Patents by Inventor NIKHIL BOKARE

NIKHIL BOKARE has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11601474
    Abstract: Some embodiments provide a method for network management and control system that manages one or more logical networks. From a first user, the method receives a definition of one or more security zones for a logical network. Each security zone definition includes a set of security rules for data compute nodes (DCNs) assigned to the security zone. From a second user, the method receives a definition of an application to be deployed in the logical network. The application definition specifies a set of requirements. Based on the specified set of requirements, the method assigns DCNs implementing the application to one or more of the security zones for the logical network.
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: March 7, 2023
    Assignee: VMWARE, INC.
    Inventors: Sachin Mohan Vaidya, Kausum Kumar, Nikhil Bokare, Mayur Dhas, Shailesh Makhijani, Rushikesh Wagh, Shrinivas Sharad Parashar, Vaibhav Bhandari
  • Patent number: 11343227
    Abstract: Some embodiments provide a method for a network management and control system that manages a virtual infrastructure deployed across a plurality of sites. The method receives a definition of an application to be deployed in the virtual infrastructure. The application definition specifying a first set of the sites at which to deploy the application. Based on the definition of the application, the method assigns the application to a set of security zones defined for the virtual infrastructure. Each respective security zone is restricted to a respective set of the sites. The method deploys the application in a second set of sites based on the first set of sites and the sets of sites to which the set of security zones are restricted.
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: May 24, 2022
    Assignee: VMWARE, INC.
    Inventors: Sachin Mohan Vaidya, Shailesh Makhijani, Mayur Dhas, Rushikesh Wagh, Nikhil Bokare, Vaibhav Bhandari, Shrinivas Sharad Parashar
  • Patent number: 11343283
    Abstract: Some embodiments provide a method for a network management and control system that manages a virtual infrastructure deployed across a set of datacenters. Based on input from a top-level user of the virtual infrastructure, the method deploys a first logical network within the virtual infrastructure and defines one or more second-level users of the virtual infrastructure. The method receives input from a second-level user of the virtual infrastructure to define a second logical network and connect the second logical network to the first logical network. The first and second logical networks use a same data model and the second-level users are restricted from viewing configuration of the first logical network.
    Type: Grant
    Filed: November 24, 2020
    Date of Patent: May 24, 2022
    Assignee: VMWARE, INC.
    Inventors: Sachin Mohan Vaidya, Shailesh Makhijani, Mayur Dhas, Rushikesh Wagh, Nikhil Bokare, Vaibhav Bhandari, Alka Pendharkar, Disha Chopra, Pavlush Margarian, Farzad Ghannadian, Shrinivas Sharad Parashar
  • Patent number: 11315044
    Abstract: The disclosure provides an approach for collecting system state data relating to whether certain system states overload a processor assigned to a controller of the system. The approach further involves using the collected data to train a regression machine learning algorithm to predict whether indented or desired system states will result in processor overload. Depending on the prediction, the approach takes one of several steps to efficiently change system state.
    Type: Grant
    Filed: February 8, 2019
    Date of Patent: April 26, 2022
    Assignee: VMware, Inc.
    Inventors: Prashant Ambardekar, Darshika Khandelwal, Rushikesh Wagh, Paryushan Sarsamkar, Nikhil Bokare
  • Publication number: 20220103430
    Abstract: Some embodiments provide a method for a network management and control system that manages a virtual infrastructure deployed across a set of datacenters. The method receives a definition of an application to be deployed in the virtual infrastructure. The application definition specifies (i) a set of tiers of the application and (ii) a set of requirements for deploying the application. Based on the application definition, the method automatically defines a logical network architecture for connecting data compute nodes (DCNs) that implement the application tiers in the set of datacenters. The method configures a set of forwarding elements in the set of datacenters to implement the logical network architecture.
    Type: Application
    Filed: November 24, 2020
    Publication date: March 31, 2022
    Inventors: Sachin Mohan Vaidya, Rushikesh Wagh, Shailesh Makhijani, Mayur Dhas, Nikhil Bokare, Vaibhav Bhandari, Pavlush Margarian, Alka Pendharkar, Abhishek Goliya, Shrinivas Sharad Parashar
  • Publication number: 20220103598
    Abstract: Some embodiments provide a method for network management and control system that manages one or more logical networks. From a first user, the method receives a definition of one or more security zones for a logical network. Each security zone definition includes a set of security rules for data compute nodes (DCNs) assigned to the security zone. From a second user, the method receives a definition of an application to be deployed in the logical network. The application definition specifies a set of requirements. Based on the specified set of requirements, the method assigns DCNs implementing the application to one or more of the security zones for the logical network.
    Type: Application
    Filed: November 24, 2020
    Publication date: March 31, 2022
    Inventors: Sachin Mohan Vaidya, Kausum Kumar, Nikhil Bokare, Mayur Dhas, Shailesh Makhijani, Rushikesh Wagh, Shrinivas Sharad Parashar
  • Publication number: 20220103514
    Abstract: Some embodiments provide a method for a network management and control system that manages a virtual infrastructure deployed across a plurality of sites. The method receives a definition of an application to be deployed in the virtual infrastructure. The application definition specifying a first set of the sites at which to deploy the application. Based on the definition of the application, the method assigns the application to a set of security zones defined for the virtual infrastructure. Each respective security zone is restricted to a respective set of the sites. The method deploys the application in a second set of sites based on the first set of sites and the sets of sites to which the set of security zones are restricted.
