Abstract: A method and system for providing a mapped data to execute target action(s) at a server device [104]. The method encompasses transmitting from a client device [102] to the server device [104], a target set of static data. Then the method receives at the client device [102] from the server device [104], a set of secure data. Further, the method identifies at the client device [102], one or more user actions. Then the method generates at the client device [102], a set of dynamic data based on the one or more user actions. Then the method generates at the client device [102], a mapped data based on a mapping of the set of dynamic data and the set of secure data. Thereafter, the method provides, to the server device [104], the mapped data to execute the target action(s) at the server device [104]. [Figure 3]
FORM 2
THE PATENTS ACT, 1970
(39 OF 1970)
AND
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See section 10 and rule 13)
“SYSTEM AND METHOD FOR PROVIDING A MAPPED DATA TO EXECUTE TARGET ACTIONS”
We, Novi Digital Entertainment Private Limited, an Indian National, of Star House Urmi Estate, 95, Ganapatrao Kadam Marg, Lower Parel West, Mumbai, Maharashtra 400013, India.
The following specification particularly describes the invention and the manner in which it is to be performed.
SYSTEM AND METHOD FOR PROVIDING A MAPPED DATA TO EXECUTE TARGET
ACTIONS
TECHNICAL FIELD:
The present disclosure generally relates to the field of data processing. More particularly, the present disclosure relates to a method and a system for providing a mapped data to execute one or more target actions at a server device.
BACKGROUND OF THE DISCLOSURE:
The following description of the related art is intended to provide background information pertaining to the field of the disclosure. This section may include certain aspects of the art that may be related to various features of the present disclosure. However, it should be appreciated that this section is used only to enhance the understanding of the reader with respect to the present disclosure, and not as admission of the prior art.
The increasing use of user applications as the primary medium over user devices for various purposes, such as shopping and entertainment, has become a prominent trend in recent years. With the rapid advancement of technology and the widespread availability of smartphones and tablets, users are turning to applications as their go¬to platform for convenience and accessibility. Shopping applications, for instance, offer a seamless and personalized experience, allowing users to browse and purchase products with just a few taps. These applications (or may be referred herein as apps) provide detailed product information, customer reviews, and secure payment options, making online shopping a hassle-free experience. Similarly, entertainment applications offer a wide range of content, including movies, TV shows, music, and games, right at users' fingertips. They provide on-demand streaming, personalized
recommendations, and interactive features, delivering immersive entertainment experiences. As the use of user applications continues to grow, they are reshaping the way we engage with technology and transforming the landscape of shopping and entertainment.
The increasing use of user applications as the primary medium over user devices for various purposes has led to a greater demand for data processing and analysis. As more users engage with applications for shopping, entertainment, social networking, and other activities, the vast amount of data generated presents valuable insights. Analyzing user patterns and behaviors can help generate better recommendations, understand user needs, and identify shortcomings in the user platform. By gathering and processing data on user preferences, interactions, and feedback, applications can tailor their offerings and user experiences to provide more personalized and relevant content. This data-driven approach enhances customer satisfaction and loyalty, as well as enables continuous improvement of the application's features and functionality. Therefore, the requirement to process and analyze user data has become essential in leveraging the increasing use of user applications as the primary medium.
Further, the processing requirement to handle gathered data places a significant burden on servers, resulting in increased overhead and potential performance impacts on user platforms. As the volume of data continues to grow, the server infrastructure must scale accordingly to accommodate the processing demands. This scalability often requires significant investments in hardware, software, and network resources. Additionally, the processing itself consumes computational power and storage, which can strain server capabilities and lead to slower response times. These performance issues can negatively affect user experience, causing frustration and
potentially driving users away from the user platforms/digital platforms. Furthermore, the costs associated with maintaining and upgrading server infrastructure may impact profits, impacting the financial viability of the user platform. Therefore, striking a balance between data processing requirements and server capacity becomes crucial for maintaining user retention and maximizing profitability in the face of increasing data usage. Additionally, currently the real-time data-processing during live streaming is driven either purely by the client or a combination of triggers at the client with the enrichment at the server end. However, such approaches suffer from the problem of maintaining data quality and data consistency at scale (also known as client driven analytics approaches) and also increases compute overhead at the server (also known as server side enrichment techniques). In short, currently known approaches of data processing rely either on user device/client device driven analytics or a combination of triggers at the user device with enrichment at the server. However, these approaches encounter challenges in maintaining quality and consistency at scale. These traditional client device driven data-processing methods result in increased compute overhead at the server due to the reliance on traditional server-side enrichment techniques.
Therefore, in light of these limitations, there is a need for a solution that allows for seamless scaling and efficient processing of large volumes of data while maintaining consistent quality and performance. Hence, a system and a method for providing mapped data to execute one or more target actions at a server device is required.
OBJECTS OF THE DISCLOSURE
Some of the objects of the present disclosure, which at least one embodiment disclosed herein satisfies are listed herein below.
It is an object of the present disclosure to provide a system and a method that optimizes data-processing by utilizing a client device’s processing capabilities while centralizing control over data (backed as a package) that is used for analysis on a server.
It is another object of the present disclosure to provide in a client-server environment a solution that by processing at a client device achieves real-time data enrichment without compromising performance or scalability.
It is another object of the present disclosure to provide a solution to enable point in time enrichment of data and ensure high data quality and consistency across all clients.
Yet another object of the present disclosure is to provide a solution to allow for seamless updates to the data-processing schema and to add additional analytic sources of data without requiring clients/devices to update their applications.
Yet another object of the present disclosure is to provide a robust and efficient data-processing solution that enables point in time enrichment and ensures data quality and consistency and facilitating schema updates without any configuration change at the client.
SUMMARY OF THE DISCLOSURE
This section is provided to introduce certain aspects of the present disclosure in a simplified form that are further described below in the detailed description. This summary is not intended to identify the key features or the scope of the claimed subject matter.
