Patents by Inventor Shelesh Chopra

Shelesh Chopra has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240134755
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a cloud service provider (CSP) proxy, a backup generation event associated with a virtual machine (VM); in response to identifying the backup generation event: obtaining VM information associated with the VM; instantiating a VM agent within the VM; obtaining a metadata file from the VM agent; obtaining VM data from limited access cloud data; storing the VM data and a copy of the metadata file in a backup storage to generate a backup of the VM; generating indexing metadata associated with the backup using the metadata file; and providing the indexing metadata to a data manager.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Publication number: 20240134754
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a cloud service provider (CSP) proxy, a protection policy event associated with an incremental approximation backup of an object; in response to identifying the protection policy event: obtaining previous object metadata associated with the object; obtaining object data from on-premises cloud resources associated with the object; generating slices of the object data; generating current checksums and current object metadata associated with each slice; selecting a first slice of the slices; making a first determination that a first current checksum of the current checksums and a first previous checksum associated with the first slice do not match; in response to the first determination: storing the first slice in a backup storage; and updating a first portion of the current object metadata associated with the first slice.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Publication number: 20240137360
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes obtaining, by a data manager, an initial cloud service provider (CSP) proxy generation request from a user; in response to obtaining the initial (CSP) proxy generation request: creating an authentication account in a CSP directory based on the initial CSP proxy generation request; instantiating a CSP proxy in an on-premises CSP using authentication information associated with the authentication account; storing the authentication information; and associating the user with the authentication information and the CSP proxy, wherein after the associating the CSP proxy can access limited access cloud data and cloud resources of the on-premises CSP.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Publication number: 20240135014
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a data manager, a protection policy assignment event; in response to identifying the protection policy assignment event: identifying subscriptions associated with cloud resources; identifying services associated with each subscriptions; assigning protection policy types to the subscriptions based on the associated services; and initiating performance of data protection services based on the protection policy assignments associated with each subscription.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Shelesh Chopra, Tushar Dethe
  • Patent number: 11966297
    Abstract: System extracts backup metadata, comprising system committed change numbers, system change numbers, types, and database version identifiers, for backup copies. System generates data structure, comprising start system change numbers, based on minimums of system committed change numbers, end system change numbers, based on maximums of system change numbers, database version identifiers, and identifiers for archive log backup copies. System identifies dependent system change numbers, based on start system change number to end system change number for backup copy corresponding to database version identifier. System identifies, in data structure, backed-up system change numbers, based on start system change numbers to end system change numbers for archive log backup copies corresponding to database version identifier, which are included in dependent system change numbers.
    Type: Grant
    Filed: October 20, 2020
    Date of Patent: April 23, 2024
    Assignee: EMC IP Holding Company LLC
    Inventors: Navneet Upadhyay, Rejith Mohan M, Amith Ramachandran, Shelesh Chopra
  • Publication number: 20240126658
    Abstract: An in-guest agent receives a command to conduct a backup of a virtual machine (VM) having a copy service. A discovery is initiated of disk types attached to the VM. Based on the discovery, at least first and second disks are identified. The first disk is identified as a virtual machine disk (VMDK) and the second disk is identified as a raw device mapping (RDM) disk. After the identification, a request is issued to the copy service to prepare the applications for a snapshot operation. A first request for a snapshot of the VMDK disk is issued over a socket communication channel. A second request for a snapshot of the RDM disk is issued over a TCP network to a controller of a storage array responsible for presenting the second disk to the VM. Responses to the first and second requests are managed to conduct the backup.
    Type: Application
    Filed: October 14, 2022
    Publication date: April 18, 2024
    Inventors: Krishnendu Bagchi, Vipin Kaushal, Sudha Hebsur, Shelesh Chopra, Amarendra Behera, Pallavi Prakash
  • Publication number: 20240126661
    Abstract: A data protection agent is installed as a guest within a virtual machine (VM) hosted by a host and a snapshot data mover is installed external to the VM on the host. Upon receiving a command to conduct a backup, a first request is issued to a copy service of the VM indicating that an application in the VM is to be backed up. A second request for a snapshot is issued to the snapshot data mover. The snapshot data mover passes the snapshot request to a virtual machine manager. Upon the snapshot data mover receiving an identifier for the snapshot, the snapshot data mover passes the snapshot identifier to the agent thereby allowing the agent to locate the snapshot and conduct the backup.
