Patents by Inventor Mrityunjay UPADHYAY

Mrityunjay UPADHYAY has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250077371
    Abstract: Described herein are techniques for automating media agent state management. For example, if a media agent is running poorly, then the media agent can be disabled and an alternate media agent can perform secondary copy job operations in place of the poorly running media agent. To determine whether a media agent is running poorly, a storage manager can determine whether the media agent has an anomalous number of failed jobs, pending jobs, and/or long running jobs and/or can determine whether the amount of resources used by the media agent is high or is increasing constantly, at a constant rate, or at a near constant rate.
    Type: Application
    Filed: November 20, 2024
    Publication date: March 6, 2025
    Applicant: Commvault Systems, Inc.
    Inventors: Shree Nandhini SANTHAKUMAR, Mrityunjay UPADHYAY
  • Publication number: 20250045397
    Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.
    Type: Application
    Filed: August 12, 2024
    Publication date: February 6, 2025
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20240256661
    Abstract: An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.
    Type: Application
    Filed: February 16, 2024
    Publication date: August 1, 2024
    Applicant: Commvault Systems, Inc.
    Inventors: Sri Karthik BHAGI, Pratima Laxman GADHAVE, Marcelo dos REIS MANSANO, Mrityunjay UPADHYAY, PurnaChandra Sekhar BEDHAPUDI, Shyam Sundar RAMKUMAR
  • Publication number: 20240202363
    Abstract: An illustrative data storage management system uses a control layer that controls information content presented to users and ensures information privacy between diverse tenants and/or resellers who share the system. The system populates a relationship database as transactions roll in (intake processing), and uses information in the relationship database later when processing responses (output processing). The relationship database comprises associations between e.g., a company ID and any number of entities that were created by or on behalf of the company or that are related to the company's service in the system. The control layer parses raw results that are responsive to requests for information and prevents others' information from being included in the responsive message(s). The techniques disclosed herein are not limited to shared systems managed by service providers, and may be implemented in fully owned and operated systems to add security and privacy among diverse users and/or departments.
    Type: Application
    Filed: March 4, 2024
    Publication date: June 20, 2024
    Applicant: Commvault Systems, Inc.
    Inventors: Bhavyan Bharatkumar MEHTA, Anand VIBHOR, Mrityunjay UPADHYAY, Shree Nandhini SANTHAKUMAR
  • Publication number: 20230195926
    Abstract: An illustrative data storage management system uses a control layer that controls information content presented to users and ensures information privacy between diverse tenants and/or resellers who share the system. The system populates a relationship database as transactions roll in (intake processing), and uses information in the relationship database later when processing responses (output processing). The relationship database comprises associations between e.g., a company ID and any number of entities that were created by or on behalf of the company or that are related to the company’s service in the system. The control layer parses raw results that are responsive to requests for information and prevents others’ information from being included in the responsive message(s). The techniques disclosed herein are not limited to shared systems managed by service providers, and may be implemented in fully owned and operated systems to add security and privacy among diverse users and/or departments.
    Type: Application
    Filed: December 21, 2021
    Publication date: June 22, 2023
    Inventors: Bhavyan Bharatkumar MEHTA, Anand VIBHOR, Mrityunjay UPADHYAY, Shree Nandhini SANTHAKUMAR
  • Publication number: 20220414103
    Abstract: A client computing device receives a behavior model corresponding to a user group associated with a user. The behavior model has been trained with monitored user interactions of one or more files associated with the user group. The client computing device further mounts a snapshot of a file and determines, based on the behavior model, which files of the mounted snapshot to transfer to a locally accessible cache. During use of the client computing device, the client computing device may determine whether the mounted snapshot is accessible. If the mounted snapshot is not accessible, the client computing device may selectively delete, based on the behavior model, one or more of the files stored in the locally accessible cache. If the mounted snapshot is accessible, the client computing device may update the one or more files of the locally accessible cache with monitored user interactions with the mounted snapshot.
