Patents by Inventor Venkata L. R. Ippatapu

Venkata L. R. Ippatapu has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11831762
    Abstract: Secure credentials (e.g., Diffie Helman (DH) key pairs) may be generated independently of requests to establish communication channels between storage system ports (SSPs) and remote ports, such that secure credentials are pre-generated relative to the requests for which they are utilized to establish secure communication channels. For example, DH key pairs may be pre-generated, and each DH key pair stored in an entry of a DH key table. The number of DH keys to generate and store may be determined based on user input and/or the number of potential communication channels for the storage system. In response to a request to establish a communication channel, an IKE session may be executed, during which a pre-generated DH key pair may be obtained from the DH key table, from which symmetric for secure communication between the SSP and the remote port may be derived.
    Type: Grant
    Filed: May 29, 2020
    Date of Patent: November 28, 2023
    Assignee: EMC IP Holding Company LLC
    Inventors: Venkata L R Ippatapu, Kenneth Dorman
  • Patent number: 11546136
    Abstract: The described technology is generally directed towards generating shared authentication keys using network connection characteristics. According to an embodiment, a system can comprise a processor and a memory that can store executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise generating a first authenticator based on a first authentication key generated based on a first connection characteristic of the first device and a second connection characteristic of a second device. The operations can further comprise incorporating the first authenticator into first content for authentication by the second device employing a second authentication key, generated by the second device based on the first connection characteristic and the second connection characteristic. The operations can further comprise establishing, based on the first content, a connection with the second device.
    Type: Grant
    Filed: August 27, 2019
    Date of Patent: January 3, 2023
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth Dorman
  • Patent number: 11513841
    Abstract: In general, embodiments of the invention relate to a method and computing system for scheduling tasks (functions or routines) dynamically from Input/Output (I/O) operations that may be received from a client. The scheduling or ordering of the tasks play an important role in the overall latency of the execution of IO operations, as each task may consume significant amount of computing resources.
    Type: Grant
    Filed: July 19, 2019
    Date of Patent: November 29, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventor: Venkata L R Ippatapu
  • Patent number: 11438243
    Abstract: The described technology is generally directed towards adjusting communication channels. According to an embodiment, a system can comprise a memory that can store computer executable components, and a processor that can execute the computer executable components stored in the memory. The computer executable components can comprise a network metric monitor to monitor a network metric of a communication channel between a first device and a second device, a change in performance of the communication channel based on the network metric. The computer executable components further comprise a channel rating component to adjust a rating of the network connection based on the change in performance of the network connection, resulting in an adjusted rating. The computer executable components further comprise a link controller to adjust the communication channel based on the rating, resulting in an adjusted communication channel.
    Type: Grant
    Filed: April 12, 2019
    Date of Patent: September 6, 2022
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth Dorman
  • Patent number: 11316907
    Abstract: Embodiments described herein relate to techniques for establishing a secure communication channel. The techniques may include performing an encryption capability negotiation between peer devices, wherein a first peer device and a second peer device are connected by a communication channel comprising a first link of the first peer device and a second link of the second peer device; marking, when the encryption capability negotiation is successful, the first link and the second link as encryption capable; performing, based on the marking, a security negotiation between the first peer device and the second peer device; based on the security negotiation: establishing a first security association on the first peer device; and establishing a second security association on the second peer device; programming the first security association to hardware of the first peer device; and programming the second security association to hardware of the second peer device.
    Type: Grant
    Filed: December 6, 2019
    Date of Patent: April 26, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth M. Dorman
  • Patent number: 11231867
    Abstract: Techniques for processing write operations may include: receiving, at a first data storage system, a first write operation that writes first data to a first device, wherein the first device is configured for replication on a second device of a second data storage system; performing first processing that determines whether the first data written by the first write operation is a duplicate of an existing entry in a first hash table of the first data storage system; responsive to determining the first data written by the first write operation is a duplicate of an existing entry in the first hash table, performing second processing; responsive to determining the first data written by the first write operation is unique and is not a duplicate of an existing entry in the first hash table, performing third processing; and transmitting the final buffer to the second data storage system.
    Type: Grant
    Filed: January 25, 2018
    Date of Patent: January 25, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Venkata L R Ippatapu, Kenneth Dorman
  • Patent number: 11223654
    Abstract: Embodiments described herein relate to techniques for establishing a secure communication channel. The techniques may include making, by an upper level protocol application, a request for an interface identifier using an interface information set; receiving the interface identifier in response to the request; providing the interface identifier and an additional information set to a security module; making a first determination, by the security module, that a protocol socket is associated with the interface identifier; making a second determination, by the security module and based on the additional information set, that a security policy is configured for establishing the secure communication channel with a remote peer device; and establishing, using the protocol socket and the security policy, the secure communication channel with the remote peer device.