In order to achieve the aforementioned objectives, one aspect of the disclosure relates to a method for providing mapped data to execute one or more target actions at a server device. The method comprises transmitting by a transceiver unit from the client device to a server device , a target set of static data associated with a client account/behaviour. The method further comprises receiving by the transceiver unit at the client device from the server device , a set of secure data based on the target set of static data. Further the method encompasses identifying by an input unit at the client device, one or more user actions. The method further encompasses generating, by a processing unit at the client device, a set of dynamic data based on the one or more user actions. Further, the method comprises generating by the processing unit at the client device, a mapped data based on a mapping of the set of dynamic data and the set of secure data. Thereafter, the method comprises providing by the transceiver unit from the client device to the server device , the mapped data to execute the one or more target actions at the server device.
Another aspect of the present disclosure relates to a system for providing mapped data to execute one or more target actions at a server device. The system comprises a transceiver unit configured to transmit from the client device to a server device , a target set of static data associated with a client account. The transceiver unit is further configured to receive at the client device from the server device , a set of secure data based on the target set of static data. The system further comprises an input unit connected to at least the transceiver unit, wherein the input unit is configured to identify at the client device, one or more user actions. The system further comprises a processing unit connected to at least the transceiver unit and the input unit, wherein the processing unit is configured to generate at the client device, a set of dynamic data based on the one or more user actions. The processing unit is further configured to generate at the client device, a mapped data based on a mapping of the set of
dynamic data and the set of secure data. Furthermore, the transceiver unit as disclosed by the present system is configured to provide from the client device to the server device , the mapped data, to execute the one or more target actions at the server device.
BRIEF DESCRIPTION OF DRAWINGS
The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components, electronic components or circuitry commonly used to implement such components.
FIG.1 illustrates an exemplary block diagram depicting an exemplary network architecture diagram [100], in accordance with exemplary embodiments of the present disclosure.
FIG.2 illustrates an exemplary block diagram of a system [200], for providing a mapped data to execute one or more target actions at a server device , in accordance with exemplary embodiments of the present disclosure.
FIG.3 illustrates an exemplary method flow diagram [300], for providing a mapped data to execute one or more target actions at a server device , in accordance with exemplary embodiments of the present disclosure.
The foregoing shall be more apparent from the following more detailed description of the disclosure.
DETAILED DESCRIPTION
In the following description, for the purposes of explanation, various specific details are set forth in order to provide a thorough understanding of embodiments of the present disclosure. It will be apparent, however, that embodiments of the present disclosure may be practiced without these specific details. Several features described hereafter can each be used independently of one another or with any combination of other features. An individual feature may not address any of the problems discussed above or might address only some of the problems discussed above.
The ensuing description provides exemplary embodiments only, and is not intended to limit the scope, applicability, or configuration of the disclosure. Rather, the ensuing description of the exemplary embodiments will provide those skilled in the art with an enabling description for implementing an exemplary embodiment. It should be understood that various changes may be made in the function and arrangement of elements without departing from the spirit and scope of the disclosure as set forth.
Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details.
For example, circuits, systems, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail.
Also, it is noted that individual embodiments may be described as a process which is depicted as a flowchart, a flow diagram, a data flow diagram, a structure diagram, or a block diagram. Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel or concurrently. In addition, the order of the operations may be re-arranged. A process is terminated when its operations are completed but could have additional steps not included in a figure.
The word “exemplary” and/or “demonstrative” is used herein to mean serving as an example, instance, or illustration. For the avoidance of doubt, the subject matter disclosed herein is not limited by such examples. In addition, any aspect or design described herein as “exemplary” and/or “demonstrative” is not necessarily to be construed as preferred or advantageous over other aspects or designs, nor is it meant to preclude equivalent exemplary structures and techniques known to those of ordinary skill in the art. Furthermore, to the extent that the terms “includes,” “has,” “contains,” and other similar words are used in either the detailed description or the claims, such terms are intended to be inclusive—in a manner similar to the term “comprising” as an open transition word—without precluding any additional or other elements.
As used herein, a “processing unit” or “processor” or “operating processor” includes one or more processors, wherein processor refers to any logic circuitry for processing instructions. A processor may be a general-purpose processor, a special purpose
processor, a conventional processor, a digital signal processor, a plurality of microprocessors, one or more microprocessors in association with a DSP core, a controller, a microcontroller, Application Specific Integrated Circuits, Field Programmable Gate Array circuits, any other type of integrated circuits, etc. The processor may perform signal coding data processing, input/output processing, and/or any other functionality that enables the working of the system according to the present disclosure. More specifically, the processor or processing unit is a hardware processor.
As used herein, “a client device”, “a user equipment”, “a user device”, “a smart-user-device”, “a smart-device”, “an electronic device”, “a mobile device”, “a handheld device”, “a wireless communication device”, “a mobile communication device”, “a communication device” may be any electrical, electronic and/or computing device or equipment, capable of implementing the features of the present disclosure. The user equipment/device may include, but is not limited to, a mobile phone, smart phone, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, television, smart TVs, streaming sticks, gaming consoles, wearable device or any other computing device which is capable of implementing the features of the present disclosure. Also, the user device may contain at least one input means configured to receive an input from at least one of a transceiver unit, a processing unit, a storage unit, an input unit and any other such unit(s) which are required to implement the features of the present disclosure.
As used herein, “storage unit” or “memory unit” refers to a machine or computer-readable medium including any mechanism for storing information in a form readable by a computer or similar machine. For example, a computer-readable medium includes read-only memory (“ROM”), random access memory (“RAM”), magnetic disk
storage media, optical storage media, flash memory devices or other types of machine-accessible storage media. The storage unit stores at least the data that may be required by one or more units of the system to perform their respective functions.
As used herein, the term “secure data” may refer to a data that is unintelligible to the client device and in an implementation the secure data may be generated using at least one of one or more data encryption techniques and one or more data compression techniques. However, in another implementation, the secure data may include plain strings that are generated based on a static data associated with the client device, wherein the plain strings are unintelligible to the client device.
As used herein, “similar” and “same” may be used interchangeably in this patent specification and may intend to convey the same meaning. The use of these terms may not be interpreted as implying any difference in meaning or scope.