    Type: Application
    Filed: July 20, 2021
    Publication date: December 29, 2022
    Inventors: Mrityunjay UPADHYAY, Bhavyan Bharatkumar MEHTA, Anand VIBHOR, Jagadeesh Narayanan Kallidaikurichi SWAMINATHAN
  • Publication number: 20220292196
    Abstract: An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.
    Type: Application
    Filed: April 28, 2021
    Publication date: September 15, 2022
    Inventors: Sri Karthik BHAGI, Pratima Laxman GADHAVE, Marcelo dos Reis Mansano, Mrityunjay UPADHYAY, PurnaChandra Sekhar BEDHAPUDI, Shyam Sundar Ramkumar
  • Publication number: 20220292188
    Abstract: An information management system includes one or more client computing devices in communication with a storage manager and a secondary storage computing device. The storage manager manages the primary data of the one or more client computing devices and the secondary storage computing device manages secondary copies of the primary data of the one or more client computing devices. Each client computing device may be configured with a ransomware protection monitoring application that monitors for changes in their primary data. The ransomware protection monitoring application may input the changes detected in the primary data into a machine-learning classifier, where the classifier generates an output indicative of whether a client computing device has been affected by malware and/or ransomware. Using a virtual machine host, a virtual machine copy of an affected client computing device may be instantiated using a secondary copy of primary data of the affected client computing device.
    Type: Application
    Filed: April 28, 2021
    Publication date: September 15, 2022
    Inventors: Sri Karthik BHAGI, Pratima Laxman GADHAVE, Marcelo dos Reis Mansano, Mrityunjay UPADHYAY, PurnaChandra Sekhar BEDHAPUDI, Shyam Sundar Ramkumar
  • Publication number: 20220239740
    Abstract: A system or method for managing an auxiliary data location and a secondary data location. A client computing device may have secondary copies of its primary data stored at a secondary storage device, as well as auxiliary copies of the secondary copies at an auxiliary storage device. The client computing device may move from one geographic location that is near the secondary storage device to a second geographic location that is far from the secondary storage device, but closer to the auxiliary storage device. A method is provided with input signals in response to the move, and outputs a probability value that the move is temporary or permanent. Based on the output, a storage manager that manages the client computing device may then direct the client computing device to use the auxiliary storage device for storing secondary copies.
    Type: Application
    Filed: March 25, 2022
    Publication date: July 28, 2022
    Inventors: Anand VIBHOR, Mrityunjay UPADHYAY, Bhavyan Bharatkumar MEHTA
  • Publication number: 20220215007
    Abstract: Described herein are techniques for better understanding problems arising in an illustrative information management system, such as a data storage management system, and for issuing appropriate alerts and reporting to data management professionals. The illustrative embodiments include a number of features that detect and raise awareness of anomalies in system operations, such as in deduplication pruning operations. Such anomalies can include delays in the processing of archive files to be deleted and/or delays in the generation of the list of archive files to delete. Anomalies are characterized by frequency anomalies and/or by occurrence counts. Utilization is also of interest for certain key system resources, such as deduplication databases, CPU and memory at the storage manager, etc., without limitation.
    Type: Application
    Filed: January 7, 2022
    Publication date: July 7, 2022
    Inventors: Pavan Kumar Reddy BEDADALA, Marcelo dos Reis MANSANO, Rajiv KOTTOMTHARAYIL, Anand VIBHOR, Bhavyan Bharatkumar MEHTA, Mrityunjay UPADHYAY
  • Publication number: 20220108167
    Abstract: An information management system is disclosed herein that can use artificial intelligence to identify situations in which a performance metric may not be satisfied. For example, a storage manager of the information management system can maintain data related to historical, current, and/or future execution of secondary copy operations by secondary storage computing device(s) in the information management system. Using some or all of this data, the storage manager can train an artificial intelligence model (e.g., a neural network) to classify whether a current or future secondary copy operation job is likely to succeed or fail. Similarly, the storage manager can use some or all of this data to train another artificial intelligence model (e.g., a machine learning model) to predict the length of time for a current or future secondary copy operation job to complete. The trained models can be used to predict whether a performance metric will be satisfied.
