Sign In to Follow Application
View All Documents & Correspondence

Method And System For Managing One Or More Applications In A Network

Abstract: ABSTRACT METHOD AND SYSTEM FOR MANAGING ONE OR MORE APPLICATIONS IN A NETWORK The present invention relates to a system (120) and a method (500) for managing one or more applications in a network (105) is disclosed. The system (120) includes a transceiver (220) configured to receive one or more inputs pertaining to configurations from a user for deploying the one or more applications in the network (105). The system includes a checking unit (225) configured to check when the configurations received as the one or more inputs received from the user match with one or more predefined configurations of a Global Configuration Table (GCT). The system includes a changing unit (230) configured to dynamically change the configurations received as the one or more inputs to align with the one or more predefined configurations of the GCT when the configurations of the one or more inputs do not match with the GCT. Ref. Fig. 2

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
06 September 2023
Publication Number
11/2025
Publication Type
INA
Invention Field
COMMUNICATION
Status
Email
Parent Application

Applicants

JIO PLATFORMS LIMITED
Office-101, Saffron, Nr. Centre Point, Panchwati 5 Rasta, Ambawadi, India.

Inventors

1. Aayush Bhatnagar
Reliance Corporate Park, Thane - Belapur Road
2. Sandeep Bisht
Reliance Corporate Park, Thane - Belapur Road
3. Suman Singh Kanwer
Reliance Corporate Park, Thane - Belapur Road
4. Ankur Mishra
Reliance Corporate Park, Thane - Belapur Road
5. Yogendra Pal Singh
Reliance Corporate Park, Thane - Belapur Road
6. Pankaj Kshirsagar
Reliance Corporate Park, Thane - Belapur Road
7. Anurag Sinha
Reliance Corporate Park, Thane - Belapur Road
8. Mangesh Shantaram Kale
Reliance Corporate Park, Thane - Belapur Road
9. SUPRIYA UPADHYE
Reliance Corporate Park, Thane - Belapur Road
10. Ravindra Yadav
Reliance Corporate Park, Thane - Belapur Road
11. Abhiman Jain
Reliance Corporate Park, Thane - Belapur Road
12. Ezaj Ansari
Reliance Corporate Park, Thane - Belapur Road
13. Lakhichandra Sonkar
Reliance Corporate Park, Thane - Belapur Road

Specification

DESC:
FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENTS RULES, 2003

COMPLETE SPECIFICATION
(See section 10 and rule 13)
1. TITLE OF THE INVENTION
METHOD AND SYSTEM FOR MANAGING ONE OR MORE APPLICATIONS IN A NETWORK
2. APPLICANT(S)
NAME NATIONALITY ADDRESS
JIO PLATFORMS LIMITED INDIAN OFFICE-101, SAFFRON, NR. CENTRE POINT, PANCHWATI 5 RASTA, AMBAWADI, AHMEDABAD 380006, GUJARAT, INDIA
3.PREAMBLE TO THE DESCRIPTION

THE FOLLOWING SPECIFICATION PARTICULARLY DESCRIBES THE NATURE OF THIS INVENTION AND THE MANNER IN WHICH IT IS TO BE PERFORMED.

