Patents by Inventor Sunil Yadav

Sunil Yadav has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12105602
    Abstract: Communications are exchanged with a copy service of a host to identify writers associated with the copy service. The identification includes a type of a writer as being a system or application writer. Writers identified as system writers are added to a list of writers that should participate in a backup operation. For writers identified as application writers, components of an application writer are iterated through to determine whether a component of the application writer has a name or logical path that includes a name of a system service. When any component has the name or logical path that includes the name of the system service, the application writer is promoted to be of type system writer by adding the application writer to the list of writers that should participate in the backup operation. Components of each writer listed in the list of writers are backed up.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: October 1, 2024
    Assignee: Dell Products L.P.
    Inventors: Amarendra Behera, Shelesh Chopra, Tushar Dethe, Prabhat Kumar Dubey, Roland Fernandes, Sunil Yadav
  • Patent number: 12105600
    Abstract: A method for efficient file-based backups and recoveries. The method includes: receiving, to initiate a backup session, a file-system backup instruction identifying a host file-system; obtaining at least one clone logical cluster number (LCN) corresponding to a file managed by the host file-system, and a region LCN corresponding to a file region of the file; based on a determination that the region LCN matches a clone LCN of the at least one clone LCN: querying a cluster-offset tracking data structure using the region LCN to identify a cluster-offset tracking entry including the region LCN and a container offset; writing, as a session metadata record stored in backup session metadata for the backup session, file metadata describing the file and including the container offset; and transmitting, to a backup target, an information tuple including a backup session identifier generated for the backup session, and the backup session metadata.
    Type: Grant
    Filed: October 6, 2023
    Date of Patent: October 1, 2024
    Assignee: Dell Products, L.P.
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 12093122
    Abstract: Embodiments for an intelligent log analysis and retention for microservices applications. Such log analysis is helpful in troubleshooting failure conditions that may occur intermittently or repeatedly within a microservices environment. Executed operations by microservices, applications, or components generate logs, and these logs are classified based on certain parameters. A default log retention period defines how long the logs are stored in the system, and a log analytical engine determines and assigns weights constituting additional retention time to keep logs for failed operations. These logs can then be analyzed to determine causes of the failure, and build failure models to predict future failure conditions. Logs for successful operations can be timely deleted to save storage space.
    Type: Grant
    Filed: January 20, 2022
    Date of Patent: September 17, 2024
    Assignee: Dell Products L.P.
    Inventors: Sunil Yadav, Gururaj Kulkarni
  • Patent number: 12086105
    Abstract: A method for efficiently sharing assets such as files and folders in the form of slices. Assets are shared or transferred between a host computer system and a target computer system such as a client computer system. In one or more embodiments, assets such as files and folders that are to be shared or transferred are placed in appropriate network slice queues by the hosts in such a manner that each slice has a size that is the same as the others within a predetermined tolerance. This ensures efficient use of network resources when sharing or transferring the files, while minimizing the amount of work the hosts and/or clients must perform.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: September 10, 2024
    Assignee: DELL PRODUCTS
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 12086034
    Abstract: In general, one or more embodiments of the invention relates to systems and methods for performing a backup and later determining a level or percentage of corruption of the resulting backup set. By having a cyber-security module analyze the backup data periodically, corruption of backup data both caused by cyber-attacks or by hardware failures may be detected and characterized. By knowing how corrupted a particular corrupted backup data set is, an informed decision may be made with regards to purging the backup data set and/or using the backup data set or portion thereof in any further restorations. By making these determinations, a quick identification of possible ransomware attacks may be made, and additional degradation of a user's data may be avoided.
    Type: Grant
    Filed: September 30, 2022
    Date of Patent: September 10, 2024
    Assignee: DELL PRODUCTS L.P.
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 12079088
    Abstract: A registry writer is instructed via a copy service on a host to prepare for generation of a snapshot. The registry writer is responsible for saving system hive files to disk before the snapshot is generated. A reporting of the system hive files is received from the registry writer. Communications are exchanged with an API exposed by an operating system of the host to identify user hive files. The system hive files reported by the registry writer and the user hive files identified using the API exposed by the operating system are backed up from the snapshot to secondary storage.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: September 3, 2024
    Assignee: Dell Products L.P.
