Patents Assigned to Infosys Technologies Ltd.
-
Publication number: 20130219374Abstract: A system and method of evaluating a software program is disclosed. Information of a proposed problem is received from a user via the user interface and a problem profile associated with the proposed problem is created. A master software solution associated with the proposed problem is processed to identify one or more attributes, such as a first identified attribute. One or more first test cases associated with the first identified attribute in the master software solution are generated. An evaluation program including at least the one or more generated first test cases is generated. The generated evaluation program is configured to be applied to at least one submitted software program that is to be evaluated. At least the one or more first test cases is configured to be applied as one or more test inputs to a corresponding attributes in the submitted software program.Type: ApplicationFiled: June 19, 2012Publication date: August 22, 2013Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Kshitiz Jain, Meenakshi Sahasranaman, Lakshmi Davangere Lakshmana Setty, Sundaresan Krishnan Iyer, Subraya Beleyur Manjappa
-
Patent number: 8516563Abstract: A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string.Type: GrantFiled: August 26, 2011Date of Patent: August 20, 2013Assignee: Infosys Technologies, Ltd.Inventors: Ashutosh Saxena, Harigopal K. B. Ponnapalli
-
Publication number: 20130113999Abstract: A method, system and computer-readable media for detecting scene changes in a video that includes providing by one or more computing devices a plurality of passes through the video where a plurality of detected scenes from a first pass in a conventional method are identified and a second pass through the detected scenes are provided by the computing device. A plurality of scene boundary differences corresponding to the detected scenes, a fixed average, and a varying average are computed by the computing device. The scene boundary difference is compared with the fixed average and the varying average and if the scene boundary difference is less than the fixed average and the varying average, the detected scenes are combined else the detected scene being an abrupt scene change is determined. The steps of computing a varying average to combining the detected scenes are repeated by the computing device.Type: ApplicationFiled: November 3, 2011Publication date: May 9, 2013Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Aditya Vashistha, Rajarathnam Nallusamy, Sanjoy Paul
-
Patent number: 8412561Abstract: A system and method to offer a one or more experiences using various layers to at least one customer is disclosed. The method includes user experience layer having a first plurality of components owned by at least one service provider to evaluate a plurality of experimental changes of the at least one customer. The method further includes user service layer having a second plurality of components owned by the at least one service provider to offer a first plurality of services for the at least one customer. The method further includes an adaptation layer, a network service layer, a protocol layer and a platform layer having one or more components to provide one or more functionalities. Additionally, the method further includes a monitoring and control layer with one or more components to build management information across the one or more layers.Type: GrantFiled: July 30, 2007Date of Patent: April 2, 2013Assignee: Infosys Technologies, Ltd.Inventors: Jithesh Sathyan, Naveen Krishnan Unni, Anil J. Rajan
-
Patent number: 8356303Abstract: A method for scheduling a plurality of computation jobs to a plurality of data processing units (DPUs) in a grid computing system 100. The method includes receiving a first computation job by a scheduling DPU from the plurality of computation jobs. Further, the method includes scheduling the first computation job at a first set of DPUs in the grid computing system based on first scheduling criteria. Furthermore, the method includes scheduling the first computation job at a first DPU from the first set of DPUs based on second scheduling criteria. The method also includes storing information about the first computation job and the first set of DPUs in a history table at the scheduling DPU. The method further includes storing information about the first DPU in a demand matrix of the first set of DPUs.Type: GrantFiled: December 8, 2008Date of Patent: January 15, 2013Assignee: Infosys Technologies Ltd.Inventors: Shubhashis Sengupta, Lopamudra Chakrabarti
-
Publication number: 20130007861Abstract: A method, non-transitory computer readable medium, and apparatus that authenticates a user without personal information includes obtaining at a secure authentication computing apparatus a context identifier, a registration identifier of one of a plurality of string generator modules assigned to a client computing device requesting access, and a client string generated by the client computing device requesting access from an agent computing device associated with the client computing device requesting access. An authentication string is generated with the secure authentication computing apparatus based on the obtained context identifier and a corresponding one of the plurality of string generator modules provided to the client computing device requesting access based on the registration identifier. The requested access by the client computing device is granted with the secure authentication computing apparatus when the client string matches the authentication string.Type: ApplicationFiled: August 26, 2011Publication date: January 3, 2013Applicant: Infosys Technologies, Ltd.Inventors: Ashutosh SAXENA, Harigopal K.B. Ponnapalli
-
Publication number: 20130007198Abstract: A method, non-transitory computer readable medium, and apparatus that identifies profile information for a received request associated with an end user at a requesting computing device and context information associated with the requesting computing device. Customized content responsive to the received request is obtained from a content provider device based on the identified profile information and the identified context information. The obtained customized content is providing to the requesting computing device.Type: ApplicationFiled: August 25, 2011Publication date: January 3, 2013Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Puneet GUPTA, Venkat Kumar SIVARAMAMURTHY, Akshay DARBARI, Karthik GOPALAKRISHNAN VINMANI
