Patents by Inventor Rekha Sampath

Rekha Sampath has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11762806
    Abstract: A system clock is protected by limiting clock changes, change frequency, and calculating skew. System and secure clocks are initialized to a same time. First and second thresholds are set. The first threshold corresponds to an alert and the second threshold corresponds to an action. At a time interval at which the secure clock is to be updated, a skew is calculated between the system and secure clocks, and a cumulative skew is calculated. Upon a determination that the cumulative skew has reached the first threshold, but not the second threshold, the alert is triggered while deletions of files having retention locks that have expired according to the system clock are allowed to continue. Upon a determination that the cumulative skew has reached the second threshold, the action is triggered. The action includes blocking the deletions of files having retention locks that have expired according to the system clock.
    Type: Grant
    Filed: October 15, 2020
    Date of Patent: September 19, 2023
    Assignee: EMC IP Holding Company LLC
    Inventors: Jagannathdas Rath, Kalyan C Gunda, Rekha Sampath, Satish Inampudi, Senthil Ponnuswamy, Sophie Syau Fang Deng
  • Patent number: 11601425
    Abstract: Described is a system for maintaining dual-party authentication requirements for data retention compliance in a distributed storage environment that includes servers or nodes with remote access components. When administering a data retention policy, an operating system component may require a dual-party authentication mechanism to prevent data deletion, while a different authentication mechanism may control access to the remote access components. Access to the remote access component by a single privileged user, however, may enable overriding or compromising the retention lock compliance implemented by the operating system. Accordingly, the system may tie the dual-party authentication requirement to the authentication mechanism of the remote access components.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: March 7, 2023
    Assignee: EMC IP Holding Company LLC
    Inventors: Senthil Ponnuswamy, Marcelo Vinante, Anjali Anjali, Anurag Sharma, Rekha Sampath
  • Patent number: 11341230
    Abstract: Described is a system for maintaining dual-party authentication requirements for data retention compliance in systems with remote access components. When administering a data retention policy, an operating system component may require a dual-party authentication mechanism to prevent data deletion, while a different authentication mechanism may control access to the remote access controller. Access to the remote access controller by a single privileged user, however, may enable overriding or compromising the retention lock compliance implemented by the operating system. Accordingly, the system may tie the dual-party authentication requirement to the remote access controller authentication mechanism.
    Type: Grant
    Filed: December 12, 2019
    Date of Patent: May 24, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Senthil Ponnuswamy, Marcelo Vinante, Anjali Anjali, Anurag Sharma, Rekha Sampath
  • Publication number: 20220121620
    Abstract: A system clock is protected by limiting clock changes, change frequency, and calculating skew. System and secure clocks are initialized to a same time. First and second thresholds are set. The first threshold corresponds to an alert and the second threshold corresponds to an action. At a time interval at which the secure clock is to be updated, a skew is calculated between the system and secure clocks, and a cumulative skew is calculated. Upon a determination that the cumulative skew has reached the first threshold, but not the second threshold, the alert is triggered while deletions of files having retention locks that have expired according to the system clock are allowed to continue. Upon a determination that the cumulative skew has reached the second threshold, the action is triggered. The action includes blocking the deletions of files having retention locks that have expired according to the system clock.
    Type: Application
    Filed: October 15, 2020
    Publication date: April 21, 2022
    Inventors: Jagannathdas Rath, Kalyan C. Gunda, Rekha Sampath, Satish Inampudi, Senthil Ponnuswamy, Sophie Syau Fang Deng
  • Publication number: 20210306305
    Abstract: In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
    Type: Application
    Filed: April 12, 2021
    Publication date: September 30, 2021
    Inventors: John Hogan, Lyell Dampeer, Laxmikanth Venkatraman, Vijay Mayadas, Patricia Rosch, John Gullotta, Ashfaq Shaik, Saheer Shaik, Horacio Barakat, Kishore Seshagiri, James Wiegand, Elizabeth Maiellano, Rekha Sampath
  • Patent number: 11108540
    Abstract: Secure communications are established in a non-secure environment between virtual machines configured as nodes of a virtual machine cluster having a virtual scale-out architecture without user intervention. When a new virtual cluster node is automatically and dynamically created and deployed by a virtual cluster master node, the master node embeds in a common image from which the new node is created an initial secret key for establishing initial trusted communications between the new node and the master node. The master node then passes a permanent secret key to the new node, opens an OpenSSL connection for creating a public key infrastructure, and signs the new node's CSR with its own public and private keys and sends the signed certificate to the new node.
