Patents by Inventor Syama Sundararao Nadiminti
Syama Sundararao Nadiminti has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240118881Abstract: Some examples relate to firmware updates. In an example, a first core system determines firmware updates to be installed on the first core system and auxiliary systems of a data center. The first core system sends firmware update package generation instructions to a cloud infrastructure comprising data center firmware updates. The first core system downloads a firmware update package from the cloud infrastructure. The first core system updates firmware of the first core system, based on one or more firmware updates in the firmware update package. The first core system receives a request for a specific firmware update from an auxiliary system. Based on the request received from the auxiliary system, the first core system identifies the specific firmware update for the auxiliary system from the firmware update package. The first core system provides the specific firmware update to the auxiliary system.Type: ApplicationFiled: December 14, 2022Publication date: April 11, 2024Inventors: Deepak Panambur, Pavan Sridhar Murthy, Syama Sundararao Nadiminti
-
Publication number: 20240020130Abstract: Examples of cloud-based provisioning of a computing system are disclosed. In an example, a baseboard management controller (BMC) of the computing system may be configured to establish a secure cloud provisioning connection between a cloud manager and the BMC. UEFI configuration may be received from the cloud manager over the secure cloud provisioning connection. A UEFI shell may be executed during a startup of the computing system initiated by the cloud manager. Based on the UEFI configuration, a provisioning proxy server communicatively coupled to a cloud repository may be identified. A startup script may be requested from the cloud repository over a network connection using a UEFI network stack. The startup script may download an image file via the provisioning proxy server from the cloud repository over the network connection and provision the computing system from the image file.Type: ApplicationFiled: September 6, 2022Publication date: January 18, 2024Inventors: Syama Sundararao Nadiminti, Sriram Subramanian, Sunil Malhotra
-
Patent number: 11805117Abstract: In some examples, a cloud-based management system receives information identifying electronic devices to be onboarded for cloud-based management by the cloud-based management system, receives, from a first electronic device, a request to establish a secure connection between the cloud-based management system and the first electronic device, and receives, from the first electronic device, a certificate. The cloud-based management system confirms, based on information in the certificate and the information identifying the electronic devices to be onboarded for cloud-based management, that the cloud-based management system is to perform the cloud-based management of the first electronic device over the secure connection.Type: GrantFiled: March 21, 2023Date of Patent: October 31, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Syama Sundararao Nadiminti, Blaine R. Southam, Dominic Fernandes, Sunil Malhotra, Daniel Edward Frank, Niharika Mateti, Matthew Lewis Fischer, John Thomas Weidenfeller
-
Publication number: 20230224292Abstract: In some examples, a cloud-based management system receives information identifying electronic devices to be onboarded for cloud-based management by the cloud-based management system, receives, from a first electronic device, a request to establish a secure connection between the cloud-based management system and the first electronic device, and receives, from the first electronic device, a certificate. The cloud-based management system confirms, based on information in the certificate and the information identifying the electronic devices to be onboarded for cloud-based management, that the cloud-based management system is to perform the cloud-based management of the first electronic device over the secure connection.Type: ApplicationFiled: March 21, 2023Publication date: July 13, 2023Inventors: Syama Sundararao Nadiminti, Blaine R. Southam, Dominic Fernandes, Sunil Malhotra, Daniel Edward Frank, Niharika Mateti, Matthew Lewis Fischer, John Thomas Weidenfeller
-
Patent number: 11637822Abstract: In some examples, a cloud-based management system receives information identifying electronic devices to be onboarded for cloud-based management by the cloud-based management system, receives, from a first electronic device, a request to establish a secure connection between the cloud-based management system and the first electronic device, and receives, from the first electronic device, a certificate. The cloud-based management system confirms, based on information in the certificate and the information identifying the electronic devices to be onboarded for cloud-based management, that the cloud-based management system is to perform the cloud-based management of the first electronic device over the secure connection.Type: GrantFiled: September 2, 2021Date of Patent: April 25, 2023Assignee: Hewlett Packard Enterprise Development LPInventors: Syama Sundararao Nadiminti, Blaine R. Southam, Dominic Fernandes, Sunil Malhotra, Daniel Edward Frank, Niharika Mateti, Matthew Lewis Fischer, John Thomas Weidenfeller
-
