Patents by Inventor Shiv S. Kumar
Shiv S. Kumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250077359Abstract: A system can maintain a record of first files that have been accessed via at least one of a group of priority user accounts, wherein the record is maintained as a least recently used structure, and wherein the first files belong to a group of files. The system can, in response to determining that the group of files is to be backed up, traverse the record of files from a head of the least recently used structure, and, for respective first files of the record of first files, create respective backup tasks for the respective first files. The system can, after backing up the respective first files, perform a backup of second files of the group of files that are omitted from the record of first files.Type: ApplicationFiled: August 29, 2023Publication date: March 6, 2025Inventors: Kaushik Gupta, Shiv S. Kumar
-
Publication number: 20250077667Abstract: A system can maintain, in a directory, respective first softlinks of respective first files that have a size within a specified range, and that have been modified subsequent to a respective most-recent virus scan. The system can, in response to determining to perform an antivirus scan on a group of files that comprises the first files, perform a first antivirus scan on the first files based on identifying the first softlinks in the directory, and, after performing the first antivirus scan on the first files, perform a second antivirus scan on second files of the group of files that are not identified with respective second softlinks in the directory.Type: ApplicationFiled: August 29, 2023Publication date: March 6, 2025Inventors: Shiv S. Kumar, Kaushik Gupta
-
Patent number: 12235730Abstract: A system can determine that a node a storage cluster has failed, wherein respective data protection levels are maintained for respective files. The system can traverse the respective files, comprising, in response to determining that a data protection level for a file is degraded and that the file is a priority file, adding an identifier of the file to a priority table for restoration of data protection, or, in response to determining that the data protection level for the file of the respective files is degraded and that the file is not the priority file, adding the identifier of the file to a non-priority table for the restoration of data protection. The system can, after traversing the files, restore respective first data protection levels of respective first files represented by the priority table, and then restore respective second data protection levels of respective second files represented by the non-priority table.Type: GrantFiled: October 4, 2023Date of Patent: February 25, 2025Assignee: DELL PRODUCTS L.P.Inventors: Shiv S. Kumar, Kaushik Gupta, Anurag Chandra
-
Patent number: 12222900Abstract: A system can maintain respective extended attributes for respective files in a file system, wherein the respective extended attributes comprise respective first-in-first-out (FIFO) queues of user identities that have been determined to have modified the respective files. The system can receive an indication to perform a delete operation on a first portion of the file system, wherein the indication is indicative of a first user identity for which files are to be preserved. The system can, in response to receiving the indication, evaluate the respective files, comprising in response to determining that the first user identity is omitted from a FIFO queue of the respective FIFO queues, delete a file of the respective files that corresponds to the FIFO queue; and in response to determining that the first user identity is identified in the FIFO queue, refrain from deleting the file.Type: GrantFiled: July 21, 2023Date of Patent: February 11, 2025Assignee: DELL PRODUCTS L.P.Inventor: Shiv S. Kumar
-
Publication number: 20250028683Abstract: A system can maintain respective extended attributes for respective files in a file system, wherein the respective extended attributes comprise respective first-in-first-out (FIFO) queues of user identities that have been determined to have modified the respective files. The system can receive an indication to perform a delete operation on a first portion of the file system, wherein the indication is indicative of a first user identity for which files are to be preserved. The system can, in response to receiving the indication, evaluate the respective files, comprising in response to determining that the first user identity is omitted from a FIFO queue of the respective FIFO queues, delete a file of the respective files that corresponds to the FIFO queue; and in response to determining that the first user identity is identified in the FIFO queue, refrain from deleting the file.Type: ApplicationFiled: July 21, 2023Publication date: January 23, 2025Inventor: Shiv S. Kumar
-
Publication number: 20250028609Abstract: A system can create a group of at least one file on a source computer. The system can perform iterations of backing up the group of at least one file to a destination computer. The system can store respective job status indications of respective iterations of the iterations of backing up the group of at least one file. The system can, in response to determining to back up the data, and in response to determining that the job status indications indicate that at least one iteration of the iterations of backing up the group of at least one file was successful, back up the data to the destination computer, or, in response to determining that the job status indications indicate that the at least one iteration of the iterations of backing up the group of at least one file was unsuccessful, refrain from backing up the data.Type: ApplicationFiled: July 21, 2023Publication date: January 23, 2025Inventors: Narayan Behera, Shilbin Devassy, Anurag Chandra, Shiv S. Kumar
-
