Patents by Inventor Sandeep Sinha
Sandeep Sinha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250125946Abstract: An example method for encrypting clusters during deployment may include retrieving, from a blueprint, resource information required to deploy a cluster including a host computing system and a virtual cluster manager node to manage the host computing system. The resource information may include host information and disk information required to deploy the virtual cluster manager node, and encryption information associated with a key provider. Based on the host information and the disk information, a clustered datastore may be created on the host computing system. Further, the virtual cluster manager node may be deployed on the clustered datastore. Based on the encryption information associated with the key provider, the virtual cluster manager node and associated disks may be encrypted. Upon encrypting the virtual cluster manager node, a cluster may be created and the host computing system may be added to the cluster.Type: ApplicationFiled: September 30, 2024Publication date: April 17, 2025Inventors: Niharika Narasimha Murthy, Akash Kodenkiri, Ammar Rizvi, Sandeep Sinha
-
Publication number: 20250110766Abstract: Described herein are systems, methods, and software to manage the assignment of hosts to host clusters and the assignment of virtual endpoints to the host clusters. In one implementation, a management service identifies a host to be added to a computing environment and identifies physical resources available on the host. The management service further determines a host cluster for the host from a plurality of host clusters in the computing environment based on the physical resources available on the host and assign the host to the host cluster.Type: ApplicationFiled: September 28, 2023Publication date: April 3, 2025Inventors: Niharika Narasimhamurthy, Sandeep Sinha, Ammar Rizvi, Akash Kodenkiri, Shweta Mishra
-
Publication number: 20250089104Abstract: The present disclosure generally relates to wireless communication systems, more particularly to systems and methods for providing Fixed Mobile Convergence (FMC) service. System receives contact number/short code of first user dialed by second user, and establishes connection between BTAS and IMS server, when second user dials mobile number. Further, system invokes FMC create/update service to trigger modification of IFC service chaining data in IMS core network. Furthermore, system converts short code and transmits invite request messages to IMS core network and triggers ringing mode on mobile/fixed line device. In response to conversion, system transmit invite request messages to IMS core network of mobile number link to fixed line, and in response to transmission, system triggers ringing mode on mobile device and fixed line device, to establish call. Additionally, system establishes call between mobile device and fixed line device of second user, and fixed line/mobile device of first user, respectively.Type: ApplicationFiled: March 11, 2023Publication date: March 13, 2025Inventors: Birendra Singh BISHT, Harbinder Pal Singh SAINI, Anurag SINHA, Sandeep GUPTA, Rohit SOREN
-
Patent number: 12229574Abstract: An example method of deploying a logical network platform in a virtualized computing system, the virtualized computing system including a host cluster and a virtualization management server connected to a physical network, the host cluster having hosts and a virtualization layer executing on hardware platforms of the hosts is described. The method includes receiving, at the virtualization management server, a declarative specification describing a proposed state of the logical network platform; deploying, by the virtualization management server, a network manager of the logical network platform in response to the proposed state in the declarative specification; and deploying, by the virtualization management server in cooperation with the network manager, binaries to the hosts in the host cluster.Type: GrantFiled: August 28, 2020Date of Patent: February 18, 2025Assignee: VMware LLCInventors: Sandeep Sinha, Ammar Rizvi, Krishnendu Gorai, Brian Masao Oki, Akash Kodenkiri
-
Publication number: 20240411540Abstract: A method of upgrading a software service from a first version to a second version, wherein the software service is supported by a file system on which a first archive is mounted, includes the steps of: causing execution of the software service to be stopped, and mounting a second archive onto the file system, wherein the second mounted archive includes a plurality of files for executing the second version of the software service; creating a set of pointers, each of the set of pointers pointing to a respective one of the plurality of files of the second mounted archive; and after creating the set of pointers, causing the second version of the software service to be executed, wherein executing the second version of the software service involves accessing code from the plurality of files of the second mounted archive using the set of pointers and executing the code.Type: ApplicationFiled: June 7, 2023Publication date: December 12, 2024Inventors: Vikas Kumar PANDEY, Sandeep SINHA, Hakan Sunay HALIL, Ivaylo Radoslavov RADEV, Mark ZEREN
