Patents by Inventor Nitin Madan
Nitin Madan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 12153547Abstract: One example method includes creating a namespace of a deduplication filesystem, adding a ‘temporary’ flag to the namespace, adding a ‘delete’ flag to the namespace when the namespace is to be deleted, and when a maximum number of namespaces permitted by the deduplication filesystem has been reached due to the creating of the namespace, deleting another namespace bearing a ‘temporary’ flag and a ‘delete’ flag. In this way, efficient use may be made of the NVRAM, while also maintaining compliance with deduplication filesystem requirements concerning the maximum number of permitted namespaces.Type: GrantFiled: April 22, 2022Date of Patent: November 26, 2024Assignee: Dell Products L.P.Inventors: Nitin Madan, Neerajkumar N. Chourasia
-
Patent number: 12153502Abstract: Improving the performance of read operations in a restore path of an inline deduplication system utilizing a DDBOOST interface by providing an adaptive compression component for use with DDBOOST applications. A built-in compression mode transfers read data if there are sufficient CPU resources in the server and client to compress and decompress the read data without destabilizing the system. CPU usage is tracked to generate predicted respective client and server CPU usage. These respective predictions are compared to defined maximum threshold usage values. If the predicted values do not exceed the thresholds, compression is used, otherwise the data is transmitted over the network as non-compressed data. A pre-filter is used to first determine whether or not the data would benefit from the built-in compression mode.Type: GrantFiled: August 3, 2023Date of Patent: November 26, 2024Assignee: Dell Products L.P.Inventors: Donna Barry Lewis, Nitin Madan, Bhimsen Bhanjois
-
Patent number: 12141035Abstract: A self-healing method of recovering files using a cyber recovery vault for deduplication filesystems. Data to be backed up from a production system to a backup system in a datacenter is also copied to a cyber security vault coupled to the data center through an air gapped connection. A copy process makes a point-in-time (PIT) copy of the portion of data to a namespace in the vault, and retention locks the copied portion in the vault. An automated process detects a missing segment error, such as due to a bad index lookup in the data to be backed up. The self-healing process provides the missing segment from the PIT copy in the cyber security vault. For any missing fingerprints the process adds the data in new containers and the references in the index, providing an indirection that allows for just writing a new container with the missing L0 references and updating the index.Type: GrantFiled: June 13, 2022Date of Patent: November 12, 2024Assignee: Dell Products L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda
-
Publication number: 20240362141Abstract: System audits messages, communicated internally in copy management system, about copy management jobs, and learns about relationships between message requests for user actions on copy management jobs and subsequent failures of copy management jobs. System creates snapshot of copy management content displayed by user interface and selected by user as context for user's message, and creates message's link to snapshot. System stores user entries that identify message's intended recipient(s), time of availability, and text. If message requests user action on copy management job, and relationship between unanswered requests for user to perform action on copy management job and subsequent failures of copy management job satisfies relationship threshold, then machine learning system sends message via copy management system's internal communication channel to system-selected administrator, who selects message's hyperlink to snapshot.Type: ApplicationFiled: October 26, 2023Publication date: October 31, 2024Applicant: Dell Products L.P.Inventors: Salil Dangi, Nitin Madan
-
Publication number: 20240362125Abstract: System determines first context of messages between copy management system users and creates snapshot of copy management content part, which is displayed by user interface, and selected by system user as context for subsequent message. System creates hyperlink in message to snapshot that depicts copy management content part and stores user entries for tag that identifies at least one intended recipient of message, time when message is available for intended recipient(s), and text for message. System sends message at time to intended recipient(s) via internal communication channel of system. In response to recipient of message selecting message's hyperlink to snapshot, system outputs context for message to recipient's user interface, which enables recipient to respond to message. If second context of messages between copy management system users matches first context of messages, then information requested in message after first context of messages is conveyed to at least one user interface.Type: ApplicationFiled: October 26, 2023Publication date: October 31, 2024Applicant: Dell Products L.P.Inventors: Salil Dangi, Nitin Madan
-
Patent number: 12117907Abstract: Methods of cloning data backup across namespaces are disclosed. In response to receiving a file replication request, one or more source files are cloned from a first namespace to a second namespace, as one or more destination files. A first attribute indicating that the source file(s) have been cloned to the second namespace as the destination file(s) is created. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where synthetic information of the destination synthetic file points to the source file(s) as one or more base file. A second attribute indicating that the source synthetic file has been cloned to the second namespace as the destination synthetic file is created. Based on the first and second attributes, the synthetic information of the destination synthetic file is updated or propagated to use the destination file(s) as one or more base files on the second namespace.Type: GrantFiled: April 29, 2022Date of Patent: October 15, 2024Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda, Srisailendra Yallapragada, Alok Katiyar, Salil Dangi, Sanjay Vedanthan
-
