Patents by Inventor Saurabh Agrawal
Saurabh Agrawal has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10025672Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.Type: GrantFiled: January 20, 2017Date of Patent: July 17, 2018Assignee: COMMVAULT SYSTEMS, INC.Inventors: Chandrashekar Maranna, Manoj Kumar Vijayan, Abhishek Narulkar, Deepak Raghunath Attarde, Saurabh Agrawal
-
Patent number: 9940059Abstract: An information management system provides a data deduplication system that uses a primary table, a deduplication chunk table, and a chunk integrity table to ensure that a referenced deduplicated data block is only verified once during the data verification of a backup or other replication operation. The data deduplication system may reduce the computational and storage overhead associated with traditional data verification processes. The primary table, the deduplication chunk table, and the chunk integrity table, all of which are stored in a deduplication database, can also ensure synchronization between the deduplication database and secondary storage devices.Type: GrantFiled: June 29, 2016Date of Patent: April 10, 2018Assignee: COMMVAULT SYSTEMS, INC.Inventors: Saurabh Agrawal, Manoj Kumar Vijayan
-
Publication number: 20180063251Abstract: Embodiments of the present disclosure relate to remotely accessing at least one computing device [e.g. 102A, 102B, 102C] by an operating device [104]. In a preferred embodiment, a method comprises steps of establishing a wireless connection with an operating device [104] and the at least one computing device [e.g. 102A, 102B, 102C] by a network entity [202]; receiving an access request from the operating device [104] for remotely accessing the at least one computing device [e.g. 102A, 102B, 102C]. Subsequently, the network entity [202] grants an access to the operating device [104] for remotely accessing the at least one computing device [e.g. 102A, 102B, 102C] pursuant to the accomplishment of the reconfiguration/prerequisites such as obtaining a port detail.Type: ApplicationFiled: August 24, 2017Publication date: March 1, 2018Applicant: RELIANCE JIO INFOCOMM LIMITEDInventors: Shweta MAHENDRA, Saurabh AGRAWAL
-
Patent number: 9887979Abstract: The disclosed computer-implemented method for enabling users to launch applications without entering authentication credentials may include (1) receiving, at a server that hosts an application that requests authentication credentials from users before allowing the users to access the application, a request from an endpoint device to download the application, the request including a user token that identifies a user of the endpoint device, (2) in response to receiving the request, authenticating the user token within the request, (3) creating an authenticated version of the application by adding, to the application, an indication that the user token has been authenticated, (4) distributing the authenticated version of the application to the endpoint device, where the endpoint device (A) identifies, within the authenticated version of the application, the indication that the user token has been authenticated and (B) launches the authenticated version of the application without requiring the user to enter authenType: GrantFiled: December 15, 2015Date of Patent: February 6, 2018Assignee: Symantec CorporationInventors: Sunil Pandita, Saurabh Agrawal, Prasad Agarmore
-
Patent number: 9870164Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.Type: GrantFiled: June 30, 2016Date of Patent: January 16, 2018Assignee: Commvault Systems, Inc.Inventors: Manoj Kumar Vijayan, Saurabh Agrawal, Deepak Raghunath Attarde
-
Publication number: 20170344949Abstract: Systems herein include a managed content application that can place markers for conversations within secure documents. A separate social application can serve as the platform for the conversations, allowing for efficient conversations that can occur in real time. The markers can be stored with the documents and identify the conversation, allowing users to retrieve historical conversations that occurred on the social application from within the document. This can allow users to quickly come up to speed without having to rehash the conversations with the original participants. Document security can also be maintained without sacrificing conversation efficiency of the social application.Type: ApplicationFiled: September 15, 2016Publication date: November 30, 2017Inventors: Gangadhar NITTALA, Ramani PANCHAPAKESAN, Arjun KOCHHAR, Saurabh AGRAWAL, Akshay LAXMINARAYAN, Ilanchezhian KUPPUSAMY
-
Patent number: 9753955Abstract: An information management system provides a data deduplication system that uses a primary table, a deduplication chunk table, and a chunk integrity table to ensure that a referenced deduplicated data block is only verified once during the data verification of a backup or other replication operation. The data deduplication system may reduce the computational and storage overhead associated with traditional data verification processes. The primary table, the deduplication chunk table, and the chunk integrity table, all of which are stored in a deduplication database, can also ensure synchronization between the deduplication database and secondary storage devices.Type: GrantFiled: September 16, 2014Date of Patent: September 5, 2017Assignee: Commvault Systems, Inc.Inventors: Saurabh Agrawal, Manoj Kumar Vijayan
-
Publication number: 20170206219Abstract: A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable.Type: ApplicationFiled: March 30, 2017Publication date: July 20, 2017Inventors: Manoj Kumar VIJAYAN, Jaidev Oppath KOCHUNNI, Saurabh AGRAWAL, Abhishek NARULKAR
-
Patent number: 9665591Abstract: A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable.Type: GrantFiled: January 10, 2014Date of Patent: May 30, 2017Assignee: Commvault Systems, Inc.Inventors: Manoj Kumar Vijayan, Jaidev Oppath Kochunni, Saurabh Agrawal, Abhishek Narulkar
-
Publication number: 20170132088Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.Type: ApplicationFiled: January 20, 2017Publication date: May 11, 2017Inventors: Chandrashekar Maranna, Manoj Kumar Vijayan, Abhishek Narulkar, Deepak Raghunath Attarde, Saurabh Agrawal
