Patents by Inventor Sandeep Sinha

Sandeep Sinha has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20250125946
    Abstract: An example method for encrypting clusters during deployment may include retrieving, from a blueprint, resource information required to deploy a cluster including a host computing system and a virtual cluster manager node to manage the host computing system. The resource information may include host information and disk information required to deploy the virtual cluster manager node, and encryption information associated with a key provider. Based on the host information and the disk information, a clustered datastore may be created on the host computing system. Further, the virtual cluster manager node may be deployed on the clustered datastore. Based on the encryption information associated with the key provider, the virtual cluster manager node and associated disks may be encrypted. Upon encrypting the virtual cluster manager node, a cluster may be created and the host computing system may be added to the cluster.
    Type: Application
    Filed: September 30, 2024
    Publication date: April 17, 2025
    Inventors: Niharika Narasimha Murthy, Akash Kodenkiri, Ammar Rizvi, Sandeep Sinha
  • Publication number: 20250110766
    Abstract: Described herein are systems, methods, and software to manage the assignment of hosts to host clusters and the assignment of virtual endpoints to the host clusters. In one implementation, a management service identifies a host to be added to a computing environment and identifies physical resources available on the host. The management service further determines a host cluster for the host from a plurality of host clusters in the computing environment based on the physical resources available on the host and assign the host to the host cluster.
    Type: Application
    Filed: September 28, 2023
    Publication date: April 3, 2025
    Inventors: Niharika Narasimhamurthy, Sandeep Sinha, Ammar Rizvi, Akash Kodenkiri, Shweta Mishra
  • Publication number: 20250089104
    Abstract: The present disclosure generally relates to wireless communication systems, more particularly to systems and methods for providing Fixed Mobile Convergence (FMC) service. System receives contact number/short code of first user dialed by second user, and establishes connection between BTAS and IMS server, when second user dials mobile number. Further, system invokes FMC create/update service to trigger modification of IFC service chaining data in IMS core network. Furthermore, system converts short code and transmits invite request messages to IMS core network and triggers ringing mode on mobile/fixed line device. In response to conversion, system transmit invite request messages to IMS core network of mobile number link to fixed line, and in response to transmission, system triggers ringing mode on mobile device and fixed line device, to establish call. Additionally, system establishes call between mobile device and fixed line device of second user, and fixed line/mobile device of first user, respectively.
    Type: Application
    Filed: March 11, 2023
    Publication date: March 13, 2025
    Inventors: Birendra Singh BISHT, Harbinder Pal Singh SAINI, Anurag SINHA, Sandeep GUPTA, Rohit SOREN
  • Patent number: 12229574
    Abstract: An example method of deploying a logical network platform in a virtualized computing system, the virtualized computing system including a host cluster and a virtualization management server connected to a physical network, the host cluster having hosts and a virtualization layer executing on hardware platforms of the hosts is described. The method includes receiving, at the virtualization management server, a declarative specification describing a proposed state of the logical network platform; deploying, by the virtualization management server, a network manager of the logical network platform in response to the proposed state in the declarative specification; and deploying, by the virtualization management server in cooperation with the network manager, binaries to the hosts in the host cluster.
    Type: Grant
    Filed: August 28, 2020
    Date of Patent: February 18, 2025
    Assignee: VMware LLC
    Inventors: Sandeep Sinha, Ammar Rizvi, Krishnendu Gorai, Brian Masao Oki, Akash Kodenkiri
  • Publication number: 20240411540
    Abstract: A method of upgrading a software service from a first version to a second version, wherein the software service is supported by a file system on which a first archive is mounted, includes the steps of: causing execution of the software service to be stopped, and mounting a second archive onto the file system, wherein the second mounted archive includes a plurality of files for executing the second version of the software service; creating a set of pointers, each of the set of pointers pointing to a respective one of the plurality of files of the second mounted archive; and after creating the set of pointers, causing the second version of the software service to be executed, wherein executing the second version of the software service involves accessing code from the plurality of files of the second mounted archive using the set of pointers and executing the code.
    Type: Application
    Filed: June 7, 2023
    Publication date: December 12, 2024
    Inventors: Vikas Kumar PANDEY, Sandeep SINHA, Hakan Sunay HALIL, Ivaylo Radoslavov RADEV, Mark ZEREN
  • Patent number: 12153904
    Abstract: A method, system, and computer program product for automated identification and generation of user interface interactions for robotic process automation development are provided. The method identifies an interface environment including a set of user interface elements. The method identifies a set of element attributes associated with the set of user interface elements based on a user interface model. A set of automated interactions are generated based on the interface environment, the set of user interface elements, the set of element attributes, and the user interface model. An input interface is generated based on the set of automated interactions. The method generates program code for a thematic interface environment based on user input received through the input interface, the interface environment, the set of user interface elements, the set of element attributes, and the user interface model.
    Type: Grant
    Filed: June 17, 2021
    Date of Patent: November 26, 2024
    Assignee: International Business Machines Corporation
    Inventors: Zachary A. Silverstein, Jacob Ryan Jepperson, Jean Pommier, William Taylor, Sandeep Sinha
  • Publication number: 20240020108
    Abstract: An example method of upgrading an application in a software-defined data center (SDDC) includes: deploying, by lifecycle management software executing in the SDDC, a second appliance, a first appliance executing services of the application at a first version, the second appliance having services of the application at a second version, the services in the first appliance being active and the services in the second appliance being inactive; setting, by the lifecycle management software, the first and second appliances as a preemptive pair, where the first appliance is protected and the second appliance is unprotected by fault domain management (FDM) software executing in the SDDC; performing, by the lifecycle management software, a switchover to stop the services of the first appliance and start the services of the second appliance; and setting, by the lifecycle management software, the first appliance as unprotected and the second appliance as protected by the FDM software.
    Type: Application
    Filed: November 3, 2022
    Publication date: January 18, 2024
    Inventors: SANDEEP SINHA, ANIKET AVINASH SAKHARDANDE, RAHUL KUMAR SINGH, CHANDRIKA MUTALIK, AKASH KODENKIRI, VASANTHA KUMARI TAMMANA
  • Publication number: 20240012668
    Abstract: A method performing at least one of hardware component compatibility checks or resource checks for datastore deployment is provided. The method includes receiving a request to aggregate local disks of a first host in a first host cluster to create and deploy a first datastore for the first host cluster, determining one or more of hardware components on the first host supports the deployment of the first datastore using a first database file available on the first host or resources on the first host support the deployment of the first datastore, and aggregating the local disks of the first host to create and deploy the first datastore for the first host cluster based on the determination.
    Type: Application
    Filed: August 26, 2022
    Publication date: January 11, 2024
    Inventors: Anmol Parikh, Akash Kodenkiri, Sandeep Sinha, Ammar Rizvi, Niharika Narasimhamurthy
  • Publication number: 20240004687
    Abstract: Methods, apparatus, systems, and articles of manufacture are disclosed for state convergence associated with high availability application migration in a virtualized environment. An example apparatus includes at least one memory, machine readable instructions, and processor circuitry to at least one of execute or instantiate the machine readable instructions to identify a high availability slot in a virtual server rack including a first virtual machine (VM) associated with first configuration data that identifies the first VM as a protected VM, transmit second configuration data to a second VM that identifies the first VM as a nonprotected VM and the second VM as the protected VM, after a determination that a network partition is identified based on a failure of a request to retrieve the second configuration data from the second VM, and transfer data from the first VM to the second VM after causing the removal of the network partition.
    Type: Application
    Filed: November 18, 2022
    Publication date: January 4, 2024
    Inventors: DEEPAK BABARJUNG, BRIAN MASAO OKI, MAARTEN WIGGERS, IVAYLO RADOSLAVOV RADEV, SANDEEP SINHA
  • Publication number: 20230342178
    Abstract: Managing virtual infrastructure with self-initialized upgrades, such as upgrades or configuration changes, includes receiving, by a first virtual machine (VM) that provides a management function for a plurality of VMs, an indication of a pending configuration change. The first VM identifies, from within the plurality of VMs, a VM having a property which is associated with the first VM. This enables the first VM to locate itself among the plurality of VMs that it manages. Based on at least locating itself among the plurality of managed VMs (e.g., determining that the first VM comprises the identified VM), the first VM performs the configuration change on itself. Example changes include increasing memory, increasing storage allocation, increasing the number of processors, and other changes that may be associated with upgrading or migrating a VM.
    Type: Application
    Filed: June 6, 2022
    Publication date: October 26, 2023
    Inventors: TOMO VLADIMIROV SIMEONOV, IVAYLO RADOSLAVOV RADEV, SANDEEP SINHA, PRADEEP JIGALUR
  • Publication number: 20230336991
    Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. When a request with the second security token is sent from the first management entity to the second management entity, the second security token is validated using a public key from the first management entity at the second management entity. After validation, the request is processed at the second management entity and a response is transmitted to the first management entity.
    Type: Application
    Filed: June 26, 2023
    Publication date: October 19, 2023
    Inventors: KRISHNENDU GORAI, SANDEEP SINHA, VINOD R N, RAMESH VEPURI LAKSHMINARAYANA, AKASH KODENKIRI, SACHIN JOHRI
  • Publication number: 20230229484
    Abstract: An example method of establishing trust between a cross-cluster control plane (xCCP) and a cluster control plane (CCP) of an autonomous cluster of hosts in a virtualized computing system includes: providing, by the xCCP, trust data of the xCCP to a hypervisor of a host in the autonomous cluster that is executing the CCP; providing, by the hypervisor, the trust data to the CCP through a volume attached to a virtual machine (VM) that executes the CCP; persisting, by the CCP, the trust data in a database; and accessing, by a security token service (STS) of the CCP, the trust data in the database to authenticate access to the CCP by the xCCP.
    Type: Application
    Filed: April 18, 2022
    Publication date: July 20, 2023
    Inventors: Sandeep Sinha, Akash Kodenkiri, Vaun Rajasekar, Prachi Singhal, Ivailo Vladimirov Loboshki, Dimitar Dimitrov, Hakan Sunay Halil
  • Publication number: 20230229483
    Abstract: An example method of fault-handling for an autonomous cluster of hosts in a virtualized computing system includes: detecting, by a second plurality of infravisors in a second plurality of the hosts, lack of network connectivity with a first cluster control plane (CCP) executing on a first host in a first plurality of the hosts; electing, among the second plurality of infravisors, a second primary infravisor, a first primary infravisor executing on the first host; running, by the second primary infravisor, a second CCP on a second host in the second plurality of hosts; providing, by the second primary infravisor, a CCP configuration to the second CCP; and applying, by an initialization script of the second CCP, the CCP configuration to the second CCP to create a second autonomous cluster having the second plurality of hosts, the first CCP managing a first autonomous cluster having the first plurality of hosts.
    Type: Application
    Filed: April 18, 2022
    Publication date: July 20, 2023
    Inventors: SANDEEP SINHA, Akash KODENKIRI, Varun RAJASEKAR, Prachi SINGHAL, Ivailo Vladimirov LOBOSHKI, Dimitar DIMITROV, Hakan Sunay HALIL
  • Publication number: 20230229482
    Abstract: An example method of creating an autonomous cluster of hosts in a virtualized computing system includes: enabling, by a virtualization management server executing a cross cluster control plane (xCCP), an infravisor in a seed host of the hosts, the infravisor a component of a hypervisor executing on the seed host; running, by the infravisor, a cluster control plane (CCP) pod on the seed host executing a CCP; providing, by the infravisor, a CCP configuration to the CCP pod; applying, by an initialization script of the CCP pod, the CCP configuration to the CCP to create the autonomous cluster having the seed host as a single node thereof; and extending the autonomous cluster with remaining hosts of the hosts other than the seed host as additional nodes thereof, the CCP applying a cluster personality to each of the remaining hosts derived from the seed host.
    Type: Application
    Filed: April 18, 2022
    Publication date: July 20, 2023
    Inventors: SANDEEP SINHA, Akash Kodenkiri, Varun Rajasekar, Prachi Singhal, Ivailo Vladimirov Loboshki, Dimitar Dimitrov, Hakan Sunay Halil
  • Patent number: 11689924
    Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. In an embodiment, an endpoint is set at the first management entity as an authentication endpoint for the second management entity, which is used to authenticate a request with the second security token that is sent from the first management entity to the second management entity. After authentication, the request is processed at the second management entity and a response is transmitted to the first management entity.
    Type: Grant
    Filed: May 31, 2021
    Date of Patent: June 27, 2023
    Assignee: VMWARE, INC.
    Inventors: Krishnendu Gorai, Sandeep Sinha, Vinod R N, Ramesh Vepuri Lakshminarayana, Akash Kodenkiri, Sachin Johri
  • Publication number: 20230168912
    Abstract: A system and method for upgrading a source management component of a computing environment uses a target management component that is deployed in a host computer of the computing environment. The source and target management components are set as a primary-secondary management pair for a high availability system such that the source management component is set as a primary protected component and the target management component is set as a secondary unprotected component. After services of the source management component are stopped and the target management component is powered on, the primary-secondary management pair is modified to switch the source management component to the secondary unprotected component and the target management component to the primary protected component. Services of the target management component are then started to take over responsibilities of the source management component.
    Type: Application
    Filed: February 10, 2022
    Publication date: June 1, 2023
    Inventors: Sandeep Sinha, Akash Kodenkiri, Chandrika Mutalik
  • Publication number: 20230030000
    Abstract: Techniques for declaratively deploying a virtual infrastructure management (VIM) server in a computing environment are provided. According to one set of embodiments, an installer computer system can receive a desired state definition specifying a desired state for the VIM server and a virtual infrastructure to be managed by the VIM server. The installer computer system can further install the VIM server on a target computer system in the computing environment and provide the desired state definition to the target computer system. Upon initial boot up of the VIM server on the target computer system, a service of the VIM server can automatically configure the VIM server in accordance with the desired state definition.
    Type: Application
    Filed: September 2, 2021
    Publication date: February 2, 2023
    Inventors: Sandeep Sinha, Ivaylo Radoslavov Radev, Akash Kodenkiri, Ammar Rizvi, Pradeep Jigalur, Niharika Narasimhamurthy, Anmol Parikh, Chandrika Mutalik
  • Publication number: 20220405064
    Abstract: A method, system, and computer program product for automated identification and generation of user interface interactions for robotic process automation development are provided. The method identifies an interface environment including a set of user interface elements. The method identifies a set of element attributes associated with the set of user interface elements based on a user interface model. A set of automated interactions are generated based on the interface environment, the set of user interface elements, the set of element attributes, and the user interface model. An input interface is generated based on the set of automated interactions. The method generates program code for a thematic interface environment based on user input received through the input interface, the interface environment, the set of user interface elements, the set of element attributes, and the user interface model.
    Type: Application
    Filed: June 17, 2021
    Publication date: December 22, 2022
    Inventors: Zachary A. Silverstein, Jacob Ryan Jepperson, Jean Pommier, William Taylor, Sandeep Sinha
  • Publication number: 20220322090
    Abstract: A system and method for establishing trust between management entities with different authentication mechanisms in a computing system utilizes a token exchange service to acquire a second security token used in a second management entity in exchange for a first security token used in a first management entity. In an embodiment, an endpoint is set at the first management entity as an authentication endpoint for the second management entity, which is used to authenticate a request with the second security token that is sent from the first management entity to the second management entity. After authentication, the request is processed at the second management entity and a response is transmitted to the first management entity.
    Type: Application
    Filed: May 31, 2021
    Publication date: October 6, 2022
    Inventors: KRISHNENDU GORAI, Sandeep Sinha, Vinod R N, Ramesh Vepuri Lakshminarayana, Akash Kodenkiri, Sachin Johri
  • Publication number: 20220229687
    Abstract: Methods, systems, and apparatus, including computer programs encoded on computer storage media, for migrating from a first container runtime to a second container runtime.
    Type: Application
    Filed: March 26, 2021
    Publication date: July 21, 2022
    Inventors: Prachi SINGHAL, Akash KODENKIRI, Sandeep SINHA, Ammar RIZVI