Abstract:
An embodiment for securely accessing services of a service provider based on single sign on. The user device is authenticated by an authentication server if the computed hash of the first random number r is same as the received hash of the first random number r sent by a user device. Thereafter, the second random number y, the user id and an element Q are encrypted using a service provider password and send to the service provider. The user device computes a first discrete exponential function Z using the element Q and the second random number y and sends along with the user id to the service provider. The service provider computes a second discrete exponential function Z′ using the element Q and the second random number y received from the authentication server and provides the user device access to the services if Z is equal to Z′.
Abstract:
A system, medium and method of managing, via a gateway device, to wirelessly communicate with a plurality of network appliances in a closed local area network is disclosed. A data message is received from a first network appliance configured to communicate data in association with a first application profile. The first application profile is retrieved from a locally stored application profile database upon being identified. A database is accessed at the gateway device containing policy information of the first network appliance and evaluated for one or more policy parameters. A first instruction command is generated at the gateway device based on the accessed policy information, wherein the instruction command conforms with the first application profile to instruct the first network appliance to perform a specified action. The instruction command is wirelessly transmitted from the gateway device to the first network appliance to cause it to perform a specified action.
Abstract:
Embodiments of the present invention relate to an inventory management method and system. The present invention addresses the foregoing need of an inventory management system through which all size and shape of components can tracked before and after an assembly process in a manufacturing facility. The invention address the challenges faced by store keeping clerks in locating the position of excess components returned from assembly floor, which are taken in excess but not being utilized during assembly process. Since basic spare parts which are smaller in size but taken in large quantity from store room due to their frequent usage, excess components needs to be kept back in store keeping units for effective inventory management.
Abstract:
The present invention provides a method and a system for providing at least one communications service to one or more service providers by a communications service provider. Communications capabilities of the communications service provider are sliced into a plurality of virtual slices and each of the plurality of virtual slices is configured for a different service provider from among the one or more service providers. At least one communications service is provided to each of the one or more service providers through a respective configured virtual slice by the communications service provider. Each of the one or more service providers further provides the communications service to a user through the respective configured virtual slice in collaboration with the communications service provider.
Abstract:
The present disclosure discloses a method, a system and a computer program product for secure data communication between a user device and a server. User credentials, a device id and a first hash are received at server from a user device. The first hash is generated using the user credentials. At server, a second hash is computed using the user credentials stored in the database of the server. The first hash is verified with the second hash. Once verified, an encryption key and a sequence number corresponding to the user credentials and device id are generated. The encryption key and the sequence number are encrypted using a pre-defined key and one or more user credentials. The encrypted encryption key and the sequence number are sent to the user device to encrypt data.
Abstract:
The present disclosure includes, in a heterogeneous system, receiving a desired speedup of an application as input and performing a static analysis and a dynamic analysis of the application. The dynamic analysis of the application comprises, identifying a set of parameters including, an end-to-end execution time of the application, an execution time of data parallel loops in the application, an execution time of non-data parallel loops in the application, and an amount of physical memory used by each data structure in each data parallel loop. Dynamic analysis also includes calculating and providing the feasibility of achieving the desired speedup of the application based on the identified set of parameters, and satisfaction of each of, an initialization invariant, a data-parallel invariant and a data transfer invariant.
Abstract:
A method and system provisions a plurality of resources of a data center. A violation risk factor for a set of low priority requests can be computed. A utilization factor of a set of activated resources of the data center shall be evaluated. According to a predefined rule base, one or more of the plurality of resources, shall be provisioned for a received high priority request, whereby the predefined rule base defines performing one or more of; a) preempting a set of virtual machines utilizing a subset of the set of activated resources, whereby the set of virtual machines is associated with the set of low priority requests; b) activating a new set of resources; and c) consolidating a plurality of virtual machines, based on the computed violation risk factor and the evaluated utilization factor.
Abstract:
A method, non-transitory computer readable medium, and apparatus that obtains a request message in a hierarchical format. A set of flat request records is generated based on the request message wherein each flat request record includes at least a key and a value. Each flat request record is compared to a set of criteria records to generate one or more response sets wherein each criteria record includes at least a key, a value, and a response identifier and each response set includes one or more response identifiers. One or more rules are applied to the one or more response sets to identify one or more response identifiers. One or more responses corresponding to the one or more identified response identifiers are optionally assembled and form at least part of an output.
Abstract:
A method, non-transitory computer readable medium, and anomaly detection computing apparatus that detects one or more of a plurality of symptoms associated with a device when the device is operating in a fault mode. One or more of a plurality of components of the device that are potentially faulty are identified based on the detected symptoms. One or more tests are performed on each of the one or more of the components to confirm that at least a subset of the one or more of the components is faulty. An optimal remedy pattern is determined for the subset of the one or more of the components based at least in part on historical data and cost data obtained from a database, and the optimal remedy pattern is output.
Abstract:
The present invention describes a method of dynamic gamification over a network and comprises of the steps of creating a network of statistical models associated with a real life situation by using a processor, modifying a predefined parameter of a first statistical model by either a player or a moderator which triggers a modification subsequently in the other statistical models related to the first statistical model and deciding an outcome of the gamification in response to the modification of the first and the other statistical models