Patents by Inventor Mohammed Junaid Ahmed

Mohammed Junaid Ahmed has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11455182
    Abstract: Systems and methods are described for encrypting a swap file in a computer system. The swap file can be encrypted by a background process executing on the computer system. Processing of paging swapping operations occurs independently and separately of the background encryption of the swap file. Processing a page swapping operation can include decrypting or encrypting data to be swapped involved in the paging operation depending on the paging operation and whether or not the data to be swapped is encrypted or not.
    Type: Grant
    Filed: May 3, 2019
    Date of Patent: September 27, 2022
    Assignee: VMware, Inc.
    Inventors: Ishan Banerjee, Preeti Agarwal, Valeriy Zhuravlev, Nick M Ryan, Mohammed Junaid Ahmed
  • Patent number: 11436034
    Abstract: Provided are techniques for encrypting a virtual disk of a virtual computing instance (VCI) while the VCI is online and still running using a mirror driver. In certain aspects a mirror driver is a filter running in an I/O stack used for accessing a virtual disk, such that the mirror driver receives I/Os destined to the virtual disk and mirrors those I/Os to the virtual disk and one or more additional virtual disks. The mirror driver begins copying data from an unencrypted source virtual disk to a destination virtual disk, and the data is encrypted as it is stored in the destination virtual disk, while the VCI is still online. During the copying, as new writes are issued to the unencrypted source virtual disk from the VCI, the mirror driver mirrors the writes to both the unencrypted source virtual disk and the destination virtual disk.
    Type: Grant
    Filed: November 13, 2019
    Date of Patent: September 6, 2022
    Assignee: VMWARE, INC.
    Inventor: Mohammed Junaid Ahmed
  • Publication number: 20210141656
    Abstract: Provided are techniques for encrypting a virtual disk of a virtual computing instance (VCI) while the VCI is online and still running using a mirror driver. In certain aspects a mirror driver is a filter running in an I/O stack used for accessing a virtual disk, such that the mirror driver receives I/Os destined to the virtual disk and mirrors those I/Os to the virtual disk and one or more additional virtual disks. The mirror driver begins copying data from an unencrypted source virtual disk to a destination virtual disk, and the data is encrypted as it is stored in the destination virtual disk, while the VCI is still online. During the copying, as new writes are issued to the unencrypted source virtual disk from the VCI, the mirror driver mirrors the writes to both the unencrypted source virtual disk and the destination virtual disk.
    Type: Application
    Filed: November 13, 2019
    Publication date: May 13, 2021
    Inventor: Mohammed Junaid AHMED
  • Publication number: 20200349260
    Abstract: Systems and methods are described for encrypting the virtual disk in a virtual machine (VM). The virtual disk can be encrypted by a background process executing on the host machine that hosts the VM. Input/output operations (I/Os) to the virtual disk issued by a guest operating system (OS) executing on the VM can be intercepted on the hypervisor of the host machine and processed during the background encryption. Processing of the I/Os occurs independently and separately of background encryption of the virtual disk. Processing an I/O can include decrypting or encrypting data involved in the I/O depending on the location on the virtual disk targeted by the I/O.
    Type: Application
    Filed: May 3, 2019
    Publication date: November 5, 2020
    Inventors: Nick M. Ryan, Viswesh Narayanan, Mohammed Junaid Ahmed
  • Publication number: 20200348954
    Abstract: Systems and methods are described for encrypting a swap file in a computer system. The swap file can be encrypted by a background process executing on the computer system. Processing of paging swapping operations occurs independently and separately of the background encryption of the swap file. Processing a page swapping operation can include decrypting or encrypting data to be swapped involved in the paging operation depending on the paging operation and whether or not the data to be swapped is encrypted or not.
    Type: Application
    Filed: May 3, 2019
    Publication date: November 5, 2020
    Inventors: Ishan Banerjee, Preeti Agarwal, Valeriy Zhuravlev, Nick M. Ryan, Mohammed Junaid Ahmed
  • Patent number: 10585690
    Abstract: One or more embodiments provide techniques for promoting a linked clone virtual machine to a full clone virtual machine. In one embodiment, a method includes receiving an instruction to promote the linked clone virtual machine to a full clone virtual machine. The method also includes creating a second base disk for the linked clone virtual machine. The method includes installing a mirror driver between the first delta disk and the second base disk. The method includes copying the contents of the first delta disk to the second base disk with the mirror driver. After the contents of the first delta disk have been copied to the second base disk, the method includes removing the mirror driver and operating the linked clone virtual machine as a full clone virtual machine on the second base disk.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: March 10, 2020
    Assignee: VMware, Inc.
