-
公开(公告)号:US11295602B2
公开(公告)日:2022-04-05
申请号:US16835591
申请日:2020-03-31
申请人: Wipro Limited
IPC分类号: G08B13/14 , G08B29/18 , G06F9/54 , G06Q50/26 , G01S5/20 , G06F30/10 , G06N20/00 , G08B13/16 , G06K7/10
摘要: The disclosure relates to a system and method for providing enhanced security of physical assets within a physical infrastructure. The method includes receiving an overall layout of the physical infrastructure and multi-modal input with respect to the physical asset from a plurality of sensors installed within the physical infrastructure. The multi-modal input includes acoustic signal generated by or reflected off the physical asset and captured by a set of acoustic sensors. The method further includes generating a digital asset corresponding to the physical asset by determining an identification, a location, a shape, a size, and a behavior of the physical asset based on the multi-modal input and the overall layout, detecting one or more events of interest involving the digital asset based on the behavior of the physical asset, and simulating the one or more events of interest to evaluate a possible fault or a possible security threat.
-
公开(公告)号:US20190095635A1
公开(公告)日:2019-03-28
申请号:US15819010
申请日:2017-11-21
申请人: Wipro Limited
摘要: A method and device are described for managing system access to a user. The method includes receiving at least one of user-profile parameters, work-profile parameters and health parameters associated with the user. The method includes determining, one or more patterns from the at least one of user-profile parameters, work-profile parameters and health parameters associated with the user. The method further includes determining a stress level of the user based on the one or more patterns. The method further includes, managing access to at least one of one or more devices, user accounts, or user access cards associated with the user based on the stress level.
-
公开(公告)号:US10218743B2
公开(公告)日:2019-02-26
申请号:US15441383
申请日:2017-02-24
申请人: Wipro Limited
IPC分类号: H04L29/06 , H04L12/24 , H04W12/02 , H04L12/707
摘要: This disclosure relates to intent based Lawful Interception (LI) in a communication network. The method includes interpreting an LI intent of a Law Enforcement Agency (LEA) based on LI intent information provided by the LEA; determining LI content required by the LEA and at least one LI trigger associated with the LI content based on an analysis of the LI intent information; monitoring ongoing communication session associated with an LI target user to detect matching of the at least one LI trigger; processing duplicated LI content in response to matching of the at least one LI trigger; inserting at least one marker tag in the duplicated LI content to generate marked LI content; and sending the marked LI content and a notification comprising information associated with matching of the at least one LI trigger and the at least one marker tag to the LEA.
-
公开(公告)号:US09760340B2
公开(公告)日:2017-09-12
申请号:US14935540
申请日:2015-11-09
申请人: Wipro Limited
摘要: The present disclosure relates to a method for enhancing quality of requirements for an application development. The method comprises retrieving expertise information of each user of groups involved in identifying requirements, domain knowledge of each user, information on number of defects associated with requirements and information of requirements for application development from sources. Then, skill score of the groups is computed using expertise information and domain knowledge of each user of corresponding groups. Solidity score of each of requirements is determined using information of requirements and predetermined threshold solidity score. Weightage score of each of requirements is computed based on information of requirements and information on number of defects. The, using skill score of groups, solidity score of each of requirements and weightage score, strength score of each of requirements is computed for enhancing quality of requirements.
-
5.
公开(公告)号:US11151019B2
公开(公告)日:2021-10-19
申请号:US16365248
申请日:2019-03-26
申请人: Wipro Limited
摘要: Systems and methods for dynamically testing product and process of production environment in virtual testing environment are disclosed. A testing system may retrieve production data related to each production activity corresponding to events executing in real-time. Each production activity is related to product and process of production environment. Further, testing system generates each scenario of production environment in virtual testing environment in real-time, based on sequencing of each event and creates, in the virtual testing environment, virtual process and virtual product corresponding to process and product of production environment, based on at least the events, generated scenarios, and historical data. Finally, testing system re-plays each production activity in virtual testing environment for testing virtual process and virtual product. The method may comprise testing using real-time scenarios of production environment, allowing a user to view testing process and perform selective actions while testing.
-
6.
公开(公告)号:US20200285565A1
公开(公告)日:2020-09-10
申请号:US16365248
申请日:2019-03-26
申请人: Wipro Limited
摘要: The present disclosure is related to field of software testing, disclosing method and system for dynamically testing product and process of production environment in virtual testing environment. Testing system retrieves production data related to each production activity corresponding to events executing in real-time. Each production activity is related to product and process of production environment. Further, testing system generates each scenario of production environment in virtual testing environment in real-time, based on sequencing of each event and creates, in the virtual testing environment, virtual process and virtual product corresponding to process and product of production environment, based on at least the events, generated scenarios, and historical data. Finally, testing system re-plays each production activity in virtual testing environment for testing virtual process and virtual product. The present disclosure enables testing using real-time scenarios of production environment, allows user to view testing process and perform selective actions while testing.
-
7.
公开(公告)号:US20200226222A1
公开(公告)日:2020-07-16
申请号:US16244563
申请日:2019-01-10
申请人: Wipro Limited
摘要: The present disclosure is related to a method and a system for preventing failures of a product of real production environment in virtual testing environment. A virtual process corresponding to each physical process related to the product is created and replicated in real-time in the virtual testing environment based on input data related to each physical process. Further one or more errors that occurred during implementation of each virtual process and corresponding error pattern are detected and the error pattern corresponding to each of the one or more errors is analyzed with corresponding historical pattern to predict the failures of the product. Finally a solution for resolving the one or more errors is determined to prevent occurrence of the predicted failures in each physical process. The present disclosure provides accurate failure predictions and accurate remedies for preventing the predicted failures based on real-time data.
-
公开(公告)号:US10268824B2
公开(公告)日:2019-04-23
申请号:US15070490
申请日:2016-03-15
申请人: Wipro Limited
IPC分类号: G06F21/57
摘要: The present disclosure relates to a method and a system for identifying one or more test cases for penetration testing of an application associated with an entity. An application testing system receives data related to application from one or more data sources and uses the data to determine threat score, vulnerability score, human error score, business impact score and popularity score. Further, application testing system identifies threat quantifier value based on threat score, vulnerability score and human error score. The application testing system also determines impact quantifier value based on business score and popularity score. The application testing system then determines threat severity level and impact severity level based on threat quantifier value and impact quantifier value. Based on the determined threat severity level and the impact severity level, the application testing system identifies the one or more test cases for performing penetration testing of the application.
-
公开(公告)号:US10230614B2
公开(公告)日:2019-03-12
申请号:US14943631
申请日:2015-11-17
申请人: Wipro Limited
摘要: A system and method for improving integration testing in a cloud computing environment includes collecting one or more input parameters associated with each of one or more products, deployed in cloud computing environment, from one or more external resources and test management systems. The input parameters include one or more defect parameters, user requirements, test parameters or performance parameters associated with the product. The integration testing improvement system determines one or more failure issues associated with the product and analyzes the behavior of the product over a predetermined time period to identify a failure pattern associated with the product. Each of the determined failure issues is mapped with the identified failure pattern to detect one or more critical scenarios in each of the products. Later the critical scenarios are automated by executing associated test scripts thereby improving the integration testing in the cloud computing environment.
-
10.
公开(公告)号:US09705933B2
公开(公告)日:2017-07-11
申请号:US14943799
申请日:2015-11-17
申请人: Wipro Limited
IPC分类号: H04L29/06 , H04L12/26 , H04L12/703
CPC分类号: H04L63/30 , H04L1/00 , H04L43/0823 , H04L43/16 , H04L45/28 , H04L63/306
摘要: This technology relates generally to lawful interception and more particularly to methods and systems for lawful interception. In one embodiment, a method for lawful interception in a communication network is disclosed. The method includes detecting in real-time, via at least one network device, adulteration in communication data based on comparison of a set of adulteration parameters derived from the communication data with associated thresholds within a set of thresholds. The method further includes analyzing, via the at least one network device, adulterated content in the communication data to determine feasibility of correcting the adulterated content based on satisfaction of predefined criteria. Moreover, the method includes correcting, selectively, the adulterated content based on satisfaction of the predefined criteria.
-
-
-
-
-
-
-
-
-