Patents by Inventor Sandeep Sinha

Sandeep Sinha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240020108
    Abstract: An example method of upgrading an application in a software-defined data center (SDDC) includes: deploying, by lifecycle management software executing in the SDDC, a second appliance, a first appliance executing services of the application at a first version, the second appliance having services of the application at a second version, the services in the first appliance being active and the services in the second appliance being inactive; setting, by the lifecycle management software, the first and second appliances as a preemptive pair, where the first appliance is protected and the second appliance is unprotected by fault domain management (FDM) software executing in the SDDC; performing, by the lifecycle management software, a switchover to stop the services of the first appliance and start the services of the second appliance; and setting, by the lifecycle management software, the first appliance as unprotected and the second appliance as protected by the FDM software.
    Type: Application
    Filed: November 3, 2022
    Publication date: January 18, 2024
    Inventors: SANDEEP SINHA, ANIKET AVINASH SAKHARDANDE, RAHUL KUMAR SINGH, CHANDRIKA MUTALIK, AKASH KODENKIRI, VASANTHA KUMARI TAMMANA
  • Publication number: 20240012668
    Abstract: A method performing at least one of hardware component compatibility checks or resource checks for datastore deployment is provided. The method includes receiving a request to aggregate local disks of a first host in a first host cluster to create and deploy a first datastore for the first host cluster, determining one or more of hardware components on the first host supports the deployment of the first datastore using a first database file available on the first host or resources on the first host support the deployment of the first datastore, and aggregating the local disks of the first host to create and deploy the first datastore for the first host cluster based on the determination.
    Type: Application
    Filed: August 26, 2022
    Publication date: January 11, 2024
    Inventors: Anmol Parikh, Akash Kodenkiri, Sandeep Sinha, Ammar Rizvi, Niharika Narasimhamurthy
  • Publication number: 20240004687
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed for state convergence associated with high availability application migration in a virtualized environment. An example apparatus includes at least one memory, machine readable instructions, and processor circuitry to at least one of execute or instantiate the machine readable instructions to identify a high availability slot in a virtual server rack including a first virtual machine (VM) associated with first configuration data that identifies the first VM as a protected VM, transmit second configuration data to a second VM that identifies the first VM as a nonprotected VM and the second VM as the protected VM, after a determination that a network partition is identified based on a failure of a request to retrieve the second configuration data from the second VM, and transfer data from the first VM to the second VM after causing the removal of the network partition.
    Type: Application
    Filed: November 18, 2022
    Publication date: January 4, 2024
    Inventors: DEEPAK BABARJUNG, BRIAN MASAO OKI, MAARTEN WIGGERS, IVAYLO RADOSLAVOV RADEV, SANDEEP SINHA
  • Publication number: 20230342178
    Abstract: Managing virtual infrastructure with self-initialized upgrades, such as upgrades or configuration changes, includes receiving, by a first virtual machine (VM) that provides a management function for a plurality of VMs, an indication of a pending configuration change. The first VM identifies, from within the plurality of VMs, a VM having a property which is associated with the first VM. This enables the first VM to locate itself among the plurality of VMs that it manages. Based on at least locating itself among the plurality of managed VMs (e.g., determining that the first VM comprises the identified VM), the first VM performs the configuration change on itself. Example changes include increasing memory, increasing storage allocation, increasing the number of processors, and other changes that may be associated with upgrading or migrating a VM.
    Type: Application
    Filed: June 6, 2022
    Publication date: October 26, 2023
    Inventors: TOMO VLADIMIROV SIMEONOV, IVAYLO RADOSLAVOV RADEV, SANDEEP SINHA, PRADEEP JIGALUR
  • Publication number: 20230336991
    Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. When a request with the second security token is sent from the first management entity to the second management entity, the second security token is validated using a public key from the first management entity at the second management entity. After validation, the request is processed at the second management entity and a response is transmitted to the first management entity.
    Type: Application
    Filed: June 26, 2023
    Publication date: October 19, 2023
    Inventors: KRISHNENDU GORAI, SANDEEP SINHA, VINOD R N, RAMESH VEPURI LAKSHMINARAYANA, AKASH KODENKIRI, SACHIN JOHRI
  • Publication number: 20230229484
    Abstract: An example method of establishing trust between a cross-cluster control plane (xCCP) and a cluster control plane (CCP) of an autonomous cluster of hosts in a virtualized computing system includes: providing, by the xCCP, trust data of the xCCP to a hypervisor of a host in the autonomous cluster that is executing the CCP; providing, by the hypervisor, the trust data to the CCP through a volume attached to a virtual machine (VM) that executes the CCP; persisting, by the CCP, the trust data in a database; and accessing, by a security token service (STS) of the CCP, the trust data in the database to authenticate access to the CCP by the xCCP.