    Type: Grant
    Filed: December 6, 2019
    Date of Patent: January 11, 2022
    Assignee: EMC IP Holding Company LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth M. Dorman
  • Patent number: 11204713
    Abstract: Techniques for processing data may include: receiving a write operation that writes first data to a first storage device of a first data storage system that is configured for replication on a second storage device of a second data storage system; and replicating the first data on the second storage device on the second data storage system. The replicating may include identifying the first data of the first storage device to be replicated on the second storage device of the second data storage system; selecting a compression technique in accordance with an expected wait delay of the first data, wherein the first expected wait delay denotes an amount of time the first bucket of data is expected to wait before transmission to the second data storage system; compressing the first data using the selected first compression technique; and sending the compressed first data to the second data storage system.
    Type: Grant
    Filed: May 28, 2020
    Date of Patent: December 21, 2021
    Assignee: EMC IP Holding Company LLC
    Inventor: Venkata L R Ippatapu
  • Publication number: 20210373772
    Abstract: Techniques for processing data may include: receiving a write operation that writes first data to a first storage device of a first data storage system that is configured for replication on a second storage device of a second data storage system; and replicating the first data on the second storage device on the second data storage system. The replicating may include identifying the first data of the first storage device to be replicated on the second storage device of the second data storage system; selecting a compression technique in accordance with an expected wait delay of the first data, wherein the first expected wait delay denotes an amount of time the first bucket of data is expected to wait before transmission to the second data storage system; compressing the first data using the selected first compression technique; and sending the compressed first data to the second data storage system.
    Type: Application
    Filed: May 28, 2020
    Publication date: December 2, 2021
    Applicant: EMC IP Holding Company LLC
    Inventor: Venkata L. R. Ippatapu
  • Patent number: 11157189
    Abstract: An information handling system may include at least one processor and a memory coupled to the at least one processor. The information handling system may be configured to receive data comprising a plurality of data chunks; perform deduplication on the plurality of data chunks to produce a plurality of unique data chunks; determine a compression ratio for respective pairs of the unique data chunks; determine a desired compression order for the plurality of unique data chunks based on the compression ratios; combine the plurality of unique data chunks in the desired compression order; and perform data compression on the combined plurality of unique data chunks.
    Type: Grant
    Filed: July 10, 2019
    Date of Patent: October 26, 2021
    Assignee: Dell Products L.P.
    Inventor: Venkata L. R. Ippatapu
  • Patent number: 11146663
    Abstract: Facilitating improved overall performance of remote data facility replication systems. A device can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise adjusting, by a device comprising a processor, a value of a compression counter based on global system attributes associated with a remote data facility replication system and an application service performance expectation. The method also can comprise performing, by the device, one of: facilitating a data compression of a group of data blocks based on the value of the compression counter satisfying a threshold compression level or storing the group of data blocks without the data compression based on the value of the compression counter failing to satisfy the threshold compression level.
    Type: Grant
    Filed: July 18, 2019
    Date of Patent: October 12, 2021
    Assignee: EMC IP Holding Company LLC
    Inventor: Venkata L. R. Ippatapu
  • Patent number: 11095550
    Abstract: The described technology is generally directed towards evaluating, weighting, and scheduling the use of network links. According to an embodiment, a system can comprise a memory that can store computer executable components, and a processor that can execute the computer executable components stored in the memory. The components can comprise a link mapper that can identify at least two network links between a first device and a second device, resulting in identified network links. The system can further comprise a link weighting component that can assign weights to respective ones of the identified network links resulting in weighted network links, based on a criterion and characteristics of the identified network links, the first device and the second device. The system can further comprise a link scheduler that can schedule the weighted network links based on the weights assigned to the respective ones of the weighted network links.
    Type: Grant
    Filed: April 30, 2019
    Date of Patent: August 17, 2021
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventor: Venkata L. R. Ippatapu
  • Publication number: 20210176283
    Abstract: Embodiments described herein relate to techniques for establishing a secure communication channel. The techniques may include performing an encryption capability negotiation between peer devices, wherein a first peer device and a second peer device are connected by a communication channel comprising a first link of the first peer device and a second link of the second peer device; marking, when the encryption capability negotiation is successful, the first link and the second link as encryption capable; performing, based on the marking, a security negotiation between the first peer device and the second peer device; based on the security negotiation: establishing a first security association on the first peer device; and establishing a second security association on the second peer device; programming the first security association to hardware of the first peer device; and programming the second security association to hardware of the second peer device.
    Type: Application
    Filed: December 6, 2019
    Publication date: June 10, 2021
    Inventors: Venkata L.R. Ippatapu, Kenneth M. Dorman
  • Publication number: 20210176277
    Abstract: Embodiments described herein relate to techniques for establishing a secure communication channel. The techniques may include making, by an upper level protocol application, a request for an interface identifier using an interface information set; receiving the interface identifier in response to the request; providing the interface identifier and an additional information set to a security module; making a first determination, by the security module, that a protocol socket is associated with the interface identifier; making a second determination, by the security module and based on the additional information set, that a security policy is configured for establishing the secure communication channel with a remote peer device; and establishing, using the protocol socket and the security policy, the secure communication channel with the remote peer device.