FIELD OF THE INVENTION
[0001] The present invention relates to the field of wireless communication networks, more particularly relates to a method and a system for managing one or more applications in the wireless communication networks.
BACKGROUND OF THE INVENTION
[0002] In a telecommunication network, fresh installation or upgradation of the applications or modules are marred by multiple challenges, such as the need for manual intervention. During fresh installations or upgradation, the applications or modules often require complex configurations. These configurations can include setting up new APIs, integrating with existing services, or establishing connections with new providers. If these steps are performed manually, there’s a high chance of errors, such as incorrect parameter settings or missed configurations, leading to service disruptions and downtime. As such, during fresh installation, upgradation, or any related activity, manual intervention may lead to error.
[0003] Manual tasks, such as entering configurations, updating databases, or modifying scripts, are prone to human error. Even small mistakes, such as a typo or incorrect data entry, can lead to major issues like service failures, security vulnerabilities, or data corruption.
[0004] There is, therefore, a need for solutions for automated handling of fresh installation or upgradation of the applications that minimize the manual intervention during installing and upgrading of the software applications.
SUMMARY OF THE INVENTION
[0005] One or more embodiments of the present disclosure provide a method and a system for managing one or more applications in a network.
[0006] In one aspect of the present invention, the method for managing the one or more applications in the network is disclosed. The method includes the step of receiving, by one or more processors, one or more inputs pertaining to configurations from a user for deploying the one or more applications in the network. The method includes the step of checking, by the one or more processors, when the configurations received as the one or more inputs from the user matches with one or more pre-defined configurations of a Global Configuration Table (GCT). The method includes the step of dynamically changing, by the one or more processors, the configurations received as the one or more inputs to align with the one or more pre-defined configurations of the GCT, when the configurations received as the one or more inputs do not match with the one or more pre-defined configurations of the GCT.
[0007] In one embodiment, the configurations received as the one or more inputs from the user pertain to at least one of, the one or more applications data, server details, install/upgrade option, path of application, application configuration option, library option, other folders, pre-check and post-check, and/or backup options.
[0008] In another embodiment, deploying the one or more applications includes, at least one of, installing or upgrading the one or more applications in the network.
[0009] In another embodiment, the step of, checking, when the configurations received as the one or more inputs from the user matches with the one or more pre-defined configurations of a Global Configuration Table (GCT), includes the steps of in response to the user selecting a pre-check option, checking, by the one or more processors, when the configurations received as the one or more inputs received from the user matches with the one or more pre-defined configurations the GCT before at least one of, installing or upgrading the one or more applications in the network. The step of, checking, when the configurations of the one or more inputs received from the user for at least one of, installation or upgrading the one or more applications matches with a Global Configuration Table (GCT), includes the steps of in response to the user selecting a post-check option, checking, by the one or more processors, when the configurations received as the one or more inputs received from the user matches with the one or more pre-defined configurations of the GCT subsequent to at least one of, installing or upgrading the one or more applications in the network.
[0010] In yet another embodiment, the method further includes the step of applying, by the one or more processors, the one or more pre-defined configurations from the GCT to at least one of, a plurality of applications or instances present in the network in response to the user providing an option via a User Interface (UI) to at least one of, install or upgrade at least one of, the plurality of applications or the instances in the network as per the one or more pre-defined configurations from the GCT.
[0011] In yet another embodiment, the method further includes the step of checking, by the one or more processors, when the one or more applications are at least one of, installed or upgraded. The method further includes the step of when the one or more applications are not at least one of, installed or upgraded, providing by the one or more processors, an option for the user to install or upgrade the one or more applications using a backup system.
[0012] In yet another embodiment, the one or more processors, validates the user prior to receiving, the one or more inputs pertaining to the configurations from the user for at least one of, the installation or upgrading the one or more applications in the network, the one or more processors, validates the user by receiving, by the one or more processors, credentials of the user. The one or more processors, validates the user prior to receiving, the one or more inputs pertaining to the configurations from the user for at least one of, the installation or upgrading the one or more applications in the network, the one or more processors, validates the user by checking, by the one or more processors, when the credentials received from the user match with pre-stored credentials of the user. The one or more processors, validates the user prior to receiving, the one or more inputs pertaining to the configurations from the user for at least one of, the installation or upgrading the one or more applications in the network, the one or more processors, validates the user by when the credentials received from the user match with the pre-stored credentials of the user, generating, by the one or more processors, a user session with the user to receive the one or more inputs pertaining to the configurations for at least one of, the installation or upgrading the one or more applications in the network.