    Inventors: Amarendra Behera, Shelesh Chopra, Tushar Dethe, Roland Fernandes, Sunil Yadav
  • Publication number: 20240289231
    Abstract: Techniques described herein relate to a method for performing data protection of file system data on a host. The method includes identifying a backup access event associated with a backup of a virtual machine (VM) stored on a backup storage, wherein the VM comprises a plurality of applications; obtaining backup metadata associated with the backup from a data protection manager; generating a placeholder file structure using the backup metadata and storing the placeholder file in a virtual hard disk file; loading the virtual hard disk file on a host associated with the VM; instantiating single application instances of the VM on the host; and performing application aware backup access services using the placeholder file structure, the backup metadata, and the single application instances of the VM, wherein the single application instances of the VM have limited access to placeholder file structure portions associated with the single application instances.
    Type: Application
    Filed: February 24, 2023
    Publication date: August 29, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240289234
    Abstract: Techniques described herein relate to a method for performing data protection of file system data on a host. The method includes identifying a backup access event associated with a backup, wherein a first portion of the backup is stored on a first backup storage and a second portion of the backup is stored on a second backup storage; obtaining backup metadata associated with the backup from a data protection manager; generating a placeholder file structure using the backup metadata and storing the placeholder file structure in a virtual hard disk file; and performing heterogeneous backup storage backup access services using the placeholder file structure and the backup metadata to facilitate transfer of data of the first portion of the backup on the first backup storage and the transfer of data of the second portion of the backup on the second backup storage to an application associated with the backup.
    Type: Application
    Filed: February 24, 2023
    Publication date: August 29, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240283800
    Abstract: An example method includes detecting, using sensors, packets throughout a datacenter. The sensors can then send packet logs to various collectors which can then identify and summarize data flows in the datacenter. The collectors can then send flow logs to an analytics module which can identify the status of the datacenter and detect an attack.
    Type: Application
    Filed: May 1, 2024
    Publication date: August 22, 2024
    Inventors: Navindra Yadav, Abhishek Ranjan Singh, Shashidhar Gandham, Ellen Christine Scheib, Omid Madani, Ali Parandehgheibi, Jackson Ngoc ki Pang, Vimalkumar Jeyakumar, Michael Standish Watts, Hoang Viet Nguyen, Khawar Deen, Rohit Chandra Prasad, Sunil Kumar Gupta, Supreeth Hosur Nagesh Rao, Anubhav Gupta, Ashutosh Kulshreshtha, Roberto Femando Spadaro, Hai Trong Vu, Varun Sagar Malhotra, Shih-Chun Chang, Bharathwaj Sankara Viswanathan, Fnu Rachita Agasthy, Duane Thomas Barlow
  • Patent number: 12061523
    Abstract: A method for managing data include obtaining, by a universal connector, a backup request for a set of files, in response to the backup request: performing a batching of file read requests for data associated with the set of files to obtain a set of file read batches, sending the set of file read batches to a network attached storage (NAS) server, obtaining a response for each of the set of file read batches from the NAS server, wherein the response for each of the set of file read batches comprise a portion of the data, wherein at least two responses for the set of file read batches are obtained in parallel, writing the portion of the data to a backup container in parallel with the obtaining, and initiating a backup of the set of files using the backup container after the writing is completed.
    Type: Grant
    Filed: July 25, 2022
    Date of Patent: August 13, 2024
    Assignee: DELL PRODUCT L.P.
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 12061605
    Abstract: A method and system are provided for matching database records. According to one embodiment, the method includes receiving a record from a first database, and selecting a sequence of characters within the record. The method also includes identifying a key associated with a second, dissimilar database by comparing the selected sequence with a number of historical records. The comparison is performed using one or more analytical processes, where at least one analytical process is a machine-learning (ML) process. The method further includes matching, using the key, the record from the first database with another record from the second database, where the other record includes the identified key.
    Type: Grant
    Filed: August 3, 2020
    Date of Patent: August 13, 2024
    Assignee: Genpact USA, Inc.
    Inventors: Yudhvir Mor, Rakesh Verma, Sunil Yadav
  • Patent number: 12061527
    Abstract: A method for managing data. The method includes obtaining, by a universal connector, a backup request for a file, in response to the backup request: determining a number of read buffers required by a network attached storage (NAS) server to read data associated with the file, generating a set of file read requests based on the number of read buffers, sending, to the NAS server, a data request for the file that includes the set of file read requests, obtaining a data response from the NAS server, wherein the data response comprises a portion of data associated with the file, populating a data array using the data associated with the file, and initiating a backup of the file using the data array.
    Type: Grant
    Filed: July 25, 2022
    Date of Patent: August 13, 2024
    Assignee: DELL PRODUCTS L.P.
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 12050520
    Abstract: Writers on a host and associated with a copy service are identified. The identification includes names of the writers and writer types as being system or application writers. For each writer identified as a system writer, a size of the system writer is calculated and a check is made as to whether a volume associated with the system writer includes system data. When the volume include system data, the volume is marked as a critical volume and a size of the critical volume is obtained. A tally is maintained summing the sizes of the system writer and critical volume.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: July 30, 2024
    Assignee: Dell Products L.P.
