Patents Assigned to Infosys Technologies Ltd.
  • Publication number: 20120233589
    Abstract: A three-layer architecture is provided for implementing a software development kit (SDK) for developing blended service software applications that utilize multiple service endpoints. The three-layer architecture comprises an application programming interface (API) layer, a core layer, and a communication layer. The API layer provides a set of interfaces for developing blended services that utilize a plurality of service endpoints. The core layer receives commands from the API layer and transforms the received commands for communication with the plurality of service endpoints. The communication layer provides communication adapters for communicating with the plurality of service endpoints. Blended service software applications can be developed using the SDK by receiving a plurality of API commands for a blended service that utilizes a plurality of service endpoints, determining a plurality of worker classes, and providing communication adapters for communicating with the plurality of service endpoints.
    Type: Application
    Filed: May 17, 2011
    Publication date: September 13, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Subrahmanya R. Mruthyunjaya, Tushar Agrawal
  • Publication number: 20120233588
    Abstract: A blended service creation environment is provided for developing blended service software applications that utilize multiple service endpoints. The blended service creation environment comprises a software development kit, a graphical service creation environment, and service endpoint simulators. Blended services can be tested locally using the service endpoint simulators, which simulate communication with actual service endpoints. The graphical service creation environment can be used to create blended services that utilize multiple service endpoints from different service providers. A service definition document can be used to define a blended service and the service definition document can be used to execute the blended service using a service execution environment.
    Type: Application
    Filed: May 17, 2011
    Publication date: September 13, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Subrahmanya R. Mruthyunjaya, Chetan Kumar Gupta, Ravindra K. Ghanathe, Tushar Agrawal
  • Publication number: 20120233595
    Abstract: A service definition document (SDD) framework is provided for defining blended services that utilize multiple service endpoints. The SDD framework can comprise a first category that defines a service endpoint representing a blended service, a second category that defines a plurality of service endpoints utilized by the blended service, and a third category that defines execution of the blended service. Blended services can be provided by creating a model of a blended service and saving a representation of the model of the blended service in a service definition document (SDD) framework. A blended service defined in a SDD framework can be executed by receiving the SDD and executing the blended service as defined by the SDD using a service execution environment (SEE).
    Type: Application
    Filed: May 17, 2011
    Publication date: September 13, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Ravindra K. Ghanathe, Subrahmanya R. Mruthyunjaya, Rashmi Shenoy
  • Publication number: 20120185517
    Abstract: The present invention includes a method and a system for creating Web Ontology Language (OWL) ontology from a Universal Business Language (UBL) process diagram. The UBL process diagram includes one or more processes, one or more partitions, one or more activities, one or more objects, an initial node, and a final node. At least one of the processes, the partitions, the activities, and the objects are extracted from the UBL process diagram. A first OWL class, a second OWL class, and a third OWL class are created corresponding to the processes, partitions, and objects, respectively. Thereafter, an object property is created corresponding to each of the activities, the initial node, and the final node. Finally, the first OWL class, the second OWL class, the third OWL class, and each of the created object property are added to obtain the OWL ontology.
    Type: Application
    Filed: December 14, 2011
    Publication date: July 19, 2012
    Applicant: INFOSYS TECHNOLOGIES, LTD.
    Inventors: Kiran Prakash SAWANT, Suman ROY
  • Publication number: 20120176938
    Abstract: A method for creating a virtual Wireless Sensor Network (WSN) is disclosed. The method includes extracting one or more niceties of a physical WSN and embedding at least one of the extracted niceties in a soft object to represent one or more sensor nodes of the physical WSN. The method includes, sending equivalent command to the one or more sensor nodes of the physical WSN, when one or more changes are performed on corresponding niceties of the soft object. Further, the method adding or deleting one or more niceties corresponding to the one or more sensor nodes from the soft object upon ingress or egress of the one or more sensor nodes in the physical WSN. The method also includes steps of building application using the soft object of the virtual WSN.
    Type: Application
    Filed: December 14, 2011
    Publication date: July 12, 2012
    Applicant: INFOSYS TECHNOLOGIES, LTD.
    Inventors: Kumar PADMANABH, Adi Mallikarjuna Reddy VANTEDDU, Sougata SEN, Amrit KUMAR, Puneet GUPTA, Lakshya MALHOTRA, Sunil Kumar VUPPALA
  • Publication number: 20120131090
    Abstract: A distributed hierarchical registry provides services, such as registry services, including client device discovery and communication services. The distributed hierarchical registry comprises a plurality of registry groups where a registry group comprises a plurality of registry servers. The registry servers receive client device information, such as status, capability, and usage information, and update other registry servers, in the same registry group and/or in other registry groups, using a quorum consensus protocol. The registry servers also respond to lookup requests from client devices. Registry servers use policies to define parameters such as a number of registry servers that make up a read quorum and the number of registry servers that make up a write quorum.
