Patents Assigned to Infosys Technologies
  • Patent number: 8336057
    Abstract: The present invention provides a method, system and computer program product for automatically generating message queue scripts for defining one or more Websphere® Message Queue™ (WMQ) objects on one or more queue managers. A user provides parameters corresponding to the WMQ objects as input in an input parameter file. The parameters include the name of the WMQ objects and the queue managers. Further, a message queue environment consistency check is performed on the input parameter file for validating the parameters provided. The validation is performed by using a database that stores information about the message queue environment. After successful validation of the input parameter file, one or more message queue scripts are generated for defining the WMQ objects on the queue managers. Fallback scripts may also be generated for rolling back the modifications performed on the queue managers, if required at a later stage.
    Type: Grant
    Filed: September 28, 2009
    Date of Patent: December 18, 2012
    Assignee: Infosys Technologies Limited
    Inventor: Kiran Ramchandra Shirgaonkar
  • Patent number: 8332507
    Abstract: An approach to determine the service demand of various resources of any individual server (present in a cluster of servers), given the overall transaction throughput and utilization values of these resources, in case of a network load balanced scenario is disclosed. The method proposes a quantitative approach to calculate the transaction throughput of each network load balanced server from the overall transaction throughput, obtained from any commercial performance testing tool. The individual transaction throughputs are calculated using monitored values of network related performance counters of each server and the load balancer obtained from performance testing. Service demands of the resource can be computed using the Utilization law of Queuing Theory once the throughput of that server and utilization of that resource is obtained.
    Type: Grant
    Filed: January 21, 2009
    Date of Patent: December 11, 2012
    Assignee: Infosys Technologies Limited
    Inventors: Sachin Ashok Wagh, Vikas Gupta
  • Patent number: 8331288
    Abstract: A method for delivering location based information in wireless zone is disclosed. All the location based information is stored in the access point itself thus eliminating the need for backend server. Access point has the intelligence to deliver information in customized to each requesting device's display capability. To provide seamless access to local information the user will get a default web page once the device connects to access point and tries to access internet. This web page will act as a gateway to all the location based information available in the access point. Along with location based information advertisements can also be delivered to the end user in a very cost effective and targeted manner.
    Type: Grant
    Filed: March 31, 2009
    Date of Patent: December 11, 2012
    Assignee: Infosys Technologies Limited
    Inventors: Karthikeyan Balaji Dhanapal, Puneet Gupta, Karthik G. V
  • Patent number: 8307117
    Abstract: A system for data exchange in multiprocessor computer system is disclosed. The system includes at least one processing module adapted to communicate with at least one of a plurality of routing modules or a plurality of buffer modules or both and at least one communicating interfaces to facilitate data exchange in multiprocessor computer system.
    Type: Grant
    Filed: June 9, 2011
    Date of Patent: November 6, 2012
    Assignee: Infosys Technologies Limited
    Inventors: Guruprasad Ramananda Athani, A. r. Philip, C. b. Shashi
  • Patent number: 8306932
    Abstract: A method for adaptive data masking of a database is provided. The method comprises extracting data from a first database and providing one or more predefined rules for masking the extracted data. The method further comprises masking a first portion of extracted data using a trained Artificial Neural Network (ANN), where the ANN is trained for masking at least one database having properties similar to the first database. The masked and unmasked data is aggregated to arrive at an output structurally similar to the extracted data. The method furthermore comprises determining a deviation value between the arrived output and expected output of the extracted data, and adapting the trained ANN automatically according to data masking requirements of the first database, if the deviation value is more than a predefined value.
    Type: Grant
    Filed: April 8, 2009
    Date of Patent: November 6, 2012
    Assignee: Infosys Technologies Limited
    Inventors: Ashutosh Saxena, Vishal Anjaiah Gujjary, Kumar Surni
  • Patent number: 8301570
    Abstract: A method and system to enhance the protection of the data in an user equipment and secure real time streaming of the data in the user equipment is disclosed. The method and system includes sending request by at least one user to access at least one application server. The user is provisioned to download a appropriate CMSC and a mapper into the user equipment from the application server. The method and system further comprises user sending request via an IMS network to download a data to the user equipment. The data is encrypted in the application server and is downloaded into the user equipment. The mapper identifies the appropriate CMSC, which may decrypt the data. Further, the data undergoes double decryption in real time within the user equipment before being presented in user interface. The double decryption is provisioned using the valid CMSC downloaded in the user equipment.
    Type: Grant
    Filed: October 27, 2008
    Date of Patent: October 30, 2012
    Assignee: Infosys Technologies Limited
    Inventors: Jithesh Sathyan, Naveen Krishnan Unni
  • Publication number: 20120260134
    Abstract: The embodiments herein provide a method and system for determining availability of a software application using Composite Hidden Markov Model (CHMM). The software application is divided into plurality of layers which are further divided into sub-components. The configurations and dependencies of the sub-components are identified and also the state of the sub-components is determined. The state of the sub-components is represented in CHMM using state space diagram. The failure rate and recovery time of the sub-components is computed using the state space diagram and the respective transition tables are derived from the CHMM to determine the availability of the layers. The availability of the layers is combined to determine the availability of the software application.
