Abstract: A method for watermarking of video content is provided. An averaged scene image is computed for each scene of video content by performing averaging of frames present in each scene of video content. For each averaged scene image a set of random numbers are generated using a secret key to identify pixels at random locations of the averaged scene image. The secret key is associated with a watermark pattern corresponding to each averaged scene image. The identified pixels in each averaged scene image are mapped to each pixel of corresponding watermark pattern to obtain respective mapped pixels. Using respective mapped pixels, values of verification information are fetched and assigned using predetermined rules. The values of verification information are arranged to obtain first visual cryptographic share of watermark pattern for each averaged scene image.
February 15, 2011
Date of Patent:
February 19, 2013
Infosys Technologies Limited
Aditya Vashistha, Rajarathnam Nallusamy, Sanjoy Paul
Abstract: A computer-implemented method for facilitating interoperation between communication devices of different networks following different protocols is provided. The computer-implemented method enables creating a virtual device. The virtual device is a software representation of a first communication device in a first network. The computer-implemented method further comprises linking a synchronization module within the virtual device to the first communication device. The synchronization module receives data related to one or more attributes of the first communication device. The computer-implemented method comprises linking at least one mapping module within the virtual device to a second communication device. The mapping module facilitates conversion of the received data and transmission of the converted data to the second communication device for facilitating interoperation therebetween.
September 15, 2011
January 3, 2013
INFOSYS TECHNOLOGIES LIMITED
Lakshya Malhotra, Kumar Padmanabh, Sanjoy Paul
Abstract: The present invention provides a method, system and computer program product for automatically generating message queue scripts for defining one or more Websphere® Message Queue™ (WMQ) objects on one or more queue managers. A user provides parameters corresponding to the WMQ objects as input in an input parameter file. The parameters include the name of the WMQ objects and the queue managers. Further, a message queue environment consistency check is performed on the input parameter file for validating the parameters provided. The validation is performed by using a database that stores information about the message queue environment. After successful validation of the input parameter file, one or more message queue scripts are generated for defining the WMQ objects on the queue managers. Fallback scripts may also be generated for rolling back the modifications performed on the queue managers, if required at a later stage.
Abstract: An approach to determine the service demand of various resources of any individual server (present in a cluster of servers), given the overall transaction throughput and utilization values of these resources, in case of a network load balanced scenario is disclosed. The method proposes a quantitative approach to calculate the transaction throughput of each network load balanced server from the overall transaction throughput, obtained from any commercial performance testing tool. The individual transaction throughputs are calculated using monitored values of network related performance counters of each server and the load balancer obtained from performance testing. Service demands of the resource can be computed using the Utilization law of Queuing Theory once the throughput of that server and utilization of that resource is obtained.
Abstract: A method for delivering location based information in wireless zone is disclosed. All the location based information is stored in the access point itself thus eliminating the need for backend server. Access point has the intelligence to deliver information in customized to each requesting device's display capability. To provide seamless access to local information the user will get a default web page once the device connects to access point and tries to access internet. This web page will act as a gateway to all the location based information available in the access point. Along with location based information advertisements can also be delivered to the end user in a very cost effective and targeted manner.
March 31, 2009
Date of Patent:
December 11, 2012
Infosys Technologies Limited
Karthikeyan Balaji Dhanapal, Puneet Gupta, Karthik G. V
Abstract: A method for dynamic management of one or more cloud database nodes is provided. The method enables gathering information related to usage of one or more cloud database nodes. The method further enables comparing time required by the one or more cloud database nodes for responding to one or more requests with a predetermined threshold. Furthermore, the method enables provisioning one or more new cloud database nodes or removing one or more new cloud database nodes based on at least one of: the gathered information, the comparison and a combination thereof.
Abstract: The disclosed embodiment relates to methods, systems, and computer readable code for establishing transshipment of a product between stocking locations. The exemplary method comprises the steps of transmitting a transshipment request to at least one supplier requesting transshipment of a product, the transshipment request including information regarding the product and specifying a reward for transshipment of the product, receiving a handshake request from one of the suppliers in response to the transshipment request, the handshake request indicating the willingness of the one of the suppliers to provide the product as specified in the transshipment request and including information regarding the transshipment; and accepting the handshake request, thereby initiating transshipment of the product from the one of the suppliers in accordance with the accepted handshake request.
Abstract: A method and a system for determining a skill matrix of an employee is provided. The method comprises analyzing the employee's folksonomic behavior and consequently creating the skill matrix of the employee. Folksonomy comprises creating one or more tags to annotate and categorize web content. The system includes a Tag Cloud Management Module, a Tag Cluster Generator Module and a Skill Matrix Generator Module. The Tag Cloud Management Module is configured to generate a tag cloud, wherein the tag cloud includes one or more tags created by the employee while browsing content of interest. The Tag Cluster Generator Module is configured to create one or more groups/clusters of one or more tags included in the tag cloud, based on one or more technologies related to the one or more tags. The Skill Matrix Generator Module is configured to analyze the created one or more clusters of tags to determine the skill matrix of the employee.