Publication number: 20240330127Abstract: Improving the performance of read operations in a restore path of an inline deduplication system utilizing a DDBOOST interface by providing an adaptive compression component for use with DDBOOST applications. A built-in compression mode transfers read data if there are sufficient CPU resources in the server and client to compress and decompress the read data without destabilizing the system. CPU usage is tracked to generate predicted respective client and server CPU usage. These respective predictions are compared to defined maximum threshold usage values. If the predicted values do not exceed the thresholds, compression is used, otherwise the data is transmitted over the network as non-compressed data. A pre-filter is used to first determine whether or not the data would benefit from the built-in compression mode.Type: ApplicationFiled: August 3, 2023Publication date: October 3, 2024Inventors: Donna Barry Lewis, Nitin Madan, Bhimsen Bhanjois
-
Patent number: 12105594Abstract: Embodiments for processing fastcopy overwrite backup workloads (FCOW) as virtual synthetic backups, by detecting whether or not a backup workload comprises an FCOW workload in which a base file is fastcopied to a target file, wherein portions of the base file are overwritten through overwrites by new data in the target file by a deduplication backup process. For FCOW workloads, the process creates a file recipe by trapping seek offsets and write byte lengths for the overwrites, and writing extent information comprising offset differences to a recipe table of the file recipe, and the file recipe facilitates file processing optimizations including differencing, replication, and tiering.Type: GrantFiled: June 16, 2022Date of Patent: October 1, 2024Assignee: Dell Products L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda
-
Patent number: 12105595Abstract: Embodiments for providing file immutability for cloud storage data in a deduplicating filesystem and using a new filesystem that is spawned to receive redirected live data, after which the old filesystem is expired. Data objects are stored in the cloud by defining a protection duration from a first date to a fixed future date, and applying a retention lock to one or more data objects stored in cloud storage during the protection duration, the retention lock preventing unauthorized deletion, modification or movement of the data. A renew threshold date is defined within the protection duration, and a new filesystem is spawned on this date. All new data is redirected to the new filesystem and locked for the protection duration, and the first file system is destroyed.Type: GrantFiled: September 28, 2022Date of Patent: October 1, 2024Assignee: Dell Products L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Fei Wang, Jagannathdas Rath, Srisailendra Yallapragada
-
Publication number: 20240303510Abstract: Dynamic rule-based recommendations are disclosed. A rule-base, which includes rules, is received for a data-related operation. Potential targets of the data-related operation are validated against the rule-base. Targets that are eligible or validated using the rule-base may be returned and/or ranked. The data-relation operation may be performed using one of the validated targets.Type: ApplicationFiled: March 6, 2023Publication date: September 12, 2024Inventors: Nicholas A. Noto, Nitin Madan, Jingwen Zhang, Sriranjani Vaidyanathan, Ishan Khaparde
-
Patent number: 12079198Abstract: Corruption detection in backups is disclosed. Backups that are received into a backup environment are stored in corresponding lineages. A detection engine is configured to perform corruption detection operations on the most recent backups in each of the lineages based on a sample frequency. Corruption detection operations may also be performed randomly and based on unexpected or unusual changes in backup metadata.Type: GrantFiled: September 30, 2022Date of Patent: September 3, 2024Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kiran Kumar Malle Gowda
-
Publication number: 20240256393Abstract: One example method includes accessing a point-in-time copy including retention locked backups that were stored on a backup storage server at a time the point-in-time copy was generated. The method further includes accessing a current namespace including retention locked backups that are currently stored on the backup storage server. Each retention locked backup includes data backup files. The method also includes determining a first set of retention locked backups that are included in the point-in-time copy, but are not included in the current namespace. The method finally includes copying the first set of retention locked backups from the point-in-time copy into the current namespace without removing any of the retention locked backups already in the current namespace.Type: ApplicationFiled: January 31, 2023Publication date: August 1, 2024Inventors: Salil Dangi, Nitin Madan
-
Publication number: 20240256388Abstract: One example method includes providing, during a rollback recovery process, a current namespace of a backup storage server. The current namespace includes data backups including a first set of data backups there were restored from a point-in-time copy and a second set of data backups that are retention locked. The method also includes providing, during the rollback recovery process, a recovery metadata backup of a metadata backup server including metadata backups. The method further includes performing a garbage collection optimization procedure that removes the need to disable a garbage collection procedure at the backup storage server and the metadata backup server.Type: ApplicationFiled: October 31, 2023Publication date: August 1, 2024Inventors: Salil Dangi, Nitin Madan
-
Publication number: 20240256658Abstract: Improving data recovery and restoration times by clamping down security after malware detection, and protect a data center from a cyber recovery vault. Embodiments provide a cyber recovery vault configured to store data backed up for a production site for long-term retention and disaster recovery. The vault is coupled to the data center comprising a production site through an automated air gap controlled by the vault. Control signals transmitted by the vault trigger the air gap to close the coupling between the vault and data center upon detection of a malware attack, and the data center is configured to listen for the control signals and implement heightened security measures to protect its data in response to the control signal.Type: ApplicationFiled: February 1, 2023Publication date: August 1, 2024Inventors: Nitin Madan, Salil Dangi, Bhimsen Bhanjois