    Type: Grant
    Filed: January 18, 2019
    Date of Patent: August 31, 2021
    Assignee: EMC IP Holding Company, LLC
    Inventors: Senthilkumar Ponnuswamy, Anjali Anjali, Satish Inampudi, Rekha Sampath, Amei Xu
  • Patent number: 10979405
    Abstract: In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
    Type: Grant
    Filed: June 24, 2019
    Date of Patent: April 13, 2021
    Assignee: Broadridge Financial Solutions, Inc.
    Inventors: John Hogan, Lyell Dampeer, Laxmikanth Venkatraman, Vijay Mayadas, Patricia Rosch, John Gullotta, Ashfaq Shaik, Saheer Shaik, Horacio Barakat, Kishore Seshagiri, James Wiegand, Elizabeth Maiellano, Rekha Sampath
  • Publication number: 20200235907
    Abstract: Secure communications are established in a non-secure environment between virtual machines configured as nodes of a virtual machine cluster having a virtual scale-out architecture without user intervention. When a new virtual cluster node is automatically and dynamically created and deployed by a virtual cluster master node, the master node embeds in a common image from which the new node is created an initial secret key for establishing initial trusted communications between the new node and the master node. The master node then passes a permanent secret key to the new node, opens an OpenSSL connection for creating a public key infrastructure, and signs the new node's CSR with its own public and private keys and sends the signed certificate to the new node.
    Type: Application
    Filed: January 18, 2019
    Publication date: July 23, 2020
    Applicant: EMC IP HOLDING COMPANY, LLC
    Inventors: Senthilkumar Ponnuswamy, Anjali Anjali, Satish Inampudi, Rekha Sampath, Amei Xu
  • Publication number: 20190312852
    Abstract: In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
    Type: Application
    Filed: June 24, 2019
    Publication date: October 10, 2019
    Inventors: John Hogan, Lyell Dampeer, Laxmikanth Venkatraman, Vijay Mayadas, Patricia Rosch, John Gullotta, Ashfaq Shaik, Saheer Shaik, Horacio Barakat, Kishore Seshagiri, James Wiegand, Elizabeth Maiellano, Rekha Sampath
  • Patent number: 10333910
    Abstract: In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
    Type: Grant
    Filed: April 19, 2018
    Date of Patent: June 25, 2019
    Assignee: Broadridge Financial Solutions, Inc.
    Inventors: John Hogan, Lyell Dampeer, Laxmikanth Venkatraman, Vijay Mayadas, Patricia Rosch, John Gullotta, Ashfaq Shaik, Saheer Shaik, Horacio Barakat, Kishore Seshagiri, James Wiegand, Elizabeth Maiellano, Rekha Sampath
  • Publication number: 20190141018
    Abstract: In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
    Type: Application
    Filed: April 19, 2018
    Publication date: May 9, 2019
    Inventors: John Hogan, Lyell Dampeer, Laxmikanth Venkatraman, Vijay Mayadas, Patricia Rosch, John Gullotta, Ashfaq Shaik, Saheer Shaik, Horacio Barakat, Kishore Seshagiri, James Wiegand, Elizabeth Maiellano, Rekha Sampath
  • Patent number: 9967238
    Abstract: In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
    Type: Grant
    Filed: November 9, 2017
    Date of Patent: May 8, 2018
    Assignee: Broadridge Financial Solutions, Inc.
    Inventors: John Hogan, Lyell Dampeer, Laxmikanth Venkatraman, Vijay Mayadas, Patricia Rosch, John Gullotta, Ashfaq Shaik, Saheer Shaik, Horacio Barakat, Kishore Seshagiri, James Wiegand, Elizabeth Maiellano, Rekha Sampath