    Inventors: Amarendra Behera, Sapna Chauhan, Shelesh Chopra, Tushar Dethe, Sunil Yadav
  • Publication number: 20240248805
    Abstract: Techniques described herein relate to a method for performing data protection of file system data on a host. The method includes identifying, by a data protection agent, a backup access event associated with a backup of a file system stored on a backup storage; in response to identifying the backup access event: obtaining backup metadata associated with the backup from a data protection manager; generating a placeholder file system using the backup metadata and storing the placeholder file in a virtual hard disk file; and performing backup access services using the placeholder file and the backup metadata to facilitate transfer of file system data of the backup to an application associated with the backup.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240248875
    Abstract: A method for information recovery includes providing a set of rules to hosts, where each host performs a backup operation using the set of rules by sending at least one file to at least one backup location. The method also includes receiving, from each host, a first metadata corresponding to files backed up in the backup operation, where the metadata from each host forms a set of metadata, providing the set of metadata to a learning module, receiving from the learning module metadata analysis, adjusting, using the metadata analysis, the set of rules to obtain an adjusted set of rules, and providing the adjusted set of rules to the plurality of hosts, where at least one host of the hosts uses the adjusted set of rules to identify a backup location for a file.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240248802
    Abstract: A method for information recovery includes receiving a first metadata corresponding to a first batch of files, determining a set of rules for backup locations based on the first metadata, initiating a backup operation of a second batch of files, where the backup operation includes the set of rules, receiving a second metadata corresponding to a first file of the second batch of files, applying the set of rules to the second metadata to identify a first one of the backup locations, and sending the first file to the first one of the backup locations.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Publication number: 20240248874
    Abstract: Techniques described herein relate to a method for performing data protection of file system data on a host. The method includes identifying, by a data protection agent, a backup access event associated with a backup of a file system stored on a backup storage; in response to identifying the backup access event: obtaining backup metadata associated with the backup from a data protection manager; generating a placeholder file system using the backup metadata and storing the placeholder file system in virtual hard disk file; loading the virtual hard disk file on a target application; performing, after the loading, prefetching of backup data using the virtual hard disk file and the backup metadata to store the backup data in a cache; and performing backup access services using the virtual hard disk file, the backup metadata, and the cache.
    Type: Application
    Filed: January 20, 2023
    Publication date: July 25, 2024
    Inventors: Sunil Yadav, Shelesh Chopra
  • Patent number: 12045138
    Abstract: A data structure is generated to store information about a set of writers associated with a copy service. The information is gathered from the copy service and populated into the data structure. The information includes names of the writers, writer types as being system or application writers, and system writer subtypes as being one of bare metal recovery (BMR) writers or system state recovery (SSR) writers. The data structure is reviewed to determine whether a particular writer should participate in the backup. Based on the review, a list is generated including a subset of the participating writers. Instructions are issued, via the copy service, for the writers in the list to prepare for creation of a snapshot. Upon creation of the snapshot, data is backed up from the snapshot to secondary storage.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: July 23, 2024
    Assignee: Dell Products L.P.
    Inventors: Nitin Anand, Amarendra Behera, Shelesh Chopra, Tushar Dethe, Sunil Yadav
  • Publication number: 20240236077
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes obtaining, by a data manager, an initial cloud service provider (CSP) proxy generation request from a user; in response to obtaining the initial (CSP) proxy generation request: creating an authentication account in a CSP directory based on the initial CSP proxy generation request; instantiating a CSP proxy in an on-premises CSP using authentication information associated with the authentication account; storing the authentication information; and associating the user with the authentication information and the CSP proxy, wherein after the associating the CSP proxy can access limited access cloud data and cloud resources of the on-premises CSP.
    Type: Application
    Filed: October 24, 2022
    Publication date: July 11, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Publication number: 20240232024
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a cloud service provider (CSP) proxy, a protection policy event associated with an incremental approximation backup of an object; in response to identifying the protection policy event: obtaining previous object metadata associated with the object; obtaining object data from on-premises cloud resources associated with the object; generating slices of the object data; generating current checksums and current object metadata associated with each slice; selecting a first slice of the slices; making a first determination that a first current checksum of the current checksums and a first previous checksum associated with the first slice do not match; in response to the first determination: storing the first slice in a backup storage; and updating a first portion of the current object metadata associated with the first slice.
    Type: Application
    Filed: October 24, 2022
    Publication date: July 11, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra