Patents by Inventor Tushar Dethe

Tushar Dethe has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 12229022
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a cloud service provider (CSP) proxy, a protection policy event associated with an incremental approximation backup of an object; in response to identifying the protection policy event: obtaining previous object metadata associated with the object; obtaining object data from on-premises cloud resources associated with the object; generating slices of the object data; generating current checksums and current object metadata associated with each slice; selecting a first slice of the slices; making a first determination that a first current checksum of the current checksums and a first previous checksum associated with the first slice do not match; in response to the first determination: storing the first slice in a backup storage; and updating a first portion of the current object metadata associated with the first slice.
    Type: Grant
    Filed: October 24, 2022
    Date of Patent: February 18, 2025
    Assignee: Dell Products L.P.
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Patent number: 12216549
    Abstract: Described is a system for cloud-based processing of backup data for storage onto various types of object storage systems. A specialized cloud-based component (e.g. proxy server) may act as an intermediary when backing up data from a client system to an object storage. For example, the cloud-based component may be provided as part of backup service that operates in conjunction with a client system. Accordingly, the system may allow different clients of a backup service to efficiently and seamlessly interact with the different third-party object storage providers via a single cloud-based component. To provide such object-storage-agnostic functionality, the cloud-based component may include a function library that includes object-storage-specific functions. For example, the cloud-based component may invoke a specific set of operations that interact with a storage API provided by a particular object storage provider.
    Type: Grant
    Filed: October 23, 2020
    Date of Patent: February 4, 2025
    Assignee: EMC IP Holding Company LLC
    Inventors: Sunil Yadav, Shelesh Chopra, Amarendra Behera, Himanshu Arora, Tushar Dethe, Ravi Vijayakumar Chitloor, Prabhatkumar Dubey, Deependra Singh, Jigar Bhanushali
  • Patent number: 12105602
    Abstract: Communications are exchanged with a copy service of a host to identify writers associated with the copy service. The identification includes a type of a writer as being a system or application writer. Writers identified as system writers are added to a list of writers that should participate in a backup operation. For writers identified as application writers, components of an application writer are iterated through to determine whether a component of the application writer has a name or logical path that includes a name of a system service. When any component has the name or logical path that includes the name of the system service, the application writer is promoted to be of type system writer by adding the application writer to the list of writers that should participate in the backup operation. Components of each writer listed in the list of writers are backed up.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: October 1, 2024
    Assignee: Dell Products L.P.
    Inventors: Amarendra Behera, Shelesh Chopra, Tushar Dethe, Prabhat Kumar Dubey, Roland Fernandes, Sunil Yadav
  • Patent number: 12079088
    Abstract: A registry writer is instructed via a copy service on a host to prepare for generation of a snapshot. The registry writer is responsible for saving system hive files to disk before the snapshot is generated. A reporting of the system hive files is received from the registry writer. Communications are exchanged with an API exposed by an operating system of the host to identify user hive files. The system hive files reported by the registry writer and the user hive files identified using the API exposed by the operating system are backed up from the snapshot to secondary storage.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: September 3, 2024
    Assignee: Dell Products L.P.
    Inventors: Amarendra Behera, Shelesh Chopra, Tushar Dethe, Roland Fernandes, Sunil Yadav
  • Patent number: 12050520
    Abstract: Writers on a host and associated with a copy service are identified. The identification includes names of the writers and writer types as being system or application writers. For each writer identified as a system writer, a size of the system writer is calculated and a check is made as to whether a volume associated with the system writer includes system data. When the volume include system data, the volume is marked as a critical volume and a size of the critical volume is obtained. A tally is maintained summing the sizes of the system writer and critical volume.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: July 30, 2024
    Assignee: Dell Products L.P.
    Inventors: Amarendra Behera, Sapna Chauhan, Shelesh Chopra, Tushar Dethe, Sunil Yadav
  • Patent number: 12045138
    Abstract: A data structure is generated to store information about a set of writers associated with a copy service. The information is gathered from the copy service and populated into the data structure. The information includes names of the writers, writer types as being system or application writers, and system writer subtypes as being one of bare metal recovery (BMR) writers or system state recovery (SSR) writers. The data structure is reviewed to determine whether a particular writer should participate in the backup. Based on the review, a list is generated including a subset of the participating writers. Instructions are issued, via the copy service, for the writers in the list to prepare for creation of a snapshot. Upon creation of the snapshot, data is backed up from the snapshot to secondary storage.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: July 23, 2024
    Assignee: Dell Products L.P.