The present disclosure relates to a system and a method for providing mapped data to execute one or more target actions at a server device. The present disclosure provides a solution that effectively overcomes the shortcomings of the prior art. The prior art suffers from several limitations, including the significant burden placed on servers to handle the gathered data, resulting in increased overhead and potential performance impacts on user platforms. As data volumes grow, the scalability of server infrastructure becomes a challenge, requiring substantial investments in hardware, software, and network resources. Moreover, the processing of data consumes computational power and storage, straining server capabilities and leading to slower response times. These performance issues negatively affect user experience, potentially driving users away from the platform. Additionally, the costs associated with maintaining and upgrading server infrastructure can impact the
financial viability of the user platform. The present disclosure addresses these
challenges by providing a system and a method that leverage the processing
capabilities of the client device while centralizing control over the data used for
analysis on the server. This approach aims to improve the efficiency and effectiveness
of data-processing techniques. The present disclosure introduces a novel solution that
mitigates these challenges, resulting in improved efficiency, scalability, and user
experience and providing a robust and efficient data-processing solution that
facilitates point in time data enrichment, ensures data quality and consistency, and
supports schema updates without necessitating client application releases (i.e.,
without necessitating any configuration change e.g., without downloading, and
reinstalling or upgrading of new code at the client end). This objective of the present
disclosure emphasizes the need for a reliable and scalable data-processing
framework. By overcoming the shortcomings of the prior art, the present disclosure offers a more effective and financially viable solution for data-processing at user platforms. Further, in an implementation the present solution as disclosed herein may additionally be used for various use cases such as for a payment drop off funnels, pushing one or more advertisements to the users and/or any other interaction flows related to the users.
Hereinafter, exemplary embodiments of the present disclosure will be described in detail with reference to the accompanying drawings so that those skilled in the art can easily carry out the solution provided by the present disclosure.
Referring to Figure 1, the Figure 1 illustrates an exemplary block diagram depicting an exemplary network architecture diagram [100], in accordance with exemplary embodiments of the present disclosure. As shown in Figure 1, the exemplary network architecture diagram [100] comprises one or more client devices (CD) [102(1)],
[102(2)], ….[102(n)] (hereinafter collectively referred to as client device [102] for clarity purpose) in communication with at least one server device [104], wherein in an implementation the CD [102] further comprises a system [200] configured to implement the feature of the present disclosure. Also, in an implementation the system [200] may reside partially in either the server device [104] or the client device [102], or the system [200] may be in connection with the server device [104] and the client device [102], in a manner as obvious to a person skilled in the art to implement the features of the present disclosure.
Also, in Figure 1 only a single client device (or may be referred to as user equipment) [102] and a single the server device [104] are shown, however, there may be multiple such client devices [102] and/or server devices [104] or there may be any such numbers of said client device [102] and/or server device [104] as obvious to a person skilled in the art or as required to implement the features of the present disclosure. Further, in the implementation where the system [200] is present in the CD [102], based on the implementation of the features of the present disclosure, a mapped data is provided to execute one or more target actions at the server device [104] by the system [200], wherein the mapped data is generated by the system [200] by mapping of a set of dynamic data and a set of secure data. The set of dynamic data is generated at the CD [102] based on one or more user actions performed at the CD [102], and the set of secure data is generated at the server device [200] from a target set of static data, using at least one of one or more data encryption techniques and one or more data compression techniques. As used herein the “target set of static data” comprises one of a set of static data and a set of updated static data, wherein the set of static data comprises a client device data and the set of updated static data comprises an updated client device data. Further, the client device data comprises at least one of a client device identification data, a client device authentication data, an information
of a client account, and a client device location data. Also, the updated client device data comprises at least one of an updated client device identification data, an updated client device authentication data, an updated information of a client account, and an updated client device location data.
Further, referring to Figure 2, an exemplary block diagram of a system [200], for providing the mapped data to execute the one or more target actions at the server device [104] is shown. The system [200] comprises at least one transceiver unit [202], at least one input unit [204], at least one processing unit [206] and at least one storage unit [208]. Also, all of the components/ units of the system [200] are assumed to be interacting with each other in a manner that may be obvious to a person skilled in the art in light of the present disclosure, to implement the solution as disclosed herein unless otherwise indicated below. Also, in Fig. 2 only a few units are shown, however, the system [200] may comprise multiple such units or the system [200] may comprise any such numbers of said units, as required to implement the features of the present disclosure. Further, in an implementation, the system [200] may be present in the client device [102] to implement the features of the present disclosure. The system [200] may be a part of the client device [102]/ or may be independent but in communication with the client device [102].
The system [200] is configured for providing the mapped data to execute one or more target actions at the server device [104], with the help of the interconnection between the components/units of the system [200].
More specifically, in order to implement the features of the present disclosure, the transceiver unit [202] is configured to transmit from the client device [102] to the server device [104], a target set of static data associated with a client account. As used
herein the “client account” may be a digital account associated with the server device
[104]. More specifically, the “client account” may be a digital user account that is a
part of a digital application associated with the server device [104]. For example, the
client account may be a user profile created on an over the top (OTT) application
linked to the server device [104]. In an implementation of the present disclosure, the
target set of static data comprises one of a set of static data and a set of updated
static data. Further, the set of static data comprises a client device data comprising at
least one of a client device identification data, a client device authentication data, an
information of the client account, and a client device location data. Further, the term
client device identification data refers to a specific information or data that uniquely
identifies the client device [102] and may include details such as a client device [102]
ID, a client device [102] serial number, a client device [102] media access control
address (MAC address), or any other identifier that distinguishes the client device
[102] from other electronic devices. Further, the term client device authentication
data refers to a data used to authenticate or verify an identity of the client device
[102] and may include but not limited client credential(s), such as username(s),
password(s), digital certificate(s), and/or other authentication mechanism(s) used
to validate or authorize the client device [102] to access certain resources or services of the server device [104]. Further, the term information of the client account pertains to a data associated with the client account and typically includes details about a client i.e., a user of the client device [102], such as the client’s personal information, the client’s business information, the client’s contact information, the client’s subscription plans, the client’s payment details, the client’s preferences, and/or any other relevant information that characterizes the client's account. Further, the term client device location data refers to the geographical or spatial information related to a location of the client device [102] and may be in the form of GPS coordinates, an
provides information about a current location of the client device [102] and/or a last known location of the client device [102]. It is to be noted that a person skilled in the art would appreciate that such client device location data is commonly used for location-based services, tracking, or enhancing user experiences by providing location-specific content or functionality. It should be noted that the terms "client device identification data," "client device authentication data," "information of the client account," and "client device location data" as used in present disclosure should not be considered as restrictive or limiting. It is understood that a person skilled in the art would recognize that these terms encompass any parameter, concept, or element that is currently known or may become known in the future. Furthermore, the scope of these terms may extend to include any obvious variations or developments that would be apparent to a person skilled in the art in light of technological advancements or industry developments. Therefore, the interpretation of these terms should be broad and flexible to accommodate future discoveries or innovations in the field.