    Type: Application
    Filed: February 7, 2011
    Publication date: May 24, 2012
    Applicant: Infosys Technologies Ltd.
    Inventor: Shyam Kumar Doddavula
  • Patent number: 8166309
    Abstract: A method, system, and computer program product for network management, including masking a true service set identifier (SSID) in beacon frame; and broadcasting the beacon frame with the masked true SSID, whereby an authorized device retrieve the true SSID from the broadcast beacon frame.
    Type: Grant
    Filed: May 1, 2007
    Date of Patent: April 24, 2012
    Assignee: Infosys Technologies, Ltd.
    Inventors: Kartik Muralidharan, Puneet Gupta
  • Publication number: 20120092352
    Abstract: A computer-implemented method for event matching in a complex event processing system includes receiving, with a computer processing device, a stream of event data; receiving, with a computer processing device, an event list and an access predicate list, wherein the event list includes one or more event data pairs; and identifying, with a graphical processing device, patterns in the stream of event data.
    Type: Application
    Filed: February 9, 2011
    Publication date: April 19, 2012
    Applicant: INFOSYS TECHNOLOGIES LTD.
    Inventors: Sudeep Mallick, Murali Krishna Emani
  • Publication number: 20120096434
    Abstract: The invention relates to a system and method for identifying occurrences of preventive maintenance on computer source code. The method comprises analyzing source code, defining data sets associated with characteristics of the source code, and applying an operation algorithm to the data sets to thereby identify occurrences of preventive maintenance operations that were carried out on the source code. A first instance of a source code and a second instance of the source code are preferably analyzed, wherein the second instance of the source code is a revised version of the first instance of the source code, a first data set associated with the first instance of the source code and a second data set associated with the second instance of the source code are preferably defined, and the operation algorithm is preferably applied to the first data set and the second data set to thereby identify at least one occurrence of a preventive maintenance operation that was carried out on the source code.
    Type: Application
    Filed: February 15, 2011
    Publication date: April 19, 2012
    Applicant: INFOSYS TECHNOLOGIES LTD.
    Inventor: Girish Maskeri Rama
  • Publication number: 20120089726
    Abstract: Automated service level management of applications can include automated deployment, monitoring, forecasting, and/or predicting based on a plurality of service levels comprising application level, application server platform level, virtual machine level, and/or infrastructure level, and optimizations at multiple levels using a plurality of techniques including automated dynamic application migration. Automated deployment of applications in a cloud computing environment using deployment descriptors comprises receiving values for service level parameters for an application, creating a deployment descriptor based on the parameters, identifying application servers that satisfy the deployment descriptors, and deploying the application to the identified application servers.
    Type: Application
    Filed: November 19, 2010
    Publication date: April 12, 2012
    Applicant: Infosys Technologies Ltd.
    Inventor: Shyam Kumar Doddavula
  • Publication number: 20120077461
    Abstract: A method of preauthenticating a mobile node in advance of a switch from a current point of attachment (CPoA) to a next point of attachment (NPoA) is disclosed. One or more preauthentication requests are received at the CPoA. The one or more preauthentication requests include a proxy assignment from the mobile node. Each of the one or more preauthentication requests corresponds to one of one or more possible points of attachment (PPoAs). Using the CPoA, the mobile node is preauthenticated with the one or more PPoAs using a transitivity of trust between the mobile node, the CPoA, and one or more authentication servers.
    Type: Application
    Filed: February 9, 2011
    Publication date: March 29, 2012
    Applicant: INFOSYS TECHNOLOGIES LTD.
    Inventors: Amitabha Das, Sanjoy Paul
  • Patent number: 8122365
    Abstract: A method, system, and computer program product for dynamic creation and customization of a user interface in a web service environment, including dynamically generating and customizing a portlet; providing policy based access to the portlet depending on a consumer of the portlet; providing caching or cache refreshing of a feed to the portlet; and providing authentication of a consumer of the portlet.
    Type: Grant
    Filed: February 23, 2007
    Date of Patent: February 21, 2012
    Assignee: Infosys Technologies, Ltd.
    Inventors: Srinivas Padmanabhuni, Krishnendu Kunti, Anshuk Chinmoy Pal Chaudhuri, Shaurabh Bharti
  • Patent number: 8117606
    Abstract: A system and method for assessing performance of a software application migrated to a grid infrastructure is provided. The system comprises a grid code analyzer for generating a directed acyclic graph (DAG) corresponding to the software application by performing static and dynamic analysis; a grid task generator for reducing the DAG generated by the grid code analyzer; and a grid simulator for simulating performance of the software application on one or more predetermined grid infrastructures. The grid simulator accepts the reduced DAG as input and produces performance data as output.
    Type: Grant
    Filed: June 4, 2007
    Date of Patent: February 14, 2012
    Assignee: Infosys Technologies Ltd.