[0013] In yet another embodiment, the method further comprises the step of logging, by the one or more processors, a timestamp for each step for at least one of, the installation or upgrading the one or more applications in the network.
[0014] In another aspect of the present invention, the system for managing the one or more applications in the network is disclosed. The system includes a transceiver, configured to one or more inputs pertaining to configurations from a user for deploying the one or more applications in the network. The system includes a checking unit, configured to check when the configurations received as the one or more inputs from the user match with one or more pre-defined configurations of a Global Configuration Table (GCT). The system includes when the configurations received as the one or more inputs do not match with the one or more pre-defined configurations of the GCT, a changing unit, configured to, dynamically change, the configurations received as the one or more inputs to align with the one or more pre-defined configurations of the GCT.
[0015] In another aspect of the present invention, a User Equipment (UE) is disclosed. One or more primary processors communicatively coupled to one or more processors. The one or more primary processors coupled with a memory. The said memory stores instructions which when executed by the one or more primary processors causes the UE to transmit one or more inputs received from a user for deploying the one or more applications in the network.
[0016] In another aspect of the present invention, a non-transitory computer-readable medium having stored thereon computer-readable instructions that, when executed by a processor. The processor is configured to receive one or more inputs pertaining to configurations from a user for deploying the one or more applications in the network. The processor is configured to check when the configurations received as the one or more inputs from the user match with a Global Configuration Table (GCT). The processor is configured to when the configurations received as the one or more inputs do not match with the one or more pre-defined configurations of the GCT, dynamically change, the configurations received as the one or more inputs to align with the one or more pre-defined configurations of the GCT.
[0017] Other features and aspects of this invention will be apparent from the following description and the accompanying drawings. The features and advantages described in this summary and in the following detailed description are not all-inclusive, and particularly, many additional features and advantages will be apparent to one of ordinary skill in the relevant art, in view of the drawings, specification, and claims hereof. Moreover, it should be noted that the language used in the specification has been principally selected for readability and instructional purposes and may not have been selected to delineate or circumscribe the inventive subject matter, resort to the claims being necessary to determine such inventive subject matter.
BRIEF DESCRIPTION OF THE DRAWINGS
[0018] The accompanying drawings, which are incorporated herein, and constitute a part of this disclosure, illustrate exemplary embodiments of the disclosed methods and systems in which like reference numerals refer to the same parts throughout the different drawings. Components in the drawings are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the present disclosure. Some drawings may indicate the components using block diagrams and may not represent the internal circuitry of each component. It will be appreciated by those skilled in the art that disclosure of such drawings includes disclosure of electrical components, electronic components or circuitry commonly used to implement such components.
[0019] FIG. 1 is an exemplary block diagram of an environment for managing one or more applications in a network, according to one or more embodiments of the present disclosure;
[0020] FIG. 2 is an exemplary block diagram of a system for managing the one or more applications in the network, according to one or more embodiments of the present disclosure;
[0021] FIG. 3 is a schematic representation of a workflow of the system of FIG. 2 communicably coupled with a User Equipment (UE), according to one or more embodiments of the present disclosure;
[0022] FIG. 4 is a block diagram of an architecture that can be implemented in the system of FIG.2, according to one or more embodiments of the present disclosure;
[0023] FIG. 5 is a flow diagram illustrating a method for managing the one or more applications in the network, according to one or more embodiments of the present disclosure; and
[0024] FIG. 6 is a flow diagram illustrating the method for managing the one or more applications in the network, according to one or more embodiments of the present disclosure.
[0025] The foregoing shall be more apparent from the following detailed description of the invention.
DETAILED DESCRIPTION OF THE INVENTION
[0026] Some embodiments of the present disclosure, illustrating all its features, will now be discussed in detail. It must also be noted that as used herein and in the appended claims, the singular forms "a", "an" and "the" include plural references unless the context clearly dictates otherwise.
[0027] Various modifications to the embodiment will be readily apparent to those skilled in the art and the generic principles herein may be applied to other embodiments. However, one of ordinary skill in the art will readily recognize that the present disclosure including the definitions listed here below are not intended to be limited to the embodiments illustrated but is to be accorded the widest scope consistent with the principles and features described herein.
