Patents by Inventor Shiva ANKAM
Shiva ANKAM has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 11954238Abstract: Systems and methods for role-based access control for a storage system are described. An illustrative method includes an access control system identifying, based on a role of a user requesting access to the storage system, a permission of the role to access a resource type; determining, based on the resource type and on a mapping of resources of different secured endpoints of the storage system to resource types, a set of resources of the storage system that the role has permission to access; identifying a subset of the set of resources of the storage system that the user is authorized to access; and granting the user role-based access to the subset of the set of resources of the storage system.Type: GrantFiled: October 28, 2020Date of Patent: April 9, 2024Assignee: Pure Storage, Inc.Inventors: Yu Tan, Shiva Ankam, Hongbin Li, Ziyuan Song
-
Patent number: 11888846Abstract: Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; determining one or more data storage operations corresponding to the physical storage devices to implement the one or more commands on the storage system; and extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system.Type: GrantFiled: October 28, 2021Date of Patent: January 30, 2024Assignee: PURE STORAGE, INC.Inventors: Sergey Zhuravlev, Shiva Ankam
-
Publication number: 20230388365Abstract: Secure cloud-based storage system management that includes: extending a cloud-based storage management session by using cloud-based user credentials to securely manage a remote storage system, and executing, on the remote storage system, data storage operations generated from commands issued via the cloud-based storage management session.Type: ApplicationFiled: August 1, 2023Publication date: November 30, 2023Inventors: SHIVA ANKAM, YU TAN, HONGKAI WU, ZIYUAN SONG, DIVYA MARLAPALLE, SAMRIDH SRINATH, MIRANDA STEELE
-
Patent number: 11729251Abstract: Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system.Type: GrantFiled: July 28, 2021Date of Patent: August 15, 2023Assignee: PURE STORAGE, INC.Inventors: Shiva Ankam, Yu Tan, Hongkai Wu, Ziyuan Song, Divya Marlapalle, Samridh Srinath, Miranda Steele
-
Patent number: 11632360Abstract: An exemplary access control system controls access to a computing system such as a data storage system. For example, the exemplary access control system includes a cloud storage platform that authorizes a user to access the cloud storage platform. After access to the cloud storage platform is authorized, the cloud storage platform receives, from the user, a request to access, through the cloud storage platform, an application executing on a remote storage device. The cloud storage platform obtains an access token in response to receiving the request from the user. The cloud storage platform transmits the access token to the storage device for use by the storage device to validate the user and grant the user access, through the cloud storage platform, to the application executing on the storage device.Type: GrantFiled: June 7, 2019Date of Patent: April 18, 2023Assignee: Pure Storage, Inc.Inventors: Yu Tan, Shiva Ankam
-
Publication number: 20220052993Abstract: Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; determining one or more data storage operations corresponding to the physical storage devices to implement the one or more commands on the storage system; and extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system.Type: ApplicationFiled: October 28, 2021Publication date: February 17, 2022Inventors: SERGEY ZHURAVLEV, SHIVA ANKAM
-
Publication number: 20210360052Abstract: Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system.Type: ApplicationFiled: July 28, 2021Publication date: November 18, 2021Inventors: SHIVA ANKAM, YU TAN, HONGKAI WU, ZIYUAN SONG, DIVYA MARLAPALLE, SAMRIDH SRINATH, MIRANDA STEELE
-
Patent number: 11171950Abstract: Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; determining one or more data storage operations corresponding to the physical storage devices to implement the one or more commands on the storage system; and extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system.Type: GrantFiled: May 8, 2019Date of Patent: November 9, 2021Assignee: Pure Storage, Inc.Inventors: Sergey Zhuravlev, Shiva Ankam
-
Patent number: 11146564Abstract: Login authentication in a cloud storage platform includes: receiving, in a cloud storage platform, a user identifier for a user; extracting, based on the user identifier, a domain registered with the cloud storage platform, where each domain registered with the cloud storage platform is associated with an identity authentication endpoint and one or more groups to which users from the domain may be assigned; determining an identity authentication endpoint associated with the extracted domain; providing, to the identity authentication endpoint associated with the extracted domain, login credentials for the user; receiving an identity authorization from the identity authentication endpoint associated with the extracted domain, where the identity authorization includes a plurality of groups for the user; and filtering any groups included in the identity authorization that are not registered with the cloud storage platform.Type: GrantFiled: July 24, 2018Date of Patent: October 12, 2021Assignee: Pure Storage, Inc.Inventors: Shiva Ankam, Yu Tan
-
