Patents by Inventor Puneet KAUSHIK

Puneet KAUSHIK has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10353636
    Abstract: A write filter can be configured to employ a dynamically expandable overlay. The size of the overlay could initially be small and could then grow and shrink during the current session based on demand. The overlay can span both RAM and disk to thereby allow the size of the overlay to be relatively large. When sufficient RAM is available, the overlay can be allowed to grow in RAM. In contrast, if RAM is low, the overlay can grow on disk. Also, artifacts in the overlay can be moved from the RAM portion to the disk portion to reduce the amount of RAM consumed by the overlay. Because the overlay is dynamically expandable, it will typically not become full and will therefore not force a reboot.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: July 16, 2019
    Assignee: WYSE TECHNOLOGY L.L.C.
    Inventors: Puneet Kaushik, Salil S Joshi, Sumit Popli
  • Patent number: 10346320
    Abstract: Applications and users can be restricted from making persistent changes to artifacts on a protected volume. In Windows-based systems that include a file-based write filter, a policy-based write filter can be positioned below the file-based write filter and can examine any write requests that target artifacts of a protected volume and are not redirected by the file-based write filter. The policy-based write filter can examine the write requests against any applicable policies to determine whether the write requests should be allowed to proceed. If the policy-based write filter determines that a write request is not allowed by policy, it can fail the write request to thereby prevent the targeted artifact from being updated in the protected volume.
    Type: Grant
    Filed: January 27, 2017
    Date of Patent: July 9, 2019
    Assignee: WYSE TECHNOLOGY L.L.C.
    Inventors: Salil S Joshi, Puneet Kaushik
  • Patent number: 10235187
    Abstract: Application configurations can be merged to enhance multi-layer performance. When a layering system is employed, a layering registry filter driver can create a merged registry hive that includes the contents of each operating system registry hive as well as the contents of each registry hive of a mounted layer. The merged registry hive will therefore form a single location that the layering registry filter driver can access to complete a registry operation.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: March 19, 2019
    Assignee: Wyse Technology L.L.C.
    Inventors: Rushikesh Patil, Puneet Kaushik
  • Patent number: 10216939
    Abstract: A security solution can be implemented using a layering system. By using a layering system, any changes that are made to a computing system can be isolated within a separate write layer. Due to this isolation, the changes, which may even be malicious, can be evaluated without fear that the resources in other layers will be negatively affected. In this way, even security threats that are still unknown to antivirus solutions (so-called zero-day attacks) can be prevented from harming the system.
    Type: Grant
    Filed: April 29, 2016
    Date of Patent: February 26, 2019
    Assignee: Wyse Technology L.L.C.
    Inventors: Rushikesh Patil, Puneet Kaushik
  • Publication number: 20180268126
    Abstract: Access to devices can be controlled dynamically. A device control driver can function as an upper filter driver so that it can intercept I/O requests that target a particular device. The device control driver can be configured to communicate with a device control server to dynamically determine whether the current user is allowed to access the particular device. The device control server can employ policy or administrator input to determine whether access should be allowed and can then notify the device control driver accordingly. When access is granted, the device control driver can pass I/O requests down the device driver stack. Otherwise, the device control driver can block the I/O requests. Also, when access is granted, the device control server can specify a permission expiration time after which the device control driver should again resume blocking I/O requests.
    Type: Application
    Filed: March 14, 2017
    Publication date: September 20, 2018
    Inventors: Puneet Kaushik, Salil Joshi
  • Patent number: 10067887
    Abstract: In one embodiment, a method performed by one or more computing devices includes identifying, at a first computing device, a composite device having one or more interfaces; calling a driver in conjunction with an initialization of the composite device; identifying the one or more interfaces associated with the composite device; determining whether to redirect any of the one or more interfaces to a second computing device; and redirecting to the second computing device any of the one or more interfaces that were determined to require redirection.
    Type: Grant
    Filed: September 12, 2013
    Date of Patent: September 4, 2018
    Assignee: Dell Products L.P.
    Inventor: Puneet Kaushik
  • Publication number: 20180225058
    Abstract: A write filter can be configured to employ a dynamically expandable overlay. The size of the overlay could initially be small and could then grow and shrink during the current session based on demand. The overlay can span both RAM and disk to thereby allow the size of the overlay to be relatively large. When sufficient RAM is available, the overlay can be allowed to grow in RAM. In contrast, if RAM is low, the overlay can grow on disk. Also, artifacts in the overlay can be moved from the RAM portion to the disk portion to reduce the amount of RAM consumed by the overlay. Because the overlay is dynamically expandable, it will typically not become full and will therefore not force a reboot.
