Sign In to Follow Application
View All Documents & Correspondence

System And Method For Suppressing Repetitive Logs In Real Time

Abstract: The present disclosure provides a system (108) and a method (300) to suppress repetitive entry of logs in a file in real-time. A processing engine (208) receives a request from at least one source for performing entry of a new log line in the file. A recording engine (212) extracts at least one log line from the file, and maintains a log-map using a plurality of attributes corresponding to the extracted log line. The recording engine further performs attribute mapping of the received new log line with the maintained log-map. An update engine (214) determines whether the attributes corresponding to the received new log line already exists in the log map maintained by the recording engine (212) based on the attribute mapping. The update engine (214) writes the new received log line on determining that the attributes corresponding to the received new log line do not exist in the log-map. Figure.2

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
02 July 2023
Publication Number
1/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

JIO PLATFORMS LIMITED
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, Ahmedabad - 380006, Gujarat, India.

Inventors

1. BHATNAGAR, Aayush
Tower-7, 15B, Beverly Park, Sector-14 Koper Khairane, Navi Mumbai - 400701, Maharashtra, India.
2. SHETTY, Mukta
Flat No 302, Mukund Park, Sheetal Nagar, Mira Road (East), Thane - 401107, Maharashtra, India.
3. JHA, Alok
B1-1701, G21 Avenue, Sector 83, Vatika INXT, Gurugram, Haryana - 122004, India.
4. KUMAR, Sanjeev
House No.: 8, V.P.O -Kalawar, Tehsil Jagadhri, Distt - Yamuna Nagar, Haryana - 133103, India.
5. JADHAV, Sayali
Flat No: 704, Archit Madhuban Building, Near Dream Castle, Makhmalabad Road, Nashik - 422003, Maharashtra, India.
6. NARAYAN, Gaurav
C/o Kundan Narayan, Kedar Kunj Colony, Behind Indira Palace, P.O-Hinoo, Dist- Ranchi, Jharkhand - 834002, India.
7. ANJALI, Kunuguntla
House No.: 1-123, Lingala Village, Vatsavai Mandal, Krishna District, Andhra Pradesh - 521402, India.
8. PATIDAR, Chetan
250 - Pathrad Khurd, West Nimar, Madhya Pradesh - 451225, India.

Specification

FORM 2
THE PATENTS ACT, 1970 (39 of 1970) THE PATENTS RULES, 2003
COMPLETE SPECIFICATION
APPLICANT
of Office-101, Saffron, Nr JIO PLATFORMS LIMITED , Ambawadi, Ahmedabad -
380006, Gujarat, India; Nationality : India
The following specification particularly describes
the invention and the manner in which
it is to be performed

RESERVATION OF RIGHTS
[001] A portion of the disclosure of this patent document contains material, which is subject to intellectual property rights such as, but are not limited to, copyright, design, trademark, integrated circuit (IC) layout design, and/or trade dress protection, belonging to Jio Platforms Limited (JPL) or its affiliates (herein after referred as owner). The owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent files or records, but otherwise reserves all rights whatsoever. All rights to such intellectual property are fully reserved by the owner.
TECHNICAL FIELD
[002] The present disclosure relates to a field of Policy Control Function
(PCF) in a wireless network, and specifically to a system and a method for suppressing repetitive logs i.e., logs writing of same log lines in a file to avoid expensive file write operation in real-time.
DEFINITION
[003] The following description of related art is intended to provide
background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
[004] The expression ‘Policy Control Function (PCF)’ used hereinafter in
the specification refers to how data travels within the network, ensuring efficient use of resources and providing a secure and customized experience for users. The PCF determines policies based on SPR (Subscriber Profile Repository) and PC-Ids (Policy Counter Identities). These policies define criteria for handling different types of data traffic based on various factors.

[005] These definitions are in addition to those expressed in the art.
BACKGROUND
[006] The following description of related art is intended to provide
background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section be used only to enhance the understanding of the reader with respect to the present disclosure, and not as admissions of prior art.
[007] In general, Policy Control Function (PCF) in a wireless network
provides following functions: policy rules for application and service data flow detection, gating, Quality of Service (QoS), and flow-based charging to a Session Management Function (SMF). Access and Mobility Management related policies to an Access and Mobility Management Function (AMF). Service configurations, policy configurations and session viewer appear underneath.
[008] In conventional methods and systems, log analysis in PCF becomes
difficult when a particular log line starts printing in an application log file. Failure
repeatedly occurs due to a network communication failure. If the log is left
unconditionally, a large amount of the same log information is stored in a log area,
and there is a problem of obtaining information that triggers the failure.
[009] Therefore, there is a need in the art to suppress logs writing of same
log lines in a file to avoid expensive file write operation by overcoming the deficiencies of the prior art.
OBJECTS OF THE PRESENT DISCLOSURE
[0010] It is an object of the present disclosure to provide a system to
suppress entry of repetitive logs in real-time.
[0011] It is an object of the present disclosure to suppress the writing of the
same log lines in a file to avoid expensive file write operations.