Furthermore, the set of updated static data comprises an updated client device data comprising at least one of an updated client device identification data, an updated client device authentication data, an updated information of the client account, and an updated client device location data. Also, in an implementation to generate the set of updated static data, the processing unit [206] is first configured to detect, at the client device [102], at least one change in the client device data. Thereafter, the processing unit [206] is configured to generate, at the client device [102], the set of updated static data based on the at least one change in the client device data.
Further, the term updated client device identification data pertains to a revised identification data that uniquely identifies the client device [102] after a change in the client device identification data or an update in the client device identification data
and may include an updated client device [102] ID(s), updated client device [102] serial number(s), an updated client device [102] Media Access Control Address (MAC addresses), and/or any other identifiers that distinguish the client device [102] in its updated state. Further, the term updated client device authentication data refers to a modified data used for authenticating or verifying the identity of the client device [102] following a change in the client device authentication data or an update in the client device authentication data and may include updated client device [102] credential(s) such as username(s) updated by the client, password(s) updated by the client, updated digital certificate(s) for the client, and/or other authentication mechanism(s) used to validate the client device [102]'s authorization. Further, the term updated information of the client account encompasses the revised details of the client account or data associated with the client's account after a change in the client account or an update in the client account and may include an updated personal information of the client, an updated business information of the client, an updated contact details of the client, updated subscription plan(s) of the client, an updated payment information of the client, updated preference(s) of the client, or any other relevant information that characterizes the client's account in its updated state. Further, the term updated client device location data refers to a modified geographical or spatial information related to an updated location of the client device [102] after a change in the location of the client device [102], or an update in location of the client device [102]. The modified geographical or spatial information may be in a form of updated GPS coordinates of the client device [102], an updated client device [102] internet protocol address (IP address), an updated client device [102] physical address, and/or any other data that provides information about the updated or current location of the client device [102]. This data is commonly used for location-based services, tracking, or enhancing user experiences based on the updated device location.
It should be noted that the terms " updated client device identification data," " updated client device authentication data," " updated information of the client account," and " updated client device location data" used in the present disclosure should not be considered as restrictive or limiting. It is understood that a person skilled in the art would recognize that these terms encompass any parameter, concept, or element that is currently known or may become known in the future. Furthermore, the scope of these terms may extend to include any obvious variations or developments that would be apparent to a person skilled in the art in light of technological advancements or industry developments. Therefore, the interpretation of these terms should be broad and flexible to accommodate future discoveries or innovations in the field.
Further, the transceiver unit [202] as disclosed by the present disclosure is configured to receive at the client device [102] from the server device [104], a set of secure data based on the target set of static data. Further, in a preferred implementation of the present disclosure, the set of secure data is generated at the server device [104] from the target set of static data, using at least one of one or more data encryption techniques and one or more data compression techniques. Furthermore, in another implementation of the present disclosure, the set of secure data is received at the client device [102] from the server device [104] at one of a periodic time intervals, and a dynamically defined time interval.
Further, in accordance with present disclosure the one or more data encryption techniques may comprise one or more cryptographic encryption techniques designed to secure a data during transmission and storage and such technique(s) may include a symmetric encryption technique, an asymmetric encryption technique, a hash
function technique, a digital signature technique, and/or a cryptographic key management technique. Furthermore, a selection and an application of specific encryption technique(s) may vary depending on factors such as a level of security required, a computational efficiency, and a compatibility with a system [200] in use. Further, in accordance with present disclosure the one or more data compression techniques encompasses technique(s) to reduce the size of a data while preserving its essential information and functionality. These data compression technique(s) enable efficient storage and transmission of the data by minimizing a required storage space or bandwidth. In accordance with the present disclosure the one or more data compression techniques may comprise common data compression technique(s) that may include lossless compression technique(s) and/or lossy compression technique(s). The choice of data compression technique may depend on a type of data, a desired compression ratio, and a trade-off between compression efficiency and data fidelity. It should be noted that the usage of the terms "one or more data encryption techniques" and "one or more data compression techniques" as used in the present disclosure are not intended to limit the scope of the present disclosure to specific techniques. A person skilled in the art would appreciate that there exists a wide range of data encryption and compression techniques, both existing and future developments. The selection and application of specific techniques may depend on various factors, including security requirements, performance considerations, and technological advancements. Therefore, the terms "one or more data encryption techniques" and "one or more data compression techniques" used herein should be interpreted broadly to encompass any known or future encryption techniques and compression techniques, respectively, that are obvious to a person skilled in the art in light of developments in the field.
Further, the input unit [204] connected to at least the transceiver unit [202], as disclosed by the present disclosure, is configured to identify, at the client device [102], one or more user actions. Further, in an implementation of the present disclosure, the one or more user actions comprises an execution of one or more predefined actions. The term one or more predefined actions refers to one or more specific operations or one or more specific tasks that have been established in advance to perform certain functions or to trigger particular responses in the client account. These one or more predefined actions may be designed to facilitate user interactions, automate processes, or provide specific functionalities on the client account. Further, the one or more predefined actions may include user driver actions and/or non-user driven actions such including but not limited to a download completion action, a buffering action, a content downloading action, an application viewing action, an action of clicking a button, a selection of an option from a menu action, an action related to entering specific keystrokes, an action for submitting a form, an action initiating a specific function, and/or any other predetermined user action(s) defined within the system [200]. It is important to note that the identification of the user action(s) and the execution of the predefined action(s) may vary depending on the specific implementation or application of a system [200].