    Type: Application
    Filed: February 6, 2017
    Publication date: August 9, 2018
    Inventors: Puneet Kaushik, Salil S Joshi, Sumit Popli
  • Publication number: 20180227296
    Abstract: Authentication can be performed on thin clients using independent mobile devices. Because many users have smart phones or other similar mobile devices that include biometric scanners, such mobile devices can be leveraged to perform authentication of users as part of logging in to a thin client desktop. A mapping can be created on a central server between a user's mobile device and the user's domain identity. A mapping can also be created between the user's domain identity and the user's thin client desktop. Then, when a user desires to log in to his thin client desktop, the user can employ the appropriate biometric scanner on his mobile device to perform authentication. The central server can then rely on this authentication to identify and log the user into his thin client desktop.
    Type: Application
    Filed: February 3, 2017
    Publication date: August 9, 2018
    Inventors: Salil Joshi, Puneet Kaushik, Sumit Popli, Suruchi Dubey, Oleg Rombakh, Varun Raghavan
  • Publication number: 20180225105
    Abstract: When it is desired to update a group of thin clients that have a common configuration, the update can be deployed to a reference device on which a replicate tool executes. The replicate tool can examine the file system and registry of the reference device and create a manifest that describes the current state. The manifest can then be published for access by an agent that executes on the thin clients in the group. When the agent receives the manifest, it can compare the received manifest to an existing manifest on the thin client that defines the thin client's current state to identify any artifacts that differ. The agent can then retrieve and install any artifacts the thin client needs to match the current state of the reference device.
    Type: Application
    Filed: February 7, 2017
    Publication date: August 9, 2018
    Inventors: Puneet Kaushik, Salil Joshi
  • Publication number: 20180217940
    Abstract: An overlay of a file-based write filter can be freed up to thereby minimize the likelihood that the overlay will become full and force a system reboot. An overlay-managing write filter can be employed in conjunction with the file-based write filter to monitor files that are stored in the overlay and move files that are not currently being accessed. If a request is made to access a moved file, the overlay-managing write filter can modify the request so that it targets the location of the moved file rather than the location of the original file on the protected volume. In this way, the fact that modified files are being moved from the overlay but not discarded can be hidden from the file-based write filter. As a result, the effective size of the overlay will be increased while still allowing the file-based write filter to function in a normal fashion.
    Type: Application
    Filed: February 1, 2017
    Publication date: August 2, 2018
    Inventors: Salil S. Joshi, Puneet Kaushik
  • Publication number: 20180217996
    Abstract: Access to functionality of a file-based write filter can be secured. A policy-based filter can be configured to monitor and filter calls to APIs that access functionality of the file-based write filter. Based on policy, the policy-based filter can selectively block such calls to ensure that only permitted applications and/or users are allowed to access the functionality of the file-based write filter. In some cases, the policy-based filter can be configured to communicate with a server component to determine whether a particular attempt to access the functionality of the file-based write filter should be allowed.
    Type: Application
    Filed: January 27, 2017
    Publication date: August 2, 2018
    Inventors: Salil S. Joshi, Puneet Kaushik, Sumit Popli
  • Publication number: 20180217946
    Abstract: Applications and users can be restricted from making persistent changes to artifacts on a protected volume. In Windows-based systems that include a file-based write filter, a policy-based write filter can be positioned below the file-based write filter and can examine any write requests that target artifacts of a protected volume and are not redirected by the file-based write filter. The policy-based write filter can examine the write requests against any applicable policies to determine whether the write requests should be allowed to proceed. If the policy-based write filter determines that a write request is not allowed by policy, it can fail the write request to thereby prevent the targeted artifact from being updated in the protected volume.
    Type: Application
    Filed: January 27, 2017
    Publication date: August 2, 2018
    Inventors: Salil S. Joshi, Puneet Kaushik
  • Patent number: 10019191
    Abstract: A method and system for handling a file operation directed to an original file of a protected layer. A protected layer and a user- or device-specific write layer associated with the protected layer are both mounted. File open operations directed to an original file on the protected layer are instead redirected to one of a dummy file associated with the original file or a write-layer copy of the original file located on the write layer. If neither a dummy file nor a write-layer copy of the original file are on the write layer, a dummy file having the same file name and file attributes as the original file is created in the write layer. Subsequent file operations, such as reading, writing, and closing, are directed to the one of the dummy file or the write-layer copy.
    Type: Grant
    Filed: September 25, 2015
    Date of Patent: July 10, 2018
    Assignee: Dell Products L.P.