[0012] It is an object of the present disclosure to ease operations team efforts
to debug logs.
[0013] It is an object of the present disclosure to capture occurrence of a
specific log line along with its start time and end time at one place.
SUMMARY
[0014] The present disclosure discloses a system for suppressing repetitive
entry of log lines in a file in real-time. A processing engine is configured to receive a request from at least one source for performing entry of a new log line in the file, wherein the request includes the new log line. A recording engine is configured to extract at least one log line from the file, maintain a log-map having a plurality of attributes corresponding to the extracted log line, perform an attribute mapping of the received new log line with the maintained log-map and an update engine is configured to determine whether the received new log line or attributes corresponding to the received new log line already exists in the log map maintained by the recording engine based on the attribute mapping, responsive to determining that the new received log line or the attributes corresponding to the received new log line exist in the log map, skip writing the new received log line in the file, and update the plurality of attributes corresponding to the log file.
[0015] In an embodiment, upon determining that the new received log line
or the attributes corresponding to the received new log line do not exist in the log-map, the new received log line is written in the file.
[0016] In an embodiment, the plurality of attributes includes an identifier, a
count value, a start time, and an end time.
[0017] In an embodiment, the recording engine is configured to clear the
log-map when the count value is equal to a threshold value.
[0018] In an embodiment, an interface(s) is configured to display the file or
a log file on a display screen.

[0019] In an embodiment, a scheduler is configured to run at a configurable
time interval.
[0020] In an embodiment, the scheduler is configured to write the map data
in the log-map and clear the map entries from a memory once the schedular run.
[0021] In an embodiment, the system is configured to receive the request by
the interface(s).
[0022] In an embodiment, the at least one source includes at least a user or
an application.
[0023] The present disclosure discloses a method of suppressing repetitive
entry of log lines in a file in real-time. The method includes receiving by a processing engine a request from at least one source for performing entry of a new log line in the file, wherein the request includes the new log line. The method includes extracting at least one log line from the file by a recording engine. The method includes maintaining a log-map having a plurality of attributes corresponding the extracted log line. The method includes performing an attribute mapping of each new received log line with said maintained log-map. The method includes determining whether said new received log line map to the log-map: If yes, skip writing said new received log line in said log file.
[0024] The present disclosure discloses a user equipment configured to
receiving by a processing engine a request from at least one source for performing entry of a new log line in the file, wherein the request includes the new log line, extracting a plurality of log lines from the file by a recording engine, maintaining a log-map having a plurality of attributes corresponding to each of the plurality of extracted log lines, performing an attribute mapping of each new received log line with said maintained log-map, whether the attributes corresponding to the received new log line already exists in the log map maintained by the recording engine (212) based on the attribute mapping: If yes, skip writing said new received log line in the file, and update said plurality of attributes corresponding to said existing log file

in said log-map. If no, write said new generated log line in said log-map and in said log file.
BRIEF DESCRIPTION OF THE DRAWINGS
[0025] In the figures, similar components and/or features may have the
same reference label. Further, various components of the same type may be
distinguished by following the reference label with a second label that distinguishes
among the similar components. If only the first reference label is used in the
specification, the description is applicable to any one of the similar components
having the same first reference label irrespective of the second reference label.
[0026] The diagrams are for illustration only, which thus is not a limitation
of the present disclosure, and wherein:
[0027] FIG. 1 illustrates an exemplary network architecture in which or with
a system for suppressing entry of repetitive log lines in a file in real-time is
implemented, in accordance with an embodiment of the present disclosure.
[0028] FIG. 2 illustrates an exemplary block diagram of a system, in
accordance with an embodiment of the present disclosure.
[0029] FIG. 3 illustrates an exemplary flow diagram of a method, in
accordance with an embodiment of the present disclosure.
[0030] FIG. 4 is an illustration of a non-limiting example of details of
computing hardware used in the system, in accordance with an embodiment of the
present disclosure.
[0031] The foregoing shall be more apparent from the following more
detailed description of the disclosure.
LIST OF REFERENCE NUMERALS
100 – Network Architecture
102-1, 102-2…102-N – One or More Users
104-1, 104-2…104-N – One or More User Equipments (UEs)
106 – Network
108 – System

110 – Entity
112 – Centralized Server
202 – One or more processor(s)
204 – Memory
206 – Interfaces
208 – Processing Engine
210 – Database
212 – Recording Engine
214 – Update Engine
216 – Suppression Engine
218 – Other Engines/Units
410 – External Storage Device
420 – Bus
430 – Main Memory
440 – Read Only Memory
450 – Mass Storage Device
460 – Communication Port
470 – Processor
BRIEF DESCRIPTION OF THE INVENTION
[0032] In the following description, for the purposes of explanation, various
specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above. Some of the problems discussed above might not be fully addressed by any of the features described herein. Example embodiments of the present disclosure are described below, as illustrated in various drawings in

which like reference numerals refer to the same parts throughout the different drawings.
[0033] The ensuing description provides exemplary embodiments only, and
is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
[0034] Specific details are given in the following description to provide a
thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail in order to avoid obscuring the embodiments.
[0035] Also, it is noted that individual embodiments may be described as a
process that is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc. When a process corresponds to a function, its termination can correspond to a return of the function to the calling function or the main function.
[0036] The word “exemplary” and/or “demonstrative” is used herein to
mean serving as an example, instance, or illustration. For the avoidance of doubt,