    Inventors: Nitin Anand, Amarendra Behera, Shelesh Chopra, Tushar Dethe, Sunil Yadav
  • Publication number: 20240232024
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a cloud service provider (CSP) proxy, a protection policy event associated with an incremental approximation backup of an object; in response to identifying the protection policy event: obtaining previous object metadata associated with the object; obtaining object data from on-premises cloud resources associated with the object; generating slices of the object data; generating current checksums and current object metadata associated with each slice; selecting a first slice of the slices; making a first determination that a first current checksum of the current checksums and a first previous checksum associated with the first slice do not match; in response to the first determination: storing the first slice in a backup storage; and updating a first portion of the current object metadata associated with the first slice.
    Type: Application
    Filed: October 24, 2022
    Publication date: July 11, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Publication number: 20240232404
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a data manager, a protection policy assignment event; in response to identifying the protection policy assignment event: identifying subscriptions associated with cloud resources; identifying services associated with each subscriptions; assigning protection policy types to the subscriptions based on the associated services; and initiating performance of data protection services based on the protection policy assignments associated with each subscription.
    Type: Application
    Filed: October 24, 2022
    Publication date: July 11, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Shelesh Chopra, Tushar Dethe
  • Publication number: 20240232025
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a cloud service provider (CSP) proxy, a backup generation event associated with a virtual machine (VM); in response to identifying the backup generation event: obtaining VM information associated with the VM; instantiating a VM agent within the VM; obtaining a metadata file from the VM agent; obtaining VM data from limited access cloud data; storing the VM data and a copy of the metadata file in a backup storage to generate a backup of the VM; generating indexing metadata associated with the backup using the metadata file; and providing the indexing metadata to a data manager.
    Type: Application
    Filed: October 24, 2022
    Publication date: July 11, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Publication number: 20240236077
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes obtaining, by a data manager, an initial cloud service provider (CSP) proxy generation request from a user; in response to obtaining the initial (CSP) proxy generation request: creating an authentication account in a CSP directory based on the initial CSP proxy generation request; instantiating a CSP proxy in an on-premises CSP using authentication information associated with the authentication account; storing the authentication information; and associating the user with the authentication information and the CSP proxy, wherein after the associating the CSP proxy can access limited access cloud data and cloud resources of the on-premises CSP.
    Type: Application
    Filed: October 24, 2022
    Publication date: July 11, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Patent number: 12032445
    Abstract: Described is a system (and method) for specialized data management when performing incremental backups to a cloud-based object storage. When backing up client data, the server may utilize incremental backups to conserve the amount of storage space required on the object storage. However, the server may implement a configuration that enables full reconstruction of the client data at the time of recovery. To provide such capabilities, the server may leverage a specialized metadata database. The metadata database may be an embedded database maintained by the server. The server may leverage the metadata database to provide further storage efficiencies by storing certain incremental backup data exclusively within the metadata database. Accordingly, the server may implement a data management configuration as part of a backup service that conserves storage usage, and as a result, storage costs when using on a third-party cloud-based object storage.
    Type: Grant
    Filed: December 18, 2020
    Date of Patent: July 9, 2024
    Assignee: EMC IP Holding Company LLC
    Inventors: Sunil Yadav, Shelesh Chopra, Ravi Vijayakumar Chitloor, Tushar Dethe, Amarendra Behera, Deependra Singh, Jigar Bhanushali, Himanshu Arora, Prabhat Kumar Dubey
  • Patent number: 12026062
    Abstract: Described is a system for managing backup data stored on a cloud-based object storage irrespective of the storage provider. The system may include a server (or gateway) that provides a backup service, and acts as an intermediary between a client device and object storage. To provide such capabilities, the system may manage an application programming interface (API) that provides a uniform set of methods to a client device irrespective of the destination object storage provider. A function library may include provider-specific functions that invoke corresponding storage-layer operations provided by the destination object storage. The server may also manage an operation pool to schedule operations and saturate bandwidth to the object storage. The server may also implement a specialized metadata database to provide further storage efficiencies by storing certain backup data exclusively within the metadata database.
    Type: Grant
    Filed: January 4, 2021
    Date of Patent: July 2, 2024
    Assignee: EMC IP Holding Company LLC
    Inventors: Sunil Yadav, Shelesh Chopra, Amarendra Behera, Tushar Dethe, Himanshu Arora, Deependra Singh, Jigar Bhanushali, Prabhat Kumar Dubey, Ravi Vijayakumar Chitloor
  • Patent number: 11994953
    Abstract: A target host is booted into a preinstallation environment. A request to register as a recovery agent is issued from a REST API of the target host to a backup management server. A TLS certificate to establish a secure channel is received from the backup management server. A request identifying a backup copy to be stored on the target host is issued from the REST API of the target host and over the secure channel to the backup management server. Credentials required to access a backup storage at which the backup copy is stored is received. Using the credentials, the backup copy is retrieved from the backup storage.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: May 28, 2024
    Assignee: Dell Products L.P.
