Patents by Inventor Nitin Madan
Nitin Madan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250036530Abstract: Improving the performance of read operations in a restore path of a backup system by adaptively applying compression. The method defines an extent covering data segments for which compression ratio statistics are calculated, and calculates a respective compression ratio for each data segment in the defined extent. It then associates each unique compression ratio with a corresponding index value and stores each compression ratio and associated corresponding index value in an array. The array is appended as extended file attribute to the data segments, the indexed compression ratio is used by a backup server to determine whether or not to apply compression to the data segments in a restore path sending the data segments from the backup server.Type: ApplicationFiled: July 26, 2023Publication date: January 30, 2025Inventors: Donna Barry Lewis, Nitin Madan, Bhimsen Bhanjois
-
Patent number: 12189494Abstract: One example method includes accessing a point-in-time copy including retention locked backups that were stored on a backup storage server at a time the point-in-time copy was generated. The method further includes accessing a current namespace including retention locked backups that are currently stored on the backup storage server. Each retention locked backup includes data backup files. The method also includes determining a first set of retention locked backups that are included in the point-in-time copy, but are not included in the current namespace. The method finally includes copying the first set of retention locked backups from the point-in-time copy into the current namespace without removing any of the retention locked backups already in the current namespace.Type: GrantFiled: January 31, 2023Date of Patent: January 7, 2025Assignee: Dell Products L.P.Inventors: Salil Dangi, Nitin Madan
-
Patent number: 12174709Abstract: During a current backup of a file system of a client, a determination is that a file in the current backup includes first data regions found in a file from a previous backup, and second data regions that are new. A virtual synthetic file is generated by writing the second data regions, and synthesizing the first data regions by referencing the file from the previous backup. A request received to restore the particular file includes identifications of other files still present at client. A determination is that the particular file corresponds to the virtual synthetic file and that the other files still present at client include the file from the previous backup. The second data regions are read to send to client. A complete version of the particular file is assembled at client using the file from the previous backup, still present at client, and the second data regions.Type: GrantFiled: August 3, 2023Date of Patent: December 24, 2024Assignee: Dell Products L.P.Inventors: Bhimsen Bhanjois, Kedar Godbole, Donna Barry Lewis, Nitin Madan, Srikant Viswanathan
-
Publication number: 20240403286Abstract: Corruption detection in backups is disclosed. Backups that are received into a backup environment are stored in corresponding lineages. A detection engine is configured to perform corruption detection operations on the most recent backups in each of the lineages based on a sample frequency. Corruption detection operations may also be performed randomly and based on unexpected or unusual changes in backup metadata.Type: ApplicationFiled: August 12, 2024Publication date: December 5, 2024Inventors: Nitin Madan, Bhimsen Bhanjois, Kiran Kumar Malle Gowda
-
Patent number: 12153547Abstract: One example method includes creating a namespace of a deduplication filesystem, adding a ‘temporary’ flag to the namespace, adding a ‘delete’ flag to the namespace when the namespace is to be deleted, and when a maximum number of namespaces permitted by the deduplication filesystem has been reached due to the creating of the namespace, deleting another namespace bearing a ‘temporary’ flag and a ‘delete’ flag. In this way, efficient use may be made of the NVRAM, while also maintaining compliance with deduplication filesystem requirements concerning the maximum number of permitted namespaces.Type: GrantFiled: April 22, 2022Date of Patent: November 26, 2024Assignee: Dell Products L.P.Inventors: Nitin Madan, Neerajkumar N. Chourasia
-
Patent number: 12153502Abstract: Improving the performance of read operations in a restore path of an inline deduplication system utilizing a DDBOOST interface by providing an adaptive compression component for use with DDBOOST applications. A built-in compression mode transfers read data if there are sufficient CPU resources in the server and client to compress and decompress the read data without destabilizing the system. CPU usage is tracked to generate predicted respective client and server CPU usage. These respective predictions are compared to defined maximum threshold usage values. If the predicted values do not exceed the thresholds, compression is used, otherwise the data is transmitted over the network as non-compressed data. A pre-filter is used to first determine whether or not the data would benefit from the built-in compression mode.Type: GrantFiled: August 3, 2023Date of Patent: November 26, 2024Assignee: Dell Products L.P.Inventors: Donna Barry Lewis, Nitin Madan, Bhimsen Bhanjois
-
Patent number: 12141035Abstract: A self-healing method of recovering files using a cyber recovery vault for deduplication filesystems. Data to be backed up from a production system to a backup system in a datacenter is also copied to a cyber security vault coupled to the data center through an air gapped connection. A copy process makes a point-in-time (PIT) copy of the portion of data to a namespace in the vault, and retention locks the copied portion in the vault. An automated process detects a missing segment error, such as due to a bad index lookup in the data to be backed up. The self-healing process provides the missing segment from the PIT copy in the cyber security vault. For any missing fingerprints the process adds the data in new containers and the references in the index, providing an indirection that allows for just writing a new container with the missing L0 references and updating the index.Type: GrantFiled: June 13, 2022Date of Patent: November 12, 2024Assignee: Dell Products L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda
-
Publication number: 20240362141Abstract: System audits messages, communicated internally in copy management system, about copy management jobs, and learns about relationships between message requests for user actions on copy management jobs and subsequent failures of copy management jobs. System creates snapshot of copy management content displayed by user interface and selected by user as context for user's message, and creates message's link to snapshot. System stores user entries that identify message's intended recipient(s), time of availability, and text. If message requests user action on copy management job, and relationship between unanswered requests for user to perform action on copy management job and subsequent failures of copy management job satisfies relationship threshold, then machine learning system sends message via copy management system's internal communication channel to system-selected administrator, who selects message's hyperlink to snapshot.Type: ApplicationFiled: October 26, 2023Publication date: October 31, 2024Applicant: Dell Products L.P.Inventors: Salil Dangi, Nitin Madan
-
Publication number: 20240362125Abstract: System determines first context of messages between copy management system users and creates snapshot of copy management content part, which is displayed by user interface, and selected by system user as context for subsequent message. System creates hyperlink in message to snapshot that depicts copy management content part and stores user entries for tag that identifies at least one intended recipient of message, time when message is available for intended recipient(s), and text for message. System sends message at time to intended recipient(s) via internal communication channel of system. In response to recipient of message selecting message's hyperlink to snapshot, system outputs context for message to recipient's user interface, which enables recipient to respond to message. If second context of messages between copy management system users matches first context of messages, then information requested in message after first context of messages is conveyed to at least one user interface.Type: ApplicationFiled: October 26, 2023Publication date: October 31, 2024Applicant: Dell Products L.P.Inventors: Salil Dangi, Nitin Madan
-
Patent number: 12117907Abstract: Methods of cloning data backup across namespaces are disclosed. In response to receiving a file replication request, one or more source files are cloned from a first namespace to a second namespace, as one or more destination files. A first attribute indicating that the source file(s) have been cloned to the second namespace as the destination file(s) is created. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where synthetic information of the destination synthetic file points to the source file(s) as one or more base file. A second attribute indicating that the source synthetic file has been cloned to the second namespace as the destination synthetic file is created. Based on the first and second attributes, the synthetic information of the destination synthetic file is updated or propagated to use the destination file(s) as one or more base files on the second namespace.Type: GrantFiled: April 29, 2022Date of Patent: October 15, 2024Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda, Srisailendra Yallapragada, Alok Katiyar, Salil Dangi, Sanjay Vedanthan
-
Publication number: 20240330127Abstract: Improving the performance of read operations in a restore path of an inline deduplication system utilizing a DDBOOST interface by providing an adaptive compression component for use with DDBOOST applications. A built-in compression mode transfers read data if there are sufficient CPU resources in the server and client to compress and decompress the read data without destabilizing the system. CPU usage is tracked to generate predicted respective client and server CPU usage. These respective predictions are compared to defined maximum threshold usage values. If the predicted values do not exceed the thresholds, compression is used, otherwise the data is transmitted over the network as non-compressed data. A pre-filter is used to first determine whether or not the data would benefit from the built-in compression mode.Type: ApplicationFiled: August 3, 2023Publication date: October 3, 2024Inventors: Donna Barry Lewis, Nitin Madan, Bhimsen Bhanjois
-
Patent number: 12105595Abstract: Embodiments for providing file immutability for cloud storage data in a deduplicating filesystem and using a new filesystem that is spawned to receive redirected live data, after which the old filesystem is expired. Data objects are stored in the cloud by defining a protection duration from a first date to a fixed future date, and applying a retention lock to one or more data objects stored in cloud storage during the protection duration, the retention lock preventing unauthorized deletion, modification or movement of the data. A renew threshold date is defined within the protection duration, and a new filesystem is spawned on this date. All new data is redirected to the new filesystem and locked for the protection duration, and the first file system is destroyed.Type: GrantFiled: September 28, 2022Date of Patent: October 1, 2024Assignee: Dell Products L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Fei Wang, Jagannathdas Rath, Srisailendra Yallapragada
-
Patent number: 12105594Abstract: Embodiments for processing fastcopy overwrite backup workloads (FCOW) as virtual synthetic backups, by detecting whether or not a backup workload comprises an FCOW workload in which a base file is fastcopied to a target file, wherein portions of the base file are overwritten through overwrites by new data in the target file by a deduplication backup process. For FCOW workloads, the process creates a file recipe by trapping seek offsets and write byte lengths for the overwrites, and writing extent information comprising offset differences to a recipe table of the file recipe, and the file recipe facilitates file processing optimizations including differencing, replication, and tiering.Type: GrantFiled: June 16, 2022Date of Patent: October 1, 2024Assignee: Dell Products L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda
-
Publication number: 20240303510Abstract: Dynamic rule-based recommendations are disclosed. A rule-base, which includes rules, is received for a data-related operation. Potential targets of the data-related operation are validated against the rule-base. Targets that are eligible or validated using the rule-base may be returned and/or ranked. The data-relation operation may be performed using one of the validated targets.Type: ApplicationFiled: March 6, 2023Publication date: September 12, 2024Inventors: Nicholas A. Noto, Nitin Madan, Jingwen Zhang, Sriranjani Vaidyanathan, Ishan Khaparde
-
Patent number: 12079198Abstract: Corruption detection in backups is disclosed. Backups that are received into a backup environment are stored in corresponding lineages. A detection engine is configured to perform corruption detection operations on the most recent backups in each of the lineages based on a sample frequency. Corruption detection operations may also be performed randomly and based on unexpected or unusual changes in backup metadata.Type: GrantFiled: September 30, 2022Date of Patent: September 3, 2024Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kiran Kumar Malle Gowda
-
Publication number: 20240256393Abstract: One example method includes accessing a point-in-time copy including retention locked backups that were stored on a backup storage server at a time the point-in-time copy was generated. The method further includes accessing a current namespace including retention locked backups that are currently stored on the backup storage server. Each retention locked backup includes data backup files. The method also includes determining a first set of retention locked backups that are included in the point-in-time copy, but are not included in the current namespace. The method finally includes copying the first set of retention locked backups from the point-in-time copy into the current namespace without removing any of the retention locked backups already in the current namespace.Type: ApplicationFiled: January 31, 2023Publication date: August 1, 2024Inventors: Salil Dangi, Nitin Madan
-
Publication number: 20240256658Abstract: Improving data recovery and restoration times by clamping down security after malware detection, and protect a data center from a cyber recovery vault. Embodiments provide a cyber recovery vault configured to store data backed up for a production site for long-term retention and disaster recovery. The vault is coupled to the data center comprising a production site through an automated air gap controlled by the vault. Control signals transmitted by the vault trigger the air gap to close the coupling between the vault and data center upon detection of a malware attack, and the data center is configured to listen for the control signals and implement heightened security measures to protect its data in response to the control signal.Type: ApplicationFiled: February 1, 2023Publication date: August 1, 2024Inventors: Nitin Madan, Salil Dangi, Bhimsen Bhanjois
-
Publication number: 20240256388Abstract: One example method includes providing, during a rollback recovery process, a current namespace of a backup storage server. The current namespace includes data backups including a first set of data backups there were restored from a point-in-time copy and a second set of data backups that are retention locked. The method also includes providing, during the rollback recovery process, a recovery metadata backup of a metadata backup server including metadata backups. The method further includes performing a garbage collection optimization procedure that removes the need to disable a garbage collection procedure at the backup storage server and the metadata backup server.Type: ApplicationFiled: October 31, 2023Publication date: August 1, 2024Inventors: Salil Dangi, Nitin Madan
-
Patent number: 12047499Abstract: Embodiments of a cryptographic key management system for cached data that efficiently re-encrypts cached data encrypted with a compromised encryption key by receiving a request to access a cached data block encrypted with an original encryption key. Upon determining that the original encryption key is compromised or destroyed, thus resulting in the requested data block being invalid, evicting the requested data block from the cache storing the cached data. The data block is re-encrypted using a new encryption key upon receipt of a new request to access the cached data. Any remaining cached data encrypted with the original encryption key is evicted from the cache through a defined cache eviction policy.Type: GrantFiled: April 6, 2022Date of Patent: July 23, 2024Assignee: Dell Products L.P.Inventors: Niharika Avasarala, Mahadev Karadigudda, Nitin Madan, Madhu Agrahara Gopalakrishna
-
Patent number: 12032529Abstract: Methods of cloning data backup across namespaces are disclosed. One or more source files are cloned from a first namespace to a second namespace, as one or more destination files. When the cloning of the source file(s) is performed, a data structure including source file information and destination file information is generated. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where the source synthetic file uses the source file(s) as one or more base files on the first namespace. When the cloning of the source synthetic file is performed, the data structure is looked up to obtain the source file information and the destination file information. Based on the source file information and the destination file information, synthetic information of the destination synthetic file is updated to use the destination file(s) as one or more base files on the second namespace.Type: GrantFiled: April 29, 2022Date of Patent: July 9, 2024Assignee: DELL PRODUCTS L.P.Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda, Srisailendra Yallapragada, Alok Katiyar, Salil Dangi, Sanjay Vedanthan