual machine or virtual machine disk file with a host, including a storage host, is disclosed. A lookup matrix is created to provide a fast compatibility lookup for a group of computing objects and a group of hosts. To create the lookup matrix, computing object properties are retrieved from each of the plurality of computing objects. The computing object properties include resource requirements of each of the plurality of computing objects. Further, host properties are retrieved from each of the plurality of hosts. The method further includes creating a plurality of host logical groups of a subset of the plurality of hosts having substantially same host properties and creating a plurality of computing object logical groups of a subject of the plurality of computing objects having substantially same computing object properties.Type: GrantFiled: September 9, 2009Date of Patent: January 22, 2013Assignee: VMware, Inc.Inventors: Kinshuk Govil, Kiran Kamath, Steven Michael Kusalo, Mark Russell Johnson
-
Publication number: 20110060832Abstract: A method of determining compatibility of a virtual machine or virtual machine disk file with a host, including a storage host, is disclosed. A lookup matrix is created to provide a fast compatibility lookup for a group of computing objects and a group of hosts. To create the lookup matrix, computing object properties are retrieved from each of the plurality of computing objects. The computing object properties include resource requirements of each of the plurality of computing objects. Further, host properties are retrieved from each of the plurality of hosts. The method further includes creating a plurality of host logical groups of a subset of the plurality of hosts having substantially same host properties and creating a plurality of computing object logical groups of a subject of the plurality of computing objects having substantially same computing object properties.Type: ApplicationFiled: September 9, 2009Publication date: March 10, 2011Applicant: VMWARE, INC.Inventors: Kinshuk GOVIL, Kiran KAMATH, Steven Michael KUSALO, Mark Russell JOHNSON
-
Publication number: 20100070970Abstract: At least one target configuration of a host at a virtualization software level is automatically assembled based on a source configuration. A policy based profile describing the source configuration is processed. A configuration specification describing the target configuration is automatically created, based on the policy based profile describing the source configuration. The configuration specification is automatically applied to target configurations, such that the target configuration(s) are compliant with the policy based profile.Type: ApplicationFiled: September 15, 2008Publication date: March 18, 2010Applicant: VMware, Inc.Inventors: Jeffrey HU, Kiran KAMATH, Saurav SEN, Sandhya KUNNATUR