the subject matter disclosed herein is not limited by such examples. In addition, any
aspect or design described herein as “exemplary” and/or “demonstrative” is not
necessarily to be construed as preferred or advantageous over other aspects or
designs, nor is it meant to preclude equivalent exemplary structures and techniques
5 known to those of ordinary skill in the art. Furthermore, to the extent that the terms
“includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive like the term “comprising” as an open transition word without precluding any additional or other elements.
10 [0037] Reference throughout this specification to “one embodiment” or “an
embodiment” or “an instance” or “one instance” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” in various places throughout
15 this specification are not necessarily all referring to the same embodiment.
Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.
[0038] The terminology used herein is to describe particular embodiments
only and is not intended to be limiting the disclosure. As used herein, the singular
20 forms “a”, “an”, and “the” are intended to include the plural forms as well, unless
the context indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other
25 features, integers, steps, operations, elements, components, and/or groups thereof.
As used herein, the term “and/or” includes any combinations of one or more of the associated listed items. It should be noted that the terms “mobile device”, “user equipment”, “user device”, “communication device”, “device” and similar terms are used interchangeably for the purpose of describing the invention. These terms
30 are not intended to limit the scope of the invention or imply any specific
9

functionality or limitations on the described embodiments. The use of these terms
is solely for convenience and clarity of description. The invention is not limited to
any particular type of device or equipment, and it should be understood that other
equivalent terms or variations thereof may be used interchangeably without
5 departing from the scope of the invention as defined herein.
[0039] As used herein, an “electronic device”, or “portable electronic
device”, or “user device” or “communication device” or “user equipment” or “device” refers to any electrical, electronic, electromechanical, and computing device. The user device is capable of receiving and/or transmitting one or
10 parameters, performing function/s, communicating with other user devices, and
transmitting data to the other user devices. The user equipment may have a processor, a display, a memory, a battery, and an input-means such as a hard keypad and/or a soft keypad. The user equipment may be capable of operating on any radio access technology including but not limited to IP-enabled communication, Zig Bee,
15 Bluetooth, Bluetooth Low Energy, Near Field Communication, Z-Wave, Wi-Fi,
Wi-Fi direct, etc. For instance, the user equipment may include, but not limited to, a mobile phone, smartphone, virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other device as may be obvious to a
20 person skilled in the art for implementation of the features of the present disclosure.
[0040] Further, the user device may also comprise a “processor” or
“processing unit” includes processing unit, wherein processor refers to any logic
circuitry for processing instructions. The processor may be a general-purpose
processor, a special purpose processor, a conventional processor, a digital signal
25 processor, a plurality of microprocessors, one or more microprocessors in
association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of
10

the system according to the present disclosure. More specifically, the processor is a hardware processor.
[0041] As portable electronic devices and wireless technologies continue to
improve and grow in popularity, the advancing wireless technologies for data
5 transfer are also expected to evolve and replace the older generations of
technologies. In the field of wireless data communications, the dynamic
advancement of various generations of cellular technology is also seen. The
development, in this respect, has been incremental in the order of second generation
(2G), third generation (3G), fourth generation (4G), and now fifth generation (5G),
10 and more such generations are expected to continue in the forthcoming time.
[0042] While considerable emphasis has been placed herein on the
components and component parts of the preferred embodiments, it will be
appreciated that many embodiments can be made and that many changes can be
made in the preferred embodiments without departing from the principles of the
15 disclosure. These and other changes in the preferred embodiment, as well as other
embodiments of the disclosure, will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter is to be interpreted merely as illustrative of the disclosure and not as a limitation.
20 [0043] Generally, a Policy Control Function (PCF) in a wireless network
provides the following functions: policy rules for application and service data flow detection, gating, Quality of Service (QoS), and flow-based charging to a Session Management Function (SMF). Access and Mobility Management related policies to an Access and Mobility Management Function (AMF). Service configurations,
25 policy configurations and session viewer appear underneath. In conventional PCF
systems, log writing of the same log lines in a file occurs due to a network communication failure. Thus, there is a need to suppress the repetition of logs in real time.
11

[0044] The present disclosure is configured to perform logs analysis in PCF
systems to determine how many times the log has been printed and a place where the log has been printed automatically rather than scrolling multiple files for the same log.
5 [0045] The present disclosure is configured to suppress writing of the same
log lines in a file to avoid expensive file write operations. The present disclosure is configured to ease operations team efforts to debug logs. It is configured to capture the occurrence of a specific log line along with its start time and end time at one place efficiently.
10 [0046] The various embodiments throughout the disclosure will be
explained in more detail with reference to FIG. 1- FIG. 4.
[0047] FIG. 1 illustrates an exemplary network architecture (100) in which
a system (108) for changing a plurality of policy rules in a communication network is implemented in accordance with embodiments of the present disclosure.
15 [0048] Referring to FIG. 1, the network architecture (100) includes one or
more computing devices or user equipments (104-1, 104-2…104-N) associated with one or more users (102-1, 102-2…102-N) in an environment. A person of ordinary skill in the art will understand that one or more users (102-1, 102-2…102-N) may be individually referred to as the user (102) and collectively referred to as
20 the users (102). Similarly, a person of ordinary skill in the art will understand that
one or more user equipments (104-1, 104-2…104-N) may be individually referred to as the user equipment (104) and collectively referred to as the user equipment (104). A person of ordinary skill in the art will appreciate that the terms “computing device(s)” and “user equipment” may be used interchangeably throughout the
25 disclosure. Although three user equipments (104) are depicted in FIG. 1, however
any number of the user equipments (104) may be included without departing from the scope of the ongoing description.
12

