TATA CONSULTANCY SERVICES LTD.
|TATA CONSULTANCY SERVICES LTD. Patent applications|
|Patent application number||Title||Published|
|20160112381||Computer Implemented System and Method for Secure Session Establishment and Encrypted Exchange of Data - A system(s) and method(s) for secure session establishment and secure encrypted exchange of data is disclosed. The system satisfies authentication requirement of general networking/communication systems. It provides an easy integration with systems already using schemes like DTLS-PSK. The system follows a cross layer approach in which session establishment is performed in a lightweight higher layer like the application layer. The system then passes resultant parameters of such session establishment including the session keys to a lower layer. The lower layer like the transport layer is then used by the system to perform channel encryption to allow exchange of encrypted data based on a cross layer approach, over a secure session. As the exchange of data becomes the responsibility of the lower layer like the transport layer, the data is protected from replay attacks since the transport layer record encryption mechanism provides that kind of protection.||04-21-2016|
|20160078217||Computer Implemented Systems and Methods for Generating and Recovering an Authorization Code - A computer implemented system and method for generating and recovering an authorization code. The system creates an authorization code by accepting a base-sentence from a user. Based on the characters present in this base-sentence, the system computes a base-sentence matrix. The system also generates a plurality of patterns. The user can either select the pattern from the multiple patterns suggested by the system or can create his/her own pattern. The system then performs multiplications between the base-sentence matrix and the selected pattern matrix at different stages in the path forward, for obtaining a strong authorization code. In case the user forgets the base sentence, the system also has provisions to manage forgotten authorization code. This is done by fragmenting the base-sentence into different matrices and storing the fragmented matrices into a repository after computing matrix multiplication with a security question answer and with a secret key provided by the user.||03-17-2016|
|20160049153||Computer Implemented System for Audio Watermarking - A computer implemented system for audio watermarking for providing robust and blind audio watermarking. The system comprises a watermark embedding system wherein an audio signal is divided into audio frames, multi-level District Wavelet Transform (DWT) is applied on each frame, followed by Singular Value Decomposition (SVD) and embedding the watermark, further followed by inverse SVD and inverse DWT to get watermarked audio frames which are combined to generate a watermarked audio signal. The system further comprises watermark extracting detection system wherein the watermarked audio signal which may be attacked and/or modified is divided into watermarked audio frames, multilevel DWT is applied on each watermarked audio frame, followed by SVD, extracting the embedded watermarked, correlating the extracted watermark with pre-stored watermarks, calculating Peak to Sidelobe ratio (PSR) from the correlation coefficient arrays and finally comparing each PSR with a threshold to authenticate the embedded watermark.||02-18-2016|
|20150370819||Computer Implemented System and Method for Comparing At Least Two Visual Programming Language Files - A computer implemented system for comparing at least two visual programming language files, the system comprising an intransient repository, a user interface, an authentication module, a menu driven selector module, an extractor module, a transient repository, a processor and a report generation module. A computer implemented method for comparing at least two visual programming language files, the method comprising the steps of verifying login credentials of a user, identifying a file type, identifying a file format, identifying file path to the files stored in an intransient repository, extracting files from the intransient repository, creating a copy each of the files in a transient repository, carrying out iterations of node-wise comparison between the files using a DOM parser and generating a report in a chosen file format.||12-24-2015|
|20150301921||Computer Implemented System and Method of Instrumentation for Software Applications - A method(s) and system(s) of monitoring and logging of various identified events of the operating system or the software application hosted on the operating system is disclosed. The method includes configuring the events associated with at least one event handler for monitoring. The method further includes assigning the at least one event handler to active processes of an operating system for handling of the events. Further, the method includes capturing of events by a different daemons and collecting the captured events. To this end, the captured similar events are grouped in one or more groups. The method further includes filtering of collected events based on a definable filter configuration and generating a dashboard representation of the filtered events. The dashboard representations of filtered events are then reported to the user.||10-22-2015|