    Type: Application
    Filed: April 18, 2022
    Publication date: July 20, 2023
    Inventors: Sandeep Sinha, Akash Kodenkiri, Vaun Rajasekar, Prachi Singhal, Ivailo Vladimirov Loboshki, Dimitar Dimitrov, Hakan Sunay Halil
  • Publication number: 20230229482
    Abstract: An example method of creating an autonomous cluster of hosts in a virtualized computing system includes: enabling, by a virtualization management server executing a cross cluster control plane (xCCP), an infravisor in a seed host of the hosts, the infravisor a component of a hypervisor executing on the seed host; running, by the infravisor, a cluster control plane (CCP) pod on the seed host executing a CCP; providing, by the infravisor, a CCP configuration to the CCP pod; applying, by an initialization script of the CCP pod, the CCP configuration to the CCP to create the autonomous cluster having the seed host as a single node thereof; and extending the autonomous cluster with remaining hosts of the hosts other than the seed host as additional nodes thereof, the CCP applying a cluster personality to each of the remaining hosts derived from the seed host.
    Type: Application
    Filed: April 18, 2022
    Publication date: July 20, 2023
    Inventors: SANDEEP SINHA, Akash Kodenkiri, Varun Rajasekar, Prachi Singhal, Ivailo Vladimirov Loboshki, Dimitar Dimitrov, Hakan Sunay Halil
  • Publication number: 20230229483
    Abstract: An example method of fault-handling for an autonomous cluster of hosts in a virtualized computing system includes: detecting, by a second plurality of infravisors in a second plurality of the hosts, lack of network connectivity with a first cluster control plane (CCP) executing on a first host in a first plurality of the hosts; electing, among the second plurality of infravisors, a second primary infravisor, a first primary infravisor executing on the first host; running, by the second primary infravisor, a second CCP on a second host in the second plurality of hosts; providing, by the second primary infravisor, a CCP configuration to the second CCP; and applying, by an initialization script of the second CCP, the CCP configuration to the second CCP to create a second autonomous cluster having the second plurality of hosts, the first CCP managing a first autonomous cluster having the first plurality of hosts.
    Type: Application
    Filed: April 18, 2022
    Publication date: July 20, 2023
    Inventors: SANDEEP SINHA, Akash KODENKIRI, Varun RAJASEKAR, Prachi SINGHAL, Ivailo Vladimirov LOBOSHKI, Dimitar DIMITROV, Hakan Sunay HALIL
  • Patent number: 11689924
    Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. In an embodiment, an endpoint is set at the first management entity as an authentication endpoint for the second management entity, which is used to authenticate a request with the second security token that is sent from the first management entity to the second management entity. After authentication, the request is processed at the second management entity and a response is transmitted to the first management entity.
    Type: Grant
    Filed: May 31, 2021
    Date of Patent: June 27, 2023
    Assignee: VMWARE, INC.
    Inventors: Krishnendu Gorai, Sandeep Sinha, Vinod R N, Ramesh Vepuri Lakshminarayana, Akash Kodenkiri, Sachin Johri
  • Publication number: 20230168912
    Abstract: A system and method for upgrading a source management component of a computing environment uses a target management component that is deployed in a host computer of the computing environment. The source and target management components are set as a primary-secondary management pair for a high availability system such that the source management component is set as a primary protected component and the target management component is set as a secondary unprotected component. After services of the source management component are stopped and the target management component is powered on, the primary-secondary management pair is modified to switch the source management component to the secondary unprotected component and the target management component to the primary protected component. Services of the target management component are then started to take over responsibilities of the source management component.
    Type: Application
    Filed: February 10, 2022
    Publication date: June 1, 2023
    Inventors: Sandeep Sinha, Akash Kodenkiri, Chandrika Mutalik
  • Publication number: 20230030000
    Abstract: Techniques for declaratively deploying a virtual infrastructure management (VIM) server in a computing environment are provided. According to one set of embodiments, an installer computer system can receive a desired state definition specifying a desired state for the VIM server and a virtual infrastructure to be managed by the VIM server. The installer computer system can further install the VIM server on a target computer system in the computing environment and provide the desired state definition to the target computer system. Upon initial boot up of the VIM server on the target computer system, a service of the VIM server can automatically configure the VIM server in accordance with the desired state definition.
    Type: Application
    Filed: September 2, 2021
    Publication date: February 2, 2023
    Inventors: Sandeep Sinha, Ivaylo Radoslavov Radev, Akash Kodenkiri, Ammar Rizvi, Pradeep Jigalur, Niharika Narasimhamurthy, Anmol Parikh, Chandrika Mutalik
  • Publication number: 20220405064
    Abstract: A method, system, and computer program product for automated identification and generation of user interface interactions for robotic process automation development are provided. The method identifies an interface environment including a set of user interface elements. The method identifies a set of element attributes associated with the set of user interface elements based on a user interface model. A set of automated interactions are generated based on the interface environment, the set of user interface elements, the set of element attributes, and the user interface model. An input interface is generated based on the set of automated interactions. The method generates program code for a thematic interface environment based on user input received through the input interface, the interface environment, the set of user interface elements, the set of element attributes, and the user interface model.