[0049] In an embodiment, the user equipment (104) includes smart devices
operating in a smart environment, for example, an Internet of Things (IoT) system.
In such an embodiment, the user equipment (104) includes, but is not limited to,
smart phones, smart watches, smart sensors (e.g., mechanical, thermal, electrical,
5 magnetic, etc.), networked appliances, networked peripheral devices, networked
lighting system, communication devices, networked vehicle accessories, networked
vehicular devices, smart accessories, tablets, smart television (TV), computers,
smart security system, smart home system, other devices for monitoring or
interacting with or for the users (102) and/or entity (110), or any combination
10 thereof. A person of ordinary skill in the art will appreciate that the user equipment
(104) may include, but is not limited to, intelligent, multi-sensing, network-connected devices, that can integrate seamlessly with each other and/or with a central server or a cloud-computing system or any other device that is network-connected.
15 [0050] In an embodiment, the user equipment (104) includes, but is not
limited to, a handheld wireless communication device (e.g., a mobile phone, a smart phone, a phablet device, and so on), a wearable computer device(e.g., a head-mounted display computer device, a head-mounted camera device, a wristwatch computer device, and so on), a Global Positioning System (GPS) device, a laptop
20 computer, a tablet computer, or another type of portable computer, a media playing
device, a portable gaming system, and/or any other type of computer device with wireless communication capabilities, and the like. In an embodiment, the user equipment (104) includes, but is not limited to, any electrical, electronic, electro-mechanical, or an equipment, or a combination of one or more of the above devices
25 such as virtual reality (VR) devices, augmented reality (AR) devices, laptop, a
general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other computing device, wherein the user equipment (104) may include one or more in-built or externally coupled accessories including, but not limited to, a visual aid device such as a camera, an audio aid, a microphone,
30 a keyboard, and input devices for receiving input from the user (102) or the entity
13

(110) such as touch pad, touch enabled screen, electronic pen, and the like. A person of ordinary skill in the art will appreciate that the user equipment (104) may not be restricted to the mentioned devices and various other devices may be used.
[0051] Referring to FIG. 1, the user equipment (104) is configured to
5 communicate with the system (108), for example, a repetitive logs suppression
system (108), through a network (106). In an embodiment, the network (106) includes at least one of a Fifth Generation (5G) network, 6G network, or the like. The network (106) enables the user equipment (104) to communicate with other devices in the network architecture (100) and/or with the system (108). The network
10 (106) includes a wireless card or some other transceiver connection to facilitate this
communication. In another embodiment, the network (106) may be implemented as, or include any of a variety of different communication technologies such as a wide area network (WAN), a local area network (LAN), a wireless network, a mobile network, a Virtual Private Network (VPN), the Internet, the Public Switched
15 Telephone Network (PSTN), or the like.
[0052] In another exemplary embodiment, the centralized server (112) may
include or comprise, by way of example but not limitation, one or more of a stand¬
alone server, a server blade, a server rack, a bank of servers, a server farm, hardware
supporting a part of a cloud service or system, a home server, hardware running a
20 virtualized server, one or more processors executing code to function as a server,
one or more machines performing server-side functionality as described herein, at least a portion of any of the above, some combination thereof.
[0053] The system (108) is configured to receive a request to perform entry
of a new log line in the file, wherein the request includes the new log line. For
25 example, the input unit is a touchpad or a keyboard. In an embodiment, the system
(108) is configured to receive the request via a command-line interface (CLI) and graphical user interface (GUI) from at least one source including a user (102) or an application.
14

[0054] The system (108) is configured to extract a plurality of log lines
from the file. The system (108) maintains a log map having a plurality of attributes
corresponding to each of the plurality of extracted log lines. In an example, the
plurality of attributes includes an identifier, a count value, a start time, and an end
5 time.
[0055] The system (108) performs an attribute mapping of the received new
log line with the maintained log-map. The system (108) is configured to determine whether the new received log line maps to the existing log file based on the attribute mapping. In response to determining if the received log line or attributes
10 corresponding to the received log line exists in the log-map, the system (108) is
configured to skip writing the new received log line in the log file and update the plurality of attributes corresponding to the existing log file in the log-map. In response to determining if the received log line or attributes corresponding to the received log line does not exist in the log map, the system (108) is configured to
15 write the new generated log line in the log-map and in the file. In an embodiment,
the system (108) includes a scheduler which is configured to run at a configurable time interval. In an embodiment, the system (108) is configured to write the map data in the log-map and clear the map entries from a memory once the schedular run. In an aspect, the configurable time interval is set by the user.
20 [0056] In an example, the system (108) is configured to clear the log-map
when the count value is equal to a threshold value.
[0057] In an example, the system (108) is configured to display the log-map
and the file on an interface(s) (206 as provided in Fig. 2).
[0058] In accordance with embodiments of the present disclosure, the
25 system (108) may be designed and configured for performing logs analysis in PCF
to determine how many times the log has been printed and a place where the log
has been printed automatically rather than scrolling multiple files for the same log.
15