    Type: Application
    Filed: December 6, 2019
    Publication date: June 10, 2021
    Inventors: Venkata L.R. Ippatapu, Kenneth M. Dorman
  • Patent number: 11012473
    Abstract: A consolidated default security policy for a storage node is created by combining a system-wide default security policy with default security policies for multiple protocols and default security policies for multiple applications. The default security policies for protocols and applications include IKE parameters and parameter values. In response to receipt of an IKE request from a peer, the storage node obtains dynamically-assigned source and destination information and finds matching parameters and parameter values in the consolidated default security policy. The matching parameters and parameter values are used with the dynamically-assigned source and destination information to auto-generate a secure channel with the peer.
    Type: Grant
    Filed: November 1, 2019
    Date of Patent: May 18, 2021
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth Dorman
  • Publication number: 20210136116
    Abstract: A consolidated default security policy for a storage node is created by combining a system-wide default security policy with default security policies for multiple protocols and default security policies for multiple applications. The default security policies for protocols and applications include IKE parameters and parameter values. In response to receipt of an IKE request from a peer, the storage node obtains dynamically-assigned source and destination information and finds matching parameters and parameter values in the consolidated default security policy. The matching parameters and parameter values are used with the dynamically-assigned source and destination information to auto-generate a secure channel with the peer.
    Type: Application
    Filed: November 1, 2019
    Publication date: May 6, 2021
    Applicant: EMC IP HOLDING COMPANY LLC
    Inventors: Venkata L. R. Ippatapu, Kenneth Dorman
  • Patent number: 10998918
    Abstract: The described technology is generally directed towards reducing the amount of data stored in a sequence of data blocks by combining deduplication and compression. According to an embodiment, a system can comprise a memory that can store computer executable components, and a processor that can execute the components stored in the memory. The components can comprise a data block identifier that can identify, for a sequence of data blocks, a first data block that corresponds to a first data, resulting in a first identified data block, and a deduplication component that can identify a second data block that corresponds to the first data, resulting in a second identified data block, wherein the deduplication component can replace the second identified data block with a key value corresponding to the first identified data block. Further, a compression component can compress the first identified data block, resulting in a compressed data block.
    Type: Grant
    Filed: April 13, 2020
    Date of Patent: May 4, 2021
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventor: Venkata L. R. Ippatapu
  • Publication number: 20210067325
    Abstract: The described technology is generally directed towards generating shared authentication keys using network connection characteristics. According to an embodiment, a system can comprise a processor and a memory that can store executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise generating a first authenticator based on a first authentication key generated based on a first connection characteristic of the first device and a second connection characteristic of a second device. The operations can further comprise incorporating the first authenticator into first content for authentication by the second device employing a second authentication key, generated by the second device based on the first connection characteristic and the second connection characteristic. The operations can further comprise establishing, based on the first content, a connection with the second device.
    Type: Application
    Filed: August 27, 2019
    Publication date: March 4, 2021
    Inventors: Venkata L.R. Ippatapu, Kenneth Dorman
  • Patent number: 10936197
    Abstract: The described technology is generally directed towards performing memory copy operations. According to an embodiment, a system can comprise a memory that stores computer executable components, a compression component, and a processor that can execute the computer executable components stored in the memory. The computer executable components comprise an instruction decoder that can receive an instruction from a host application, resulting in a decoded instruction. The components can also comprise a compression component controller to control the compression component, and a memory copier to employ the compression component controller to control the compression component to copy the value from the first memory location to a second memory location in the second memory, in accordance with the decoded instruction.
    Type: Grant
    Filed: April 15, 2019
    Date of Patent: March 2, 2021
    Assignee: EMC IP HOLDING COMPANY LLC
    Inventor: Venkata L. R. Ippatapu
  • Publication number: 20210021693
    Abstract: Facilitating improved overall performance of remote data facility replication systems. A device can comprise a processor and a memory that stores executable instructions that, when executed by the processor, facilitate performance of operations. The operations can comprise adjusting, by a device comprising a processor, a value of a compression counter based on global system attributes associated with a remote data facility replication system and an application service performance expectation. The method also can comprise performing, by the device, one of: facilitating a data compression of a group of data blocks based on the value of the compression counter satisfying a threshold compression level or storing the group of data blocks without the data compression based on the value of the compression counter failing to satisfy the threshold compression level.
    Type: Application
    Filed: July 18, 2019
    Publication date: January 21, 2021
    Inventor: Venkata L. R. Ippatapu