    Type: Application
    Filed: December 19, 2011
    Publication date: October 11, 2012
    Applicant: Infosys Technologies Limited
    Inventors: Shyam Kumar Doddavula, Mudit Kaushik
  • Publication number: 20120260089
    Abstract: A secure messaging channel is necessary especially when the message involves confidential transactions, for example a bank transaction which involves funds transfer and other additional information. The present disclosure describes securing message. The method of securing a message comprises providing a personal identification number by the user, wherein the personal identification number is associated to a unique number of a user. The unique number can be a mobile number. The correct personal identification number invokes the one-time password generator. The one time password generator accesses a metadata which comprises a value stored. The value stored in the metadata is retrieved to generate a dynamic key. The dynamic key is converted to a symmetric encryption key to encrypt the data. The dynamic key can also be converted to a symmetric decryption key to decrypt the data.
    Type: Application
    Filed: January 9, 2012
    Publication date: October 11, 2012
    Applicant: Infosys Technologies, Ltd.
    Inventors: Puneet Gupta, Venkat Kumar Sivaramamurthy, Akshay Darbari, Sudhakar Vusirika
  • Publication number: 20120260230
    Abstract: Methods, apparatus, and computer-readable media for analyzing the prospective quality of source code produced according to a class representation (e.g., a UML class diagram) are disclosed. According to one embodiment, a class-level representation of a software application is received, one or more object classes of the class-level representation are selected, and a number of quality metrics are calculated for the selected object classes. The quality metrics can be output as a report or used to modify object classes of the class representation to improve the prospective quality of source code produced according to the class representation.
    Type: Application
    Filed: May 24, 2011
    Publication date: October 11, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Naresh Balaram Choudhary, Mursheid Khan
  • Publication number: 20120260201
    Abstract: Tools and techniques are provided that capture, aggregate, analyze and display soft data relating to an enterprise's services and products, and to the enterprise itself. The soft data comprises customer feedback on services, products and the enterprise, and are based on interactions between enterprise employers and the customers. The soft data comprises quantitative ratings and qualitative comments and is entered by employees at a capture engine. The captured soft data is aggregated and analyzed by an analytics engine, thereby generating aggregate data for use in generating data clouds at a display. Data clouds comprise service, product and enterprise attributes that are weighted according to quantitative rankings and qualitative comments relating to the attributes. Enterprise employees having decision-making authority can request data clouds for display, which can aid the decision makers in making decisions relating to enterprise services and products, and to the enterprise itself.
    Type: Application
    Filed: May 19, 2011
    Publication date: October 11, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Jai Ganesh, Shaurabh Bharti
  • Publication number: 20120260019
    Abstract: A multi-layer architecture is provided for elastic provisioning of virtualized computing resources. The multi-layer architecture comprises a physical hardware layer comprising a plurality of physical computing machines, a distributed operating system layer that aggregates and virtualizes the computing resources, and a virtual machine layer that comprises virtual machines provisioned, by the distributed operating system layer, with virtualized computing resources. Elastic provisioning of virtualized computing resources comprising receiving computing resource information of a plurality of physical computing machines, producing virtualized computing resources by aggregating the received computing resource information of the plurality of physical computing machines, and provisioning the virtualized computing resources among a plurality of virtual machines.
    Type: Application
    Filed: May 20, 2011
    Publication date: October 11, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Ganesan Malaiyandisamy, Rajarshi Bhose, Sudeep Mallick
  • Publication number: 20120260228
    Abstract: Composite applications can be created that utilize a plurality of different services across a plurality of different cloud stack layers. The composite applications are defined using the Service Component Architecture (SCA) model. Composite applications can be translated from the SCA model into a format compatible for a virtualization platform, such as the Open Virtualization Format (OVF). Composite applications, as defined in the format compatible for the virtualization platform, can be deployed on the virtualization platform.
    Type: Application
    Filed: May 20, 2011
    Publication date: October 11, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Sudeep Mallick, Rajarshi Bhose, Ganesan Malaiyandisamy
  • Publication number: 20120254143
    Abstract: A natural language query tool comprising cascaded conditional random fields (CRFs) (e.g., a linear-chain CRF and a skip-chain CRF applied sequentially) processes natural language input to produce output that can be used in database searches. For example, cascaded CRFs extract entities from natural language input that correspond to column names or column values in a database, and identify relationships between the extracted entities. A search engine can execute queries based on output from the cascaded CRFs over an inverted index of a database, which can be based on one or more materialized views of the database. Results can be sorted (e.g., according to relevance scores) and presented in a user interface.