-
Publication number: 20120317195Abstract: A method and system for managing communication between a plurality of team members are provided. The method includes, at a first agent associated with a team member, receiving inputs from a team member about an event associated with one or more team members. The method further includes sending an event request to agents of one or more team members and receiving responses from them. Based on the responses, the first agent either cancels the event, schedules the event, or reschedules the event.Type: ApplicationFiled: December 14, 2011Publication date: December 13, 2012Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Anjaneyulu PASALA, Arun SETHURAMAN, Niranjani SRINIVASA VIBHU, Ravi Prakash GORTHI
-
METHODS FOR SELECTING ONE OF A PLURALITY OF COMPETING IT-LED INNOVATION PROJECTS AND DEVICES THEREOF
Publication number: 20120296688Abstract: Methods, systems, and computer-readable storage media for selecting one of a plurality of information technology (IT)-led innovation projects include obtaining a plurality of IT-led innovation projects. A selection of one or more research projects for each of the obtained IT-led innovation projects is determined based at least on one or more research project criteria. One of the obtained IT-led innovation projects is selected based at least on the determined selection of one or more research projects for each of the obtained IT-led innovation projects and one or more innovation project criteria. The selection of the one of the obtained IT-led innovation projects is provided.Type: ApplicationFiled: August 24, 2011Publication date: November 22, 2012Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Nagarajan DAYASINDHU, Venkatakrishnan BALASUBRAMANIAN, Vikas DEWANGAN -
Publication number: 20120260201Abstract: Tools and techniques are provided that capture, aggregate, analyze and display soft data relating to an enterprise's services and products, and to the enterprise itself. The soft data comprises customer feedback on services, products and the enterprise, and are based on interactions between enterprise employers and the customers. The soft data comprises quantitative ratings and qualitative comments and is entered by employees at a capture engine. The captured soft data is aggregated and analyzed by an analytics engine, thereby generating aggregate data for use in generating data clouds at a display. Data clouds comprise service, product and enterprise attributes that are weighted according to quantitative rankings and qualitative comments relating to the attributes. Enterprise employees having decision-making authority can request data clouds for display, which can aid the decision makers in making decisions relating to enterprise services and products, and to the enterprise itself.Type: ApplicationFiled: May 19, 2011Publication date: October 11, 2012Applicant: Infosys Technologies Ltd.Inventors: Jai Ganesh, Shaurabh Bharti
-
Publication number: 20120259744Abstract: An augmented reality system is necessary for providing assistance for the customer in retail purchase decision. The augmented reality system comprising a one data sending module which is configured to send retail product information to the central server module is provided. A central server module configured to receive the retail product information from the data sending server where, the central server module is attached to a processor to process the retail product information. Processing the retail product information at the central server module, wherein the central server module retrieves retail product information from multiple databases which contains the retail product information. A data receiving module configured to receive the retail product information from the central server module. An application server configured to accept input from a user and to share the user details with a social networking platform.Type: ApplicationFiled: January 9, 2012Publication date: October 11, 2012Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Jai GANESH, Tarun Prakash SHARMA, Mukund RAJ, Christin Elisabeth STAUBO, Joseph Maloba MAKOKHA
-
Publication number: 20120257876Abstract: A method, a system, and a computer program product code for generating a series of still images from an input video file are provided. The series of still images may include, but are not limited to, a comic strip and a storyboard. The method includes extracting audio and visual frames from the video file. Thereafter, basic units of the video file are identified. The basic units are exposition (beginning), conflict (middle), and resolution (end). Thereafter, key frames are extracted from the basic units based on at least one of audio frames, visual frames, and a combination of the visual frames and the audio frames. Then, the extracted key frames are manipulated to output a series of still images. Subsequently, narration in the form of audio or text is attached to the still images to generate at least one of comic strips and storyboards.Type: ApplicationFiled: December 6, 2011Publication date: October 11, 2012Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Puneet GUPTA, Akshay DARBARI, Karthik Gopalakrishnan VINMANI, Venkat Kumar SIVARAMAMURTHY
-
Publication number: 20120260019Abstract: A multi-layer architecture is provided for elastic provisioning of virtualized computing resources. The multi-layer architecture comprises a physical hardware layer comprising a plurality of physical computing machines, a distributed operating system layer that aggregates and virtualizes the computing resources, and a virtual machine layer that comprises virtual machines provisioned, by the distributed operating system layer, with virtualized computing resources. Elastic provisioning of virtualized computing resources comprising receiving computing resource information of a plurality of physical computing machines, producing virtualized computing resources by aggregating the received computing resource information of the plurality of physical computing machines, and provisioning the virtualized computing resources among a plurality of virtual machines.Type: ApplicationFiled: May 20, 2011Publication date: October 11, 2012Applicant: Infosys Technologies Ltd.Inventors: Ganesan Malaiyandisamy, Rajarshi Bhose, Sudeep Mallick
-