Patent number: 11095706Abstract: Secure cloud-based storage system management that includes: establishing, within a cloud-based services provider and based on one or more user credentials, a cloud-based user session to execute one or more commands on a remote storage system that includes physical storage devices; determining one or more data storage operations corresponding to the physical storage devices to implement the one or more commands on the storage system; and extending, based on using an access token based on the one or more user credentials to securely issue the one or more data storage operations to the remote storage system, the cloud-based user session to the remote storage system.Type: GrantFiled: February 20, 2019Date of Patent: August 17, 2021Assignee: Pure Storage, Inc.Inventors: Shiva Ankam, Yu Tan, Hongkai Wu, Ziyuan Song, Divya Marlapalle, Samridh Srinath, Miranda Steele
-
Patent number: 9210081Abstract: The solution described herein provides systems and methods for the interoperability of network processing programs that process network packets at different levels of the network stack. This solution bridges the communications of a network packet between a first network processing program operating at a first level of a network stack in an intermediary and a second network processing program operating at a second level of the network stack of the intermediary. The first network processing program may modify an incoming network packet so that the packet may traverse the network stack to an upper level of the stack to the second network processing program. After processing the network packet at the upper layers of the stack or by the second network processing program, the first network processing program modifies the network pack in order to transmit the packet to the intended destination while traversing the intermediary.Type: GrantFiled: October 24, 2014Date of Patent: December 8, 2015Assignee: CITRIX SYSTEMS, INC.Inventors: Sanjay Chadda, Allen R. Samuels, Dan S. Decasper, Zubin Dittia, Shiva Ankam
-
Publication number: 20150139236Abstract: The solution described herein provides systems and methods for the interoperability of network processing programs that process network packets at different levels of the network stack. This solution bridges the communications of a network packet between a first network processing program operating at a first level of a network stack in an intermediary and a second network processing program operating at a second level of the network stack of the intermediary. The first network processing program may modify an incoming network packet so that the packet may traverse the network stack to an upper level of the stack to the second network processing program. After processing the network packet at the upper layers of the stack or by the second network processing program, the first network processing program modifies the network pack in order to transmit the packet to the intended destination while traversing the intermediary.Type: ApplicationFiled: October 24, 2014Publication date: May 21, 2015Applicant: Citrix Systems, Inc.Inventors: Sanjay Chadda, Allen R. Samuels, Dan S. Decasper, Zubin Dittia, Shiva Ankam
-
Patent number: 8908700Abstract: The solution described herein provides systems and methods for the interoperability of network processing programs that process network packets at different levels of the network stack. This solution bridges the communications of a network packet between a first network processing program operating at a first level of a network stack in an intermediary and a second network processing program operating at a second level of the network stack of the intermediary. The first network processing program may modify an incoming network packet so that the packet may traverse the network stack to an upper level of the stack to the second network processing program. After processing the network packet at the upper layers of the stack or by the second network processing program, the first network processing program modifies the network pack in order to transmit the packet to the intended destination while traversing the intermediary.Type: GrantFiled: September 7, 2007Date of Patent: December 9, 2014Assignee: Citrix Systems, Inc.Inventors: Sanjay Chadda, Allen Samuels, Dan DeCasper, Zubin Dittia, Shiva Ankam
-
Publication number: 20090067440Abstract: The solution described herein provides systems and methods for the interoperability of network processing programs that process network packets at different levels of the network stack. This solution bridges the communications of a network packet between a first network processing program operating at a first level of a network stack in an intermediary and a second network processing program operating at a second level of the network stack of the intermediary. The first network processing program may modify an incoming network packet so that the packet may traverse the network stack to an upper level of the stack to the second network processing program. After processing the network packet at the upper layers of the stack or by the second network processing program, the first network processing program modifies the network pack in order to transmit the packet to the intended destination while traversing the intermediary.Type: ApplicationFiled: September 7, 2007Publication date: March 12, 2009Inventors: Sanjay CHADDA, Allen SAMUELS, Dan DECASPER, Zubin DITTIA, Shiva ANKAM