    Type: Application
    Filed: October 7, 2020
    Publication date: April 7, 2022
    Inventors: Mrityunjay UPADHYAY, Anand VIBHOR, Bhavyan Bharatkumar MEHTA
  • Publication number: 20220043836
    Abstract: An improved information management system is described herein that can use artificial intelligence to classify data files (e.g., emails, documents, audio files, video files, etc.) and/or surface in a user interface the classification assigned to the data files. For example, a lightweight training or a heavyweight training can be employed to train classifiers to classify the data files. Use of artificial intelligence to classify data files may reduce the amount of computing resources that the information management system allocates to the data file review process because an auditor may be able to quickly identify those data files that meet the desired criteria using the classification and only request access to those data files. Thus, the information management system may be able to allocate more computing resources to normal or routine tasks, ensuring that such tasks are completed and/or completed in an appropriate amount of time.
    Type: Application
    Filed: August 7, 2020
    Publication date: February 10, 2022
    Inventors: Mrityunjay UPADHYAY, Pavan Kumar Reddy BEDADALA, Marcelo dos Reis MANSANO
  • Publication number: 20210390495
    Abstract: A system may measure one or more metrics relating to the performance of a job for a set of occurrences of the job with respect to a data set. The measurements may be used to predict a completion time for a subsequent job or phase of the job on the data set. This prediction may be used to present a more accurate indication of a job completion status on the data set. The process may be repeated or performed separately for each client or set of data to provide an individualized progress meter or indicator. Thus, in some cases, variances in the data or computing systems may be reflected in the displayed progress of the job providing for a more accurate indication of job progress.
    Type: Application
    Filed: June 16, 2020
    Publication date: December 16, 2021
    Inventors: Mrityunjay UPADHYAY, Rajiv KOTTOMTHARAYIL, Anand VIBHOR, Bhavyan Bharatkumar MEHTA
  • Publication number: 20210344755
    Abstract: A region-based distributed information management system is described herein in which some or all of the operations typically performed by a centralized storage manager can be distributed to storage managers located in the various geographic regions. These regional storage managers can manage components of the information management system located in their respective geographic region, and communicate with the centralized storage manager (also referred to herein as a “master storage manager”) for synchronization purposes and/or to hand off operations that cannot be performed by the regional storage manager.
    Type: Application
    Filed: April 16, 2021
    Publication date: November 4, 2021
    Inventors: Bhavyan Bharatkumar MEHTA, Anand VIBHOR, Suraj BHARECH, Mrityunjay UPADHYAY
  • Publication number: 20210271758
    Abstract: This application relates to ransomware detection and data pruning management. Ransomware typically involves an I/O heavy process of encrypting data files and/or deleting or renaming the original files. Thus, ransomware attacks may be detected by analyzing the I/O activity in a given file system. In some embodiments, a software module running on a client machine manages copying, archiving, migrating, and/or replicating of primary data and restoring and/or pruning secondary data (e.g., backup copies of the primary data). When a potential ransomware attack is detected, the software module is immediately stopped so that the software module does not prune any data that may need to be restored. Upon receiving user input that indicates that the client machine is not under a ransomware attack, the software module is allowed to resume its operations, including pruning of the secondary data.
    Type: Application
    Filed: February 11, 2021
    Publication date: September 2, 2021
    Inventors: PurnaChandra Sekhar BEDHAPUDI, Sri Karthik BHAGI, Deepak Raghunath ATTARDE, Arun Prasad AMARENDRAN, Amit Bhaskar AUSARKAR, Mrityunjay UPADHYAY
  • Publication number: 20210073190
    Abstract: Described herein are techniques for better understanding problems arising in an illustrative information management system, such as a data storage management system, and for issuing appropriate alerts and reporting to data management professionals. The illustrative embodiments include a number of features that detect and raise awareness of anomalies in system operations, such as in deduplication pruning operations. Such anomalies can include delays in the processing of archive files to be deleted and/or delays in the generation of the list of archive files to delete. Anomalies are characterized by frequency anomalies and/or by occurrence counts. Utilization is also of interest for certain key system resources, such as deduplication databases, CPU and memory at the storage manager, etc., without limitation.