Further, as disclosed by the present disclosure the processing unit [206] connected to at least the transceiver unit [202] and the input unit [204] is configured to generate, at the client device [102], a set of dynamic data based on the one or more user actions. Further, the set of dynamic data may be an information or a content that is dynamically generated or updated on the client account, in response to the one or more user actions. Further, in an implementation of the present disclosure the feature of generation of the set of dynamic data may comprise tracking a log of the one or more user actions at the client device [102] for a predefined period of duration,
wherein the predefined period of duration may be dynamically defined duration of time or a fixed duration of time. Further, in another implementation of the present disclosure the log may be transmitted to the server device [104] from the client device [102] at a regular interval of time i.e., 1 millisecond or at a dynamically defined interval of time, wherein transmitting the log may be further based on various factors such as network conditions, the system [200] load, user preferences or user activity. Furthermore, the set of dynamic data may include, but is not limited to, real-time data, interactive elements, calculated values, contextual information, and/or any other relevant data that reflects a current state of the client account and/or outcome of the user actions. In an exemplary implementation of the present disclosure, the client device [102] may provide to the server device [104], personalized, up-to-date, and interactive content or information to enhance the user experience and to provide relevant functionality based on the user's actions.
Further, the processing unit [206] is configured to generate, at the client device [102], the mapped data based on a mapping of the set of dynamic data and the set of secure data. In a preferred implementation of the present invention, the set of secure data is received from the server device [104] at the client device [102] in a predefined format, wherein predefined format is an encoded format that may not be decoded at the client device [102] and may only be used at the client device [102] to generate the mapped data. Further, in a preferred implementation of the present disclosure the mapped data is generated using one or more data mapping techniques. Furthermore, in an implementation of the present disclosure, one or more data mapping techniques facilitate a creation of a combined dataset by establishing a correlation or mapping between element(s) of the set of dynamic data and element(s) of the set of secure data. In an implementation of the present disclosure, a mapping process ensures an integration and alignment of relevant information from both datasets i.e., the set of
dynamic data and the set of secure data, allowing for further processing, analysis, or presentation of the mapped data. Further, in another implementation of the present disclosure, one or more additional fields of the set of dynamic data comprising a dynamic data, and one or more additional fields of secure data associated with the set of secure data may be mapped while generating the mapped data by the processing unit [206] at the client device [102]. Further, the one or more data mapping techniques may include a field mapping technique, a value mapping technique, a schema mapping technique, an entity mapping technique, and/or any other technique that enables a consolidation and structured representation of data from different sources. It should be noted that the use of the term "one or more data mapping techniques" as used herein in accordance with present disclosure is not intended to limit the scope of the disclosure to specific techniques. A person skilled in the art would appreciate that there exists a wide range of data mapping techniques, both existing and future developments and the selection and application of specific techniques may depend on various factors, including nature of data, desired mapping requirements, and/or technological advancements. Therefore, the terms used herein should be interpreted broadly to encompass any known or future data mapping techniques that are or may be obvious to a person skilled in the art in light of developments in the field.
Furthermore, the transceiver unit [202] as disclosed by the present disclosure is further configured to provide, from the client device [102] to the server device [104], the mapped data, to execute the one or more target actions at the server device [104]. In accordance with the present disclosure the one or more target actions refer to one or more predefined operations, one or more predefined tasks, and/or one or more predefined processes that are intended to be performed at the server device [104] based on the received mapped data. These actions may include, but are not limited
to, a data processing operation, a data analysis operation, a content generation operation, a resource allocation operation, and/or any other operation that utilizes the information contained within the mapped data. Thus, in an exemplary implementation of the present disclosure, the client device [102] by providing the mapped data to the server device [104], enables at the server device [104], a server-side execution of desired action(s), leveraging the combined and processed information (i.e., the mapped data) from the client device [102] to perform one or more specific tasks and/or one or more specific operations within the client- server environment.
Now, referring to Figure 3, an exemplary method flow diagram [300], for providing the mapped data to execute the one or more target actions at the server device [104], in accordance with exemplary embodiments of the present disclosure is shown. In an implementation the method [300] is performed by the system [200]. Further, in an implementation, the system [200] may be present in the client device [102] to implement the features of the present disclosure. Also, as shown in Figure 3, the method [300] starts at step [302].
Next, at step [304], the method [300] comprises transmitting by a transceiver unit [202] from the client device [102] to the server device [104], a target set of static data associated with a client account. As used herein the “client account” may be a digital account associated with the server device [104]. More specifically, the “client account” may be a digital user account that is a part of a digital application associated with the server device [104]. For example, the client account may be a user profile created on an over the top (OTT) application linked to the server device [104]. In a preferred implementation of the present disclosure, the target set of static data comprises one of a set of static data and a set of updated static data.
Further, the set of static data comprises a client device data comprising at least one of a client device identification data, a client device authentication data, an information of the client account, and a client device location data. Further, the term client device identification data refers to a specific information or data that uniquely identifies the client device [102] and may include details such as a client device [102] ID, a client device [102] serial number, a client device [102] media access control address (MAC address), or any other identifier that distinguishes the client device [102] from other electronic devices. Further, the term client device authentication data refers to a data used to authenticate or verify an identity of the client device [102] and may include client credential(s), such as username(s), password(s), digital certificate(s), and/or other authentication mechanism(s) used to validate or authorize the client device [102] to access certain resources or services of the server device [104]. Further, the term information of the client account pertains to a data associated with the client account and typically includes details about a client i.e., a user of the client device [102], such as the client’s personal information, the client’s business information, the client’s contact information, the client’s subscription plans, the client’s payment details, the client’s preferences, and/or any other relevant information that characterizes the client's account. Further, the term client device location data refers to the geographical or spatial information related to a location of the client device [102] and may be in the form of GPS coordinates, an internet protocol address (IP address), a physical address, and/or any other data that provides information about a current location of the client device [102] and/or a last known location of the client device [102]. It is to be noted that a person skilled in the art would appreciate that such client device location data is commonly used for location-based services, tracking, or enhancing user experiences by providing location-specific content or functionality. It should be noted that the terms "client device identification
data," "client device authentication data," "information of the client account," and "client device location data" as used in present disclosure should not be considered as restrictive or limiting. It is understood that a person skilled in the art would recognize that these terms encompass any parameter, concept, or element that is currently known or may become known in the future. Furthermore, the scope of these terms may extend to include any obvious variations or developments that would be apparent to a person skilled in the art in light of technological advancements or industry developments. Therefore, the interpretation of these terms should be broad and flexible to accommodate future discoveries or innovations in the field.