    Type: Application
    Filed: June 17, 2021
    Publication date: December 22, 2022
    Inventors: Zachary A. Silverstein, Jacob Ryan Jepperson, Jean Pommier, William Taylor, Sandeep Sinha
  • Publication number: 20220322090
    Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. In an embodiment, an endpoint is set at the first management entity as an authentication endpoint for the second management entity, which is used to authenticate a request with the second security token that is sent from the first management entity to the second management entity. After authentication, the request is processed at the second management entity and a response is transmitted to the first management entity.
    Type: Application
    Filed: May 31, 2021
    Publication date: October 6, 2022
    Inventors: KRISHNENDU GORAI, Sandeep Sinha, Vinod R N, Ramesh Vepuri Lakshminarayana, Akash Kodenkiri, Sachin Johri
  • Publication number: 20220229687
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for migrating from a first container runtime to a second container runtime.
    Type: Application
    Filed: March 26, 2021
    Publication date: July 21, 2022
    Inventors: Prachi SINGHAL, Akash KODENKIRI, Sandeep SINHA, Ammar RIZVI
  • Publication number: 20220107830
    Abstract: In one example, a computer implemented method may include designating a configurable object as a guarded object to restrict access to the configurable object. Further, the method may include receiving a request to access the guarded object and determining whether the request is received from a user having a privilege to access the guarded object. Furthermore, the method may include controlling the access to the guarded object based on the determination.
    Type: Application
    Filed: November 23, 2020
    Publication date: April 7, 2022
    Inventors: AKASH KODENKIRI, AMMAR RIZVI, SACHIN JOHRI, KRISHNENDU GORAI, SANDEEP SINHA
  • Publication number: 20220004417
    Abstract: An example method of deploying a logical network platform in a virtualized computing system, the virtualized computing system including a host cluster and a virtualization management server connected to a physical network, the host cluster having hosts and a virtualization layer executing on hardware platforms of the hosts is described. The method includes receiving, at the virtualization management server, a declarative specification describing a proposed state of the logical network platform; deploying, by the virtualization management server, a network manager of the logical network platform in response to the proposed state in the declarative specification; and deploying, by the virtualization management server in cooperation with the network manager, binaries to the hosts in the host cluster.
    Type: Application
    Filed: August 28, 2020
    Publication date: January 6, 2022
    Inventors: SANDEEP SINHA, Ammar RIZVI, Krishnendu GORAI, Brian Masao OKI, Akash KODENKIRI
  • Patent number: 9760680
    Abstract: A system, method, and computer program product for generating healthcare data keyword files is disclosed. The system may include a reader module on a computer, a mapper module on a computer, and a generator module on a computer. The reader module may be configured to read one or more healthcare data fields associated with a first vendor and read one or more portions of healthcare data associated with the one or more data fields. The mapper module may be configured to allow a first mapping of the one or more data fields to one or more keyword fields. In accordance with the first mapping, the generator module may be configured to generate one or more keywords associated with the one or more portions of healthcare data.
    Type: Grant
    Filed: March 21, 2014
    Date of Patent: September 12, 2017
    Assignee: Syntel, Inc.
    Inventors: Ankur Chadha, Sabari Mallika Ramakrishnan, Sandeep Sinha, Alok Srivastava
  • Publication number: 20150269320
    Abstract: A system, method, and computer program product for generating healthcare data keyword files is disclosed. The system may include a reader module on a computer, a mapper module on a computer, and a generator module on a computer. The reader module may be configured to read one or more healthcare data fields associated with a first vendor and read one or more portions of healthcare data associated with the one or more data fields. The mapper module may be configured to allow a first mapping of the one or more data fields to one or more keyword fields. In accordance with the first mapping, the generator module may be configured to generate one or more keywords associated with the one or more portions of healthcare data.
    Type: Application
    Filed: March 21, 2014
    Publication date: September 24, 2015
    Applicant: Syntel, Inc.
    Inventors: Ankur Chadha, Sabari Mallika Ramakrishnan, Sandeep Sinha, Alok Srivastava
  • Publication number: 20090012116
    Abstract: Provided are muscarinic receptor antagonists, which can be useful in treating various diseases of the respiratory, urinary or gastrointestinal system mediated through muscarinic receptors. Also provided are processes for preparing compounds described herein, pharmaceutical compositions comprising compounds described herein, and methods for treating diseases mediated through muscarinic receptors.
    Type: Application
    Filed: July 11, 2006
    Publication date: January 8, 2009
    Inventors: Naresh Kumar, Kirandeep Kaur, Sandeep Sinha, Suman Gupta, Venkata P. Palle, Anita Chugh
  • Publication number: 20080255188
    Abstract: This present invention generally relates to muscarinic receptor antagonists of Formula (I), which are useful, among other uses, for the treatment of various diseases of the respiratory, urinary and gastrointestinal systems mediated through muscarinic receptors. The invention also relates to the process for the preparation of disclosed compounds, pharmaceutical compositions containing the disclosed compounds, and the methods for treating diseases mediated through muscarinic receptors.
    Type: Application
    Filed: July 11, 2006
    Publication date: October 16, 2008
    Inventors: Naresh Kumar, Mohammad Salman, Kirandeep Kaur, Anita Chugh, Sandeep Sinha