Publication number: 20230063428Abstract: In some examples, a cloud-based management system receives information identifying electronic devices to be onboarded for cloud-based management by the cloud-based management system, receives, from a first electronic device, a request to establish a secure connection between the cloud-based management system and the first electronic device, and receives, from the first electronic device, a certificate. The cloud-based management system confirms, based on information in the certificate and the information identifying the electronic devices to be onboarded for cloud-based management, that the cloud-based management system is to perform the cloud-based management of the first electronic device over the secure connection.Type: ApplicationFiled: September 2, 2021Publication date: March 2, 2023Inventors: Syama Sundararao Nadiminti, Blaine R. Southam, Dominic Fernandes, Sunil Malhotra, Daniel Edward Frank, Niharika Mateti, Matthew Lewis Fischer, John Thomas Weidenfeller
-
Patent number: 11436107Abstract: Examples described herein relate a method, a system, and a non-transitory machine-readable medium for restoring a computing resource. The method may include determining whether the computing resource is required to be restored on a recovery node using a backup of the computing resource stored in a backup storage node. A resource restore operation may be triggered on the recovery node in response to determining that the computing resource is required to be restored. The resource restore operation include copying a subset of the objects from the backup to the recovery node to form, from the subset of objects, a partial filesystem instance of the computing resource on the recovery node that is operable as a restored computing resource on the recovery node.Type: GrantFiled: March 18, 2021Date of Patent: September 6, 2022Assignee: Hewlett Packard Enterprise Development LPInventor: Syama Sundararao Nadiminti
-
Publication number: 20220150241Abstract: Example techniques for granting permissions for performing an operation related to a backup copy are described. The backup copy corresponds to first device data and the first device data is stored in a first device. In an example, in response to receiving a request to perform the operation related to the backup copy, telemetry data received from the first device is analyzed. Based on the analysis, it is determined that security of the first device is uncompromised. Based on the determination, a permission to perform the operation related to the backup copy is granted.Type: ApplicationFiled: April 21, 2021Publication date: May 12, 2022Inventors: Syama Sundararao Nadiminti, Annmary Justine K., Keshetti Mahesh
-
Publication number: 20210334175Abstract: Examples described herein relate a method, a system, and a non-transitory machine-readable medium for restoring a computing resource. The method may include determining whether the computing resource is required to be restored on a recovery node using a backup of the computing resource stored in a backup storage node. A resource restore operation may be triggered on the recovery node in response to determining that the computing resource is required to be restored. The resource restore operation include copying a subset of the objects from the backup to the recovery node to form, from the subset of objects, a partial filesystem instance of the computing resource on the recovery node that is operable as a restored computing resource on the recovery node.Type: ApplicationFiled: March 18, 2021Publication date: October 28, 2021Inventor: Syama Sundararao Nadiminti
-
Patent number: 10877931Abstract: Example implementations relate to backups to a secondary storage system of a file system instance that hierarchically relates data objects by content-based signatures to a root object and includes subtrees that correspond to respective inodes. In an example, a list of the content-based signatures is sent to the secondary storage system. Metadata and data of a subtree is stored into an item in the secondary storage system designated for the subtree.Type: GrantFiled: September 12, 2019Date of Patent: December 29, 2020Assignee: Hewlett Packard Enterprise Development LPInventors: Syama Sundararao Nadiminti, Keshetti Mahesh, John Michael Czerkowicz, Peter Thomas Camble, Ieuan James Henry
-
Patent number: 9031876Abstract: A system administrator, while logged into a system-administrator account, creates and configures a key-administrator account and a member account. A key administrator, while logged into said key-administrator account, creates a group private key, a group public key, and a group symmetric key, a member private key, and a member public key. The key administrator encrypts the group private key with the group symmetric key, and encrypts said group symmetric key with the member public key. A publisher encrypts a document using the group public key. The publisher distributes the resulting encrypted group document so that it is accessible via said member account but not through said key-administrator account.Type: GrantFiled: June 19, 2009Date of Patent: May 12, 2015Assignee: Hewlett-Packard Development Company, L.P.Inventors: Hemant Mittal, Syama Sundararao Nadiminti, Sue Pei Wang
-
Publication number: 20100325732Abstract: A system administrator, while logged into a system-administrator account, creates and configures a key-administrator account and a member account. A key administrator, while logged into said key-administrator account, creates a group private key, a group public key, and a group symmetric key, a member private key, and a member public key. The key administrator encrypts the group private key with the group symmetric key, and encrypts said group symmetric key with the member public key. A publisher encrypts a document using the group public key. The publisher distributes the resulting encrypted group document so that it is accessible via said member account but not through said key-administrator account.Type: ApplicationFiled: June 19, 2009Publication date: December 23, 2010Inventors: Hemant MITTAL, Syama Sundararao Nadiminti, Sue Pei Wang