Patents by Inventor Naveena Kedlaya

Naveena Kedlaya has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11983277
    Abstract: Some examples relate to identifying a security vulnerability in a computer system. In an example, via a NAND flash memory, a computer system may be scanned to obtain information related to a software program, based on a rule set defined in a management controller (e.g., baseboard management controller (BMC)) on the computer system. The NAND flash memory may obtain metrics related to the software program via the BMC. The NAND flash memory may analyze the information related to the software program along with the metrics related to the software program to identify a security vulnerability in the computer system. The NAND flash memory may provide the information related to the security vulnerability in the computer system to the BMC.
    Type: Grant
    Filed: July 16, 2019
    Date of Patent: May 14, 2024
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Umesh Markandaya Lakshminarasimha, Mahesh Ramenahalli Mayanna, Naveena Kedlaya
  • Publication number: 20230359514
    Abstract: Techniques for performing operation-based event suppression are described. In an example, a determination may be performed as to whether an event is to be suppressed if the event is received in response to performance of an operation. The determination may be performed based on at least one of number of actions triggered by the event, frequency of occurrence of the event in an event stream in response to performance of the operation, and frequency of occurrence of the event in the event stream without performance of the first operation.
    Type: Application
    Filed: July 17, 2023
    Publication date: November 9, 2023
    Inventors: Naveena Kedlaya, Sharath Karkada Srinivasa, Bindu Loganathan
  • Patent number: 11800676
    Abstract: Example implementations relate to method and controller for secure management of a rack. The method includes generating a first unique identifier corresponding to a rack profile of the rack hosting rack devices including physical devices and logical devices, in accordance with a rack topology, wherein the rack profile is based on configuration of the rack devices and the rack topology. Further, the method includes receiving information corresponding to the rack profile of the rack from peripheral devices disposed in the rack, wherein the information is based on monitored condition of the rack devices and the rack topology. The method further includes generating a second unique identifier based on the information, and determining variation in the rack profile based on comparison of the first and second unique identifiers. Further, the method includes generating an alert signal in the rack, in response to determination of the variation in the rack profile.
    Type: Grant
    Filed: January 31, 2020
    Date of Patent: October 24, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Naveena Kedlaya, Bindu Loganathan, Sharath Karkada Srinivasa, Rekha G, Varsha Anandani
  • Patent number: 11734086
    Abstract: Techniques for performing operation-based event suppression are described. In an example, a determination may be performed as to whether an event is to be suppressed if the event is received in response to performance of an operation. The determination may be performed based on at least one of number of actions triggered by the event, frequency of occurrence of the event in an event stream in response to performance of the operation, and frequency of occurrence of the event in the event stream without performance of the first operation.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: August 22, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Naveena Kedlaya, Sharath Karkada Srinivasa, Bindu Loganathan
  • Patent number: 11562077
    Abstract: Example implementations relate to method and system for securing a workload from a security vulnerability based on management of critical patches for the workload. The method includes obtaining information of existing patches for each of a plurality of infrastructure resources that are required to execute the workload, where the infrastructure resources are segregated as multiple layers. The method further includes determining dependency of the infrastructure resources across the multiple layers and identifying the security vulnerability related to the infrastructure resources. The method further includes evaluating perceived criticalities of first and second new patches for the security vulnerability based a workload weightage, a resource age of the infrastructure resources, and an actual criticality of the first and second new patches.
    Type: Grant
    Filed: April 9, 2020
    Date of Patent: January 24, 2023
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Umesh Markandaya Lakshminarasimha, Vijay Suryanarayana, Naveena Kedlaya
  • Patent number: 11463265
    Abstract: A system to facilitate data center security is described. The system includes a processor and a machine readable medium storing instructions that, when executed, cause the processor to receive a plurality of resources that are to be provided to process a workload, receive one or more characteristics associated with each of the plurality of resources, generate a resource signature for each of the plurality of resources using the one or more characteristics associated with each resource and generate an aggregated signature using the resource signatures generated for each of the plurality of resources.
