Patents by Inventor Mohammed Junaid Ahmed
Mohammed Junaid Ahmed has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11455182Abstract: Systems and methods are described for encrypting a swap file in a computer system. The swap file can be encrypted by a background process executing on the computer system. Processing of paging swapping operations occurs independently and separately of the background encryption of the swap file. Processing a page swapping operation can include decrypting or encrypting data to be swapped involved in the paging operation depending on the paging operation and whether or not the data to be swapped is encrypted or not.Type: GrantFiled: May 3, 2019Date of Patent: September 27, 2022Assignee: VMware, Inc.Inventors: Ishan Banerjee, Preeti Agarwal, Valeriy Zhuravlev, Nick M Ryan, Mohammed Junaid Ahmed
-
Patent number: 11436034Abstract: Provided are techniques for encrypting a virtual disk of a virtual computing instance (VCI) while the VCI is online and still running using a mirror driver. In certain aspects a mirror driver is a filter running in an I/O stack used for accessing a virtual disk, such that the mirror driver receives I/Os destined to the virtual disk and mirrors those I/Os to the virtual disk and one or more additional virtual disks. The mirror driver begins copying data from an unencrypted source virtual disk to a destination virtual disk, and the data is encrypted as it is stored in the destination virtual disk, while the VCI is still online. During the copying, as new writes are issued to the unencrypted source virtual disk from the VCI, the mirror driver mirrors the writes to both the unencrypted source virtual disk and the destination virtual disk.Type: GrantFiled: November 13, 2019Date of Patent: September 6, 2022Assignee: VMWARE, INC.Inventor: Mohammed Junaid Ahmed
-
Publication number: 20210141656Abstract: Provided are techniques for encrypting a virtual disk of a virtual computing instance (VCI) while the VCI is online and still running using a mirror driver. In certain aspects a mirror driver is a filter running in an I/O stack used for accessing a virtual disk, such that the mirror driver receives I/Os destined to the virtual disk and mirrors those I/Os to the virtual disk and one or more additional virtual disks. The mirror driver begins copying data from an unencrypted source virtual disk to a destination virtual disk, and the data is encrypted as it is stored in the destination virtual disk, while the VCI is still online. During the copying, as new writes are issued to the unencrypted source virtual disk from the VCI, the mirror driver mirrors the writes to both the unencrypted source virtual disk and the destination virtual disk.Type: ApplicationFiled: November 13, 2019Publication date: May 13, 2021Inventor: Mohammed Junaid AHMED
-
Publication number: 20200349260Abstract: Systems and methods are described for encrypting the virtual disk in a virtual machine (VM). The virtual disk can be encrypted by a background process executing on the host machine that hosts the VM. Input/output operations (I/Os) to the virtual disk issued by a guest operating system (OS) executing on the VM can be intercepted on the hypervisor of the host machine and processed during the background encryption. Processing of the I/Os occurs independently and separately of background encryption of the virtual disk. Processing an I/O can include decrypting or encrypting data involved in the I/O depending on the location on the virtual disk targeted by the I/O.Type: ApplicationFiled: May 3, 2019Publication date: November 5, 2020Inventors: Nick M. Ryan, Viswesh Narayanan, Mohammed Junaid Ahmed
-
Publication number: 20200348954Abstract: Systems and methods are described for encrypting a swap file in a computer system. The swap file can be encrypted by a background process executing on the computer system. Processing of paging swapping operations occurs independently and separately of the background encryption of the swap file. Processing a page swapping operation can include decrypting or encrypting data to be swapped involved in the paging operation depending on the paging operation and whether or not the data to be swapped is encrypted or not.Type: ApplicationFiled: May 3, 2019Publication date: November 5, 2020Inventors: Ishan Banerjee, Preeti Agarwal, Valeriy Zhuravlev, Nick M. Ryan, Mohammed Junaid Ahmed
-
Patent number: 10585690Abstract: One or more embodiments provide techniques for promoting a linked clone virtual machine to a full clone virtual machine. In one embodiment, a method includes receiving an instruction to promote the linked clone virtual machine to a full clone virtual machine. The method also includes creating a second base disk for the linked clone virtual machine. The method includes installing a mirror driver between the first delta disk and the second base disk. The method includes copying the contents of the first delta disk to the second base disk with the mirror driver. After the contents of the first delta disk have been copied to the second base disk, the method includes removing the mirror driver and operating the linked clone virtual machine as a full clone virtual machine on the second base disk.Type: GrantFiled: September 30, 2016Date of Patent: March 10, 2020Assignee: VMware, Inc.Inventors: Mohammed Junaid Ahmed, Nishant Yadav, Jesse Pool
-
