Patents by Inventor Satish Grandhi
Satish Grandhi has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11822684Abstract: A computer-implemented method for identifying possible leakage paths of sensitive information may include (i) discovering an original set of users having permission to read the sensitive information at an originating storage device in an originating location via an original set of information transfer paths and (ii) performing a security action. The security action may include (A) determining an additional set of information transfer paths having information transfer paths other than the information transfer paths already discovered, via which the original set of users can write the sensitive information and (B) identifying an additional set of users having permission to read the sensitive information via the additional set of information transfer paths.Type: GrantFiled: January 13, 2020Date of Patent: November 21, 2023Assignee: Veritas Technologies LLCInventors: Anand Athavale, Shailesh A. Dargude, Satish Grandhi
-
Patent number: 11782965Abstract: The disclosed computer-implemented method for normalizing data store classification information may include (1) receiving, at the computing device, classification information from multiple data store content classification sources, (2) training a continuous bag of words (CBOW) classification model with the classification information, (3) receiving a classification tag from a data store for which respectively stored data is classified by one of the data store content classification sources, and (4) classifying, with the trained CBOW classification model, the received classification tag to a corresponding command tag, wherein the command tag represents a meaning of the classification tag. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: August 29, 2018Date of Patent: October 10, 2023Assignee: Veritas Technologies LLCInventors: Shailesh A. Dargude, Satish Grandhi, Joshua V. Stageberg
-
Patent number: 11487825Abstract: The disclosed computer-implemented method for prioritizing and detecting file datasets based on metadata may include (i) receive a group of files from a data storage, (ii) train a machine-learning model utilizing a set of properties derived from metadata associated with the files, (iii) identify, utilizing the machine-learning model, a dataset including at least one candidate file that performs an action in a set of predetermined actions, and (iv) prioritize the action based on the dataset. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 3, 2019Date of Patent: November 1, 2022Assignee: Veritas Technologies LLCInventors: Shailesh Dargude, Harshit Shah, Anand Athavale, Satish Grandhi
-
Patent number: 11336650Abstract: The disclosed computer-implemented method for producing access control list caches including effective information access permissions across disparate storage devices may include (i) receiving, at a computing device, an instruction to prepare an access control list (ACL) cache and (ii) performing a security action. The security action may include (A) recursively parsing, at the computing device, at least one respective ACL for information stored on at least two disparate storage devices, (B) identifying, at each step of recursion, each direct user and each indirect user having information access permissions in at least one of the respective ACLs, (C) determining, for each unique user in the respective ACLs, per-control point effective permissions, and (D) storing the per-control point effective information access permissions in the ACL cache. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: February 3, 2020Date of Patent: May 17, 2022Assignee: Veritas Technologies LLCInventors: Shailesh Dargude, Satish Grandhi, Harshit Shah
-
Patent number: 11301568Abstract: The disclosed computer-implemented method for computing a risk score for stored information may include (1) extracting factor-specific information from metadata describing characteristics of files stored on multiple storage devices, (2) assigning at least one respective factor score to at least one respective factor based at least in part on the factor-specific information, and (3) calculating the risk score from the at least one factor score. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: August 29, 2018Date of Patent: April 12, 2022Assignee: Veritas Technologies LLCInventors: Shailesh Dargude, Satish Grandhi, Anand Athavale, Rohit Nath
-
Patent number: 11070560Abstract: The disclosed computer-implemented method for managing user entitlements of objects from heterogeneous content sources may include (i) obtaining a user identifier from a user profile associated with a user, (ii) determining an entitlement for the user in an access control list (ACL) for an object of a content source, (iii) determining another entitlement for the user in another ACL for another object of another content source, wherein the content source and the other content source are associated with different systems, (iv) generating an effective entitlement of the user by associating the user identifier, the entitlement for the user in the ACL for the object, and the other entitlement for the user in the other ACL for the other object, and (v) storing the effective entitlement of the user. Various other methods, systems, and computer-readable media are also disclosed.Type: GrantFiled: April 3, 2019Date of Patent: July 20, 2021Assignee: Veritas Technologies LLCInventors: Shailesh Dargude, Satish Grandhi, Srinivas Kavuri
-
Publication number: 20190310791Abstract: The disclosed computer-implemented method for data management of multiple cloud services may include receiving, via a visibility application, a command for managing data hosted on a plurality of content sources. The commands from the visibility application may be modified and indirectly routed to the plurality of content sources. The method may include accessing, in response to the command, the plurality of content sources, and collecting and aggregating, from the plurality of content sources, metadata associated with the data. The method may also include analyzing the aggregated metadata. The method may further include providing, for presentation by the visibility application, results of the metadata analysis. Various other methods, systems, and computer-readable media are also disclosed.Type: ApplicationFiled: April 4, 2019Publication date: October 10, 2019Inventors: Rohini Kasturi, Satish Grandhi, Shailesh Dargude, Vibhu Pratap, Vijay Rajaram, Srinivas Kavuri, Stuart Carter, Yogendra Singh
-
Patent number: 10291476Abstract: A multi-cloud fabric includes an application management unit responsive to one or more applications from an application layer. The multi-cloud fabric further includes a controller that is in communication with resources of a cloud. The controller is responsive to the applications and includes a processor operable to analyze the application relative to the resources to cause delivery of the applications to the resources dynamically and automatically.Type: GrantFiled: May 11, 2017Date of Patent: May 14, 2019Assignee: Veritas Technologies LLCInventors: Rohini Kumar Kasturi, Satish Grandhi
-
Publication number: 20150319081Abstract: A fabric system is disclosed. The fabric system may be for a single cloud or multi-cloud environment and includes a services controller. The services controller communicates with at least one of a number of services, which are in turn in communication with an endpoint device. The services controller receives data packets from an open flow switch that is in communication with a client device. The data packets are destined to take a predetermined sub-optimal path through services that are not identical to the services. Based on certain policies, the services controller therefore alters the destined path by re-directing the data packets to an altered path so as to minimize the number of services performed on the data packets and accordingly informs an underlying network of the altered path.Type: ApplicationFiled: April 10, 2015Publication date: November 5, 2015Inventors: Rohini Kumar Kasturi, Ravi Kanth Nuguru, Satish Grandhi, Bhaskar Bhupalam, Bojjiraju Satya Tirumala Nanduri, Venkata Siva Satya Phani Kumar Gattupalli
-
Publication number: 20150304281Abstract: A multi-cloud fabric system includes an open flow switch responsive to a first and subsequent data packets and a services controller including a flow database. Further, the multi-cloud fabric system includes a SDN controller that communicates with the services controller through an open flow switch, wherein upon the receipt of the first data packet, the open flow switch directs the first packet to the services controller. The services controller creates a flow entry and makes authentication decisions based on authentication information. The open flow controller based on authentication policies, determines whether to allow or deny access to a corporate network based on saved authentication policies and if the open flow controller determines to deny access, the first packet being re-directed to an authentication server for access.Type: ApplicationFiled: May 1, 2015Publication date: October 22, 2015Inventors: Rohini Kumar KASTURI, Bhaskar BHUPALAM, Satish GRANDHI, Vijay Sundar Rajaram, Venkata Siva Satya Phani Kumar GATTUPALLI, Bojjiraju Satya NANDURI
-
Publication number: 20150281006Abstract: A multi-cloud fabric system includes a distributed elastic SLA analyzer and a distributed elastic analytic correlator. The distributed elastic SLA analyzer provides aggregated network state information to the distributed elastic analytic correlator and the distributed elastic analytic correlator, correlates the aggregated network state information from more than one network services for optimization of the multi-cloud fabric system.Type: ApplicationFiled: April 9, 2015Publication date: October 1, 2015Inventors: Rohini Kumar KASTURI, Satish GRANDHI, Vijay Sundar RAJARAM, Baranidharan SEETHARAMAN, Vibhu PRATAP
-
Publication number: 20150281005Abstract: A multi-cloud fabric system includes an application management unit responsive to one or more applications from an application layer. The multi-cloud fabric system further includes a controller that is in communication with resources of a cloud. The controller is responsive to the received application and includes a processor operable to analyze the received application relative to the resources to cause delivery of the one or more applications to the resources dynamically and automatically.Type: ApplicationFiled: April 7, 2015Publication date: October 1, 2015Inventors: Rohini Kumar Kasturi, Ravi Kanth Nuguru, Satish Grandhi, Bhaskar Bhupalam, Bojjiraju Satya Tirumala Nanduri, Venkata Siva Satya Phani Kumar Gattupalli
-
METHOD AND APPARATUS FOR ENSURING APPLICATION AND NETWORK SERVICE PERFORMANCE IN AN AUTOMATED MANNER
Publication number: 20150263906Abstract: A method of managing a service level agreement (SLA) of a data center includes receiving information from a plurality of SLA agents, aggregating the received information and automatically scaling-up or scaling-down network service, network application, or network servers of the data center to meet the SLA.Type: ApplicationFiled: March 14, 2014Publication date: September 17, 2015Applicant: Avni Networks Inc.Inventors: Rohini Kumar KASTURI, Satish GRANDHI, Baranidharan SEETHARAMAN, Tushar Rajnikant JAGTAP, Vijay Sundar RAJARAM -
Publication number: 20150263894Abstract: A method of cloud migration includes copying, by a cloud migration manager, a meta data and configuration associated with an application of an existing tier, bringing up, by the cloud migration manager, another tier, applying the copied metadata and configuration associated with the application of the existing tier to the another tier so that the another tier resembles the existing tier and re-directing traffic intended for the existing tier to the another tier.Type: ApplicationFiled: May 14, 2015Publication date: September 17, 2015Inventors: Rohini Kumar KASTURI, Satish GRANDHI, Baranidharan SEETHARAMAN, Anand Deshpande, Vijay Sundar RAJARAM, Venkata Siva Satya Phani Kumar Gattupalli
-
Publication number: 20150264117Abstract: A method of launching a controller unit in an Multi-Cloud Service Fabric includes launching a value added service (VAS) unit, launching a profiler, and sending tier event to the VAS unit with tier information.Type: ApplicationFiled: March 14, 2014Publication date: September 17, 2015Applicant: Avni Networks Inc.Inventors: Rohini Kumar KASTURI, Satish GRANDHI, Bhaskar BHUPALAM, Anand DESHPANDE, Bojjiraju Satya Tirumala NANDURI
-
Patent number: 7672682Abstract: In a radio access network, techniques for determining how often an aces terminal in communication with the network is to monitor a channel of the network based on trigger information received from the access terminal that is specific to one or more of the following: a state of the terminal, a state of a premium application, and a user of the terminal. The trigger information includes information about one or more of the following: a power mode of the access terminal, a user profile identification, an activation of a premium application on the terminal, and a terminal of a premium application on the terminal.Type: GrantFiled: March 28, 2006Date of Patent: March 2, 2010Assignee: Airvana, Inc.Inventors: Vivek Sharma, Sundar Raman, Rayadurgam Ravikanth, Gopal Harikumar, Woojune Kim, Srinivas Kappla, Satish Grandhi
-
Publication number: 20070238476Abstract: In a radio access network, techniques for determining how often an aces terminal in communication with the network is to monitor a channel of the network based on trigger information received from the access terminal that is specific to one or more of the following: a state of the terminal, a state of a premium application, and a user of the terminal. The trigger information includes information about one or more of the following: a power mode of the access terminal, a user profile identification, an activation of a premium application on the terminal, and a terminal of a premium application on the terminal.Type: ApplicationFiled: March 28, 2006Publication date: October 11, 2007Inventors: Vivek Sharma, Sundar Raman, Rayadurgam Ravikanth, Gopal Harikumar, Woojune Kim, Srinivas Kappla, Satish Grandhi