    Type: Application
    Filed: February 12, 2020
    Publication date: March 11, 2021
    Inventors: Pavan Kumar Reddy BEDADALA, Marcelo dos Reis MANSANO, Rajiv KOTTOMTHARAYIL, Anand VIBHOR, Bhavyan Bharatkumar MEHTA, Mrityunjay UPADHYAY
  • Publication number: 20210073097
    Abstract: Described herein are techniques for better understanding problems arising in an illustrative information management system, such as a data storage management system, and for issuing appropriate alerts and reporting to data management professionals. The illustrative embodiments include a number of features that detect and raise awareness of anomalies in system operations. Categories of interest include events and job anomalies, such as long-running jobs and job success/failure rates. Anomalies are characterized by frequency anomalies and/or by occurrence counts. Utilization is also of interest for certain key system resources, such as deduplication databases, CPU and memory at the storage manager, etc., without limitation. Predicting low utilization periods for these and other key resources is useful for scheduling maintenance activities without interfering with ordinary data protection jobs.
    Type: Application
    Filed: November 6, 2019
    Publication date: March 11, 2021
    Inventors: Mrityunjay UPADHYAY, Anand VIBHOR, Bhavyan Bharatkumar MEHTA, Rajiv KOTTOMTHARAYIL
  • Publication number: 20200349317
    Abstract: Systems, methods, and computer-readable media are disclosed for enhancing an email application to automatically analyze an email thread and generate a compact content summary. The content summary is based on relative content contributions provided by the constituent email messages in the email thread. The content summary may be presented in a special window without disturbing or modifying the email thread or its constituent email messages. The distinctive content summary disclosed herein comprises certain sentences that are automatically gleaned from the email thread, analyzed relative to other sentences, and presented in a chronological sequence so that the user can quickly determine what the email thread is about and/or the current status of the conversation. The content summary is based on email weights, word weights, and intersecting sentence pairs.
    Type: Application
    Filed: July 22, 2020
    Publication date: November 5, 2020
    Inventors: Mrityunjay UPADHYAY, Divakar RADHAKRISHNAN, Madhusudhanan NATARAJAN
  • Publication number: 20200195719
    Abstract: A region-based distributed information management system is described herein in which some or all of the operations typically performed by a centralized storage manager can be distributed to storage managers located in the various geographic regions. These regional storage managers can manage components of the information management system located in their respective geographic region, and communicate with the centralized storage manager (also referred to herein as a “master storage manager”) for synchronization purposes and/or to hand off operations that cannot be performed by the regional storage manager.
    Type: Application
    Filed: March 19, 2019
    Publication date: June 18, 2020
    Inventors: Bhavyan Bharatkumar MEHTA, Anand VIBHOR, Suraj BHARECH, Mrityunjay UPADHYAY
  • Publication number: 20190228004
    Abstract: A system according to certain aspects improves the process of managing log data. The system may receive a log data file including one or more log lines that contain information relating to computing operations. At least some of the log lines may include a static portion and a variable portion. The system may process a first log line to identify and extract a static portion from the first log line, and determine a first value for the first log line based on the extracted static portion. The system may process a second log line to identify and extract a static portion from the second log line, and determine a second value for the second log line based on the extracted static portion. The system may compare the first and second values, and based on the comparison, organize the first and second log lines together for presentation to a user.
    Type: Application
    Filed: April 3, 2019
    Publication date: July 25, 2019
    Inventors: Amey Vijaykumar KARANDIKAR, Anand VIBHOR, Mrityunjay UPADHYAY