Patents by Inventor Kshitiz Sharma

Kshitiz Sharma has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12182250
    Abstract: Credentials management and usage in application modernization can be implemented as computer-readable methods, media and systems. A notification identifying an application modernization operation is received. The operation is to be performed on an application deployed by multiple resources arranged in multiple hierarchical levels. A resource residing at a hierarchical level of the multiple hierarchical levels is identified. The application modernization operation is to be performed on the identified resource which has a resource type. A search for a credential is performed. The credential grants access to the resource to enable performing the application modernization operation. In response to the searching, a credential included in the multiple credentials is identified. The identified credential grants access either to the resource or to resources of the resource type. In response to receiving the notification, the identified credential is provided.
    Type: Grant
    Filed: August 11, 2021
    Date of Patent: December 31, 2024
    Assignee: VMware LLC
    Inventors: Avi Sharma, Sri Narayanan Thanga Nadar, Shivakumar Somapur, Ashok Aletty, Kshitiz Sharma, Gyanendra Pratap Singh, William Lam, Ankita Sharma, Ahil Kanna
  • Publication number: 20240231876
    Abstract: An example method of determining application topology in a virtualized computing system having a cluster of hosts with hypervisors supporting virtual machines (VMs), the method including: executing agents on the VMs to obtain process metadata describing processes executing in the VMs; receiving, at an application analysis system, the process metadata; receiving network flow metadata from the agents on the VMs and/or from a network analyzer in the virtualized computing system; parsing the network flow metadata to identify a source VM and a destination VM of the VMs; relating the network flow metadata to portions of the process metadata associated with the source and the destination VMs to identify a source process and a destination process; and generating a topology of a source component connected to a destination component, the source component identifying the source VM and the source process, the destination component identifying the destination VM and the destination process.
    Type: Application
    Filed: March 15, 2023
    Publication date: July 11, 2024
    Inventors: Avi Sharma, Ahil Kanna, Kshitiz Sharma, Ashok Aletty, Sanjay Amin, Nithin Krishnan
  • Patent number: 11995461
    Abstract: An example method includes: executing, by application analysis software executing in the virtualized computing system, process discovery agents on the VMs; receiving, at the application analysis software from the process discovery agents, process metadata describing processes executing on the VMs; generating signatures for the processes based on the process metadata; determining components of an application based on the signatures; determining components of an application based on the signatures; identifying, for a first component of the components, a component-specific metadata collector; executing, by the application analysis software, the component-specific metadata collector on a first VM of the VMs; and receiving, at the application analysis software from the component-specific metadata collector, custom metadata further describing a first process of the processes associated with the first component.
    Type: Grant
    Filed: October 29, 2021
    Date of Patent: May 28, 2024
    Assignee: VMware LLC
    Inventors: Sri Narayanan Thanga Nadar, Ankita Sharma, Ashok Aletty, Ahil Kanna, Kshitiz Sharma, Shivakumar Somapur, Aman Singh, Vijay Kintali
  • Publication number: 20230024826
    Abstract: An example method includes: executing, by application analysis software executing in the virtualized computing system, process discovery agents on the VMs; receiving, at the application analysis software from the process discovery agents, process metadata describing processes executing on the VMs; generating signatures for the processes based on the process metadata; determining components of an application based on the signatures; determining components of an application based on the signatures; identifying, for a first component of the components, a component-specific metadata collector; executing, by the application analysis software, the component-specific metadata collector on a first VM of the VMs; and receiving, at the application analysis software from the component-specific metadata collector, custom metadata further describing a first process of the processes associated with the first component.
    Type: Application
    Filed: October 29, 2021
    Publication date: January 26, 2023
    Inventors: Sri Narayanan Thanga Nadar, Ankita Sharma, Ashok Aletty, Ahil Kanna, Kshitiz Sharma, Shivakumar Somapur, Aman Singh, Vijay Kintali
  • Publication number: 20220382849
    Abstract: Credentials management and usage in application modernization can be implemented as computer-readable methods, media and systems. A notification identifying an application modernization operation is received. The operation is to be performed on an application deployed by multiple resources arranged in multiple hierarchical levels. A resource residing at a hierarchical level of the multiple hierarchical levels is identified. The application modernization operation is to be performed on the identified resource which has a resource type. A search for a credential is performed. The credential grants access to the resource to enable performing the application modernization operation. In response to the searching, a credential included in the multiple credentials is identified. The identified credential grants access either to the resource or to resources of the resource type. In response to receiving the notification, the identified credential is provided.
    Type: Application
    Filed: August 11, 2021
    Publication date: December 1, 2022
    Inventors: Avi SHARMA, Sri Narayanan THANGA NADAR, Shivakumar SOMAPUR, Ashok ALETTY, Kshitiz SHARMA, Gyanendra Pratap SINGH, William LAM, Ankita SHARMA, Ahil KANNA
  • Publication number: 20070006170
    Abstract: When, during debugging, a program failure occurs, the location of the failure is determined. First the address in the stack related to the program failure is found. Then static analysis is performed in order to determine a possible culprit for the failure. For example, when a security cookie has been overwritten, indicating a probable overflow, the location of the security cookie on the stack is determined, and proximate storage structures (such as arrays) which may have overflowed onto the location of the security cookie are determined. Then static analysis is used to determine probable sources (e.g. functions or instructions in a function) for this error. In this way, the root cause of a buffer overflow or similar problem can be identified easily, rather than requiring extensive time and knowledge regarding the working of the compiler, the security cookie, the stack, static analysis, and the source code.
    Type: Application
    Filed: June 30, 2005
    Publication date: January 4, 2007
    Applicant: Microsoft Corporation
    Inventors: Damian Hasse, Kshitiz Sharma, Thushara Wijeratna
  • Publication number: 20050120273
    Abstract: A large portion of software bugs are related to hangs. Analyzing and diagnosing hang-related bugs involves capturing data from a hung program and extracting attributes from the captured data. Extracting attributes from the capture data provides a scheme to determine relevant characteristics of the hang. Moreover, the extracted attributes may be compared to known issues and, based on that comparison, a bug may be classified as known or unknown. Alternatively, triage may be performed on the client computing device in order to determine the potential cause of the hang event. Once the potential cause of the hang event has been determined, troubleshooting steps may be performed on the client computing device to quarantine it. Ultimately, if the hang-inducing bug is known, a user may be provided with a solution to the bug. Alternatively, if the bug is unknown, implementations of the invention send the captured data to be analyzed and fixed by the software's provider.
    Type: Application
    Filed: November 14, 2003
    Publication date: June 2, 2005
    Inventors: William Hudson, Reiner Fink, Geoff Pease, Gerald Maffeo, Yi Meng, Eric LeVine, Andrew Bliss, Andre Vachon, Kshitiz Sharma, Jing Shan