Issued Patents All Time
Showing 1–25 of 33 patents
| Patent # | Title | Co-Inventors | Date |
|---|---|---|---|
| 12093217 | File transfer prioritization during replication | Kaushik Gupta, Shiv Shankar Kumar | 2024-09-17 |
| 12086111 | File transfer prioritization during replication | Kaushik Gupta, Shiv Shankar Kumar | 2024-09-10 |
| 11972245 | Proactive prevention of data unavailability and data loss | Kaushik Gupta, Shiv Shankar Kumar | 2024-04-30 |
| 11768777 | Application aware cache management | Shiv Shankar Kumar | 2023-09-26 |
| 11747997 | Method and apparatus for providing differentiated share prioritization in a storage system | Shiv Shankar Kumar, Amit Kumar Chauhan | 2023-09-05 |
| 11687557 | Data size and time based replication | Shiv Shankar Kumar | 2023-06-27 |
| 11681662 | Tracking users modifying a file | Shiv Shankar Kumar | 2023-06-20 |
| 11675735 | File transfer prioritization during replication | Kaushik Gupta, Shiv Shankar Kumar | 2023-06-13 |
| 11663332 | Tracking a virus footprint in data copies | Shiv Shankar Kumar, Avadut Mungre | 2023-05-30 |
| 11528236 | User-based data tiering | Shiv Shankar Kumar | 2022-12-13 |
| 11436251 | Data size based replication | Shiv Shankar Kumar | 2022-09-06 |
| 11347681 | Enhanced reading or recalling of archived files | Shiv Shankar Kumar, Avadut Mungre | 2022-05-31 |
| 11314436 | Method and apparatus for dynamically adjusting differentiated share prioritization in a storage system | Shiv Shankar Kumar, Amit Kumar Chauhan | 2022-04-26 |
| 11288391 | Filename-based malware pre-scanning | Avadut Mungre, Shiv Shankar Kumar | 2022-03-29 |
| 11210395 | Filename-based malware pre-scanning | Avadut Mungre, Shiv Shankar Kumar | 2021-12-28 |
| 11200254 | Efficient configuration replication using a configuration change log | Kaushik Gupta, Shiv Shankar Kumar | 2021-12-14 |
| 11086994 | Priority scanning of files written by malicious users in a data storage system | Amit Kumar Chauhan, Shiv Shankar Kumar | 2021-08-10 |
| 11086995 | Malware scanning for network-attached storage systems | Shiv Shankar Kumar, Amit Kumar Chauhan | 2021-08-10 |
| 11086726 | User-based recovery point objectives for disaster recovery | Shiv Shankar Kumar | 2021-08-10 |
| 11079971 | Input/output (i/o) fencing without dedicated arbitrators | Vikas Goel, Shailesh Marathe, Abhijit Toley, Narender Singh Mehra | 2021-08-03 |
| 11023582 | Identification and control of malicious users on a data storage system | Amit Kumar Chauhan, Shiv Shankar Kumar | 2021-06-01 |
| 10990462 | Application aware input/output fencing | Abhijit Toley | 2021-04-27 |
| 10938701 | Efficient heartbeat with remote servers by NAS cluster nodes | Shiv Shankar Kumar, Amit Kumar Chauhan | 2021-03-02 |
| 10862922 | Server selection for optimized malware scan on NAS | Shiv Shankar Kumar, Amit Kumar Chauhan | 2020-12-08 |
| 10848559 | Malware scan status determination for network-attached storage systems | Shiv Shankar Kumar, Amit Kumar Chauhan | 2020-11-24 |