[0059] Although FIG. 1 shows exemplary components of the network
architecture (100), in other embodiments, the network architecture (100) may
include fewer components, different components, differently arranged components,
or additional functional components than depicted in FIG. 1. Additionally, or
5 alternatively, one or more components of the network architecture (100) may
perform functions described as being performed by one or more other components of the network architecture (100).
[0060] FIG. 2 illustrates an exemplary block diagram (200) of the system
(108) that may also be referred to as a repetitive log suppression system (108), in
10 accordance with an embodiment of the present disclosure.
[0061] In an aspect, the system (108) includes one or more processor(s)
(202). The one or more processor(s) (202) is implemented as one or more microprocessors, microcomputers, microcontrollers, edge or fog microcontrollers, digital signal processors, central processing units, logic circuitries, and/or any
15 devices that process data based on operational instructions. Among other
capabilities, one or more processor(s) (202) is configured to fetch and execute computer-readable instructions stored in a memory (204) of the system (108). The memory (204) is configured to store one or more computer-readable instructions or routines in a non-transitory computer-readable storage medium, which is fetched
20 and executed to create or share data packets over a network service. The memory
(204) may comprise any non-transitory storage device including, for example, volatile memory such as Random-Access Memory (RAM), or non-volatile memory such as Erasable Programmable Read-Only Memory (EPROM), flash memory, and the like.
25 [0062] In an embodiment, the system (108) includes an interface(s) (206).
The interface(s) (206) may include a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. The interface(s) (206) may facilitate communication of the system (108). The interface(s) (206) may also provide a communication pathway for one or more
16

components of the system (108). Examples of such components include but are not limited to, processing unit/engine(s) (208) and a database (210).
[0063] The processing unit/engine(s) (208) is implemented as a
combination of hardware and programming (for example, programmable
5 instructions) to implement one or more functionalities of the processing engine(s)
(208). In the examples described herein, such combinations of hardware and programming are implemented in several different ways. For example, the programming for the processing engine(s) (208) is processor-executable instructions stored on a non-transitory machine-readable storage medium and the
10 hardware for the processing engine(s) (208) may comprise a processing resource
(for example, one or more processors), to execute such instructions. In the present examples, the machine-readable storage medium may store instructions that, when executed by the processing resource, implement the processing engine(s) (208). In such examples, the system (108) may comprise the machine-readable storage
15 medium storing the instructions and the processing resource to execute the
instructions, or the machine-readable storage medium is separate but accessible to the system (108) and the processing resource. In other examples, the processing engine(s) (208) is implemented by an electronic circuitry.
[0064] The processing engine (208) includes one or more engines selected
20 from any of a recording engine (212), an update engine (214), a suppression engine
(216), and other engine(s) (218). The processing engine (208) may receive a request from a user (102) or an application for performing entry of a new log line in said file. The system (108) may be configured to receive the request by a command-line interface (CLI) or a graphical user interface (GUI).
25 [0065] The recording engine (212) is configured to record the count and
time of entry of each log line. The recording engine (212) is configured to maintain a mapping of the log-map and the value as a log detail Plain Old Java Object (POJO). The log detail POJO includes the count, the start time, and the end time.
17

[0066] The update engine (214) is configured to write a log or trace to the
file only once, after which only the count is incremented, and the time in the map is updated. The time may include a start time and an end time.
[0067] The suppression engine (216) is configured to receive a logger line
5 (log line) generated from an application and pass the received logger line. An
example of a common method or application is getLogDetailsCount. The
getLogDetailsCount method is a centralized function responsible for managing the
log entries generated by an application. The getLogDetailsCount method is
configured to check in a log-map if the same logger line is already contained in the
10 log-map and updates the log detail pojo only without writing the log in the file to
avoid redundant log writes, thereby optimizing file write operations and improving log analysis.
[0068] To avoid the memory to overflow in long run, a scheduler is
configured to run at a configurable time interval which, when run, may write the
15 map data in a configured log file in INFO mode and clear the map entries from the
map memory.
[0069] An additional check based on entries in the map is also added when
the map entries reach a threshold value (a particular count), for example, 10000, and then the log map is flushed and cleared.
20 [0070] To check the log detail POJO content at any particular time between
the scheduler run, the getLogDetailsCount may be called using any command-line interface (CLI) or Graphical User Interface (GUI) command trigger to flush the current content to the log file.
[0071] The suppression engine (216) is configured to suppress repetitive
25 logs efficiently at high load and may not introduce any additional delay in
application end processing.
18