    Type: Application
    Filed: May 26, 2011
    Publication date: October 4, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Kishore Indukuri Varma, Srikumar Krishnamoorthy, Radha Krishna Pisipati
  • Publication number: 20120254665
    Abstract: A system and method for generating functional tests to verify code migrated from a first host to a second host. In one embodiment, source code is analyzed in order to generate functional tests that can be used for testing the re-hosted application. In particular, user-input scenarios are extracted from the source code and system output responses are determined based on the user-input scenarios. Functional tests can then be generated using the extracted user-input scenarios and output responses to ensure that the re-hosted application responds in a like manner.
    Type: Application
    Filed: May 19, 2011
    Publication date: October 4, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Anjaneyulu Pasala, Sharal Nisha D'Souza, Amar Lakshmi Gejje
  • Publication number: 20120254835
    Abstract: Techniques and tools are described for searching source code. For example, source code can be indexed, a code structure query can be received, index records that conform to the code structure query can be identified, and code structure query results that correspond to the identified index records conforming to the code structure query can be sent. Also for example, a code structure query can be sent, a list of code structure query results corresponding to index records that conform to the code structure query can be received, at least one of the code structure query results can be selected, based on the selection, a formatted source-code file and a code hierarchy can be received, a code annotation associated with the formatted source-code file can be sent, and an annotation result corresponding to the formatted source-code file can be received.
    Type: Application
    Filed: May 19, 2011
    Publication date: October 4, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Basava Raju Muddu, Allahbaksh Mohammedali Asadullah, Jeena Vinod, Krishna Kumar Pooloth
  • Publication number: 20120254162
    Abstract: Techniques and tools are described for refining source-code query results. For example, source-code query results for a query can be generated, semantic clusters of the source-code query results can be generated, and based on a selection of a semantic cluster option, refined source-code query results can be sent. Also, for example, source-code query results can be received, selections of facet values associated with groups of the source-code query results can be sent, and based on selected facet values, a subset of the source-code query results can be received.
    Type: Application
    Filed: May 19, 2011
    Publication date: October 4, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Allahbaksh Mohammedali Asadullah, Susan George, Basava Raju Muddu
  • Publication number: 20120254041
    Abstract: Various technologies related to one-time credit card numbers are presented. One-time credit card numbers can originate from a customer device and be independently generated by the customer device without online communication with an issuer. Signed transaction details can also be sent, providing non-repudiation of the purchase transaction. Merchant infrastructure need not be changed to accommodate the one-time credit card numbers. The technologies can be particularly resilient to replay, forgery, man-in-the-middle, and guessing attacks for credit card number generation or other usage by an attacker.
    Type: Application
    Filed: May 17, 2011
    Publication date: October 4, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Ashutosh Saxena, Harigopal K.B. Ponnapalli
  • Publication number: 20120250106
    Abstract: The instant disclosure is related to updating an application on a mobile device without using mobile network bandwidth. The mobile device initiates the application to be updated on the mobile device to scan an encoded image of a predetermined pattern from a source. It is followed by decoding of the scanned image to extract information required to update the application. And then, updating the application on the mobile device based on the extracted information.
    Type: Application
    Filed: March 30, 2011
    Publication date: October 4, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Subbakrishna Ramsesh Kiran Kannambadi, Nazia Merchant
  • Publication number: 20120254826
    Abstract: Tools and techniques are described for estimating web accessibility and remediation efforts. One or more web accessibility standards can be indicated to be included in the effort estimate. A user can indicate which individual guidelines are to be included in standard test effort estimates by selecting individual guidelines, sub-guidelines or priority or success criteria levels. Standard test effort estimates are calculated based on test factors associated with the indicated individual guidelines or sub-guidelines. A total test effort estimate is calculated based on the standard test effort estimates and one or more web page counts, and a web accessibility and remediation effort estimate is calculated based on the total test effort estimate. A framework implementing the effort estimation methods can comprise multiple spreadsheets for use within a spreadsheet application running on a computing device.
    Type: Application
    Filed: May 17, 2011
    Publication date: October 4, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Jai Ganesh, Shrirang Prakash Sahasrabudhe, Neha Ranjeet Ghorpade
  • Publication number: 20120246610
    Abstract: An online integrated development environment (IDE) providing code assist is described. A method for providing code assist within the online IDE comprises receiving a request from a client device to access a software development project, storing code assist information related to the software development project, and sending code assist information to the client device. The client device stores the received code assist information and uses it for local code assist operations at the client device. The client device can receive a subset of a database of code assist information stored at a server environment providing the online IDE. The client device accesses the online IDE via a web browser.
    Type: Application
    Filed: March 23, 2011
    Publication date: September 27, 2012
    Applicant: Infosys Technologies Ltd.
    Inventors: Allahbaksh Mohammedali Asadullah, Susan George, Basava Raju Muddu