Publication number: 20240385933Abstract: A system can determine that an integrity of a data backup is to undergo a validation process, wherein the data backup is located at a target location, and wherein the data backup comprises a backup of source data at a source location. The system can identify a subset of files of the source data to validate in the data backup, wherein the subset of files is determined prior to performing the determining that the integrity of the data backup is to undergo the validation process. The system can, as part of validation of the subset of files according to the validation process, validate respective first hashes of respective files of the subset of files relative to respective second hashes of respective corresponding second files of the data backup, to produce a validation result. The system can store the validation result.Type: ApplicationFiled: May 17, 2023Publication date: November 21, 2024Inventors: Kaushik Gupta, Shiv S. Kumar
-
Patent number: 12093217Abstract: A system can to perform a replication of data from first computing equipment to second computing equipment, the data being stored as part of a path in a file system. The system can, from a replication policy for the replication, a priority sub-path of the path. The system can add a first set of files to a transfer queue comprising tree-walking the priority sub-path. The system can, after adding the first set of files, adding a second set of files to the transfer queue comprising tree-walking a portion of the path that is different from the priority sub-path. The system can replicate files in the transfer queue from the first computing equipment to the second computing equipment.Type: GrantFiled: November 30, 2021Date of Patent: September 17, 2024Assignee: DELL PRODUCTS L.P.Inventors: Kaushik Gupta, Shiv S. Kumar, Jai P. Gahlot
-
Patent number: 12086111Abstract: A system can determine to perform a replication of data from first computing equipment to second computing equipment, the data being stored as part of a path in a file system. The system can determine that a change log of file operations on files in the path identifies a file operation on a file that is made by a user account that has priority for replications. The system can replicate the file. The system can, after processing the change log for file operations made by first user accounts that have priority for replications, replicating other files in the path associated with second user accounts that do not have priority for replications.Type: GrantFiled: November 30, 2021Date of Patent: September 10, 2024Assignee: DELL PRODUCTS L.P.Inventors: Kaushik Gupta, Shiv S. Kumar, Jai P. Gahlot
-
Publication number: 20240281163Abstract: A system can identify a first group of files that are scheduled to be modified by another operation within a next defined amount of time. The system can remove the first group of files from the files of the file system with respect to a deduplication operation to produce a second group of files. The system can perform a sampling phase on the second group of files, wherein the sampling phase identifies a first group of blocks, and wherein the first group of blocks corresponds to duplicate file system blocks. The system can identify a second group of blocks that correspond to the first group of files. The system can remove any blocks from the first group of blocks that have a respective duplicate in the second group of blocks to produce a third group of blocks. The system can perform the deduplication operation on the third group of blocks.Type: ApplicationFiled: February 16, 2023Publication date: August 22, 2024Inventors: Shiv S. Kumar, Kaushik Gupta
-
Patent number: 11768777Abstract: Methods, apparatus, and processor-readable storage media for application aware cache management are provided herein. An example computer-implemented method includes maintaining a data structure comprising at least one entry indicative of an importance of at least one of a plurality of applications associated with a storage system; and controlling whether or not a particular data item requested by one of the plurality of applications is cached in a cache memory of the storage system based at least in part on the at least one entry of the data structure.Type: GrantFiled: January 22, 2020Date of Patent: September 26, 2023Assignee: EMC IP Holding Company LLCInventors: Jai P. Gahlot, Shiv S. Kumar
-
Patent number: 11687557Abstract: Techniques are provided for data size and time based replication. In an example, a first daemon monitors data changes that corresponds to a first replication policy, and a second daemon monitors an amount of time since performing a replication for the first replication policy. Where either a data modification threshold is met, or a time threshold is met, the daemons can perform a replication, and reset both a data counter and a timer that determine when next to perform a replication.Type: GrantFiled: October 5, 2020Date of Patent: June 27, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv S. Kumar, Jai P. Gahlot
-
Patent number: 11681662Abstract: Techniques are provided for tracking users modifying, writing, or editing a file. In an example, a file system maintains a first-in-first-out queue that logs a finite set of users that have most-recently modified a file. This queue can be maintained in an extended attribute of an Mode that corresponds to a file. Where a user modifies a file, and the user is currently identified in the queue, the user can be removed from the queue. Where the user modifies a file, is not currently identified in the queue, and the queue is full, an oldest user in the queue can be removed from the queue. Then, the user can be added to the back of the queue.Type: GrantFiled: December 14, 2020Date of Patent: June 20, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv S. Kumar, Jai P. Gahlot
-