Patent number: 10515058Abstract: A request to perform an operation on an object in a first storage system may be received from a client computing device via a local area network or a wide area network. Mapping data that associates an account identifier from the request to perform the operation on the object in the first storage system to a volume of a file system of a second storage system may be received. The second storage system may be mounted to perform the operation using the file in the second storage system that corresponds to the object in the first storage system. The second storage system may be mounted by using the account identifier from the mapping data.Type: GrantFiled: May 7, 2018Date of Patent: December 24, 2019Assignee: Red Hat, Inc.Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
-
Publication number: 20180260412Abstract: A request to perform an operation on an object in a first storage system may be received from a client computing device via a local area network or a wide area network. Mapping data that associates an account identifier from the request to perform the operation on the object in the first storage system to a volume of a file system of a second storage system may be received. The second storage system may be mounted to perform the operation using the file in the second storage system that corresponds to the object in the first storage system. The second storage system may be mounted by using the account identifier from the mapping data.Type: ApplicationFiled: May 7, 2018Publication date: September 13, 2018Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
-
Patent number: 9971788Abstract: A server computing device receives, from a client computing device, a request to perform an operation on an object. The server computing device identifies a file, that corresponds to the object, in a network attached storage file system in a local area network. The server computing device mounts, via the local area network, the network attached storage file system to perform the operation using the file that corresponds to the object. The computer device sends a response indicating performance of the operation to the client computing device.Type: GrantFiled: November 27, 2012Date of Patent: May 15, 2018Assignee: Red Hat, Inc.Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
-
Patent number: 9971787Abstract: A server computing device receives, from a client computing device, a hypertext transfer protocol (HTTP) request to perform an operation on an object. The server computing device identifies a file, that corresponds to the object, in a network attached storage file system in a local area network. The server computing device mounts, via the local area network, the network attached storage file system to perform the operation using the file that corresponds to the object. The computer device sends a HTTP response indicating performance of the operation to the client computing device.Type: GrantFiled: July 23, 2012Date of Patent: May 15, 2018Assignee: Red Hat, Inc.Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
-
Publication number: 20180095775Abstract: One or more embodiments provide techniques for promoting a linked clone virtual machine to a full clone virtual machine. In one embodiment, a method includes receiving an instruction to promote the linked clone virtual machine to a full clone virtual machine. The method also includes creating a second base disk for the linked clone virtual machine. The method includes installing a mirror driver between the first delta disk and the second base disk. The method includes copying the contents of the first delta disk to the second base disk with the mirror driver. After the contents of the first delta disk have been copied to the second base disk, the method includes removing the mirror driver and operating the linked clone virtual machine as a full clone virtual machine on the second base disk.Type: ApplicationFiled: September 30, 2016Publication date: April 5, 2018Inventors: Mohammed Junaid AHMED, Nishant YADAV, Jesse POOL
-
Publication number: 20140025711Abstract: A server computing device receives, from a client computing device, a hypertext transfer protocol (HTTP) request to perform an operation on an object. The server computing device identifies a file, that corresponds to the object, in a network attached storage file system in a local area network. The server computing device mounts, via the local area network, the network attached storage file system to perform the operation using the file that corresponds to the object. The computer device sends a HTTP response indicating performance of the operation to the client computing device.Type: ApplicationFiled: July 23, 2012Publication date: January 23, 2014Applicant: RED HAT, INC.Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
-
Publication number: 20140025713Abstract: A server computing device receives, from a client computing device, a request to perform an operation on an object. The server computing device identifies a file, that corresponds to the object, in a network attached storage file system in a local area network. The server computing device mounts, via the local area network, the network attached storage file system to perform the operation using the file that corresponds to the object. The computer device sends a response indicating performance of the operation to the client computing device.Type: ApplicationFiled: November 27, 2012Publication date: January 23, 2014Applicant: RED HAT, INC.Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed