Patents by Inventor Saurabh Agrawal

Saurabh Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10579810
    Abstract: Examples of the present disclosure relate to providing policy-protected file access. Some examples involve a configuration profile that includes a credential. The credential permits access to a policy-protected file. Once installed, the configuration profile causes the second credential to be accessible by a file management application of the client device, but inaccessible by a user of the client device. A file management application provides access to the policy-protected file based on the second credential.
    Type: Grant
    Filed: October 22, 2018
    Date of Patent: March 3, 2020
    Assignee: AIRWATCH LLC
    Inventors: Ramani Panchapakesan, Saurabh Agrawal, Suja Ramachandran, Sushilvas Vasavan
  • Patent number: 10572348
    Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.
    Type: Grant
    Filed: June 14, 2018
    Date of Patent: February 25, 2020
    Assignee: Commvault Systems, Inc.
    Inventors: Chandrashekar Maranna, Manoj Kumar Vijayan, Abhishek Narulkar, Deepak Raghunath Attarde, Saurabh Agrawal
  • Patent number: 10558374
    Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.
    Type: Grant
    Filed: May 11, 2018
    Date of Patent: February 11, 2020
    Assignee: Commvault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Saurabh Agrawal, Deepak Raghunath Attarde
  • Patent number: 10496615
    Abstract: An information management system provides a data deduplication system that uses a primary table, a deduplication chunk table, and a chunk integrity table to ensure that a referenced deduplicated data block is only verified once during the data verification of a backup or other replication operation. The data deduplication system may reduce the computational and storage overhead associated with traditional data verification processes. The primary table, the deduplication chunk table, and the chunk integrity table, all of which are stored in a deduplication database, can also ensure synchronization between the deduplication database and secondary storage devices.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: December 3, 2019
    Assignee: Commvault Systems, Inc.
    Inventors: Saurabh Agrawal, Manoj Kumar Vijayan
  • Patent number: 10455023
    Abstract: Embodiments of the present disclosure relate to remotely accessing at least one computing device [e.g. 102A, 102B, 102C] by an operating device [104]. In a preferred embodiment, a method comprises steps of establishing a wireless connection with an operating device [104] and the at least one computing device [e.g. 102A, 102B, 102C] by a network entity [202]; receiving an access request from the operating device [104] for remotely accessing the at least one computing device [e.g. 102A, 102B, 102C]. Subsequently, the network entity [202] grants an access to the operating device [104] for remotely accessing the at least one computing device [e.g. 102A, 102B, 102C] pursuant to the accomplishment of the reconfiguration/prerequisites such as obtaining a port detail.
    Type: Grant
    Filed: August 24, 2017
    Date of Patent: October 22, 2019
    Assignee: RELIANCE JIO INFOCOMM INCORPORATED
    Inventors: Shweta Mahendra, Saurabh Agrawal
  • Publication number: 20190215375
    Abstract: Examples described herein include systems and methods for providing push notifications to a third-party application executing on a client device. An example can include encrypting user credentials, generating a callback Uniform Resource Locator (“URL”) with at least a portion of the encrypted credentials embedded into the URL, and requesting notifications from an email service to be provided at the callback URL. Upon receiving a notification at the callback URL, a system component can decrypt the credentials within the URL using a private key and log into the email account using those decrypted credentials. The system component can then generate a push notification based on any changes found in the email account and cause the notification to be delivered to the third-party application on the client device.
    Type: Application
    Filed: January 29, 2018
    Publication date: July 11, 2019
    Inventors: Ian Ragsdale, Ruben Nieves, Ashish Agrawal, Santhosh Chandrashekarappa, Nikhil Jere, Saurabh Agrawal
  • Publication number: 20190205290
    Abstract: A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable.
    Type: Application
    Filed: December 28, 2018
    Publication date: July 4, 2019
    Inventors: Manoj Kumar VIJAYAN, Jaidev Oppath KOCHUNNI, Saurabh AGRAWAL, Abhishek NARULKAR
  • Patent number: 10229133
    Abstract: A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: March 12, 2019
    Assignee: Commvault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Jaidev Oppath Kochunni, Saurabh Agrawal, Abhishek Narulkar
  • Publication number: 20190057219
    Abstract: Examples of the present disclosure relate to providing policy-protected file access. Some examples involve a configuration profile that includes a credential. The credential permits access to a policy-protected file. Once installed, the configuration profile causes the second credential to be accessible by a file management application of the client device, but inaccessible by a user of the client device. A file management application provides access to the policy-protected file based on the second credential.
    Type: Application
    Filed: October 22, 2018
    Publication date: February 21, 2019
    Inventors: Ramani Panchapakesan, Saurabh Agrawal, Suja Ramachandran, Sushilvas Vasavan
  • Publication number: 20180357132
    Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.
    Type: Application
    Filed: June 14, 2018
    Publication date: December 13, 2018
    Inventors: Chandrashekar Maranna, Manoj Kumar Vijayan, Abhishek Narulkar, Deepak Raghunath Attarde, Saurabh Agrawal
  • Publication number: 20180329635
    Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.
    Type: Application
    Filed: May 11, 2018
    Publication date: November 15, 2018
    Inventors: Manoj Kumar VIJAYAN, Saurabh AGRAWAL, Deepak Raghunath ATTARDE
  • Patent number: 10108809
    Abstract: Examples of the present disclosure relate to protecting files with an information rights policy. Files can be protected as specified by a content policy associated with the file. The content policy can specify whether the file should be protected while at rest on a device as well as when the file is shared with another user of an enterprise.
    Type: Grant
    Filed: December 22, 2015
    Date of Patent: October 23, 2018
    Assignee: AIRWATCH LLC
    Inventors: Ramani Panchapakesan, Saurabh Agrawal, Suja Ramachandran, Sushilvas Vasavan
  • Patent number: 10025672
    Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.
    Type: Grant
    Filed: January 20, 2017
    Date of Patent: July 17, 2018
    Assignee: COMMVAULT SYSTEMS, INC.
    Inventors: Chandrashekar Maranna, Manoj Kumar Vijayan, Abhishek Narulkar, Deepak Raghunath Attarde, Saurabh Agrawal
  • Patent number: 9940059
    Abstract: An information management system provides a data deduplication system that uses a primary table, a deduplication chunk table, and a chunk integrity table to ensure that a referenced deduplicated data block is only verified once during the data verification of a backup or other replication operation. The data deduplication system may reduce the computational and storage overhead associated with traditional data verification processes. The primary table, the deduplication chunk table, and the chunk integrity table, all of which are stored in a deduplication database, can also ensure synchronization between the deduplication database and secondary storage devices.
    Type: Grant
    Filed: June 29, 2016
    Date of Patent: April 10, 2018
    Assignee: COMMVAULT SYSTEMS, INC.
    Inventors: Saurabh Agrawal, Manoj Kumar Vijayan
  • Publication number: 20180063251
    Abstract: Embodiments of the present disclosure relate to remotely accessing at least one computing device [e.g. 102A, 102B, 102C] by an operating device [104]. In a preferred embodiment, a method comprises steps of establishing a wireless connection with an operating device [104] and the at least one computing device [e.g. 102A, 102B, 102C] by a network entity [202]; receiving an access request from the operating device [104] for remotely accessing the at least one computing device [e.g. 102A, 102B, 102C]. Subsequently, the network entity [202] grants an access to the operating device [104] for remotely accessing the at least one computing device [e.g. 102A, 102B, 102C] pursuant to the accomplishment of the reconfiguration/prerequisites such as obtaining a port detail.
    Type: Application
    Filed: August 24, 2017
    Publication date: March 1, 2018
    Applicant: RELIANCE JIO INFOCOMM LIMITED
    Inventors: Shweta MAHENDRA, Saurabh AGRAWAL
  • Patent number: 9887979
    Abstract: The disclosed computer-implemented method for enabling users to launch applications without entering authentication credentials may include (1) receiving, at a server that hosts an application that requests authentication credentials from users before allowing the users to access the application, a request from an endpoint device to download the application, the request including a user token that identifies a user of the endpoint device, (2) in response to receiving the request, authenticating the user token within the request, (3) creating an authenticated version of the application by adding, to the application, an indication that the user token has been authenticated, (4) distributing the authenticated version of the application to the endpoint device, where the endpoint device (A) identifies, within the authenticated version of the application, the indication that the user token has been authenticated and (B) launches the authenticated version of the application without requiring the user to enter authen
    Type: Grant
    Filed: December 15, 2015
    Date of Patent: February 6, 2018
    Assignee: Symantec Corporation
    Inventors: Sunil Pandita, Saurabh Agrawal, Prasad Agarmore
  • Patent number: 9870164
    Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.
    Type: Grant
    Filed: June 30, 2016
    Date of Patent: January 16, 2018
    Assignee: Commvault Systems, Inc.
    Inventors: Manoj Kumar Vijayan, Saurabh Agrawal, Deepak Raghunath Attarde
  • Publication number: 20170344949
    Abstract: Systems herein include a managed content application that can place markers for conversations within secure documents. A separate social application can serve as the platform for the conversations, allowing for efficient conversations that can occur in real time. The markers can be stored with the documents and identify the conversation, allowing users to retrieve historical conversations that occurred on the social application from within the document. This can allow users to quickly come up to speed without having to rehash the conversations with the original participants. Document security can also be maintained without sacrificing conversation efficiency of the social application.
    Type: Application
    Filed: September 15, 2016
    Publication date: November 30, 2017
    Inventors: Gangadhar NITTALA, Ramani PANCHAPAKESAN, Arjun KOCHHAR, Saurabh AGRAWAL, Akshay LAXMINARAYAN, Ilanchezhian KUPPUSAMY
  • Patent number: 9753955
    Abstract: An information management system provides a data deduplication system that uses a primary table, a deduplication chunk table, and a chunk integrity table to ensure that a referenced deduplicated data block is only verified once during the data verification of a backup or other replication operation. The data deduplication system may reduce the computational and storage overhead associated with traditional data verification processes. The primary table, the deduplication chunk table, and the chunk integrity table, all of which are stored in a deduplication database, can also ensure synchronization between the deduplication database and secondary storage devices.
    Type: Grant
    Filed: September 16, 2014
    Date of Patent: September 5, 2017
    Assignee: Commvault Systems, Inc.
    Inventors: Saurabh Agrawal, Manoj Kumar Vijayan
  • Publication number: 20170206219
    Abstract: A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable.
    Type: Application
    Filed: March 30, 2017
    Publication date: July 20, 2017
    Inventors: Manoj Kumar VIJAYAN, Jaidev Oppath KOCHUNNI, Saurabh AGRAWAL, Abhishek NARULKAR