    Type: Application
    Filed: October 14, 2022
    Publication date: April 18, 2024
    Inventors: Krishnendu Bagchi, Vipin Kaushal, Sudha Hebsur, Shelesh Chopra, Amarendra Behera, Pallavi Prakash
  • Patent number: 11960873
    Abstract: A method for managing a client environment includes obtaining, by a client environment watcher of a production host environment, a set of actions performed by the client environment operatively connected to the production host environment, in response to obtaining the set of actions: performing an action filtering on the set of actions to obtain a set of filtered actions, wherein the set of filtered actions is associated with an attempt to resolve an issue with performing an application upgrade on the client environment, determining, using the set of filtered actions, a client-applied action set, and initiating an update to an issue analyzer model to obtain an updated issue analyzer model.
    Type: Grant
    Filed: December 10, 2021
    Date of Patent: April 16, 2024
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Lakshmi Nalam, Shelesh Chopra
  • Patent number: 11954077
    Abstract: In accordance with one or more embodiments of the invention, a method is provided for re-tiering files and folders located in a cloud-based file system without crawling all the files and folders in the cloud-based file system. The method utilizes the meta-data for the files and folders to determine, based upon provided rules, which tier a file or folder should be assigned to. By utilizing the meta-data, the use of expensive cloud resources may be minimized when there is a need for re-tiering the files and folders into appropriate cloud tiers.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: April 9, 2024
    Assignee: Dell Products L.P.
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 11953996
    Abstract: Techniques described herein relate to a method for performing data protection of file system data on a host. The method includes obtaining a data access request for a file corresponding to a placeholder file from an application during a backup access session; obtaining, in response to the data access request, file system data associated with the file from a backup storage using backup metadata associated with the placeholder file; providing the file system data associated with the file to the application; making, after the providing, a determination that the file is modified by the application; and in response to the determination: flagging the placeholder file.
    Type: Grant
    Filed: January 20, 2023
    Date of Patent: April 9, 2024
    Assignee: Dell Products L.P.
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 11954479
    Abstract: A method and system for predicting post-upgrade outcomes in information technology environments through proactive upgrade issue testing. At least with respect to computing, an upgrade may entail the replacement of a product—in the form of hardware, software, and/or firmware—with a newer or better version, which may serve to bring the product up to date, improve the characteristic(s) of the product, and/or resolve any issue(s) inflicting the product. Further, the process of upgrading a product in view of an issue therein is often reactive—that is, it is often required that a customer experiences and reports an issue for a product to a vendor prior to the issuance of an upgrade to the customer that addresses the issue for the product by the vendor. Presently, what is lacking is a mechanism through which product upgrades may be presented to customers proactively in order to minimize product failure and/or downtime.
    Type: Grant
    Filed: January 7, 2022
    Date of Patent: April 9, 2024
    Assignee: Dell Products L.P.
    Inventors: Parminder Singh Sethi, Shelesh Chopra
  • Publication number: 20240111732
    Abstract: In accordance with one or more embodiments of the invention, a method is provided for re-tiering files and folders located in a cloud-based file system without crawling all the files and folders in the cloud-based file system. The method utilizes the meta-data for the files and folders to determine, based upon provided rules, which tier a file or folder should be assigned to. By utilizing the meta-data, the use of expensive cloud resources may be minimized when there is a need for re-tiering the files and folders into appropriate cloud tiers.
    Type: Application
    Filed: September 30, 2022
    Publication date: April 4, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240114072
    Abstract: Embodiments of the invention relate to methods and systems for efficiently sharing assets such as files and folders between a host computer system and a client computer system while minimizing the amount of work the client must perform to efficiently transfer an asset. In one or more embodiments, assets such as files and folders that are to be shared or transferred are placed in appropriate network slice queues by the hosts rather than the clients. These network slice queues allow the files and folders to be placed in slices without utilizing the resources of the clients as well as much of the available network resources. This ensures efficient use of network resources, while minimizing the amount of work the hosts and/or clients must perform in order to perform a backup.
    Type: Application
    Filed: September 30, 2022
    Publication date: April 4, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240111633
    Abstract: In general, one or more embodiments of the invention relates to systems and methods for performing a backup and later determining a level or percentage of corruption of the resulting backup set. By having a cyber-security module analyze the backup data periodically, corruption of backup data both caused by cyber-attacks or by hardware failures may be detected and characterized. By knowing how corrupted a particular corrupted backup data set is, an informed decision may be made with regards to purging the backup data set and/or using the backup data set or portion thereof in any further restorations. By making these determinations, a quick identification of possible ransomware attacks may be made, and additional degradation of a user's data may be avoided.
    Type: Application
    Filed: September 30, 2022
    Publication date: April 4, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240111600
    Abstract: One example method includes, within a microservice architecture: (i) obtaining, via a monitor engine, a resource utilization associated with a set of parameters for each microservice within a consistency group, wherein each microservice within the consistency group is associated with a particular distributed operation within the microservice architecture, and wherein the consistency group defines, for each microservice within the consistency group, one or more threshold values associated with each parameter of the set of parameters, (ii) determining, via an analytical engine, whether resource utilization satisfies a particular threshold of the one or more threshold values associated with a particular parameter of the set of parameters for a particular microservice within the consistency group, and (iii) based upon resource utilization satisfying the particular threshold of the particular parameter for the particular microservice within the consistency group, throttling resource utilization for one or more mic
    Type: Application
    Filed: October 3, 2022
    Publication date: April 4, 2024
    Inventors: Gururaj Kulkarni, Shelesh Chopra
  • Publication number: 20240111630
    Abstract: One example method includes, within a microservice architecture: (i) obtaining, via a monitor engine, a resource utilization associated with a set of parameters for each microservice within a consistency group, wherein each microservice within the consistency group is associated with a particular distributed operation, and wherein the consistency group defines, for each microservice within the consistency group, one or more threshold values associated with each parameter of the set of parameters, (ii) determining, via an analytical engine, whether resource utilization satisfies a particular threshold of the one or more threshold values associated with a particular parameter of the set of parameters for a particular microservice within the consistency group, and (iii) based upon resource utilization satisfying the particular threshold of the particular parameter for the particular microservice within the consistency group, implementing a self-healing process to selectively modify resource allocation for one or
    Type: Application
    Filed: October 3, 2022
    Publication date: April 4, 2024
    Inventors: Gururaj Kulkarni, Shelesh Chopra
  • Publication number: 20240111861
    Abstract: Embodiments of the invention relate to generating backups of assets. More specifically, in one or more embodiments of the invention, the meta-data generated during the backups is leveraged for detecting cyber-attacks by leveraging backup meta-data, to reduce the amount of data that needs to be scanned by a cyber-security module to detect a cyber-attack, such as a ransomware attack. This allows any attacks to be detected earlier and reduce processing by leveraging the periodic backups that are performed as part of data protection, to detect when an attack has or is occurring. By making these determinations, a quick identification of possible ransomware attacks may be made and other methods of mitigating the attack may be deployed when the method of mitigating the attack might still be useful to mitigate potential damage to a user's data.
    Type: Application
    Filed: September 30, 2022
    Publication date: April 4, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240111636
    Abstract: Embodiments of the invention relate to generating backups of assets. More specifically, in one or more embodiments of the invention, multiple copies of a backup are stored in separate locations. The copies may then be used to perform a restoration when one of the copies is corrupted. If all copies are corrupted the invention allows for partial restoration of those portions of the copies that are not corrupted. By using copies, embodiments of the invention allow the backups to be more resilient to attacks and system failures.
    Type: Application
    Filed: September 30, 2022
    Publication date: April 4, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240111725
    Abstract: Embodiments of the invention relate to methods and systems for efficiently sharing assets such as files and folders in the form of slices. Assets are shared or transferred between a host computer system and a target computer system such as a client computer system. In one or more embodiments, assets such as files and folders that are to be shared or transferred are placed in appropriate network slice queues by the hosts in such a manner that each slice has a size that is the same as the others within a predetermined tolerance. This ensures efficient use of network resources when sharing or transferring the files, while minimizing the amount of work the hosts and/or clients must perform.
    Type: Application
    Filed: September 30, 2022
    Publication date: April 4, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 11947424
    Abstract: Embodiments of the invention relate to generating backups of applications. The user or administrator that monitors the backup is notified of those files and/or folders that have not been backed up in the most recent backup. Further, embodiments of the invention enable alerts to be initiated when a particular file or folder has not been backed up over multiple backups or over a predetermined period. As a result, the user or administrator can have a better understanding of the protection and lack of protection that the present backups are providing.
    Type: Grant
    Filed: April 15, 2022
    Date of Patent: April 2, 2024
    Assignee: Dell Products L.P.
    Inventors: Shelesh Chopra, Sunil Yadav, Manish Sharma, Aaditya Bansal