Tech mahindra
Tech mahindra

Patents - Technology

Revenue leakage is one of the major concerns of telecom operators worldwide. There are several reasons for revenue leakage including frauds, data loss, poor utilization of network infrastructure, and churn. With the growth in subscriber base and increased competition in the market space, the lack of control on revenue leak could potentially affect the profit margins drastically. The operators are ever looking for solutions that could limit the various aspects of the revenue leakage. A system and method for addressing revenue leakage due to data loss in general and incomplete/partial data in particular needs to handle the issues related to the obtaining of additional information so that incomplete/partial data records lead to additional billing opportunity for the operators.


A system to enable an enterprise to obtain an insight into the functioning and behavior of a data center that hosts the enterprise's IT infrastructure through the alerts raised by the system is provided. These alerts are based on the exhibited abnormal behavior while processing transactions of the data center and are raised by analyzing exhibited behavior with respect to the expected behavior. The system depicts the expected behaviors in the form of model sequences related to the transactions and elaborates an approach for determining these model sequences.


Enterprise users access several applications and services routinely to carry out their work-related activities on a day-to-day basis. These applications and services could be hosted within an enterprise or on a third-party data center. The enterprise users login into the applications and services so as to gain access to the applications and services. In the case of single sign-on, it is expected that the users authenticate once to a specific application/service/system and obtain access to any other application/service/system. In such a scenario, it is important to ensure that during the course of this authenticated access grant, the right users are provided access to right information. This is achieved by a re-authentication system that demands minimum re-authentication effort from "right" users and maximum re-authentication effort from "non-right" users. A system and method of on the fly re-authentication involves a novel challenge-response mechanism.


Remote control units are used to interact with a variety of devices. Modeling of the usage of a remote control unit while interacting with a device helps in (a) redesigning the remote for better usability; (b) dynamic adapting of the remote to provide improved interactions; and (c) characterizing the usage behaviors. In particular, it is very popular to use remote control units to interact with TVs and PVR devices. A system and method for the modeling of a remote usage involves the use of both pre-defined models and discovered models. Specifically, a pattern of usage of a remote control unit is abstracted to be one of either a pre-defined model or a discovered model. The model discovery involves the process of generalization based on a set of particular remote control unit usage patterns. The labels associated with the models help in characterizing the remote control unit usage patterns.


Real-time delivery of multimedia content puts extreme demand on both computational and network resources. Many a times, the requirement is to handle multiple such delivery requirements and as a consequence, the overall delivery efficiency gets affected. Another dimension of complexity is that (a) the multimedia content to be delivered may not always be highly reliable, and (b) the network may also be not highly reliable. In such a situation, it becomes even more difficult to satisfy the quality of service requirements. When content to be delivered to multiple destinations is available at multiple sources, there is an opportunity to overcome the above mentioned complexity. The system and method for efficient delivery in a multi-source multi-destination network involves pulling of data from the multiple sources by measuring quality of service and reliability parameters, and efficiently loading the systems and the network in a cooperative manner.


P networks carry packets that consist of headers and payloads. Typical traffic analysis systems at layer 3 process packet headers in order to obtain as much information about the traffic as possible. However, performing of deep packet analysis requires the processing of packet payloads as well. Another important requirement of layer 3 processing is the need to process the payloads at wire speeds. A system and method for deep packet inspection at layer 3 involves (a) an approach for packet payload processing; (b) accounting for out of order arrival of packets; (c) an approach for partial match analysis so as to be able to analyze the traffic flows when only partial information is available; and (d) an approach for effective payload processing for attempting to achieve wire speed processing.


Text segmentation based on topic boundary detection has been an industry problem in automating information dissemination to targeted users. A system for automatic segmentation of ASR output text involves boundary identification based on "topic" changes. The proposed approach is based on building a weighted graph to determine dependency in input sentences based on bi-directional analysis of the input sentences. Furthermore, the input sentences are segmented based on the notion of segment cohesiveness and the segmented sentences are merged based on preamble and postamble analyses.


Enterprises procure a large number of licenses of a large number of software packages. Software package inventory is one of the high cost items in these enterprises. It is necessary to contain this recurring expenditure on software packages by optimally utilizing the procured licenses. Disclosed is a system and method for maximizing software package license utilization. The system includes components for enabling managers of an enterprise to describe their need for software packages in project plans and users to use the software packages based on such plans. Further, the system also manages unplanned demands to use software packages and maintains a near-optimal inventory of licenses of software packages.


Customers buy a variety of equipments and gadgets from multiple vendors and interact with manufacturers through contact centers to get their questions on the bought products answered. The market opportunities and competitiveness are forcing manufacturers to be accommodative and innovative in providing post-sale support. An essential aspect of this market dynamics is customer churn and the manufactures are required to ensure that product loyalty and brand loyalty of the customers are high. While Customer Relationship Management (CRM) has been playing an all important role of monitoring and managing customer relationships, it is necessary to augment CRM with more specific enhancements. The need is to have an integrated, practical, and realizable approach that focuses on measuring customer satisfaction index based on multiple interactions of customers with manufacturers. A system and method for tracking customer satisfaction index involves tracking of the intentional states of customers and assessing them just in time to help improve the satisfaction index.


Networks carry various kinds of traffic and ISPs are keen to analyze the traffic so as to be able to support QoS on the distinct traffic flows. Traffic can be broadly categorized into two types: plain traffic and encrypted traffic. Further, each of these traffic types is based on either a standard protocol or a proprietary protocol. While it is fairly straightforward to analyze traffic that are based on standard protocols, it is extremely difficult to analyze encrypted traffic based on proprietary protocols. A system for Skype traffic detection involves analyzing encrypted traffic based on proprietary peer to peer protocol. The proposed approach is based on building Skype traffic models and using the same to determine Skype traffic in the network traffic.