Furthermore, the set of updated static data comprises an updated client device data comprising at least one of an updated client device identification data, an updated client device authentication data, an updated information of the client account, and an updated client device location data. In a preferred implementation of the present disclosure, the method [300] as disclosed by the present disclosure comprises detecting by the processing unit [206] at the client device [102], at least one change in the client device data. Thereafter, the method [300] comprises generating by the processing unit [206] at the client device [102], the set of updated static data based on the at least one change in the client device data.
Further, the term updated client device identification data pertains to a revised identification data that uniquely identifies the client device [102] after a change in the client device identification data or an update in the client device identification data and may include an updated client device [102] ID(s), updated client device [102] serial number(s), an updated client device [102] Media Access Control Address (MAC addresses), and/or any other identifiers that distinguish the client device [102] in its
a modified data used for authenticating or verifying the identity of the client device [102] following a change in the client device authentication data or an update in the client device authentication data and may include updated client device [102] credential(s) such as username(s) updated by the client, password(s) updated by the client, updated digital certificate(s) for the client, and/or other authentication mechanism(s) used to validate the client device [102]'s authorization. Further, the term updated information of the client account encompasses the revised details of the client account or data associated with the client's account after a change in the client account or an update in the client account and may include an updated personal information of the client, an updated business information of the client, an updated contact details of the client, updated subscription plan(s) of the client, an updated payment information of the client, updated preference(s) of the client, or any other relevant information that characterizes the client's account in its updated state. Further, the term updated client device location data refers to a modified geographical or spatial information related to an updated location of the client device [102] after a change in the location of the client device [102], or an update in location of the client device [102]. The modified geographical or spatial information may be in a form of updated GPS coordinates of the client device [102], an updated client device [102] internet protocol address (IP address), an updated client device [102] physical address, and/or any other data that provides information about the updated or current location of the client device [102]. This data is commonly used for location-based services, tracking, or enhancing user experiences based on the updated device location.
Next, at step [306], the method [300] comprises receiving by the transceiver unit [202] at the client device [102] from the server device [104], a set of secure data based on the target set of static data. Further, in a preferred implementation of the present
disclosure, the set of secure data is generated at the server device [104] from the target set of static data, using at least one of one or more data encryption techniques and one or more data compression techniques. Furthermore, in another implementation of the present disclosure, the set of secure data is received at the client device [102] from the server device [104] at one of a periodic time interval, and a dynamically defined time interval.
Further, in accordance with present disclosure the one or more data encryption techniques may comprise one or more cryptographic encryption techniques designed to secure a data during transmission and storage and such technique(s) may include a symmetric encryption technique, an asymmetric encryption technique, a hash function technique, a digital signature technique, and/or a cryptographic key management technique. Furthermore, a selection and an application of specific encryption technique(s) may vary depending on factors such as a level of security required, a computational efficiency, and a compatibility with the method [300] in use. Further, in accordance with present disclosure the one or more data compression techniques encompasses technique(s) to reduce a size of a data while preserving its essential information and functionality. These data compression technique(s) enable efficient storage and transmission of the data by minimizing a required storage space or bandwidth. In accordance with the present disclosure the one or more data compression techniques may comprise common data compression technique(s) that may include lossless compression technique(s) and/or lossy compression technique(s). The choice of data compression technique may depend on a type of data, a desired compression ratio, and a trade-off between compression efficiency and data fidelity. It should be noted that the usage of the terms "one or more data encryption techniques" and "one or more data compression techniques" as used in the present disclosure are not intended to limit the scope of the present disclosure to
specific techniques. A person skilled in the art would appreciate that there exists a wide range of data encryption and compression techniques, both existing and future developments. The selection and application of specific techniques may depend on various factors, including security requirements, performance considerations, and technological advancements. Therefore, the terms "one or more data encryption techniques" and "one or more data compression techniques" used herein should be interpreted broadly to encompass any known or future encryption techniques and compression techniques, respectively, that are obvious to a person skilled in the art in light of developments in the field.
Next, at step [308], the method [300] comprises identifying, by an input unit [204] at the client device [102], one or more user actions. Further, in an implementation of the present disclosure, the one or more user actions comprises an execution of one or more predefined actions.
The term one or more predefined actions refers to one or more specific operations or one or more specific tasks that have been established in advance to perform certain functions or to trigger particular responses in the client account. These one or more predefined actions may be designed to facilitate user interactions, automate processes, or provide specific functionalities on the client account. Further, the one or more predefined actions may include an action of clicking a button, a selection of an option from a menu action, an action related to entering specific keystrokes, an action for submitting a form, an action initiating a specific function, and/or any other predetermined user action(s) defined within the method [300]. It is important to note that the identification of the user action(s) and the execution of the predefined action(s) may vary depending on the specific implementation or application of a method [300].
Next, at step [310], the method [300] comprises generating by the processing unit [206] at the client device [102], a set of dynamic data based on the one or more user actions.
Further, the set of dynamic data may be an information or a content that is dynamically generated or updated on the client account, in response to the one or more user actions. Further, in an implementation of the present disclosure the feature of generation of the set of dynamic data may comprise tracking a log of the one or more user actions at the client device [102] for a predefined period of duration, wherein the predefined period of duration may be dynamically defined duration of time or a fixed duration of time. Further, in another implementation of the present disclosure the log may be transmitted to the server device [104] from the client device [102] at a regular interval of time i.e., 1 millisecond or at a dynamically defined interval of time, wherein transmitting the log may be further based on various factors such as network conditions, the method [300] load, user preferences or user activity. Furthermore, the set of dynamic may include, but is not limited to, real-time data, interactive elements, calculated values, contextual information, and/or any other relevant data that reflects a current state of the client account and/or outcome of the user actions. In an exemplary implementation of the present disclosure, the client device [102] may provide to the server device [104], personalized, up-to-date, and interactive content or information to enhance the user experience and to provide relevant functionality based on the user's actions.