    Inventors: Rushikesh P. Patil, Puneet Kaushik, Satya Mylvara
  • Patent number: 9971696
    Abstract: A file-system filter driver is attached to each cache volume containing a cache and a source volume containing a source file. The file-system filter driver intercepts requests and may redirect the requests to the cache. The redirection may be based on metadata information corresponding to the file or folder associated with a given request. Redirection to the cache prevents an application or user from directly accessing or modifying the source volume, which may be shared among multiple client devices. Redirecting requests to the cache also permits user-specific modifications to be stored in the cache. A merged view of the source volume and the cache may then be presented to the user or an application, reflecting the user-specific modifications without affecting the source volume.
    Type: Grant
    Filed: September 17, 2015
    Date of Patent: May 15, 2018
    Assignee: Dell Products L.P.
    Inventors: Sergii Liashenko, Puneet Kaushik, Rushikesh P. Patil, Satya Mylvara
  • Patent number: 9886292
    Abstract: A user profile layer provides a benefit to a user by allowing access to user profile setting and data across multiple information handling systems running one or more operating systems. Operating system specific data may be stored in a user profile operating system layer while user data may be stored in a user profile data layer. Each time a user logs in to an information handling system, a layering driver captures changes to user data and to user settings corresponding to the operating system. A new user profile operating system layer is created for each type of operating system associated with a user while only one user profile data layer is maintained for the same user. In this way, any changes made to the same operating system data or user data are captured by the user's specific user profile and usable each time the user logs in to any information handling system.
    Type: Grant
    Filed: October 26, 2015
    Date of Patent: February 6, 2018
    Assignee: Dell Products L.P.
    Inventors: Puneet Kaushik, Rushikesh P. Patil
  • Patent number: 9852077
    Abstract: User changes may be preserved across updates to a layer. When a layering client mounts a layer, a corresponding layering write cache is mounted. Changes to layered resources, such as files, registry entries, and registry values, are made only to the layering write cache. A request to create a file in the layer is directed to the layering write cache such that the new file is created in the layering write cache. A request to open a layered resource, is directed to the layered resource if the layered resource is in the layering write cache. A request to write to a layered resource is directed to the layering write cache if the layered resource is in the layering write cache. If the layered resource is not in the layering write cache, the layered resource is copied to the layering write cache before redirecting the write request.
    Type: Grant
    Filed: September 24, 2015
    Date of Patent: December 26, 2017
    Assignee: Dell Products L.P.
    Inventors: Rushikesh P. Patil, Puneet Kaushik, Satya Mylvara, Manmeet S. Bindra
  • Publication number: 20170331878
    Abstract: Concurrent access to a user profile in a layering system is provided. When a user logs into a computing device, the server can locate a corresponding user profile to identify which layers should be provided to the user. Rather than sending these layers to the computing device for mounting, the server can mount the layers on the server. Therefore, if a user logs into multiple computing devices, the layering file system and registry filter drivers on those devices can route file system and registry requests to the server where the layers are mounted. Since the layers are mounted to a single device, concurrent access can be provided without the concern of data conflicts.
    Type: Application
    Filed: May 12, 2016
    Publication date: November 16, 2017
    Inventors: Puneet Kaushik, Rushikesh Patil
  • Publication number: 20170316210
    Abstract: A security solution can be implemented using a layering system. By using a layering system, any changes that are made to a computing system can be isolated within a separate write layer. Due to this isolation, the changes, which may even be malicious, can be evaluated without fear that the resources in other layers will be negatively affected. In this way, even security threats that are still unknown to antivirus solutions (so-called zero-day attacks) can be prevented from harming the system.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Rushikesh Patil, Puneet Kaushik
  • Publication number: 20170315999
    Abstract: A directory that resides on a layered volume can be renamed A hooking module can be employed to intercept rename requests. The hooking module can query a layering file system filter driver to determine the volume of the source and target of the rename request. If the source and target are on different volumes, thereby indicating that the source is a directory of a layered volume, the hooking module can append a signature to the target which identifies the actual volume of the source. The modified rename request can then be passed to the operating system which will perform its normal operations including verifying that the source and target are on the same volume. During this verification, the layering file system filter driver can detect the appended signature in the target and can inform the operating system that the target is on the volume identified in the signature.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Rushikesh Patil, Puneet Kaushik
  • Publication number: 20170315827
    Abstract: Application configurations can be merged to enhance multi-layer performance. When a layering system is employed, a layering registry filter driver can create a merged registry hive that includes the contents of each operating system registry hive as well as the contents of each registry hive of a mounted layer. The merged registry hive will therefore form a single location that the layering registry filter driver can access to complete a registry operation.
    Type: Application
    Filed: April 29, 2016
    Publication date: November 2, 2017
    Inventors: Rushikesh Patil, Puneet Kaushik