-
Patent number: 12153904Abstract: A method, system, and computer program product for automated identification and generation of user interface interactions for robotic process automation development are provided. The method identifies an interface environment including a set of user interface elements. The method identifies a set of element attributes associated with the set of user interface elements based on a user interface model. A set of automated interactions are generated based on the interface environment, the set of user interface elements, the set of element attributes, and the user interface model. An input interface is generated based on the set of automated interactions. The method generates program code for a thematic interface environment based on user input received through the input interface, the interface environment, the set of user interface elements, the set of element attributes, and the user interface model.Type: GrantFiled: June 17, 2021Date of Patent: November 26, 2024Assignee: International Business Machines CorporationInventors: Zachary A. Silverstein, Jacob Ryan Jepperson, Jean Pommier, William Taylor, Sandeep Sinha
-
Publication number: 20240020108Abstract: An example method of upgrading an application in a software-defined data center (SDDC) includes: deploying, by lifecycle management software executing in the SDDC, a second appliance, a first appliance executing services of the application at a first version, the second appliance having services of the application at a second version, the services in the first appliance being active and the services in the second appliance being inactive; setting, by the lifecycle management software, the first and second appliances as a preemptive pair, where the first appliance is protected and the second appliance is unprotected by fault domain management (FDM) software executing in the SDDC; performing, by the lifecycle management software, a switchover to stop the services of the first appliance and start the services of the second appliance; and setting, by the lifecycle management software, the first appliance as unprotected and the second appliance as protected by the FDM software.Type: ApplicationFiled: November 3, 2022Publication date: January 18, 2024Inventors: SANDEEP SINHA, ANIKET AVINASH SAKHARDANDE, RAHUL KUMAR SINGH, CHANDRIKA MUTALIK, AKASH KODENKIRI, VASANTHA KUMARI TAMMANA
-
Publication number: 20240012668Abstract: A method performing at least one of hardware component compatibility checks or resource checks for datastore deployment is provided. The method includes receiving a request to aggregate local disks of a first host in a first host cluster to create and deploy a first datastore for the first host cluster, determining one or more of hardware components on the first host supports the deployment of the first datastore using a first database file available on the first host or resources on the first host support the deployment of the first datastore, and aggregating the local disks of the first host to create and deploy the first datastore for the first host cluster based on the determination.Type: ApplicationFiled: August 26, 2022Publication date: January 11, 2024Inventors: Anmol Parikh, Akash Kodenkiri, Sandeep Sinha, Ammar Rizvi, Niharika Narasimhamurthy
-
Publication number: 20240004687Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed for state convergence associated with high availability application migration in a virtualized environment. An example apparatus includes at least one memory, machine readable instructions, and processor circuitry to at least one of execute or instantiate the machine readable instructions to identify a high availability slot in a virtual server rack including a first virtual machine (VM) associated with first configuration data that identifies the first VM as a protected VM, transmit second configuration data to a second VM that identifies the first VM as a nonprotected VM and the second VM as the protected VM, after a determination that a network partition is identified based on a failure of a request to retrieve the second configuration data from the second VM, and transfer data from the first VM to the second VM after causing the removal of the network partition.Type: ApplicationFiled: November 18, 2022Publication date: January 4, 2024Inventors: DEEPAK BABARJUNG, BRIAN MASAO OKI, MAARTEN WIGGERS, IVAYLO RADOSLAVOV RADEV, SANDEEP SINHA
-