    Type: Application
    Filed: November 24, 2020
    Publication date: March 31, 2022
    Inventors: Sachin Mohan Vaidya, Shailesh Makhijani, Mayur Dhas, Rushikesh Wagh, Nikhil Bokare, Vaibhav Bhandari, Shrinivas Sharad Parashar
  • Publication number: 20220103429
    Abstract: Some embodiments provide a method for a network management and control system that manages a virtual infrastructure deployed across a set of datacenters. Based on input from a top-level user of the virtual infrastructure, the method deploys a first logical network within the virtual infrastructure and defines one or more second-level users of the virtual infrastructure. The method receives input from a second-level user of the virtual infrastructure to define a second logical network and connect the second logical network to the first logical network. The first and second logical networks use a same data model and the second-level users are restricted from viewing configuration of the first logical network.
    Type: Application
    Filed: November 24, 2020
    Publication date: March 31, 2022
    Inventors: Sachin Mohan Vaidya, Shailesh Makhijani, Mayur Dhas, Rushikesh Wagh, Nikhil Bokare, Vaibhav Bhandari, Alka Pendharkar, Disha Chopra, Pavlush Margarian, Farzad Ghannadian, Shrinivas Sharad Parashar
  • Publication number: 20190356697
    Abstract: Methods, apparatus, systems and articles of manufacture are disclosed for assigning security in networked computing environments. An example apparatus includes a deep packet inspector to: analyze a network communication from a virtual machine in a software defined network environment to determine an identifier of an application; and determine an application type executing on the virtual machine; a security controller to determine if a security group exists for the application type; and a user interface to present a recommendation to create a security group for the application type when a security group does not exist for the application type. The example security controller is further to add the virtual machine to the security group when the security group for the application type exists.
    Type: Application
    Filed: June 27, 2018
    Publication date: November 21, 2019
    Inventors: VISHAL CHOUGULE, NIKHIL BOKARE, SUNITHA KRISHNA
  • Patent number: 10262228
    Abstract: Techniques disclosed herein provide an approach for automated realization of hand-drawn topologies. In one embodiment, a topologizer application is configured to parse an image depicting a hand-drawn topology and identify shapes and relationships between the shapes in the image. The topologizer may convert the hand-drawn topology to polygons and then identify the polygons as being, e.g., particular shapes and arrows representing relationships between the shapes. The identified shapes and relationships are then output in a machine-readable format for consumption, in which the shapes are mapped to corresponding components of a computing system and deployed based on the mapping and the relationships indicated in the topologizer output.
    Type: Grant
    Filed: August 17, 2016
    Date of Patent: April 16, 2019
    Assignee: Nicira, Inc.
    Inventors: Bhagyashree Gujar, Dimal Baby, Nikhil Bokare, Devidas Gargote
  • Publication number: 20170286799
    Abstract: Techniques disclosed herein provide an approach for automated realization of hand-drawn topologies. In one embodiment, a topologizer application is configured to parse an image depicting a hand-drawn topology and identify shapes and relationships between the shapes in the image. The topologizer may convert the hand-drawn topology to polygons and then identify the polygons as being, e.g., particular shapes and arrows representing relationships between the shapes. The identified shapes and relationships are then output in a machine-readable format for consumption, in which the shapes are mapped to corresponding components of a computing system and deployed based on the mapping and the relationships indicated in the topologizer output.
    Type: Application
    Filed: August 17, 2016
    Publication date: October 5, 2017
    Inventors: BHAGYASHREE GUJAR, DIMAL BABY, NIKHIL BOKARE, DEVIDAS GARGOTE
  • Patent number: 9420004
    Abstract: Techniques for grouping virtual machine (VM) objects for networking and security services in a virtualized computing system are described. In one example embodiment, VM attributes and identity attributes are obtained from a virtual center and an identity server, respectively. One or more desired security groups are then formed based on security requirements of the virtualized computing system. A user defined dynamic expression is then associated with the one or more security groups. One or more expression attributes are then determined by evaluating the user defined dynamic expression using the obtained VM attributes and identity attributes. VM objects are then grouped based on the determined one or more expression attributes. The grouped VM objects are then associated with the created one or more security groups for providing the networking and security services.
    Type: Grant
    Filed: March 20, 2014
    Date of Patent: August 16, 2016
    Assignee: VMware, Inc.
    Inventors: Amol Palshikar, Sachin Mohan Vaidya, Prayas Gaurav, Nikhil Bokare
  • Publication number: 20150150087
    Abstract: Techniques for grouping virtual machine (VM) objects for networking and security services in a virtualized computing system are described. In one example embodiment. VM attributes and identity attributes are obtained from a virtual center and an identity server, respectively. One or more desired security groups are then formed based on security requirements of the virtualized computing system. A user defined dynamic expression is then associated with the one or more security groups. One or more expression attributes are then determined by evaluating the user defined dynamic expression using the obtained VM attributes and identity attributes. VM objects are then grouped based on the determined one or more expression attributes. The grouped VM objects are then associated with the created one or more security groups for providing the networking and security services.
    Type: Application
    Filed: March 20, 2014
    Publication date: May 28, 2015
    Applicant: VMWARE, INC.
    Inventors: AMOL PALSHIKAR, SACHIN MOHAN VAIDYA, PRAYAS GAURAV, NIKHIL BOKARE