    Type: Grant
    Filed: April 3, 2020
    Date of Patent: October 4, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Sharath Karkada Srinivasa, Bindu Loganathan, Naveena Kedlaya, Rekha G, Varsha Anandani
  • Patent number: 11314573
    Abstract: In an example, a first number of events associated with a first event type that are received in the first time window is compared against a first threshold. The first event type is one of a plurality of event types, and each event type corresponds to an amount of resource consumed by an event associated with the event type. It is detected whether events associated with the first event type received in the first time window are part of an event storm based on the first number of events and the first threshold.
    Type: Grant
    Filed: November 30, 2018
    Date of Patent: April 26, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Naveena Kedlaya, Maneesh Keshavan Bendiganavale
  • Publication number: 20220060402
    Abstract: Examples described herein relate to method and system for managing events received from network devices. A management station may receive events from the network devices. Further, the management station may determine a delay based at least on a rate at which the events are received at the management station. Moreover, the management station may schedule processing of the events based on the delay.
    Type: Application
    Filed: November 1, 2021
    Publication date: February 24, 2022
    Inventors: Naveena Kedlaya, Geoffery Schunicht
  • Patent number: 11237892
    Abstract: Example techniques for obtaining data for identifying a fault are described. In response to receiving a fault message corresponding to a first device, a computing device determines a first set of data to be obtained for identifying the fault. The first set of data to be obtained is determined based on a workload of the computing device. The first set of data is then obtained.
    Type: Grant
    Filed: April 19, 2021
    Date of Patent: February 1, 2022
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Naveena Kedlaya, Tushar Bajpai
  • Patent number: 11165626
    Abstract: Examples described herein relate to method and system for managing events received from network devices. A management station may receive events from the network devices. Further, the management station may determine a delay based at least on a rate at which the events are received at the management station. Moreover, the management station may schedule processing of the events based on the delay.
    Type: Grant
    Filed: November 27, 2019
    Date of Patent: November 2, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Naveena Kedlaya, Geoffery Schunicht
  • Publication number: 20210319111
    Abstract: Example implementations relate to method and system for securing a workload from a security vulnerability based on management of critical patches for the workload. The method includes obtaining information of existing patches for each of a plurality of infrastructure resources that are required to execute the workload, where the infrastructure resources are segregated as multiple layers. The method further includes determining dependency of the infrastructure resources across the multiple layers and identifying the security vulnerability related to the infrastructure resources. The method further includes evaluating perceived criticalities of first and second new patches for the security vulnerability based a workload weightage, a resource age of the infrastructure resources, and an actual criticality of the first and second new patches.
    Type: Application
    Filed: April 9, 2020
    Publication date: October 14, 2021
    Inventors: Umesh Markandaya Lakshminarasimha, Vijay Suryanarayana, Naveena Kedlaya
  • Publication number: 20210314165
    Abstract: A system to facilitate data center security is described. The system includes a processor and a machine readable medium storing instructions that, when executed, cause the processor to receive a plurality of resources that are to be provided to process a workload, receive one or more characteristics associated with each of the plurality of resources, generate a resource signature for each of the plurality of resources using the one or more characteristics associated with each resource and generate an aggregated signature using the resource signatures generated for each of the plurality of resources.
    Type: Application
    Filed: April 3, 2020
    Publication date: October 7, 2021
    Inventors: Sharath Karkada Srinivasa, Bindu Loganathan, Naveena Kedlaya, Rekha G, Varsha Anandani
  • Publication number: 20210243912
    Abstract: Example implementations relate to method and controller for secure management of a rack. The method includes generating a first unique identifier corresponding to a rack profile of the rack hosting rack devices including physical devices and logical devices, in accordance with a rack topology, wherein the rack profile is based on configuration of the rack devices and the rack topology. Further, the method includes receiving information corresponding to the rack profile of the rack from peripheral devices disposed in the rack, wherein the information is based on monitored condition of the rack devices and the rack topology. The method further includes generating a second unique identifier based on the information, and determining variation in the rack profile based on comparison of the first and second unique identifiers. Further, the method includes generating an alert signal in the rack, in response to determination of the variation in the rack profile.