Publication number: 20120260089Abstract: A secure messaging channel is necessary especially when the message involves confidential transactions, for example a bank transaction which involves funds transfer and other additional information. The present disclosure describes securing message. The method of securing a message comprises providing a personal identification number by the user, wherein the personal identification number is associated to a unique number of a user. The unique number can be a mobile number. The correct personal identification number invokes the one-time password generator. The one time password generator accesses a metadata which comprises a value stored. The value stored in the metadata is retrieved to generate a dynamic key. The dynamic key is converted to a symmetric encryption key to encrypt the data. The dynamic key can also be converted to a symmetric decryption key to decrypt the data.Type: ApplicationFiled: January 9, 2012Publication date: October 11, 2012Applicant: Infosys Technologies, Ltd.Inventors: Puneet Gupta, Venkat Kumar Sivaramamurthy, Akshay Darbari, Sudhakar Vusirika
-
Publication number: 20120259869Abstract: A system and method of providing a window sorting mechanism comprises receiving an array having a plurality of objects, wherein each object contains a digit. The digits in the received array are unsorted in association with a desired sorting arrangement. A length of the received array is determined, whereby received array is separated into a plurality of sub-arrays based on the length of the received array. An inter sub-array digit sorting process is performed in a first iteration between a first sub-array and a second sub-array to sort digits in correspondingly positioned objects in accordance with a first comparison rule. A first adjacent-object digit sorting process is performed in a second iteration on the first and second sub-arrays using simultaneously sorting windows of a first digit size in accordance with a second comparison rule. A second adjacent-object digit sorting process is then performed in a third iteration on the first and second sub-arrays using sorting windows of a second digit size.Type: ApplicationFiled: August 30, 2011Publication date: October 11, 2012Applicant: INFOSYS TECHNOLOGIES, LTD.Inventor: Pramit John PUNNILETHU
-
Publication number: 20120260228Abstract: Composite applications can be created that utilize a plurality of different services across a plurality of different cloud stack layers. The composite applications are defined using the Service Component Architecture (SCA) model. Composite applications can be translated from the SCA model into a format compatible for a virtualization platform, such as the Open Virtualization Format (OVF). Composite applications, as defined in the format compatible for the virtualization platform, can be deployed on the virtualization platform.Type: ApplicationFiled: May 20, 2011Publication date: October 11, 2012Applicant: Infosys Technologies Ltd.Inventors: Sudeep Mallick, Rajarshi Bhose, Ganesan Malaiyandisamy
-
Publication number: 20120259945Abstract: Systems and methods for dynamically rendering content based on user expectations and user tolerance levels are disclosed. Content is delivered to a user in a way that maximizes user experience and minimizes frustration while accessing web content. Because every user's expectations and tolerance levels are different, embodiments of the invention exploit these two parameters to deliver optimized web content to users within an acceptable time frame, thus ensuring a better browsing experience. In one embodiment of the invention, the method includes intercepting at a computing device a request for content from a server, determining a quality of service value based on user expectations and a user tolerance level from the content and a user profile, and delivering a modified version of the content to the user based on the quality of service value. The system is a computing device programmed with instructions to accomplish these functional steps.Type: ApplicationFiled: September 2, 2011Publication date: October 11, 2012Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Puneet GUPTA, Akshay DARBARI, Venkat Kumar SIVARAMAMURTHY
-
Publication number: 20120260079Abstract: A fast booting computer apparatus includes one or more processors and a memory comprising a hard disk drive and a solid state drive coupled to the one or more processors. The one or more processors are configured to execute programmed instructions stored in the memory. The solid state drive is configured to store and provide the programmed instructions for an operating system for execution by the one or more processors when requested.Type: ApplicationFiled: August 30, 2011Publication date: October 11, 2012Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Subrahmanya R. MRUTHYUNJAYA, Srikanth M. REDDY
-
Publication number: 20120259974Abstract: Dynamic modification of web page content is necessary especially when the delivery time has to be consistent. The present disclosure describes dynamic modification of web page content. The method for dynamic modification of web page comprises computing a required time by a middleware by considering a plurality of system constraints. Further, an available time is computed by the middleware for a data response by using one or both of the plurality of the system constraints and a target time. Determining an amount of the data response to be provided to a client based on the available time and converting the data response based on the amount of data response to be provided to the client.Type: ApplicationFiled: December 2, 2011Publication date: October 11, 2012Applicant: INFOSYS TECHNOLOGIES, LTD.Inventors: Puneet GUPTA, Akshay DARBARI, Venkat Kumar SIVARAMAMURTHY
-
Publication number: 20120259913Abstract: A system and method of implementing a dynamic change in a server operating condition in a secured server network comprises operating an application server, wherein the application server processes a plurality of scheduled tasks on behalf of one or more requesting network devices when in an operating mode. The scheduled tasks are assigned to the application server by a handling server. A stand-by status command sent from the application server to the handling server indicates that the application server's status has changed from the operating mode to a stand-by mode. The handling server accordingly does not schedule any new tasks to the application server when in it is in the stand-by mode. The application server processes all already scheduled tasks and outputs results for the scheduled tasks to the handling server while it is in the stand-by mode.Type: ApplicationFiled: August 30, 2011Publication date: October 11, 2012Applicant: INFOSYS TECHNOLOGIES, LTD.Inventor: Atul Dinkarpant JAWALKAR