    Inventors: Amarendra Behera, Shelesh Chopra, Tushar Dethe, Sanjna Umesh, Sunil Yadav
  • Publication number: 20240134754
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a cloud service provider (CSP) proxy, a protection policy event associated with an incremental approximation backup of an object; in response to identifying the protection policy event: obtaining previous object metadata associated with the object; obtaining object data from on-premises cloud resources associated with the object; generating slices of the object data; generating current checksums and current object metadata associated with each slice; selecting a first slice of the slices; making a first determination that a first current checksum of the current checksums and a first previous checksum associated with the first slice do not match; in response to the first determination: storing the first slice in a backup storage; and updating a first portion of the current object metadata associated with the first slice.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Publication number: 20240135014
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a data manager, a protection policy assignment event; in response to identifying the protection policy assignment event: identifying subscriptions associated with cloud resources; identifying services associated with each subscriptions; assigning protection policy types to the subscriptions based on the associated services; and initiating performance of data protection services based on the protection policy assignments associated with each subscription.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Shelesh Chopra, Tushar Dethe
  • Publication number: 20240134755
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes identifying, by a cloud service provider (CSP) proxy, a backup generation event associated with a virtual machine (VM); in response to identifying the backup generation event: obtaining VM information associated with the VM; instantiating a VM agent within the VM; obtaining a metadata file from the VM agent; obtaining VM data from limited access cloud data; storing the VM data and a copy of the metadata file in a backup storage to generate a backup of the VM; generating indexing metadata associated with the backup using the metadata file; and providing the indexing metadata to a data manager.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Publication number: 20240137360
    Abstract: Techniques described herein relate to a method for performing data protection services for limited access cloud data. The method includes obtaining, by a data manager, an initial cloud service provider (CSP) proxy generation request from a user; in response to obtaining the initial (CSP) proxy generation request: creating an authentication account in a CSP directory based on the initial CSP proxy generation request; instantiating a CSP proxy in an on-premises CSP using authentication information associated with the authentication account; storing the authentication information; and associating the user with the authentication information and the CSP proxy, wherein after the associating the CSP proxy can access limited access cloud data and cloud resources of the on-premises CSP.
    Type: Application
    Filed: October 23, 2022
    Publication date: April 25, 2024
    Inventors: Sunil Yadav, Amarendra Behera, Tushar Dethe, Shelesh Chopra
  • Patent number: 11928034
    Abstract: Network configuration details associated with a host are collected with each bare metal recovery (BMR) backup of the host. The network configuration details are stored in backup storage with each BMR backup copy. A target host is booted into a preinstallation environment. The target host is configured into a DHCP mode to allow the target host to establish a network connection to a backup management server. Details about the host are received from a user. A listing of BMR backup copies corresponding to the host details are retrieved from the backup management server. A selection of a BMR backup copy to be restored onto the target host is received. Network configuration details corresponding to the selected BMR backup copy are downloaded from backup storage. A recovery wizard at the target host is populated with the network configuration details.
    Type: Grant
    Filed: June 16, 2022
    Date of Patent: March 12, 2024
    Assignee: Dell Products L.P.
    Inventors: Amarendra Behera, Shelesh Chopra, Tushar Dethe, Sunil Yadav
  • Publication number: 20230409437
    Abstract: Writers participating in a backup are identified. A mapping is generated between the writers and associated files. The mapping includes file properties. The mapping is initialized by tagging the writers with a full backup tag. A base backup copy of the writers is created by conducting a full backup of each writer tagged with the full backup tag. At a current backup operation after creating the base backup, a list of current files that will participate in the current backup operation is generated. The list of current files is compared against the files in the mapping to determine whether a particular writer associated with a current file should be tagged with the full backup tag or an incremental backup tag. The particular writer is tagged with the incremental backup tag when file properties associated with the current file have changed.
    Type: Application
    Filed: June 16, 2022
    Publication date: December 21, 2023
    Inventors: Amarendra Behera, Shelesh Chopra, Tushar Dethe, Prabhat Kumar Dubey, Sunil Yadav
  • Publication number: 20230409446
    Abstract: Communications are exchanged with a copy service of a host to identify writers associated with the copy service. The identification includes a type of a writer as being a system or application writer. Writers identified as system writers are added to a list of writers that should participate in a backup operation. For writers identified as application writers, components of an application writer are iterated through to determine whether a component of the application writer has a name or logical path that includes a name of a system service. When any component has the name or logical path that includes the name of the system service, the application writer is promoted to be of type system writer by adding the application writer to the list of writers that should participate in the backup operation. Components of each writer listed in the list of writers are backed up.
    Type: Application
    Filed: June 16, 2022
    Publication date: December 21, 2023
    Inventors: Amarendra Behera, Shelesh Chopra, Tushar Dethe, Prabhat Kumar Dubey, Roland Fernandes, Sunil Yadav