Patents by Inventor Nitin Madan

Nitin Madan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250045244
    Abstract: A retention lock report generation process creates, upon deployment of a backup server in the backup system, a hidden directory structure in local storage of the backup server. Upon retention locking (RL) of a file, the process writes details of the file and lock operation to a retention lock audit (RLA) log. The RLA log is stored in the hidden directory structure in the filesystem, and maintained as a rotating log containing only a latest timestamped RLA log file. Previous RLA log files are retention locked and stored differently from the RLA log. In a cascaded storage target system, a plurality of targets store copies of the sourced data. RLA log information is generated for locked files at each target for new lock attributes and lock state changes as propagated through the targets for both replication and back replication operations.
    Type: Application
    Filed: October 25, 2023
    Publication date: February 6, 2025
    Inventors: Jagannathdas Rath, Sraisailendra Yallapragada, Nitin Madan
  • Publication number: 20250045243
    Abstract: A retention lock report generation process that creates, upon deployment of a backup server in the backup system, a hidden directory structure in local storage of the backup server. Upon retention locking of a file, the process writes details of the file and lock operation to a retention lock audit (RLA) log in the form of a timestamped RLA log file. The RLA log is then stored in the hidden directory structure in the filesystem, and maintained as a rotating log containing only a latest timestamped RLA log file. Previous RLA log files are retention locked and stored differently from the RLA log. In response to a request, the RLA log and the retention lock settings for the locked files including the previous RLA log files are provided to the user, without requiring traversal of the entire filesystem as in present retention lock reporting methods.
    Type: Application
    Filed: August 2, 2023
    Publication date: February 6, 2025
    Inventors: Jagannathdas Rath, Sraisailendra Yallapragada, Nitin Madan
  • Publication number: 20250045248
    Abstract: Improving read performance using pre-fetches by encoding an extent map identifying valid data of the file as extents that may be interspersed with holes constituting invalid data, and storing the extent map in the client. The extent map generates pre-fetches of data that land on only extents of the file and avoids the holes, by one of: transferring, upon the read request, the extent map to a filesystem storing the file, and bringing the extents from the extent map into memory ahead of the read request; or using, in the network client, the extent map to generate prefetch requests and execute read-ahead operations on the filesystem. The method may also apply where the application only wants to read what has changed since the last backup. In this case, the application has a map of what has changed, and can choose to read just the right extents.
    Type: Application
    Filed: August 3, 2023
    Publication date: February 6, 2025
    Inventors: Nitin Madan, Kedar Godbole, Srikant Viswanathan, Bhimsen Bhanjois
  • Publication number: 20250036530
    Abstract: Improving the performance of read operations in a restore path of a backup system by adaptively applying compression. The method defines an extent covering data segments for which compression ratio statistics are calculated, and calculates a respective compression ratio for each data segment in the defined extent. It then associates each unique compression ratio with a corresponding index value and stores each compression ratio and associated corresponding index value in an array. The array is appended as extended file attribute to the data segments, the indexed compression ratio is used by a backup server to determine whether or not to apply compression to the data segments in a restore path sending the data segments from the backup server.
    Type: Application
    Filed: July 26, 2023
    Publication date: January 30, 2025
    Inventors: Donna Barry Lewis, Nitin Madan, Bhimsen Bhanjois
  • Patent number: 12189494
    Abstract: One example method includes accessing a point-in-time copy including retention locked backups that were stored on a backup storage server at a time the point-in-time copy was generated. The method further includes accessing a current namespace including retention locked backups that are currently stored on the backup storage server. Each retention locked backup includes data backup files. The method also includes determining a first set of retention locked backups that are included in the point-in-time copy, but are not included in the current namespace. The method finally includes copying the first set of retention locked backups from the point-in-time copy into the current namespace without removing any of the retention locked backups already in the current namespace.
    Type: Grant
    Filed: January 31, 2023
    Date of Patent: January 7, 2025
    Assignee: Dell Products L.P.
    Inventors: Salil Dangi, Nitin Madan
  • Patent number: 12174709
    Abstract: During a current backup of a file system of a client, a determination is that a file in the current backup includes first data regions found in a file from a previous backup, and second data regions that are new. A virtual synthetic file is generated by writing the second data regions, and synthesizing the first data regions by referencing the file from the previous backup. A request received to restore the particular file includes identifications of other files still present at client. A determination is that the particular file corresponds to the virtual synthetic file and that the other files still present at client include the file from the previous backup. The second data regions are read to send to client. A complete version of the particular file is assembled at client using the file from the previous backup, still present at client, and the second data regions.
    Type: Grant
    Filed: August 3, 2023
    Date of Patent: December 24, 2024
    Assignee: Dell Products L.P.
    Inventors: Bhimsen Bhanjois, Kedar Godbole, Donna Barry Lewis, Nitin Madan, Srikant Viswanathan
  • Publication number: 20240403286
    Abstract: Corruption detection in backups is disclosed. Backups that are received into a backup environment are stored in corresponding lineages. A detection engine is configured to perform corruption detection operations on the most recent backups in each of the lineages based on a sample frequency. Corruption detection operations may also be performed randomly and based on unexpected or unusual changes in backup metadata.
    Type: Application
    Filed: August 12, 2024
    Publication date: December 5, 2024
    Inventors: Nitin Madan, Bhimsen Bhanjois, Kiran Kumar Malle Gowda
  • Patent number: 12153547
    Abstract: One example method includes creating a namespace of a deduplication filesystem, adding a ‘temporary’ flag to the namespace, adding a ‘delete’ flag to the namespace when the namespace is to be deleted, and when a maximum number of namespaces permitted by the deduplication filesystem has been reached due to the creating of the namespace, deleting another namespace bearing a ‘temporary’ flag and a ‘delete’ flag. In this way, efficient use may be made of the NVRAM, while also maintaining compliance with deduplication filesystem requirements concerning the maximum number of permitted namespaces.
    Type: Grant
    Filed: April 22, 2022
    Date of Patent: November 26, 2024
    Assignee: Dell Products L.P.
    Inventors: Nitin Madan, Neerajkumar N. Chourasia
  • Patent number: 12153502
    Abstract: Improving the performance of read operations in a restore path of an inline deduplication system utilizing a DDBOOST interface by providing an adaptive compression component for use with DDBOOST applications. A built-in compression mode transfers read data if there are sufficient CPU resources in the server and client to compress and decompress the read data without destabilizing the system. CPU usage is tracked to generate predicted respective client and server CPU usage. These respective predictions are compared to defined maximum threshold usage values. If the predicted values do not exceed the thresholds, compression is used, otherwise the data is transmitted over the network as non-compressed data. A pre-filter is used to first determine whether or not the data would benefit from the built-in compression mode.
    Type: Grant
    Filed: August 3, 2023
    Date of Patent: November 26, 2024
    Assignee: Dell Products L.P.
    Inventors: Donna Barry Lewis, Nitin Madan, Bhimsen Bhanjois
  • Patent number: 12141035
    Abstract: A self-healing method of recovering files using a cyber recovery vault for deduplication filesystems. Data to be backed up from a production system to a backup system in a datacenter is also copied to a cyber security vault coupled to the data center through an air gapped connection. A copy process makes a point-in-time (PIT) copy of the portion of data to a namespace in the vault, and retention locks the copied portion in the vault. An automated process detects a missing segment error, such as due to a bad index lookup in the data to be backed up. The self-healing process provides the missing segment from the PIT copy in the cyber security vault. For any missing fingerprints the process adds the data in new containers and the references in the index, providing an indirection that allows for just writing a new container with the missing L0 references and updating the index.
    Type: Grant
    Filed: June 13, 2022
    Date of Patent: November 12, 2024
    Assignee: Dell Products L.P.
    Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda
  • Publication number: 20240362141
    Abstract: System audits messages, communicated internally in copy management system, about copy management jobs, and learns about relationships between message requests for user actions on copy management jobs and subsequent failures of copy management jobs. System creates snapshot of copy management content displayed by user interface and selected by user as context for user's message, and creates message's link to snapshot. System stores user entries that identify message's intended recipient(s), time of availability, and text. If message requests user action on copy management job, and relationship between unanswered requests for user to perform action on copy management job and subsequent failures of copy management job satisfies relationship threshold, then machine learning system sends message via copy management system's internal communication channel to system-selected administrator, who selects message's hyperlink to snapshot.
    Type: Application
    Filed: October 26, 2023
    Publication date: October 31, 2024
    Applicant: Dell Products L.P.
    Inventors: Salil Dangi, Nitin Madan
  • Publication number: 20240362125
    Abstract: System determines first context of messages between copy management system users and creates snapshot of copy management content part, which is displayed by user interface, and selected by system user as context for subsequent message. System creates hyperlink in message to snapshot that depicts copy management content part and stores user entries for tag that identifies at least one intended recipient of message, time when message is available for intended recipient(s), and text for message. System sends message at time to intended recipient(s) via internal communication channel of system. In response to recipient of message selecting message's hyperlink to snapshot, system outputs context for message to recipient's user interface, which enables recipient to respond to message. If second context of messages between copy management system users matches first context of messages, then information requested in message after first context of messages is conveyed to at least one user interface.
    Type: Application
    Filed: October 26, 2023
    Publication date: October 31, 2024
    Applicant: Dell Products L.P.
    Inventors: Salil Dangi, Nitin Madan
  • Patent number: 12117907
    Abstract: Methods of cloning data backup across namespaces are disclosed. In response to receiving a file replication request, one or more source files are cloned from a first namespace to a second namespace, as one or more destination files. A first attribute indicating that the source file(s) have been cloned to the second namespace as the destination file(s) is created. A source synthetic file is cloned from the first namespace to the second namespace, as a destination synthetic file, where synthetic information of the destination synthetic file points to the source file(s) as one or more base file. A second attribute indicating that the source synthetic file has been cloned to the second namespace as the destination synthetic file is created. Based on the first and second attributes, the synthetic information of the destination synthetic file is updated or propagated to use the destination file(s) as one or more base files on the second namespace.
