Patents by Inventor Savitha Susan Bijoy

Savitha Susan Bijoy has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11782795
    Abstract: A method and system for source versus target metadata-based data integrity checking. Concerning backup operations directed to protecting given data, said given data may be subjected to corruption detection at the source prior to initiating a backup operation, however, said given data may not be checked for data integrity following transfer of said given data to a target storage medium prior to committing the said given data thereto. That is, at least presently, the prospect of data corruption compromising given data during the time window through which the given data journeys, usually via a network, from its source to a target storage medium, is often overlooked. The disclosed method and system, accordingly, propose a scheme directed to detecting corruption amongst data transferred from a source to a target storage medium, and handling said data given the determined integrity of said data.
    Type: Grant
    Filed: July 26, 2021
    Date of Patent: October 10, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Savitha Susan Bijoy, Gururaj Kulkarni, Mahesh Kamath, Kiran Kumar Malle Gowda
  • Publication number: 20220398165
    Abstract: A method and system for source versus target metadata-based data integrity checking. Concerning backup operations directed to protecting given data, said given data may be subjected to corruption detection at the source prior to initiating a backup operation, however, said given data may not be checked for data integrity following transfer of said given data to a target storage medium prior to committing the said given data thereto. That is, at least presently, the prospect of data corruption compromising given data during the time window through which the given data journeys, usually via a network, from its source to a target storage medium, is often overlooked. The disclosed method and system, accordingly, propose a scheme directed to detecting corruption amongst data transferred from a source to a target storage medium, and handling said data given the determined integrity of said data.
    Type: Application
    Filed: July 26, 2021
    Publication date: December 15, 2022
    Inventors: Savitha Susan Bijoy, Gururaj Kulkarni, Mahesh Kamath, Kiran Kumar Malle Gowda
  • Publication number: 20220398313
    Abstract: A method and system for threat aware data protection. Threat awareness intelligence, directed to preventing information or cyber security issues, are becoming a critical requirement for data protection (or backup) services. Accordingly, a centralized policy framework is proposed through which threat evaluations may be performed synchronously, as well as asynchronously, with data backup operations to ensure the ingestion of threat-free data into backup storage.
    Type: Application
    Filed: July 26, 2021
    Publication date: December 15, 2022
    Inventors: Savitha Susan Bijoy, Gururaj Kulkarni, Mahesh Kamath, Kiran Kumar Malle Gowda