-
Publication number: 20170124342Abstract: Examples of the present disclosure relate to protecting tiles with an information rights policy. Files can be protected as specified by a content policy associated with the file. The content policy can specify whether the file should be protected while at rest on a device as well as when the file is shared with another user of an enterprise.Type: ApplicationFiled: December 22, 2015Publication date: May 4, 2017Inventors: RAMANI PANCHAPAKESAN, SAURABH AGRAWAL, SUJA RAMACHANDRAN, SUSHILVAS VASAVAN
-
Patent number: 9639286Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.Type: GrantFiled: June 1, 2015Date of Patent: May 2, 2017Assignee: Commvault Systems, Inc.Inventors: Manoj Kumar Vijayan, Saurabh Agrawal, Deepak Raghunath Attarde
-
Patent number: 9639274Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.Type: GrantFiled: April 14, 2015Date of Patent: May 2, 2017Assignee: CommVault Systems, Inc.Inventors: Chandrashekar Maranna, Manoj Kumar Vijayan, Abhishek Narulkar, Deepak Raghunath Attarde, Saurabh Agrawal
-
Patent number: 9633033Abstract: A high availability distributed, deduplicated storage system according to certain embodiments is arranged to include multiple deduplication database media agents. The deduplication database media agents store signatures of data blocks stored in secondary storage. In addition, the deduplication database media agents are configured as failover deduplication database media agents in the event that one of the deduplication database media agents becomes unavailable.Type: GrantFiled: January 10, 2014Date of Patent: April 25, 2017Assignee: Commvault Systems, Inc.Inventors: Manoj Kumar Vijayan, Jaidev Oppath Kochunni, Saurabh Agrawal, Abhishek Narulkar
-
Publication number: 20170031618Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.Type: ApplicationFiled: June 30, 2016Publication date: February 2, 2017Inventors: Manoj Kumar Vijayan, Saurabh Agrawal, Deepak Raghunath Attarde
-
Publication number: 20170031616Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.Type: ApplicationFiled: June 30, 2016Publication date: February 2, 2017Inventors: Manoj Kumar Vijayan, Saurabh Agrawal, Deepak Raghunath Attarde
-
Publication number: 20160335009Abstract: A system according to certain aspects may include a secondary storage controller computer configured to: in response to a first instruction to obtain a first secondary copy of a first data set from a secondary storage device(s), the first instruction associated with a first restore operation: instantiate a first restore thread on a processor of the secondary storage controller computer; using the first restore thread, retrieve the first secondary copy from the secondary storage device(s); and forward the retrieved first secondary copy to a primary storage subsystem for storage; and in response to a second instruction to obtain a second secondary copy of a second data set from the secondary storage device(s), the second instruction associated with a second restore operation: using the first restore thread, retrieve the second secondary copy from the secondary storage device(s); and forward the retrieved second secondary copy to the primary storage subsystem for storage.Type: ApplicationFiled: June 1, 2015Publication date: November 17, 2016Inventors: Manoj Kumar VIJAYAN, Saurabh AGRAWAL, Deepak Raghunath ATTARDE
-
Publication number: 20160306560Abstract: According to certain aspects, a method can include receiving an indication that a restoration of a deduplication database using a secondary copy of a file associated with a secondary copy job is complete; retrieving a first data fingerprint from a data storage database, wherein the first data fingerprint is associated with the secondary copy job used to restore the deduplication database; retrieving a second data fingerprint from a deduplication database media agent, wherein the second data fingerprint is associated with the secondary copy job used to restore the deduplication database; comparing the first data fingerprint with the second data fingerprint to determine whether the first data fingerprint and the second data fingerprint match; and transmitting an instruction to the deduplication database media agent to rebuild the restored deduplication database in response to a determination that the first data fingerprint and the second data fingerprint do not match.Type: ApplicationFiled: April 14, 2015Publication date: October 20, 2016Inventors: Chandrashekar Maranna, Manoj Kumar Vijayan, Abhishek Narulkar, Deepak Raghunath Attarde, Saurabh Agrawal
-
Publication number: 20160306829Abstract: An information management system provides a data deduplication system that uses a primary table, a deduplication chunk table, and a chunk integrity table to ensure that a referenced deduplicated data block is only verified once during the data verification of a backup or other replication operation. The data deduplication system may reduce the computational and storage overhead associated with traditional data verification processes. The primary table, the deduplication chunk table, and the chunk integrity table, all of which are stored in a deduplication database, can also ensure synchronization between the deduplication database and secondary storage devices.Type: ApplicationFiled: June 29, 2016Publication date: October 20, 2016Inventors: Saurabh Agrawal, Manoj Kumar Vijayan
-
Publication number: 20160306820Abstract: An information management system provides a data deduplication system that uses a primary table, a deduplication chunk table, and a chunk integrity table to ensure that a referenced deduplicated data block is only verified once during the data verification of a backup or other replication operation. The data deduplication system may reduce the computational and storage overhead associated with traditional data verification processes. The primary table, the deduplication chunk table, and the chunk integrity table, all of which are stored in a deduplication database, can also ensure synchronization between the deduplication database and secondary storage devices.Type: ApplicationFiled: June 29, 2016Publication date: October 20, 2016Inventors: Saurabh Agrawal, Manoj Kumar Vijayan