A fault identification system analyzes alarm information and the associated contextual information to identify the occurred faults. The contextual information is based on usecases, transactions, and functions associated with the electronic system under consideration. Multiple detectors that form part of knowledge repositories are used in the process of fault identification.


The use of mobile wireless devices is on the increase. Mobile manufactures design, develop, and release new devices to the market at regular intervals. In order to keep the market leadership, such companies need to have techniques, processes, and tools to quickly design and test their products. One of the important requirements of a communicating device is its reliability and traditionally, testing has been playing a major role in assessing and improving the reliability of the devices. However, testing in general and testing of mobile wireless devices in particular, requires complementary testing in realistic environments. A system for automating much of the testing of mobile, wireless devices in a realistic environment involves (a) identifying test cases that need to be tested in outdoor environments; (b) identifying environment conditions that should prevail during the execution of test cases; (c) planning and scheduling of test cases; (d) identifying the occurrence, in real-time, of environmental conditions; (e) automatically executing the appropriate test cases and generation of test results; and (f) group testing to efficiently test as much as possible whenever environment is test conducive.


The use of a variety of plastic cards to carry out monetary transactions is on the increase. It is important to ensure that such transactions are authenticated, authorized, and accounted in a best possible manner to prevent fraudulent transactions. However, as much the transactions are being protected, the fraudsters are becoming that much more cleverer and are being able to break into the system. One of the important requirements is to protect transactions of cash cards as these cards seem to be an easier target for fraudsters. A system for cash card fraud detection involves ensuring that a cash card user's unique "signature" is determined and kept track of during the course of the use of the cash card.


The proposed system defines a predictive real-time Service Level Agreements (SLAs) monitoring system by (a) a detailed analysis of traffic flows with reduced monitor-data flow across network; and (b) a suitable combination of offline and real-time processing of historical and current traffic data. In order to be able to undertake a detailed analysis without significantly impacting the network throughput, the system analyzes the historical traffic patterns of a typical Provider's network to determine a set of critical SLAs. An in-depth analysis of traffic is performed by creating a unique network parent probe for every critical SLA and the parent probe spawns an optimal number of intelligent master and slave probes based on a regionalization procedure. The online overload monitoring system analyzes the gathered data from the master and slave probes to (a) forecast future violations of the SLA under consideration based on multiple forecast models and (b) generate operator SLA violation alarms.


Enterprises deal with a lot of papers in their day-to-day activities. Many of these papers are company confidential documents and many are legal documents with a statutory requirement that they be preserved for a pre-specified number of years. During the course of time, there is a need to (a) obtain copies of these papers; and (b) modify the contents. Such frequent handling of papers may reduce the life of the papers and lead to statutory violations. A system for automatic indexing and retrieval of paper documents involves (a) storing paper documents in a secured manner in both hard and soft forms; (b) indexing of both forms of the stored paper documents; (c) retrieving soft form of a paper document for display and copying; (d) retrieving hard form of a paper document for modification and removal; (e) managing multiple versions of the paper documents; and (e) access control and audit trailing. It is essential to maintain consistency between hard and soft forms, and image processing techniques are deployed to ensure consistency between hard and soft forms. Another form of consistency that is required to be ensured is the correct cataloging and indexing of paper documents. This is achieved by comparing input information with the contents of the cover page of a paper document to account for human input errors.


A system for warning a driver based on the road curvature consisting of multiple integrated cameras to acquire the images of different scales simultaneously, a camera controller to configure the cameras based on the vehicle speed and visibility criteria, a processor to analyze the multi-scale images to construct the mosaic, and warning generation subsystem to warn the driver about the safety speed based on the comparison of the mosaic with the curvature templates.


An information filtering process designed to sort through large volumes of dynamically generated textual information, incrementally learning process that learns as new text documents arrive and the user grades them by providing feedback. Text-based documents either dynamically retrieved from the Web or available in a textual repository on an Intranet are represented by applying key-word weighting's after capturing the user reasoning for classifying the document as relevant or irrelevant. When a new item (document) arrives, the learning agent suggests a classification and also provides an explanation by pointing out the main features (key-phrases) of the item (document) responsible for its classification. The user looks at this and provides hints by showing a list of features (key-phrases) and are truly responsible for a particular way of classifying the document. This interaction method contributes to the learning process. The apparatus includes a feedback-based clustering scheme that models user's interest profiles, a simple neural adaptation method for leaning the cluster centers to provide personalized information filtering for information seekers.


Success Stories

How a leading Japanese advertising company benefited from a multilocation global SAP rollout.

How a leading Japanese advertising company benefited from a multilocation global SAP rollout.

Tech Mahindra developed the Global template for SAP Enterprise Implementation to cater to the accounting services.

How a leading global content distribution company offered 24x7 customer support and made ongoing feature enhancements to its solutions suite.

How a leading global content distribution company offered 24x7 customer support and made ongoing feature enhancements to its solutions suite.

The role involved providing 24x7 customer support for all the 150+ customers worldwide.

How an information and news giant benefited by outsourcing its application support system

How an information and news giant benefited by outsourcing its application support system

The customer identified Tech Mahindra as its outsourcing partner for offshore and onsite application support.

Connected Stories

Case Studies

Discover how we provided ‘in stadia’ experience to viewers of a leading media group. The customer is the sports division of a leading American commercial broadcasting television network.

For further information please write to

For further information please write to