|20150242299||Computer Implemented System and Method to Non-Intrusive Sensing and Instrumentation of Work Processes - A method(s) and system(s) provide a non-intrusive sensing and instrumentation of work processes performed in computing environment. The method includes providing a pre-defined collection of work processes covering the entire activities to be performed by the end user on the IT system. Each of the process steps of the work processes are assigned with a meta-data. The method further includes obtaining a plurality of measures for each of the process step and obtaining task performance metrics by analyzing the plurality of measures. Furthermore, the method includes collecting a set of actions being performed by the user on the IT system. The method further includes identifying the work processes performed by the user and subsequently, identifying the task performance measures of the user by comparing the identified work processes with the task performance metrics.||08-27-2015|
|20150199889||Detection System - A detection system for detecting the presence and direction of a subject moving through a doorway is disclosed. The system comprises magnets disposed on the doorway, a communication device, typically a smartphone and a server. The magnets are positioned on the doorway to create a magnetic field across the doorway. When the subject having the smartphone on the body passes through the doorway, a magnetometer in the smartphone senses perturbations caused by the magnetic field and generates signals corresponding to the sensed perturbations and a processor of the smartphone processes the signals to detect the presence and direction of the subject through the doorway. The data generated by the processor and a unique identification associated with the smartphone is transmitted to the remotely located server.||07-16-2015|
|20150024930||PROCESS FOR THE SYNTHESIS OF VISIBLE LIGHT RESPONSIVE DOPED TITANIA PHOTOCATALYSTS - Present disclosure provides a process for the synthesis of visible light responsive doped titania photocatalysts. The process involves step a) milling a mixture containing titania and a precursor compound, the compound selected from the group consisting of chloroauric acid and a mixture containing chloroauric acid and silver nitrate, in the presence of water and oxide milling media, at a temperature in the range of 20 to 50° C. for a period of 60-120 minutes, to form a slurry, wherein the amount of water is in the range of 15 to 25% by weight of the total mixture; and b) filtering the slurry to separate the oxide milling media and obtain a filtrate containing doped titania nanoparticles.||01-22-2015|
|20130179954||Computer Implemented System and Method for Providing Users with Secured Access to Application Servers - A computer implemented system and method for providing users with secured access to application servers have been disclosed. The system and method envisaged by the present disclosure are not restricted to providing users with secured access to application servers. The system and the method also ensure that transactions performed by the users through the application servers remain secured and hack-resistant. The present disclosure envisages a system that acts as a secured, trusted gateway between the users and the application servers associated with providers of sensitive services such as banking and financial institutions. In case of the system envisaged by the present disclosure, rather than directly accessing an application server, users are made to contact the system of the disclosure and upon verification of their respective identities, are allowed to access the application servers associated with providers of sensitive services.||07-11-2013|
|20120166175||Method and System for Construction and Rendering of Annotations Associated with an Electronic Image - A method and system for construction and rendering of annotations associated with an electronic image is disclosed. The system comprises a first data repository for storing the electronic image, which has a plurality of pixels, with one or more pixels annotated at a plurality of levels, which contain descriptive characteristics of the pixel, in ascending magnitude, such that the descriptive characteristics at a subsequent level are with reference to descriptive characteristics of one or more pixels surrounding the pixel. The system comprises a second data repository for storing the annotations. An image display module is configured to display the electronic image. A pixel and level identification module is configured to receive pixel and level selection details from a user-interface. An annotation retrieval module is configured to retrieve annotations corresponding to the pixel and level selection from the second repository and renders the retrieved annotations for the electronic image.||06-28-2012|
|20120103915||METHOD AND DEVICE FOR PURIFICATION OF ARSENIC CONTAMINATED WATER - A method of purifying arsenic contaminated water is disclosed. The method comprises of adding to the arsenic contaminated water predetermined quantities of iron and alkali; and passing the water so obtained through a filter medium including rice husk ash. A device for purification of arsenic contaminated water is also disclosed.||05-03-2012|
|20100070952||Automation in IT Services and IT Enabled Services - A system for automation of processes in a working environment to achieve targeted deliverables, said system comprising: mapping means adapted to map discrete processes in a working environment; reader means adapted to read human instructions in relation to targeted deliverables at mapped discrete processes; interpreter means adapted to interpret said read instructions into a machine readable instruction format; compiler means adapted to compile said machine readable instruction format into a pre-defined operating system executable instruction format; packager means adapted to classify and package said operating system executable instruction format in a pre-defined format; and installer means adapted to install and deploy said packaged format in said working environment to complete the automation process and achieve targeted deliverables.||03-18-2010|
Patent applications by TATA CONSULTANCY SERVICES LTD.