[0028] A person of ordinary skill in the art will readily ascertain that the illustrated steps detailed in the figures and here below are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0029] The present disclosure provides a system and a method to manage one or more applications in a network. The present disclosure relates to automated handling of fresh installation or upgradation of the one or more applications. An option is created in a Common API Framework (CAPIF), where manual interventions and probability of error while doing integration or any configuration change can be minimized. Further, the CAPIF provides the option for adding a Global Configuration Table (GCT) to each of the one or more applications. Furthermore, the present solution does not extend only to the CAPIF but is a generic solution that can extend to other products as well.
[0030] Referring to FIG. 1, FIG. 1 illustrates an exemplary block diagram of an environment 100 for managing one or more applications in a network 105, according to one or more embodiments of the present invention. The environment 100 includes the network 105, a User Equipment (UE) 110, a server 115, and a system 120. The UE 110 aids a user to interact with the system 120 for transmitting one or more inputs received from the user for deploying the one or more applications in the network 105. In an embodiment, the user is one of, but not limited to, a network administrator or a service provider. In an embodiment, deploying the one or more applications includes at least one of, installing and upgrading the one or more applications in the network 105. The one or more applications in the network 105 involves overseeing and maintaining the applications performance, availability, security, and overall functionality within the network 105. In an embodiment, the one or more applications include but not limited to, Instant Messaging (IM), Common API Framework (CAPIF) or other microservices Managing the one or more applications in the network 105 involves deployment and configuration, upgradation, security management, and data backup.
[0031] For the purpose of description and explanation, the description will be explained with respect to the UE 110, or to be more specific will be explained with respect to a first UE 110a, a second UE 110b, and a third UE 110c, and should nowhere be construed as limiting the scope of the present disclosure. Each of the UE 110 from the first UE 110a, the second UE 110b, and the third UE 110c is configured to connect to the server 115 via the network 105. In an embodiment, each of the first UE 110a, the second UE 110b, and the third UE 110c is one of, but not limited to, any electrical, electronic, electro-mechanical or an equipment and a combination of one or more of the above devices such as smartphones, virtual reality (VR) devices, augmented reality (AR) devices, laptop, a general-purpose computer, desktop, personal digital assistant, tablet computer, mainframe computer, or any other computing device.
[0032] The network 105 includes, by way of example but not limitation, one or more of a wireless network, a wired network, an internet, an intranet, a public network, a private network, a packet-switched network, a circuit-switched network, an ad hoc network, an infrastructure network, a Public-Switched Telephone Network (PSTN), a cable network, a cellular network, a satellite network, a fiber optic network, or some combination thereof. The network 105 may include, but is not limited to, a Third Generation (3G), a Fourth Generation (4G), a Fifth Generation (5G), a Sixth Generation (6G), a New Radio (NR), a Narrow Band Internet of Things (NB-IoT), an Open Radio Access Network (O-RAN), and the like.
[0033] The server 115 may include by way of example but not limitation, one or more of a standalone server, a server blade, a server rack, a bank of servers, a server farm, hardware supporting a part of a cloud service or system, a home server, hardware running a virtualized server, one or more processors executing code to function as a server, one or more machines performing server-side functionality as described herein, at least a portion of any of the above, some combination thereof. In an embodiment, the entity may include, but is not limited to, a vendor, a network operator, a company, an organization, a university, a lab facility, a business enterprise, a defense facility, or any other facility that provides content.
[0034] The environment 100 further includes the system 120 communicably coupled to the server 115 and each of the first UE 110a, the second UE 110b, and the third UE 110c via the network 105. The system 120 is configured for managing the one or more applications in the network 105. The system 120 is adapted to be embedded within the server 115 or is embedded as the individual entity, as per multiple embodiments of the present invention.
[0035] Operational and construction features of the system 120 will be explained in detail with respect to the following figures.
[0036] FIG. 2 is an exemplary block diagram of a system 120 for managing the one or more applications in the network 105, according to one or more embodiments of the present disclosure.
[0037] The system 120 includes a processor 205, a memory 210, a user interface 255, and a database 260. For the purpose of description and explanation, the description will be explained with respect to one or more processors 205, or to be more specific will be explained with respect to the processor 205 and should nowhere be construed as limiting the scope of the present disclosure. The one or more processors 205, hereinafter referred to as the processor 205 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, single board computers, and/or any devices that manipulate signals based on operational instructions.
[0038] As per the illustrated embodiment, the processor 205 is configured to fetch and execute computer-readable instructions stored in the memory 210. The memory 210 may be configured to store one or more computer-readable instructions or routines in a non-transitory computer-readable storage medium, which may be fetched and executed to create or share data packets over a network service. The memory 210 may include any non-transitory storage device including, for example, volatile memory such as RAM, or non-volatile memory such as EPROM, flash memory, and the like.