-
Patent number: 12047499Abstract: Embodiments of a cryptographic key management system for cached data that efficiently re-encrypts cached data encrypted with a compromised encryption key by receiving a request to access a cached data block encrypted with an original encryption key. Upon determining that the original encryption key is compromised or destroyed, thus resulting in the requested data block being invalid, evicting the requested data block from the cache storing the cached data. The data block is re-encrypted using a new encryption key upon receipt of a new request to access the cached data. Any remaining cached data encrypted with the original encryption key is evicted from the cache through a defined cache eviction policy.Type: GrantFiled: April 6, 2022Date of Patent: July 23, 2024Assignee: Dell Products L.P.Inventors: Niharika Avasarala, Mahadev Karadigudda, Nitin Madan, Madhu Agrahara Gopalakrishna
-
Patent number: 12032529Abstract: Methods of cloning data backup across namespaces are disclosed. One or more source files are cloned from a first namespace to a second namespace, as one or more destination files. When the cloning of the source file(s) is performed, a data structure including source file information and destination file information is generated. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where the source synthetic file uses the source file(s) as one or more base files on the first namespace. When the cloning of the source synthetic file is performed, the data structure is looked up to obtain the source file information and the destination file information. Based on the source file information and the destination file information, synthetic information of the destination synthetic file is updated to use the destination file(s) as one or more base files on the second namespace.Type: GrantFiled: April 29, 2022Date of Patent: July 9, 2024Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda, Srisailendra Yallapragada, Alok Katiyar, Salil Dangi, Sanjay Vedanthan
-
Patent number: 12001410Abstract: This disclosure provides system, methods, and media for identifying inadvertent compression or encryption in data streams from a client that land on a deduplication storage system. When one or more such abnormalities are detected, an alert message is generated to alert the administrator of the deduplication storage system so that corrective actions can be taken to prevent undesired consequences. According to an exemplary method, machine learning techniques are used to plot and smoothen global compression ratios and local compression ratios of historical backups from a client over a period of time. Then, a second derivative of each data point on the smoothened curves is taken and compared with a predetermined threshold to detect whether that the slope of the data point exceeds a threshold. A data point whose slope exceeds the threshold can be determined to be a data point corresponding to a backup that includes compression and/encryption.Type: GrantFiled: March 2, 2022Date of Patent: June 4, 2024Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Senthil Ponnuswamy
-
Patent number: 11994957Abstract: Improving the performance of read operations in a restore path of an inline deduplication system utilizing a DDBOOST interface by providing an adaptive compression component for use with DDBOOST applications. The system utilizes a built-in compression mode for transferring read data if there is a sufficient available CPU resources in both the server and client to respectively compress and decompress the read data without destabilizing the system. CPU usage on both the client and the server is tracked to generate predicted respective CPU usage. These respective predictions are compared to defined maximum threshold usage values. If the predicted values do not exceed the thresholds, compression is used, otherwise the data is transmitted over the network as non-compressed data.Type: GrantFiled: March 31, 2023Date of Patent: May 28, 2024Assignee: Dell Products L.P.Inventors: Donna Barry Lewis, Nitin Madan, Bhimsen Bhanjois
-
Leveraging metadata of a deduplication storage system to perform an efficient restore of backup data
Patent number: 11977454Abstract: Described is a system for leveraging incremental backup metadata of a deduplication storage system to perform an efficient data restore. The system may reference metadata stored as part of incremental backup infrastructure to determine only the changes to the data that occurred subsequent to the restore point. As a result, the system may reduce data read processing by retrieving only the changed data from the deduplication storage system. Moreover, the system may reduce the required bandwidth for the restore by providing only the changed data to a target device of the restore. Data retained by the client system such as the current version of the data may then be overwritten with the reduced set of data to complete the restore. As a result, the system may perform an efficient restore by reducing read accesses and bandwidth requirements, and thus, improve overall restore performance.Type: GrantFiled: June 28, 2021Date of Patent: May 7, 2024Assignee: EMC IP Holding Company LLCInventors: Donna Barry Lewis, Nitin Madan, Kedar Sadanand Godbole, Srikant Viswanathan, Bhimsen Bhanjois -
Patent number: 11954533Abstract: Detecting a trend in latency for storage underlying a deduplicated file system includes generating a set of data points by recording when input/output (IO) requests were issued to the storage and recording time required to receive success responses from the storage. Least squares regression is performed on the data points to find a best-fit line through the data points. A slope of the best-fit line is calculated. A determination is made as to whether the slope is positive, a positive slope thereby indicating a trend of increasing latency of the storage. When the slope is determined to be positive, clients accessing the deduplicated file system are throttled.Type: GrantFiled: April 16, 2021Date of Patent: April 9, 2024Assignee: EMC IP Holding Company LLCInventors: Nitin Madan, Fani Jenkins, Gobikrishnan Sundharraj, Deepa Ramesh