Patents by Inventor Santosh Rao

Santosh Rao has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240082255
    Abstract: The disclosure relates to compositions and methods of treating cancer in a subject. The method comprises administering to a patient in need of treatment an effective amount of imipramine.
    Type: Application
    Filed: November 13, 2023
    Publication date: March 14, 2024
    Inventors: Manjeet Rao, Subapriya Rajamanickam, Santosh Timilsina, Virginia G. Kaklamani
  • Publication number: 20230409447
    Abstract: Improved techniques for disaster recover within storage area networks are disclosed. Embodiments include replicating a LIF of a primary cluster on a secondary cluster. LIF configuration information is extracted from the primary cluster. A peer node from a secondary cluster is located. One or more ports are located on the located peer node that match a connectivity of the LIF from the primary cluster. One or more ports are identified based upon one or more filtering criteria to generate a candidate port list. A port from the candidate port list is selected based at least upon a load of the port. Other embodiments are described and claimed.
    Type: Application
    Filed: August 31, 2023
    Publication date: December 21, 2023
    Inventors: Raj Lalsangi, Pramod John Mathew, Subramanian Natarajan, Santosh Rao
  • Patent number: 11782805
    Abstract: Improved techniques for disaster recover within storage area networks are disclosed. Embodiments include replicating a LIF of a primary cluster on a secondary cluster. LIF configuration information is extracted from the primary cluster. A peer node from a secondary cluster is located. One or more ports are located on the located peer node that match a connectivity of the LIF from the primary cluster. One or more ports are identified based upon one or more filtering criteria to generate a candidate port list. A port from the candidate port list is selected based at least upon a load of the port. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 27, 2022
    Date of Patent: October 10, 2023
    Assignee: NetApp, Inc.
    Inventors: Raj Lalsangi, Pramod John Mathew, Subramanian Natarajan, Santosh Rao
  • Publication number: 20230061648
    Abstract: Improved techniques for disaster recover within storage area networks are disclosed. Embodiments include replicating a LIF of a primary cluster on a secondary cluster. LIF configuration information is extracted from the primary cluster. A peer node from a secondary cluster is located. One or more ports are located on the located peer node that match a connectivity of the LIF from the primary cluster. One or more ports are identified based upon one or more filtering criteria to generate a candidate port list. A port from the candidate port list is selected based at least upon a load of the port. Other embodiments are described and claimed.
    Type: Application
    Filed: October 27, 2022
    Publication date: March 2, 2023
    Inventors: Raj Lalsangi, Pramod John Mathew, Subramanian Natarajan, Santosh Rao
  • Patent number: 11487632
    Abstract: Improved techniques for disaster recover within storage area networks are disclosed. Embodiments include replicating a LIF of a primary cluster on a secondary cluster. LIF configuration information is extracted from the primary cluster. A peer node from a secondary cluster is located. One or more ports are located on the located peer node that match a connectivity of the LIF from the primary cluster. One or more ports are identified based upon one or more filtering criteria to generate a candidate port list. A port from the candidate port list is selected based at least upon a load of the port. Other embodiments are described and claimed.
    Type: Grant
    Filed: July 31, 2020
    Date of Patent: November 1, 2022
    Assignee: NetApp Inc.
    Inventors: Raj Lalsangi, Pramod John Mathew, Subramanian Natarajan, Santosh Rao
  • Patent number: 10938926
    Abstract: Network identity to User Identity and location mapping information can be found in various logs (such as Active Directory logs, DHCP logs, VPN logs, and WLAN authentication logs) and certain files such as router Layer 2 or 3 forwarding tables. For a large organization, this mapping can be dynamic. Accurate user identity and location information is crucial to assessing the security risk associated with a host and take corrective action. This invention discloses a distributed in-memory user database update methodology for keeping track of large scale dynamically updating network to user identity mappings. The technique is further configurable for specific users, specific devices or for specific attributes in the metadata.
    Type: Grant
    Filed: December 30, 2016
    Date of Patent: March 2, 2021
    Assignee: Fortinet, Inc.
    Inventors: Partha Bhattacharya, Santosh Rao
  • Publication number: 20210049304
    Abstract: A computer-implemented method can include obtaining a first text composition and obtaining first user data of a first user. The method can further include generating a first set of character fingerprinting rules that corresponds to the first user. The method can further include performing a first modification of the first text composition, according to the first set of fingerprinting rules. The first modification can result in a first fingerprinted text composition that corresponds to the first user.
    Type: Application
    Filed: August 12, 2019
    Publication date: February 18, 2021
    Inventors: Lohitashwa Thyagaraj, Santosh Rao, Satyendra Kumar, Shubham Srivastava
  • Publication number: 20200364119
    Abstract: Improved techniques for disaster recover within storage area networks are disclosed. Embodiments include replicating a LIF of a primary cluster on a secondary cluster. LIF configuration information is extracted from the primary cluster. A peer node from a secondary cluster is located. One or more ports are located on the located peer node that match a connectivity of the LIF from the primary cluster. One or more ports are identified based upon one or more filtering criteria to generate a candidate port list. A port from the candidate port list is selected based at least upon a load of the port. Other embodiments are described and claimed.
    Type: Application
    Filed: July 31, 2020
    Publication date: November 19, 2020
    Inventors: Raj Lalsangi, Pramod John Mathew, Subramanian Natarajan, Santosh Rao
  • Patent number: 10769037
    Abstract: Improved techniques for disaster recover within storage area networks are disclosed. Embodiments include replicating a LIF of a primary cluster on a secondary cluster. LIF configuration information is extracted from the primary cluster. A peer node from a secondary cluster is located. One or more ports are located on the located peer node that match a connectivity of the LIF from the primary cluster. One or more ports are identified based upon one or more filtering criteria to generate a candidate port list. A port from the candidate port list is selected based at least upon a load of the port. Other embodiments are described and claimed.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: September 8, 2020
    Assignee: NetApp Inc.
    Inventors: Raj Lalsangi, Pramod John Mathew, Subramanian Natarajan, Santosh Rao
  • Patent number: 10693955
    Abstract: Improved techniques for disaster recovery of storage service accessible through storage area networks are disclosed. Embodiments include establishing peer relationships between nodes of primary and secondary computing clusters. Configuration information is replicated in near synchronous manner from a primary cluster and used to configure a secondary cluster in a similar manner. Host data is replicated in synchronous manner for all the storage devices and LUNs within them. The secondary cluster is kept updated continuously with configuration information and user data in LUNs on storage devices such that a host may be served data from the secondary cluster when the primary cluster experiences a disaster or failure. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: June 23, 2020
    Assignee: NETAPP, INC.
    Inventors: Raj Lalsangi, Pramod John Mathew, Perumal Govindan Deivapalan, Santosh Rao
  • Patent number: 10445479
    Abstract: Metadata is received for different log events, from a plurality of regional controller nodes, implemented at least partially in hardware and geographically-dispersed around the data communication network for proximity to network devices. Each of the log events is reported by the network devices to a regional collector node of the plurality of regional controller nodes. Log events concerning a user authenticating to a network device that is geographically proximate to the user and comprising at least user identity aspect and a location aspect for specific users of stations serviced by the network devices, are detected. Feasibility of location changes can be determined to identify possible identity theft.
    Type: Grant
    Filed: September 30, 2017
    Date of Patent: October 15, 2019
    Assignee: Fortinet, Inc.
    Inventors: Santosh Rao, Wenjun Cai, Partha Bhattacharya
  • Patent number: 10175895
    Abstract: Various embodiments are generally directed an apparatus and method for receiving an event notification for a pair of cluster nodes having a first cluster node and a second cluster node, the event notification indicating an occurrence of a takeover event or a giveback event. Further, various embodiments may include suspending copying of information from a source logical unit to a target logical unit, transferring one or more processes from the first cluster node to the second cluster node and resuming importation of information from the source logical unit to the target logical unit.
    Type: Grant
    Filed: May 23, 2016
    Date of Patent: January 8, 2019
    Assignee: NetApp Inc.
    Inventors: Dean Kalman, Vishwas Venkatesh Pai, Baskaran Krishnamurthi, Santosh Rao, Chandramouli Subramanian
  • Patent number: 10148698
    Abstract: Event record purging is selectively enforced in a high volume log system. A plurality of data retention policies is received for one or more data types. Each data retention policy can describe a retention duration for enforcement of different data types with respect to online retention and offline retention. Only online compressed file from a period of time potentially containing event records with an expiring retention duration are uncompressed. Other files are ignored to save I/O bandwidth for supporting queries of event records. Some implementations search records using the index as well.
    Type: Grant
    Filed: September 30, 2016
    Date of Patent: December 4, 2018
    Assignee: Fortinet, Inc.
    Inventors: Santosh Rao, Partha Bhattacharya
  • Patent number: 10135922
    Abstract: Data consistency and availability can be provided at the granularity of logical storage objects in storage solutions that use storage virtualization in clustered storage environments. To ensure consistency of data across different storage elements, synchronization is performed across the different storage elements. Changes to data are synchronized across storage elements in different clusters by propagating the changes from a primary logical storage object to a secondary logical storage object. To satisfy the strictest RPOs while maintaining performance, change requests are intercepted prior to being sent to a filesystem that hosts the primary logical storage object and propagated to a different managing storage element associated with the secondary logical storage object.
    Type: Grant
    Filed: December 18, 2017
    Date of Patent: November 20, 2018
    Assignee: NetApp Inc.
    Inventors: Jeffrey S. Kimmel, Susan M. Coatney, Yuedong Mu, Santosh Rao
  • Publication number: 20180210796
    Abstract: Improved techniques for disaster recover within storage area networks are disclosed. Embodiments include replicating a LIF of a primary cluster on a secondary cluster. LIF configuration information is extracted from the primary cluster. A peer node from a secondary cluster is located. One or more ports are located on the located peer node that match a connectivity of the LIF from the primary cluster. One or more ports are identified based upon one or more filtering criteria to generate a candidate port list. A port from the candidate port list is selected based at least upon a load of the port. Other embodiments are described and claimed.
    Type: Application
    Filed: March 23, 2018
    Publication date: July 26, 2018
    Inventors: Raj Lalsangi, Pramod John Mathew, Subramanian Natarajan, Santosh Rao
  • Publication number: 20180191848
    Abstract: Network identity to User Identity and location mapping information can be found in various logs (such as Active Directory logs, DHCP logs, VPN logs, and WLAN authentication logs) and certain files such as router Layer 2 or 3 forwarding tables. For a large organization, this mapping can be dynamic. Accurate user identity and location information is crucial to assessing the security risk associated with a host and take corrective action. This invention discloses a distributed in-memory user database update methodology for keeping track of large scale dynamically updating network to user identity mappings. The technique is further configurable for specific users, specific devices or for specific attributes in the metadata.
    Type: Application
    Filed: December 30, 2016
    Publication date: July 5, 2018
    Inventors: Partha Bhattacharya, Santosh Rao
  • Publication number: 20180189467
    Abstract: Metadata is received for different log events, from a plurality of regional controller nodes, implemented at least partially in hardware and geographically-dispersed around the data communication network for proximity to network devices. Each of the log events is reported by the network devices to a regional collector node of the plurality of regional controller nodes. Log events concerning a user authenticating to a network device that is geographically proximate to the user and comprising at least user identity aspect and a location aspect for specific users of stations serviced by the network devices, are detected. Feasibility of location changes can be determined to identify possible identity theft.
    Type: Application
    Filed: September 30, 2017
    Publication date: July 5, 2018
    Inventors: Santosh Rao, Wenjun Cai, Partha Bhattacharya
  • Patent number: 9965363
    Abstract: Improved techniques for disaster recover within storage area networks are disclosed. Embodiments include replicating a LIF of a primary cluster on a secondary cluster. LIF configuration information is extracted from the primary cluster. A peer node from a secondary cluster is located. One or more ports are located on the located peer node that match a connectivity of the LIF from the primary cluster. One or more ports are identified based upon one or more filtering criteria to generate a candidate port list. A port from the candidate port list is selected based at least upon a load of the port. Other embodiments are described and claimed.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: May 8, 2018
    Assignee: NETAPP, INC.
    Inventors: Raj Lalsangi, Pramod John Mathew, Subramanian Natarajan, Santosh Rao
  • Publication number: 20180124172
    Abstract: Data consistency and availability can be provided at the granularity of logical storage objects in storage solutions that use storage virtualization in clustered storage environments. To ensure consistency of data across different storage elements, synchronization is performed across the different storage elements. Changes to data are synchronized across storage elements in different clusters by propagating the changes from a primary logical storage object to a secondary logical storage object. To satisfy the strictest RPOs while maintaining performance, change requests are intercepted prior to being sent to a filesystem that hosts the primary logical storage object and propagated to a different managing storage element associated with the secondary logical storage object.
    Type: Application
    Filed: December 18, 2017
    Publication date: May 3, 2018
    Inventors: Jeffrey S. Kimmel, Susan M. Coatney, Yuedong Mu, Santosh Rao
  • Publication number: 20180097844
    Abstract: Event record purging is selectively enforced in a high volume log system. A plurality of data retention policies is received for one or more data types. Each data retention policy can describe a retention duration for enforcement of different data types with respect to online retention and offline retention. Only online compressed file from a period of time potentially containing event records with an expiring retention duration are uncompressed. Other files are ignored to save I/O bandwidth for supporting queries of event records. Some implementations search records using the index as well.
    Type: Application
    Filed: September 30, 2016
    Publication date: April 5, 2018
    Inventors: Santosh Rao, Partha Bhattacharya