Next, at step [312], the method [300] comprises generating by the processing unit [206] at the client device [102], the mapped data based on a mapping of the set of dynamic data and the set of secure data. In a preferred implementation of the present
invention, the set of secure data is received from the server device [104] at the client device [102] in a predefined format, wherein predefined format is an encoded format that may not be decoded at the client device [102] and may only be used at the client device [102] to generate the mapped data. Further, in a preferred implementation of the present disclosure the mapped data is generated using one or more data mapping techniques. Furthermore, in an implementation the present disclosure, the one or more data mapping techniques facilitate a creation of a combined dataset by establishing a correlation or mapping between element(s) of the set of dynamic data and element(s) of the set of secure data. In an implementation of the present disclosure, a mapping process ensures an integration and alignment of relevant information from both datasets i.e., the set of dynamic data and the set of secure data, allowing for further processing, analysis, or presentation of the mapped data. Further, in another implementation of the present disclosure, one or more additional fields of the set of dynamic data comprising a dynamic data, and one or more additional fields of secure data associated with the set of secure data may be mapped while generating the mapped data by the processing unit [206] at the client device [102]. Further, the one or more data mapping techniques may include a field mapping technique, a value mapping technique, a schema mapping technique, an entity mapping technique, and/or any other technique that enables a consolidation and structured representation of data from different sources. It should be noted that the use of the term "one or more data mapping techniques" as used herein in accordance with present disclosure is not intended to limit the scope of the disclosure to specific techniques. A person skilled in the art would appreciate that there exists a wide range of data mapping techniques, both existing and future developments and the selection and application of specific techniques may depend on various factors, including nature of data, desired mapping requirements, and/or technological advancements. Therefore, the terms used herein should be interpreted broadly to encompass any
known or future data mapping techniques that are or may be obvious to a person skilled in the art in light of developments in the field.
Next, at step [314], the method [300] comprises providing by the transceiver unit [202] from the client device [102] to the server device [104], the mapped data to execute the one or more target actions at the server device [104]. In accordance with the present disclosure the one or more target actions refer to one or more predefined operations, one or more predefined tasks, and/or one or more predefined processes that are intended to be performed at the server device [104] based on the received mapped data. These actions may include, but are not limited to, a data processing operation, a data analysis operation, a content generation operation, a resource allocation operation, and/or any other operation that utilizes an information contained within the mapped data. Thus, in an exemplary implementation of the present disclosure, the client device [102] by providing the mapped data to the server device [104], enables at the server device [104], a server-side execution of desired action(s), leveraging the combined and processed information (i.e., the mapped data) from the client device [102] to perform one or more specific tasks and/or one or more specific operations within the client- server environment.
Thereafter, the method [300] terminates at step [316].
Therefore, the present disclosure introduces a novel solution that optimizes data data-processing techniques by leveraging processing capabilities of client devices [102] while centralizing control over data on a server device. It enables real-time data enrichment without compromising performance or scalability, ensuring high data quality and consistency across all clients. The disclosure also facilitates seamless updates to data-processing schema without requiring a change in client application
configuration. The disclosure also facilitates addition of new data enrichment capabilities without requiring a change in client application configuration. By addressing the shortcomings of the prior art, the present disclosure offers a robust and efficient data-processing solution that enhances the effectiveness of analytics, improves data quality, and provides a flexible framework for data enrichment and schema updates. Overall, the present disclosure represents a significant advancement in the field of data processing, revolutionizing data-processing techniques and opening new possibilities for applications and developments.
The present disclosure brings notable technical effects and advancements to the field of data processing. By utilizing client device [102] processing capabilities and centralizing data control on the server, it optimizes data-processing techniques, resulting in improved performance, efficiency, and scalability. The real-time data enrichment achieved through the disclosure enhances the accuracy and relevance of data-processing results without compromising system capabilities. Furthermore, the ability to seamlessly update the data-processing schema without requiring client application configuration change is a significant technical advancement, enabling agile and efficient system maintenance. The present disclosure also reduces the load on the server and improves the consistency of mapped data, which facilitates faster and improved system performance. By distributing the computational workload to client devices [102] and ensuring consistency in mapped data, the present disclosure enhances efficiency, accuracy, and reliability in data-processing techniques.
Furthermore, in a livestreaming environment, millions of users utilizing a user application associated with the server device [104] generate a substantial amount of dynamic data based on one or more user actions performed on the client device [102]. This dynamic data usually processed by the server device [104] to execute one or more target actions. The method and system disclosed in the present disclosure
provide a technical advantage by leveraging the processing capabilities of the client device [102] to significantly reduce the computational overhead on the server device [104]. Instead of relying solely on the server device [104] to process the data generated on the client device [102], the client device [102] is utilized to map the dynamic data with a static data associated with the client account. Therefore, the method and system described in the present disclosure offloads processing tasks from the server device [104] to the client device [102], making the overall system more efficient and scalable. It allows the server device [104] to focus on executing target actions based on the processed data, while the client device [102] handles the mapping of dynamic data to the relevant client account information. Overall, the present disclosure represents a notable advancement in data analytics and data-processing technologies, offering improved data quality, system flexibility, and performance optimization.
While considerable emphasis has been placed herein on the preferred embodiments, it will be appreciated that many embodiments can be made and that many changes can be made in the preferred embodiments without departing from the principles of the disclosure. These and other changes in the preferred embodiments of the disclosure will be apparent to those skilled in the art from the disclosure herein, whereby it is to be distinctly understood that the foregoing descriptive matter to be implemented merely as illustrative of the disclosure and not as limitation.