    Type: Grant
    Filed: April 29, 2022
    Date of Patent: October 15, 2024
    Assignee: DELL PRODUCTS L.P.
    Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda, Srisailendra Yallapragada, Alok Katiyar, Salil Dangi, Sanjay Vedanthan
  • Publication number: 20240330127
    Abstract: Improving the performance of read operations in a restore path of an inline deduplication system utilizing a DDBOOST interface by providing an adaptive compression component for use with DDBOOST applications. A built-in compression mode transfers read data if there are sufficient CPU resources in the server and client to compress and decompress the read data without destabilizing the system. CPU usage is tracked to generate predicted respective client and server CPU usage. These respective predictions are compared to defined maximum threshold usage values. If the predicted values do not exceed the thresholds, compression is used, otherwise the data is transmitted over the network as non-compressed data. A pre-filter is used to first determine whether or not the data would benefit from the built-in compression mode.
    Type: Application
    Filed: August 3, 2023
    Publication date: October 3, 2024
    Inventors: Donna Barry Lewis, Nitin Madan, Bhimsen Bhanjois
  • Patent number: 12105595
    Abstract: Embodiments for providing file immutability for cloud storage data in a deduplicating filesystem and using a new filesystem that is spawned to receive redirected live data, after which the old filesystem is expired. Data objects are stored in the cloud by defining a protection duration from a first date to a fixed future date, and applying a retention lock to one or more data objects stored in cloud storage during the protection duration, the retention lock preventing unauthorized deletion, modification or movement of the data. A renew threshold date is defined within the protection duration, and a new filesystem is spawned on this date. All new data is redirected to the new filesystem and locked for the protection duration, and the first file system is destroyed.
    Type: Grant
    Filed: September 28, 2022
    Date of Patent: October 1, 2024
    Assignee: Dell Products L.P.
    Inventors: Nitin Madan, Bhimsen Bhanjois, Fei Wang, Jagannathdas Rath, Srisailendra Yallapragada
  • Patent number: 12105594
    Abstract: Embodiments for processing fastcopy overwrite backup workloads (FCOW) as virtual synthetic backups, by detecting whether or not a backup workload comprises an FCOW workload in which a base file is fastcopied to a target file, wherein portions of the base file are overwritten through overwrites by new data in the target file by a deduplication backup process. For FCOW workloads, the process creates a file recipe by trapping seek offsets and write byte lengths for the overwrites, and writing extent information comprising offset differences to a recipe table of the file recipe, and the file recipe facilitates file processing optimizations including differencing, replication, and tiering.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: October 1, 2024
    Assignee: Dell Products L.P.
    Inventors: Nitin Madan, Bhimsen Bhanjois, Kalyan C. Gunda
  • Publication number: 20240303510
    Abstract: Dynamic rule-based recommendations are disclosed. A rule-base, which includes rules, is received for a data-related operation. Potential targets of the data-related operation are validated against the rule-base. Targets that are eligible or validated using the rule-base may be returned and/or ranked. The data-relation operation may be performed using one of the validated targets.
    Type: Application
    Filed: March 6, 2023
    Publication date: September 12, 2024
    Inventors: Nicholas A. Noto, Nitin Madan, Jingwen Zhang, Sriranjani Vaidyanathan, Ishan Khaparde
  • Patent number: 12079198
    Abstract: Corruption detection in backups is disclosed. Backups that are received into a backup environment are stored in corresponding lineages. A detection engine is configured to perform corruption detection operations on the most recent backups in each of the lineages based on a sample frequency. Corruption detection operations may also be performed randomly and based on unexpected or unusual changes in backup metadata.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: September 3, 2024
    Assignee: DELL PRODUCTS L.P.
    Inventors: Nitin Madan, Bhimsen Bhanjois, Kiran Kumar Malle Gowda
  • Publication number: 20240256393
    Abstract: One example method includes accessing a point-in-time copy including retention locked backups that were stored on a backup storage server at a time the point-in-time copy was generated. The method further includes accessing a current namespace including retention locked backups that are currently stored on the backup storage server. Each retention locked backup includes data backup files. The method also includes determining a first set of retention locked backups that are included in the point-in-time copy, but are not included in the current namespace. The method finally includes copying the first set of retention locked backups from the point-in-time copy into the current namespace without removing any of the retention locked backups already in the current namespace.
    Type: Application
    Filed: January 31, 2023
    Publication date: August 1, 2024
    Inventors: Salil Dangi, Nitin Madan
  • Publication number: 20240256658
    Abstract: Improving data recovery and restoration times by clamping down security after malware detection, and protect a data center from a cyber recovery vault. Embodiments provide a cyber recovery vault configured to store data backed up for a production site for long-term retention and disaster recovery. The vault is coupled to the data center comprising a production site through an automated air gap controlled by the vault. Control signals transmitted by the vault trigger the air gap to close the coupling between the vault and data center upon detection of a malware attack, and the data center is configured to listen for the control signals and implement heightened security measures to protect its data in response to the control signal.
    Type: Application
    Filed: February 1, 2023
    Publication date: August 1, 2024
    Inventors: Nitin Madan, Salil Dangi, Bhimsen Bhanjois