    Inventors: Anirban Chakrabarti, Shubhashis Sengupta, Anish Damodaran
  • Patent number: 8104078
    Abstract: A method, system, and computer program product for preventing network service attacks, including processing a message to validate the message for message version and syntax via a security firewall; canonicalizing the message and extracting a message header and body via a converter; converting the body into a Patricia Trie via the converter; and validating the header and the converted body for security via a comparator.
    Type: Grant
    Filed: February 23, 2007
    Date of Patent: January 24, 2012
    Assignee: Infosys Technologies, Ltd.
    Inventors: Srinivas Padmanabhuni, Abhishek Malay Chatterjee, Vineet Singh, Senthil Kumar Kumarasamy Mani
  • Patent number: 8027684
    Abstract: A system, method, and computer program product for executing a task via a communication network, including devices configured to establish the communication network, wherein each of the devices includes a database having a capability of the devices, wherein the devices are adapted for executing a pre-defined set of activities indicative of the task. The device further includes a resource module adapted to select an optimal capability among the devices for performing the task based on the capability of the devices and a decision module adapted to allocate the task among the devices based on the selection of the optimal capability among the devices. The device further includes an execution module adapted to perform the task in any of the devices based on the allocation of the optimal capability among the devices and wherein the application resource is exchanged among the devices prior to invoking the task.
    Type: Grant
    Filed: August 16, 2006
    Date of Patent: September 27, 2011
    Assignee: Infosys Technologies, Ltd.
    Inventors: Puneet Gupta, Kartik Muralidharan, Zaryab Khan
  • Patent number: 8001080
    Abstract: Real-time execution of transactions can be managed between network devices. A method for managing real-time execution of transactions can comprise receiving one or more transactions, storing details associated with the one or more transactions, and synchronizing the details from a first network device to a second network device. Synchronizing details can comprise checking network connectivity between devices. Synchronization middleware can comprise a command engine, a synchronization engine, and a request-response engine. Synchronization middleware can be configured to process transactions, comprising checking network connectivity and determining whether transactions have expired.
    Type: Grant
    Filed: September 12, 2007
    Date of Patent: August 16, 2011
    Assignee: Infosys Technologies Ltd.
    Inventors: Puneet Gupta, Zalak Jitendra Dedhia, Kavitha Damodhiran, Rajat Laxmichand Gogri
  • Patent number: 7958540
    Abstract: The present invention provides a method, system and computer program product for registering and authenticating a user using a processor card with the server. The method enables the user to create his login details. Further, the method enables the authentication of the user over a public network. The method also enables the user to change the login details without accessing the server.
    Type: Grant
    Filed: December 10, 2007
    Date of Patent: June 7, 2011
    Assignee: Infosys Technologies Ltd.
    Inventor: Ashutosh Saxena
  • Patent number: 7940181
    Abstract: Product availability can be determined using radio frequency identification (RFID) by determining whether a RFID tag is detectable by a RFID reader and setting a product availability condition, where the RFID tag is not attached to the product, and where distance between the RFID tag and the RFID reader changes as quantity of the product changes. A system for determining availability of products using RFID can comprise a product display unit, a RFID reader, a RFID tag associated with the product display unit, and a computing device configured to set product availability conditions. In the system, distance between the RFID tag and the RFID reader changes as quantity of the product changes.
    Type: Grant
    Filed: January 31, 2008
    Date of Patent: May 10, 2011
    Assignee: Infosys Technologies Ltd.
    Inventor: Girish A. Ramachandra
  • Patent number: 7925594
    Abstract: A method for developing a process roadmap for a business system is disclosed. The method includes identifying a business process and determining business goals and key process metrics for the business process. The method further includes measuring process maturity levels of the business process and identifying business process improvement initiatives based on the process maturity levels. Furthermore, the method includes linking the business process to at least one of the business goals and key process metrics, the process maturity levels, and the business process improvement initiatives for developing the process roadmap for the business system.
    Type: Grant
    Filed: July 19, 2005
    Date of Patent: April 12, 2011
    Assignee: Infosys Technologies Ltd.
    Inventors: Prasad Jaligama, Sangeeta Das, Raghupathi Narayanarao Cavale
  • Patent number: 7917770
    Abstract: A data masking tool can support a wide variety of data sources and execution mechanisms. For example, any of a wide variety of data masking techniques can be achieved via a web interface, API, command line, SOA, or the like. Connectivity to mainframe environments can be achieved. Multiple data source types and data to and from different technology platform types can be supported. The tool can support interfacing with a metadata management tool. High quality randomness can be provided by a Mersenne Twister random number generator. The tool can be useful for performing data masking during software testing without having to write data masking code.
    Type: Grant
    Filed: October 9, 2007
    Date of Patent: March 29, 2011
    Assignee: Infosys Technologies Ltd.
    Inventors: Ashok Gopinath, Kolluru Venkata Surya Narayana Sastry, Rajiv Sethumadhavan, Sujith Kizhakkel