    Inventors: Mohammed Junaid Ahmed, Nishant Yadav, Jesse Pool
  • Patent number: 10515058
    Abstract: A request to perform an operation on an object in a first storage system may be received from a client computing device via a local area network or a wide area network. Mapping data that associates an account identifier from the request to perform the operation on the object in the first storage system to a volume of a file system of a second storage system may be received. The second storage system may be mounted to perform the operation using the file in the second storage system that corresponds to the object in the first storage system. The second storage system may be mounted by using the account identifier from the mapping data.
    Type: Grant
    Filed: May 7, 2018
    Date of Patent: December 24, 2019
    Assignee: Red Hat, Inc.
    Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
  • Publication number: 20180260412
    Abstract: A request to perform an operation on an object in a first storage system may be received from a client computing device via a local area network or a wide area network. Mapping data that associates an account identifier from the request to perform the operation on the object in the first storage system to a volume of a file system of a second storage system may be received. The second storage system may be mounted to perform the operation using the file in the second storage system that corresponds to the object in the first storage system. The second storage system may be mounted by using the account identifier from the mapping data.
    Type: Application
    Filed: May 7, 2018
    Publication date: September 13, 2018
    Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
  • Patent number: 9971788
    Abstract: A server computing device receives, from a client computing device, a request to perform an operation on an object. The server computing device identifies a file, that corresponds to the object, in a network attached storage file system in a local area network. The server computing device mounts, via the local area network, the network attached storage file system to perform the operation using the file that corresponds to the object. The computer device sends a response indicating performance of the operation to the client computing device.
    Type: Grant
    Filed: November 27, 2012
    Date of Patent: May 15, 2018
    Assignee: Red Hat, Inc.
    Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
  • Patent number: 9971787
    Abstract: A server computing device receives, from a client computing device, a hypertext transfer protocol (HTTP) request to perform an operation on an object. The server computing device identifies a file, that corresponds to the object, in a network attached storage file system in a local area network. The server computing device mounts, via the local area network, the network attached storage file system to perform the operation using the file that corresponds to the object. The computer device sends a HTTP response indicating performance of the operation to the client computing device.
    Type: Grant
    Filed: July 23, 2012
    Date of Patent: May 15, 2018
    Assignee: Red Hat, Inc.
    Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
  • Publication number: 20180095775
    Abstract: One or more embodiments provide techniques for promoting a linked clone virtual machine to a full clone virtual machine. In one embodiment, a method includes receiving an instruction to promote the linked clone virtual machine to a full clone virtual machine. The method also includes creating a second base disk for the linked clone virtual machine. The method includes installing a mirror driver between the first delta disk and the second base disk. The method includes copying the contents of the first delta disk to the second base disk with the mirror driver. After the contents of the first delta disk have been copied to the second base disk, the method includes removing the mirror driver and operating the linked clone virtual machine as a full clone virtual machine on the second base disk.
    Type: Application
    Filed: September 30, 2016
    Publication date: April 5, 2018
    Inventors: Mohammed Junaid AHMED, Nishant YADAV, Jesse POOL
  • Publication number: 20140025711
    Abstract: A server computing device receives, from a client computing device, a hypertext transfer protocol (HTTP) request to perform an operation on an object. The server computing device identifies a file, that corresponds to the object, in a network attached storage file system in a local area network. The server computing device mounts, via the local area network, the network attached storage file system to perform the operation using the file that corresponds to the object. The computer device sends a HTTP response indicating performance of the operation to the client computing device.
    Type: Application
    Filed: July 23, 2012
    Publication date: January 23, 2014
    Applicant: RED HAT, INC.
    Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed
  • Publication number: 20140025713
    Abstract: A server computing device receives, from a client computing device, a request to perform an operation on an object. The server computing device identifies a file, that corresponds to the object, in a network attached storage file system in a local area network. The server computing device mounts, via the local area network, the network attached storage file system to perform the operation using the file that corresponds to the object. The computer device sends a response indicating performance of the operation to the client computing device.
    Type: Application
    Filed: November 27, 2012
    Publication date: January 23, 2014
    Applicant: RED HAT, INC.
    Inventors: Anand Vishweswaran Avati, Mohammed Junaid Ahmed