Publication number: 20230342178Abstract: Managing virtual infrastructure with self-initialized upgrades, such as upgrades or configuration changes, includes receiving, by a first virtual machine (VM) that provides a management function for a plurality of VMs, an indication of a pending configuration change. The first VM identifies, from within the plurality of VMs, a VM having a property which is associated with the first VM. This enables the first VM to locate itself among the plurality of VMs that it manages. Based on at least locating itself among the plurality of managed VMs (e.g., determining that the first VM comprises the identified VM), the first VM performs the configuration change on itself. Example changes include increasing memory, increasing storage allocation, increasing the number of processors, and other changes that may be associated with upgrading or migrating a VM.Type: ApplicationFiled: June 6, 2022Publication date: October 26, 2023Inventors: TOMO VLADIMIROV SIMEONOV, IVAYLO RADOSLAVOV RADEV, SANDEEP SINHA, PRADEEP JIGALUR
-
Publication number: 20230336991Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. When a request with the second security token is sent from the first management entity to the second management entity, the second security token is validated using a public key from the first management entity at the second management entity. After validation, the request is processed at the second management entity and a response is transmitted to the first management entity.Type: ApplicationFiled: June 26, 2023Publication date: October 19, 2023Inventors: KRISHNENDU GORAI, SANDEEP SINHA, VINOD R N, RAMESH VEPURI LAKSHMINARAYANA, AKASH KODENKIRI, SACHIN JOHRI
-
Publication number: 20230229484Abstract: An example method of establishing trust between a cross-cluster control plane (xCCP) and a cluster control plane (CCP) of an autonomous cluster of hosts in a virtualized computing system includes: providing, by the xCCP, trust data of the xCCP to a hypervisor of a host in the autonomous cluster that is executing the CCP; providing, by the hypervisor, the trust data to the CCP through a volume attached to a virtual machine (VM) that executes the CCP; persisting, by the CCP, the trust data in a database; and accessing, by a security token service (STS) of the CCP, the trust data in the database to authenticate access to the CCP by the xCCP.Type: ApplicationFiled: April 18, 2022Publication date: July 20, 2023Inventors: Sandeep Sinha, Akash Kodenkiri, Vaun Rajasekar, Prachi Singhal, Ivailo Vladimirov Loboshki, Dimitar Dimitrov, Hakan Sunay Halil
-
Publication number: 20230229483Abstract: An example method of fault-handling for an autonomous cluster of hosts in a virtualized computing system includes: detecting, by a second plurality of infravisors in a second plurality of the hosts, lack of network connectivity with a first cluster control plane (CCP) executing on a first host in a first plurality of the hosts; electing, among the second plurality of infravisors, a second primary infravisor, a first primary infravisor executing on the first host; running, by the second primary infravisor, a second CCP on a second host in the second plurality of hosts; providing, by the second primary infravisor, a CCP configuration to the second CCP; and applying, by an initialization script of the second CCP, the CCP configuration to the second CCP to create a second autonomous cluster having the second plurality of hosts, the first CCP managing a first autonomous cluster having the first plurality of hosts.Type: ApplicationFiled: April 18, 2022Publication date: July 20, 2023Inventors: SANDEEP SINHA, Akash KODENKIRI, Varun RAJASEKAR, Prachi SINGHAL, Ivailo Vladimirov LOBOSHKI, Dimitar DIMITROV, Hakan Sunay HALIL
-
Publication number: 20230229482Abstract: An example method of creating an autonomous cluster of hosts in a virtualized computing system includes: enabling, by a virtualization management server executing a cross cluster control plane (xCCP), an infravisor in a seed host of the hosts, the infravisor a component of a hypervisor executing on the seed host; running, by the infravisor, a cluster control plane (CCP) pod on the seed host executing a CCP; providing, by the infravisor, a CCP configuration to the CCP pod; applying, by an initialization script of the CCP pod, the CCP configuration to the CCP to create the autonomous cluster having the seed host as a single node thereof; and extending the autonomous cluster with remaining hosts of the hosts other than the seed host as additional nodes thereof, the CCP applying a cluster personality to each of the remaining hosts derived from the seed host.Type: ApplicationFiled: April 18, 2022Publication date: July 20, 2023Inventors: SANDEEP SINHA, Akash Kodenkiri, Varun Rajasekar, Prachi Singhal, Ivailo Vladimirov Loboshki, Dimitar Dimitrov, Hakan Sunay Halil
-