    Type: Application
    Filed: January 31, 2020
    Publication date: August 5, 2021
    Inventors: Naveena Kedlaya, Bindu Loganathan, Sharath Karkada Srinivasa, Rekha G, Varsha Anandani
  • Publication number: 20210160123
    Abstract: Examples described herein relate to method and system for managing events received from network devices. A management station may receive events from the network devices. Further, the management station may determine a delay based at least on a rate at which the events are received at the management station. Moreover, the management station may schedule processing of the events based on the delay.
    Type: Application
    Filed: November 27, 2019
    Publication date: May 27, 2021
    Inventors: Naveena Kedlaya, Geoffery Schunicht
  • Patent number: 10938623
    Abstract: In an example, a first graph representing a first set of combinations of computing elements and logical elements used in a computing environment is compared with a second set of combinations of computing elements and logical elements. The first set of combinations includes a plurality of element combinations. The comparison may be performed to identify a potentially faulty element combination among the first set of combinations.
    Type: Grant
    Filed: October 23, 2018
    Date of Patent: March 2, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Pavan Belur Gopalakrishna Upadhya, Vinay Sahadevappa Banakar, Maneesh Keshavan Bendiganavale, Naveena Kedlaya
  • Publication number: 20210019421
    Abstract: Some examples relate to identifying a security vulnerability in a computer system. In an example, via a NAND flash memory, a computer system may be scanned to obtain information related to a software program, based on a rule set defined in a management controller (e.g., baseboard management controller (BMC)) on the computer system. The NAND flash memory may obtain metrics related to the software program via the BMC. The NAND flash memory may analyze the information related to the software program along with the metrics related to the software program to identify a security vulnerability in the computer system. The NAND flash memory may provide the information related to the security vulnerability in the computer system to the BMC.
    Type: Application
    Filed: July 16, 2019
    Publication date: January 21, 2021
    Inventors: Umesh Markandaya Lakshminarasimha, Mahesh Ramenahalli Mayanna, Naveena Kedlaya
  • Patent number: 10884759
    Abstract: Example approaches for remote deployment of an operating system (OS) in an electronic device are described. In an example, a Baseboard Management Controller (BMC) of the electronic device is set as a first bootable component in an order of initialization of hardware components of the electronic device during a boot operation. The BMC is initialized during the boot operation. A remote server information indicative of a network address of a remote server and a path directed to boot files of the OS stored in the remote server is received. The boot files are for deployment of the OS in the electronic device. The boot files from the remote server are downloaded over a dedicated communication channel associated with the BMC, based on the remote server information. The boot files are executed to deploy the OS in the electronic device.
    Type: Grant
    Filed: October 30, 2018
    Date of Patent: January 5, 2021
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Umesh Markandaya Lakshminarasimha, Naveena Kedlaya, Nagaraj P. Hegde
  • Patent number: 10831587
    Abstract: In an example, suspect scores for impacting elements that can cause an error state of a first element are computed. The computation is performed based on states of each element for which the impacting element can cause the error state.
    Type: Grant
    Filed: July 29, 2018
    Date of Patent: November 10, 2020
    Assignee: Hewlett Packard Enterprise Development LP
    Inventors: Maneesh Keshavan Bendiganavale, Pavan Belur Gopalakrishna Upadhya, Naveena Kedlaya, Vinay Sahadevappa Banakar
  • Publication number: 20200310890
    Abstract: Techniques for performing operation-based event suppression are described. In an example, a determination may be performed as to whether an event is to be suppressed if the event is received in response to performance of an operation. The determination may be performed based on at least one of number of actions triggered by the event, frequency of occurrence of the event in an event stream in response to performance of the operation, and frequency of occurrence of the event in the event stream without performance of the first operation.
    Type: Application
    Filed: March 29, 2019
    Publication date: October 1, 2020
    Inventors: Naveena Kedlaya, Sharath Karkada Srinivasa, Bindu Loganathan
  • Publication number: 20200174868
    Abstract: In an example, a first number of events associated with a first event type that are received in the first time window is compared against a first threshold. The first event type is one of a plurality of event types, and each event type corresponds to an amount of resource consumed by an event associated with the event type. It is detected whether events associated with the first event type received in the first time window are part of an event storm based on the first number of events and the first threshold.
    Type: Application
    Filed: November 30, 2018
    Publication date: June 4, 2020
    Inventors: Naveena Kedlaya, Maneesh Keshavan Bendiganavale