We Claim:
1. A method [300] for providing a mapped data to execute one or more target
actions at a server device [104], the method [300] comprising:
- transmitting, by a transceiver unit [202] from the client device [102] to a server device [104], a target set of static data associated with a client account;
- receiving, by the transceiver unit [202] at the client device [102] from the server device [104], a set of secure data based on the target set of static data;
- identifying, by an input unit [204] at the client device [102], one or more user actions;
- generating, by a processing unit [206] at the client device [102], a set of dynamic data based on the one or more user actions;
- generating, by the processing unit [206] at the client device [102], the mapped data based on a mapping of the set of dynamic data and the set of secure data; and
- providing, by the transceiver unit [202] from the client device [102] to the server device [104], the mapped data to execute the one or more target actions at the server device [104].
2. The method [300] as claimed in claim 1, wherein the target set of static data
comprises one of a set of static data and a set of updated static data, wherein:
the set of static data comprises a client device data comprising at least one of a client device identification data, a client device authentication data, an information of the client account, and a client device location data, and
the set of updated static data comprises an updated client device data comprising at least one of an updated client device identification data, an updated client device authentication data, an updated information of the client account, and an updated client device location data.
3. The method [300] as claimed in claim 2, the method [300] comprises:
- detecting, by the processing unit [206] at the client device [102], at least one change in the client device data, and
- generating, by the processing unit [206] at the client device [102], the set of updated static data based on the at least one change in the client device data.
4. The method [300] as claimed in claim 1, wherein the set of secure data is generated at the server device [104] from the target set of static data, using at least one of one or more data encryption techniques and one or more data compression techniques.
5. The method [300] as claimed in claim 4, wherein the set of secure data is received at the client device [102] from the server device [104] at one of a periodic time interval, and a dynamically defined time interval.
6. The method [300] of claim 1, wherein the one or more user actions comprises an execution of one or more predefined actions.
7. The method [300] of claim 1, wherein the mapped data is generated using one or more data mapping techniques.
8. A system [200] for providing a mapped data to execute one or more target actions at a server device [104], the system [200] comprises:
- a transceiver unit [202], configured to:
• transmit, from the client device [102] to a server device [104], a target set of static data associated with a client account, and
• receive, at the client device [102] from the server device [104], a set of secure data based on the target set of static data;
- an input unit [204] connected to at least the transceiver unit [202], wherein the input unit [204] is configured to identify, at the client device [102], one or more user actions; and
- a processing unit [206] connected to at least the transceiver unit [202] and the input unit [204], wherein the processing unit [206] is configured to:
• generate, at the client device [102], a set of dynamic data based on the one or more user actions, and
• generate, at the client device [102], the mapped data based on a mapping of the set of dynamic data and the set of secure data, wherein the transceiver unit [202] is further configured to provide, from the client device [102] to the server device [104], the mapped data, to execute the one or more target actions at the server device [104].
9. The system [200] as claimed in claim 8, wherein the target set of static data comprises one of a set of static data and a set of updated static data, wherein:
the set of static data comprises a client device data comprising at least one of a client device identification data, a client device authentication data, an information of the client account, and a client device location data, and
the set of updated static data comprises an updated client device data comprising at least one of an updated client device identification data,
an updated client device authentication data, an updated information of the client account, and an updated client device location data.
10. The system [200] as claimed in claim 9, wherein the processing unit [206] is
configured to:
- detect, at the client device [102], at least one change in the client device data, and
- generate, at the client device [102], the set of updated static data based on the at least one change in the client device data.
11. The system [200] as claimed in claim 8, wherein the set of secure data is generated at the server device [104] from the target set of static data, using at least one of one or more data encryption techniques and one or more data compression techniques.
12. The system [200] as claimed in claim 11, wherein the set of secure data is received at the client device [102] from the server device [104] at one of a periodic time interval, and a dynamically defined time interval.
13. The system [200] as claimed in claim 8, wherein the one or more user actions comprises an execution of one or more predefined actions.
14. The system [200] as claimed in claim 8, wherein the mapped data is generated using one or more data mapping techniques.
| # | Name | Date |
|---|---|---|
| 1 | 202321050206-STATEMENT OF UNDERTAKING (FORM 3) [25-07-2023(online)].pdf | 2023-07-25 |
| 2 | 202321050206-POWER OF AUTHORITY [25-07-2023(online)].pdf | 2023-07-25 |
| 3 | 202321050206-FORM 1 [25-07-2023(online)].pdf | 2023-07-25 |
| 4 | 202321050206-FIGURE OF ABSTRACT [25-07-2023(online)].pdf | 2023-07-25 |
| 5 | 202321050206-DRAWINGS [25-07-2023(online)].pdf | 2023-07-25 |
| 6 | 202321050206-DECLARATION OF INVENTORSHIP (FORM 5) [25-07-2023(online)].pdf | 2023-07-25 |
| 7 | 202321050206-COMPLETE SPECIFICATION [25-07-2023(online)].pdf | 2023-07-25 |
| 8 | 202321050206-Proof of Right [03-08-2023(online)].pdf | 2023-08-03 |
| 9 | 202321050206-FORM 18 [03-08-2023(online)].pdf | 2023-08-03 |
| 10 | Abstract.1.jpg | 2024-02-01 |
| 11 | 202321050206-PA [18-06-2024(online)].pdf | 2024-06-18 |
| 12 | 202321050206-ASSIGNMENT DOCUMENTS [18-06-2024(online)].pdf | 2024-06-18 |
| 13 | 202321050206-8(i)-Substitution-Change Of Applicant - Form 6 [18-06-2024(online)].pdf | 2024-06-18 |
| 14 | 202321050206-RELEVANT DOCUMENTS [12-06-2025(online)].pdf | 2025-06-12 |
| 15 | 202321050206-FORM 13 [12-06-2025(online)].pdf | 2025-06-12 |
| 16 | 202321050206-FORM-26 [09-09-2025(online)].pdf | 2025-09-09 |
| 17 | 202321050206-ORIGINAL UR 6(1A) FORM 26-220925.pdf | 2025-09-25 |
| 18 | 202321050206-ORIGINAL UR 6(1A) FORM 26-031125.pdf | 2025-11-04 |