Abstract: A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.
Abstract: A system for data exchange in multiprocessor computer system is disclosed. The system includes at least one processing module adapted to communicate with at least one of a plurality of routing modules or a plurality of buffer modules or both and at least one communicating interfaces to facilitate data exchange in multiprocessor computer system.
June 9, 2011
Date of Patent:
November 6, 2012
Infosys Technologies Limited
Guruprasad Ramananda Athani, A. r. Philip, C. b. Shashi
Abstract: A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed. The method and system includes sending request by at least one user to access at least one application server. The user is provisioned to download a appropriate CMSC and a mapper into the user equipment from the application server. The method and system further comprises user sending request via an IMS network to download a data to the user equipment. The data is encrypted in the application server and is downloaded into the user equipment. The mapper identifies the appropriate CMSC, which may decrypt the data. Further, the data undergoes double decryption in real time within the user equipment before being presented in user interface. The double decryption is provisioned using the valid CMSC downloaded in the user equipment.
Abstract: System and computer-implemented method for determining optimal combinations of elements having multiple dimensions, including determining the optimal number of destination servers for server consolidation, wherein existing servers are evaluated across multiple dimensions.
Abstract: Embodiments of the disclosure relate to a method and system for establishing sorting order for events from a plurality of systems. Central Unique Identity Service (CUIS) provides a unique ID to a client for an event. The client is a service provider registered with the CUIS. User is a subscriber of the client. The User initiates an event with the client using his computing or communication device. The client requests for a unique ID for the initiated event with the CUIS through a network, before the event is performed or executed. The CUIS records the unique ID along with predefined attributes of the client application, the application identifier for the event, application network identity, application user and the user's device associated with the event in the CUIS unit. The CUIS thus establishes a sorting order for the unique ID's recorded and thereby for the events across all clients.
Abstract: The disclosed embodiment relates to identifying telecom users. An exemplary method comprises collecting, with a computing device, call usage data based on the call usage of a new telecom user, comparing, with a computing device, the collected call usage data with existing call usage data stored within a call usage database to determine if the collected call usage data for the new telecom user corresponds with the existing call usage data for an existing telecom user, assigning the new telecom user a user identifier corresponding to the existing telecom user if it is determined that the collected call usage data for the new telecom user corresponds with the existing call usage data for an existing telecom user, and assigning the new telecom user a new user identifier if it is determined that the collected call usage data for the new telecom user does not correspond with the existing call usage data for an existing telecom user.
Abstract: Systems and computer-implemented methods for managing a workforce include receiving a request for support including a location of the request for support, converting the request for support into a work ticket, classifying the work ticket, allocating the work ticket to a field operative out of a set of at least one field operatives, transmitting a request for a map including data from the work ticket, receiving a map image including data relating to the work ticket, and transmitting the map image including data relating to the work ticket to the field operative.
Abstract: A gateway which provides network connectivity via network service providers. A method and apparatus can integrate the various connectivity options provided by multiple service providers and present to the user a single point of connectivity. Having more than one way of network connectivity may provide the following additional services: Link Aggregation (to increase bandwidth), Redundancy and ancillary services like TOD (time-of-day) based smart usage (to reduce costs). The access medium may be wired technologies like Cable, DSL, Fiber to wireless 4G technologies. These options may offer various link speeds, latency, reliability and cost structures. The embodiments integrate the various connectivity options provided by multiple service providers and present to the user a single point of connectivity.
Abstract: The embodiments herein provide a method and system for determining availability of a software application using Composite Hidden Markov Model (CHMM). The software application is divided into plurality of layers which are further divided into sub-components. The configurations and dependencies of the sub-components are identified and also the state of the sub-components is determined. The state of the sub-components is represented in CHMM using state space diagram. The failure rate and recovery time of the sub-components is computed using the state space diagram and the respective transition tables are derived from the CHMM to determine the availability of the layers. The availability of the layers is combined to determine the availability of the software application.
Abstract: Systems and methods for managing underground assets are disclosed. One or more computing devices may be used to receive a request for clearance to excavate including a location identifier, resolve a location based on the location identifier, and retrieve asset data corresponding to the location from an asset location database. The asset location database can include location data regarding the positions of a plurality of assets associated with a plurality of different asset owners and may be maintained by one or more updates regarding the positions of assets from computing devices associated with the different asset owners. The systems and methods can include determining if one or more assets are buried proximate the location based on the retrieved data and transmitting data related to the determination of assets buried proximate the location.
Abstract: A framework for centrally controlling a plurality of building automation systems. The architecture and method automates a plurality of existing and new building automation systems comprising access control, HVAC, fire safety etc. in such a way that the plurality of building automation systems can be monitored and controlled from a central dashboard. The central dashboard effectively monitors, takes right decisions and remotely controls the buildings across the globe from a centralized location.
Abstract: Systems, methods, and computer-readable media for anonymizing data include: intercepting a communication; identifying sensitive data in the communication; transmitting the sensitive data to an anonymization engine; receiving masked data from the anonymization engine; and transmitting the masked data.