[0072] In an embodiment, the database (210) is configured to include data
that is either stored or generated as a result of functionalities implemented by any of the components of the processor(s) (202) or the processing engine(s) (208) or the system (108).
5 [0073] Although FIG. 2 shows an exemplary block diagram (200) of the
system (108), in other embodiments, the system (108) may include fewer
components, different components, differently arranged components, or additional
functional components than depicted in FIG. 2. Additionally, or alternatively, one
or more components of the (108) may perform functions described as being
10 performed by one or more other components of the system (108).
[0074] FIG. 3 illustrates an example flow diagram (300) for suppressing
repetitive log lines in a file in real-time in accordance with an embodiment of the present disclosure. The system (108) may implement the following steps.
[0075] At step 302, the method (300) is configured to receive, by a
15 processing engine (208), a request from a user (102) or an application for
performing entry of a new log line in said file. This step involves interfacing with
the user (102), which may be done through a command-line interface (CLI) or a
graphical user interface (GUI). The request triggers a suppression process,
signalling the system (108) to initiate the extraction and processing of log lines from
20 the specified file.
[0076] At step 304, the method (300) is configured to extract, by a recording
engine (212), at least one log line from the file. The recording engine (212) reads the file and captures the at least one log line that need to be processed. The log lines are the raw data that will be analysed.
25 [0077] At step 306, the method (300) is configured to maintain, by the
recording engine (212), a log-map having a plurality of attributes corresponding to each of the extracted log lines. The log-map is a data structure that keeps track of
19

each unique log line along with its attributes. This approach helps in efficiently managing and updating the log information. The attributes may include:
• Identifier: A unique identifier for the log line.
• Count Value: The number of times the specific log line has been 5 encountered.
• Start Time: The timestamp of the first occurrence of the log line.
• End Time: The timestamp of the most recent occurrence of the log line.
[0078] At step 308, the method (300) is configured to perform, by the
recording engine (212), an attribute mapping of the received new log line with the
10 maintained log map. This involves checking each new log line against the log-map
to see if it already exists based on the attributes mapping. The process maps the attributes of the new log line to those in the log-map, facilitating the suppression of redundant entries of repetitive log lines in a file.
[0079] At step 310, the method (300) is configured to determine, by an
15 update engine (214), whether the received new log line or attributes corresponding
to the new log line already exists in the log map maintained by the recording engine (212) based on the attribute mapping. Based on this determination, the system decides the subsequent action.
[0080] In case the new log line exists in said log-map or the attributes
20 corresponding to the new log line exists in said log-map, the method (300) skips
writing the new received log line in the file and updates the plurality of attributes corresponding to the existing log file in said log-map. This involves incrementing the count value and updating the end time for the existing log entry, thereby preventing redundant entries in the log file.
25 [0081] In case the attributes corresponding to the new log line or new log
line does not exist in the log-map, the method (300) writes the new received log
20

line in the log-map and in the file. This action ensures that new log entries are recorded both in the log-map and the log file, maintaining a comprehensive log history.
[0082] In an embodiment, the method (300) is configured to clear said log-
5 map when the count value is equal to a threshold value. This preventive measure
ensures that the log-map does not grow indefinitely, which could otherwise lead to memory overflow issues.
[0083] In an embodiment, an interface(s) (206) is configured to display the
file. This step involves presenting the processed log data to the user, allowing them
10 to review the current state of the file.
[0084] In an embodiment, a scheduler is configured to run at a configurable
time interval. This automated process periodically writes the map data in the log-
map and clears the map entries from the memory (204) once the scheduler runs.
This ensures regular maintenance of the log-map, keeping it up-to-date and
15 manageable.
[0085] FIG. 4 is an illustration (400) of a non-limiting example of details of
computing hardware used in the system (108), in accordance with an embodiment
of the present disclosure. As shown in FIG. 4, the system (108) may include an
external storage device (410), a bus (420), a main memory (430), a read only
20 memory (440), a mass storage device (450), a communication port (460), and a
processor (470). A person skilled in the art will appreciate that the system (108) may include more than one processor (470) and communication ports (460). Processor (470) may include various modules associated with embodiments of the present disclosure.
25 [0086] In an embodiment, the communication port (460) is any of an RS-
232 port for use with a modem-based dialup connection, a 10/100 Ethernet port, a Gigabit or 10 Gigabit port using copper or fiber, a serial port, a parallel port, or other existing or future ports. The communication port (460) is chosen depending
21