Patent number: 11675735Abstract: A system can determine to perform a replication of data from first computing equipment to second computing equipment, wherein the data is stored within a path in a file system of the first computing equipment. The system can determine the path from a replication policy for the replication. The system can, while tree-walking the path, in response to determining that a first file is marked for priority replication, adding the first file to a priority queue, and in response to determining that a second file lacks a marking for priority replication, adding the second file to a normal queue. The system can, in response to determine that the priority queue contains files, replicating the files from the priority queue instead of replicating other files from the normal queue.Type: GrantFiled: November 30, 2021Date of Patent: June 13, 2023Assignee: DELL PRODUCTS L.P.Inventors: Kaushik Gupta, Shiv S. Kumar, Jai P. Gahlot
-
Publication number: 20230169046Abstract: A system can determine to perform a replication of data from first computing equipment to second computing equipment, the data being stored as part of a path in a file system. The system can determine that a change log of file operations on files in the path identifies a file operation on a file that is made by a user account that has priority for replications. The system can replicate the file. The system can, after processing the change log for file operations made by first user accounts that have priority for replications, replicating other files in the path associated with second user accounts that do not have priority for replications.Type: ApplicationFiled: November 30, 2021Publication date: June 1, 2023Inventors: Kaushik Gupta, Shiv S. Kumar, Jai P. Gahlot
-
Publication number: 20230169038Abstract: A system can to perform a replication of data from first computing equipment to second computing equipment, the data being stored as part of a path in a file system. The system can, from a replication policy for the replication, a priority sub-path of the path. The system can add a first set of files to a transfer queue comprising tree-walking the priority sub-path. The system can, after adding the first set of files, adding a second set of files to the transfer queue comprising tree-walking a portion of the path that is different from the priority sub-path. The system can replicate files in the transfer queue from the first computing equipment to the second computing equipment.Type: ApplicationFiled: November 30, 2021Publication date: June 1, 2023Inventors: Kaushik Gupta, Shiv S. Kumar, Jai P. Gahlot
-
Publication number: 20230169035Abstract: A system can determine to perform a replication of data from first computing equipment to second computing equipment, wherein the data is stored within a path in a file system of the first computing equipment. The system can determine the path from a replication policy for the replication. The system can, while tree-walking the path, in response to determining that a first file is marked for priority replication, adding the first file to a priority queue, and in response to determining that a second file lacks a marking for priority replication, adding the second file to a normal queue. The system can, in response to determine that the priority queue contains files, replicating the files from the priority queue instead of replicating other files from the normal queue.Type: ApplicationFiled: November 30, 2021Publication date: June 1, 2023Inventors: Kaushik Gupta, Shiv S. Kumar, Jai P. Gahlot
-
Patent number: 11663332Abstract: Techniques are provided for tracking a virus footprint in data copies. Data copies can be made in a variety of ways, like with snapshots, backups, replications, and simple copies. As copies of files that have not been scanned since they were last modified are made, these copies can be kept track of, and associated with the original file. When the original file is later scanned and found to be clean or infected, this information can be propagated through the copies.Type: GrantFiled: January 15, 2021Date of Patent: May 30, 2023Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv S. Kumar, Jai P. Gahlot, Avadut Mungre
-
Patent number: 11528236Abstract: Techniques are provided for user-based data tiering. In an example, a computer maintains a first-in-first-out queue that logs a finite set of users that have most-recently modified a file. This queue can be maintained in an extended attribute of an inode that corresponds to a file. A computer can also maintain a policy that defines how to perform storage tiering on a file based on which users have accessed the file. When a tiering operation is performed, the files specified by a corresponding tiering policy can be evaluated for which users have recently accessed them. When a user specified by the tiering policy has recently modified a file, the file can be placed in tiering queue for tiering.Type: GrantFiled: December 30, 2020Date of Patent: December 13, 2022Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv S. Kumar, Jai P. Gahlot
-
Patent number: 11436251Abstract: Techniques are provided for data size based replication. In an example, a replication daemon registers to receive notifications about data changes from a protocol driver. The replication daemon can maintain a counter for each of one or more replication policies, where a counter tracks how much data has changed that corresponds to a replication policy, since the prior replication for that replication policy. Where the daemon receives a notification for the protocol driver, it can determine whether the notification applies to any replication policy, and update any counters accordingly. Where an amount of data changed since the prior replication exceeds a threshold for a replication policy, a replication can be started. Upon successful completion of the replication, the corresponding counter can be reset.Type: GrantFiled: October 2, 2020Date of Patent: September 6, 2022Assignee: EMC IP HOLDING COMPANY LLCInventors: Shiv S. Kumar, Jai P. Gahlot