Patent number: 11689924Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. In an embodiment, an endpoint is set at the first management entity as an authentication endpoint for the second management entity, which is used to authenticate a request with the second security token that is sent from the first management entity to the second management entity. After authentication, the request is processed at the second management entity and a response is transmitted to the first management entity.Type: GrantFiled: May 31, 2021Date of Patent: June 27, 2023Assignee: VMWARE, INC.Inventors: Krishnendu Gorai, Sandeep Sinha, Vinod R N, Ramesh Vepuri Lakshminarayana, Akash Kodenkiri, Sachin Johri
-
Publication number: 20230168912Abstract: A system and method for upgrading a source management component of a computing environment uses a target management component that is deployed in a host computer of the computing environment. The source and target management components are set as a primary-secondary management pair for a high availability system such that the source management component is set as a primary protected component and the target management component is set as a secondary unprotected component. After services of the source management component are stopped and the target management component is powered on, the primary-secondary management pair is modified to switch the source management component to the secondary unprotected component and the target management component to the primary protected component. Services of the target management component are then started to take over responsibilities of the source management component.Type: ApplicationFiled: February 10, 2022Publication date: June 1, 2023Inventors: Sandeep Sinha, Akash Kodenkiri, Chandrika Mutalik
-
Publication number: 20230030000Abstract: Techniques for declaratively deploying a virtual infrastructure management (VIM) server in a computing environment are provided. According to one set of embodiments, an installer computer system can receive a desired state definition specifying a desired state for the VIM server and a virtual infrastructure to be managed by the VIM server. The installer computer system can further install the VIM server on a target computer system in the computing environment and provide the desired state definition to the target computer system. Upon initial boot up of the VIM server on the target computer system, a service of the VIM server can automatically configure the VIM server in accordance with the desired state definition.Type: ApplicationFiled: September 2, 2021Publication date: February 2, 2023Inventors: Sandeep Sinha, Ivaylo Radoslavov Radev, Akash Kodenkiri, Ammar Rizvi, Pradeep Jigalur, Niharika Narasimhamurthy, Anmol Parikh, Chandrika Mutalik
-
Publication number: 20220405064Abstract: A method, system, and computer program product for automated identification and generation of user interface interactions for robotic process automation development are provided. The method identifies an interface environment including a set of user interface elements. The method identifies a set of element attributes associated with the set of user interface elements based on a user interface model. A set of automated interactions are generated based on the interface environment, the set of user interface elements, the set of element attributes, and the user interface model. An input interface is generated based on the set of automated interactions. The method generates program code for a thematic interface environment based on user input received through the input interface, the interface environment, the set of user interface elements, the set of element attributes, and the user interface model.Type: ApplicationFiled: June 17, 2021Publication date: December 22, 2022Inventors: Zachary A. Silverstein, Jacob Ryan Jepperson, Jean Pommier, William Taylor, Sandeep Sinha
-
Publication number: 20220322090Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. In an embodiment, an endpoint is set at the first management entity as an authentication endpoint for the second management entity, which is used to authenticate a request with the second security token that is sent from the first management entity to the second management entity. After authentication, the request is processed at the second management entity and a response is transmitted to the first management entity.Type: ApplicationFiled: May 31, 2021Publication date: October 6, 2022Inventors: KRISHNENDU GORAI, Sandeep Sinha, Vinod R N, Ramesh Vepuri Lakshminarayana, Akash Kodenkiri, Sachin Johri
-
Publication number: 20220229687Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for migrating from a first container runtime to a second container runtime.Type: ApplicationFiled: March 26, 2021Publication date: July 21, 2022Inventors: Prachi SINGHAL, Akash KODENKIRI, Sandeep SINHA, Ammar RIZVI