on a network, such a Local Area Network (LAN), Wide Area Network (WAN), or any network to which the system (108) connects.
[0087] In an embodiment, the memory (430) is Random Access Memory
(RAM), or any other dynamic storage device commonly known in the art. Read-
5 only memory (440) is any static storage device(s) e.g., but not limited to, a
Programmable Read Only Memory (PROM) chips for storing static information
e.g., start-up or Basic Input/Output System (BIOS) instructions for the processor
(470).
[0088] In an embodiment, the mass storage (450) is any current or future
10 mass storage solution, which is used to store information and/or instructions.
Exemplary mass storage solutions include, but are not limited to, Parallel Advanced
Technology Attachment (PATA) or Serial Advanced Technology Attachment
(SATA) hard disk drives or solid-state drives (internal or external, e.g., having
Universal Serial Bus (USB) and/or Firewire interfaces), one or more optical discs,
15 Redundant Array of Independent Disks (RAID) storage, e.g., an array of disks (e.g.,
SATA arrays).
[0089] In an embodiment, the bus (420) communicatively couples the
processor(s) (470) with the other memory, storage, and communication blocks. The
bus (420) is, e.g., a Peripheral Component Interconnect (PCI)/PCI Extended (PCI-
20 X) bus, Small Computer System Interface (SCSI), Universal Serial Bus (USB) or
the like, for connecting expansion cards, drives and other subsystems as well as
other buses, such a front side bus (FSB), which connects the processor (470) to the
system (108).
[0090] Optionally, operator and administrative interfaces, e.g., a display,
25 keyboard, joystick, and a cursor control device, may also be coupled to the bus
(420) to support direct operator interaction with the system (108). Other operators and administrative interfaces are provided through network connections connected through the communication port (460). The components described above are meant
22

only to exemplify various possibilities. In no way should the aforementioned exemplary illustration (400) limit the scope of the present disclosure.
[0091] The present disclosure is configured to provide the system (108), a
PCF server, and a method (300) for suppressing entry/writing of repetitive log lines
5 in a file in real-time. In 5G networks and telecommunications systems, log files
play a crucial role in monitoring, troubleshooting, and maintaining the health of the network. Repetitive log lines can make it challenging to identify unique issues and analyze the system's behavior effectively. For example, the system (108) may be employed for network monitoring and troubleshooting and is configured to provide
10 real-time monitoring of logs, thereby helping to identify issues as they occur. The
present system (108) allows network administrators to focus on unique events, making it easier to pinpoint the root cause of problems. In another example, the system (108) may be employed for resource optimization in a 5G network. In 5G networks, efficient resource allocation is critical. Repetitive logs can clutter
15 monitoring tools and make it difficult to analyze resource utilization. present system
(108) streamlines monitoring processes and highlights unique resource-related events that require attention. The system (108) is placed within a 5G communication network or with various network elements that may involve various algorithms, protocols, or mechanisms to enhance the efficiency and reliability of
20 triggering events, ensuring a smoother operation of user equipment and network
elements in 5G networks.
[0092] The method and system of the present disclosure may be
implemented in a number of ways. For example, the methods and systems of the present disclosure may be implemented by software, hardware, firmware, or any
25 combination of software, hardware, and firmware. The above-described order for
the steps of the method is for illustration only, and the steps of the method of the present disclosure are not limited to the order specifically described above unless specifically stated otherwise. Further, in some embodiments, the present disclosure may also be embodied as programs recorded in a recording medium, the programs
30 including machine-readable instructions for implementing the methods according
23

to the present disclosure. Thus, the present disclosure also covers a recording medium storing a program for executing the method according to the present disclosure.
[0093] While the foregoing describes various embodiments of the present
5 disclosure, other and further embodiments of the present disclosure may be devised
without departing from the basic scope thereof. The scope of the present disclosure
is determined by the claims that follow. The present disclosure is not limited to the
described embodiments, versions, or examples, which are included to enable a
person having ordinary skill in the art to make and use the present disclosure when
10 combined with information and knowledge available to the person having ordinary
skill in the art.
ADVANTAGES OF THE PRESENT DISCLOSURE
[0094] The present disclosure provides a system and a method to suppress
writing of repetitive logs lines in a file in real-time.
15 [0095] The present disclosure provides the system and the method for
suppressing queries in real-time in a Policy Control Function (PCF).
[0096] The present disclosure provides the system and the method to
suppress the writing of the same log lines in a file to avoid expensive file write
operations.
20 [0097] The present disclosure eases operations team efforts to debug logs.
[0098] The present disclosure captures the occurrence of a specific log line
along with its start time and end time in one place.
24

WE CLAIM:
1. A system (108) for suppressing entry of repetitive log lines in a file in real-time,
the system (108) comprises:
a processing engine (208) configured to receive a request from at least one source for performing entry of a new log line in the file, wherein the request includes the new log line;
a recording engine (212) configured to,
extract at least one log line from the file; maintain a log-map having a plurality of attributes corresponding to the extracted at least one log line;
perform an attribute mapping of the received new log line with the maintained log-map; and an update engine (214) configured to,
determine whether attributes corresponding to the received new log line already exists in the log map maintained by the recording engine (212) based on the attribute mapping:
responsive to determining that the attributes corresponding to the received new log line exists in the log map, skip writing the new received log line in the file.
2. The system (108) as claimed in claim 1, wherein responsive to determining that the attributes corresponding to the received new log line do not exist in the log map, the new received log line is written in the file.
3. The system (108) as claimed in claim 1, wherein the plurality of attributes includes an identifier, a count value, a start time, and an end time.
4. The system (108) as claimed in claim 1, wherein the recording engine (212) is configured to clear the log-map when the count value is equal to a threshold value.

5. The system (108) as claimed in claim 1, wherein an interface(s) (206) is configured to display the log-map and the file.
6. The system (108) as claimed in claim 1, wherein a scheduler is configured to run at a configurable time interval.
7. The system (108) as claimed in claim 1, wherein the scheduler is configured to write map data in the log-map and clear the map data from a memory once the schedular run.
8. The system (108) as claimed in claim 1, the at least one source includes at least a user (102) or an application.
9. A method (300) of suppressing entry of a repetitive log line in a file in real-time, the method (300) comprising:
receiving (302), by a processing engine (208), a request from a at least one source for performing entry of a new log line in the file, wherein the request includes the new log line;
extracting (304), by a recording engine (212), at least one log line from the file;
maintaining (306), by the recording engine (212), a log-map having a plurality of attributes corresponding to the at least one extracted log line;
performing (308), by the recording engine (212), an attribute mapping of the received new log line with the maintained log-map; and
determining (310), by an update engine (214), whether the attributes corresponding to the received new log line already exists in the log map maintained by the recording engine (212) based on the attribute mapping:
responsive to determining that the attributes corresponding to the received new log line exists in the log map, skip writing the new received log line in the file.

10. The method (300) as claimed in claim 9, wherein, responsive to determining that the attributes corresponding to the received new log line do not exist in the log map, the new received log line is written in the file.
11. The method (300) as claimed in claim 9, wherein the plurality of attributes includes an identifier, a count value, a start time, and an end time.
12. The method (300) as claimed in claim 9, the recording engine (212) is configured to clear the log-map when the count value is equal to a threshold value.
13. The method (300) as claimed in claim 9, wherein an interface(s) (206) is configured to display the log-map and the suppressed file.
14. The method (300) as claimed in claim 9, wherein a scheduler is configured to run at a configurable time interval.
15. The method (300) as claimed in claim 9, the scheduler is configured to write map data in the log-map and clear the map data from a memory once the schedular run.
16. The method (300) as claimed in claim 9, wherein the at least one source includes at least a user (102) or an application.
17. A user equipment (104) communicatively coupled with a network (106), the coupling comprises steps of:
receiving, by a processing engine (208), a request from at least one source for performing entry of a new log line in the file, wherein the request includes the new log line;
extracting, by a recording engine (212), a plurality of log lines from the file;

maintaining, by the recording engine (212), a log-map having a plurality of attributes corresponding to each of the plurality of extracted log lines;
performing, by the recording engine (212), an attribute mapping of the received new log line with the maintained log-map; and
determining, by an update engine (214), whether the attributes corresponding to the received new log line already exists in the log map maintained by the recording engine (212) based on the attribute mapping:
responsive to determining that the new received log line exists in the log map, skip writing the new received log line in the file.

Documents

Application Documents

# Name Date
1 202321044255-STATEMENT OF UNDERTAKING (FORM 3) [02-07-2023(online)].pdf 2023-07-02
2 202321044255-PROVISIONAL SPECIFICATION [02-07-2023(online)].pdf 2023-07-02
3 202321044255-FORM 1 [02-07-2023(online)].pdf 2023-07-02
4 202321044255-DRAWINGS [02-07-2023(online)].pdf 2023-07-02
5 202321044255-DECLARATION OF INVENTORSHIP (FORM 5) [02-07-2023(online)].pdf 2023-07-02
6 202321044255-FORM-26 [13-09-2023(online)].pdf 2023-09-13
7 202321044255-RELEVANT DOCUMENTS [07-03-2024(online)].pdf 2024-03-07
8 202321044255-POA [07-03-2024(online)].pdf 2024-03-07
9 202321044255-FORM 13 [07-03-2024(online)].pdf 2024-03-07
10 202321044255-AMENDED DOCUMENTS [07-03-2024(online)].pdf 2024-03-07
11 202321044255-ORIGINAL UR 6(1A) FORM 26-220424.pdf 2024-04-24
12 202321044255-Request Letter-Correspondence [03-06-2024(online)].pdf 2024-06-03
13 202321044255-Power of Attorney [03-06-2024(online)].pdf 2024-06-03
14 202321044255-Covering Letter [03-06-2024(online)].pdf 2024-06-03
15 202321044255-FORM-26 [04-06-2024(online)].pdf 2024-06-04
16 202321044255-ENDORSEMENT BY INVENTORS [07-06-2024(online)].pdf 2024-06-07
17 202321044255-DRAWING [07-06-2024(online)].pdf 2024-06-07
18 202321044255-CORRESPONDENCE-OTHERS [07-06-2024(online)].pdf 2024-06-07
19 202321044255-CORRESPONDANCE-WIPO CERTIFICATE-07-06-2024.pdf 2024-06-07
20 202321044255-COMPLETE SPECIFICATION [07-06-2024(online)].pdf 2024-06-07
21 Abstract1.jpg 2024-06-29
22 202321044255-FORM 18 [30-09-2024(online)].pdf 2024-09-30
23 202321044255-FORM 3 [08-11-2024(online)].pdf 2024-11-08