[0039] The User Interface (UI) 255 includes a variety of interfaces, for example, interfaces for a Graphical User Interface (GUI), a web user interface, a Universal Command Line Interface (CLI), and the like. The UCLI is a generic template driven command-line interface (CLI) for interacting with any application that supports Representational State Transfer (REST). The user interface 255 facilitates a rich user interface with an option for installation and upgradation. In one embodiment, the user interface 255 provides a communication pathway for one or more components of the system 120. Examples of the one or more components include, but are not limited to, the UE 110, and the database 260.
[0040] The database 260 is one of, but not limited to, a centralized database, a cloud-based database, a commercial database, an open-source database, a distributed database, an end-user database, a graphical database, a No-Structured Query Language (NoSQL) database, an object-oriented database, a personal database, an in-memory database, a document-based database, a time series database, a wide column database, a key value database, a search database, a cache databases, and so forth. The foregoing examples of database 260 types are non-limiting and may not be mutually exclusive e.g., a database can be both commercial and cloud-based, or both relational and open-source, etc.
[0041] Further, the processor 205, in an embodiment, may be implemented as a combination of hardware and programming (for example, programmable instructions) to implement one or more functionalities of the processor 205. In the examples described herein, such combinations of hardware and programming may be implemented in several different ways. For example, the programming for the processor 205 may be processor-executable instructions stored on a non-transitory machine-readable storage medium and the hardware for processor 205 may comprise a processing resource (for example, one or more processors), to execute such instructions. In the present examples, the memory 210 may store instructions that, when executed by the processing resource, implement the processor 205. In such examples, the system 120 may comprise the memory 210 storing the instructions and the processing resource to execute the instructions, or the memory 210 may be separate but accessible to the system 120 and the processing resource. In other examples, the processor 205 may be implemented by electronic circuitry.
[0042] In order for the system 120 to manage the one or more applications in the network 105, the processor 205 includes a validation unit 215, a transceiver 220, a checking unit 225, a changing unit 230, an applying unit 235, a status checking unit 240, a logging unit 245, and a providing unit 250 communicably coupled to each other. In an embodiment, operations and functionalities of the validation unit 215, the transceiver 220, the checking unit 225, the changing unit 230, the applying unit 235, the status checking unit 240, the logging unit 245, and the providing unit 250 can be used in combination or interchangeably.
[0043] The validation unit 215 is configured to validate the user prior to receiving, the one or more inputs pertaining to the configurations from the user for at least one of, the installation or upgrading the one or more applications in the network 105, the validation unit 215 is configured to validate the user by receiving credentials of the user. In an embodiment, the credentials of the user include, but are not limited to username, password, and user ID. Upon receiving credentials of the user, the validation unit 215 is configured to check when the credentials received from the user match with pre-stored credentials of the user. The validation unit 215 is configured to generate a user session with the user when the credentials received from the user match with the pre-stored credentials of the user. The credentials are typically stored in a secure authentication database, relational database or directory service within the network 105. The storage is designed to be highly secure to prevent unauthorized access and ensure the integrity of user authentication processes. In an exemplary embodiment, when the user creates an account, the directory service stores the username and a hashed version of the password in its secure directory. When the username attempts to log in, the system 120 hashes the entered password and compares the username and password with the stored hash in the directory service. When the username and the password are matched, then the system 120 is authenticated and granted access to the user for accessing the network 105. Upon generating the user session, the validation unit 215 transmits the user session to the transceiver 220 for receiving the one or more inputs pertaining to the configurations for at least one of, the installation or upgrading the one or more applications in the network 105.
[0044] The transceiver 220 is configured to receive the one or more inputs pertaining to configurations from the user. In an embodiment, the one or more inputs is at least one of, installation or upgrading the one or more applications in the network 105. In another embodiment, the configurations received as the one or more inputs from the user pertain to at least one of, the one or more applications data, server details, install/upgrade option, path of application, application configuration option, library option, other folders, pre-check and post-check, and/or backup options. The one or more applications data related to the data or files of the applications that are being installed or upgraded. The one or more applications data include executable files, configuration files, or user data required by the one or more applications. The server details include information about the servers where the application will be installed or upgraded. The server details include, but are not limited to, server Internet Protocol (IP) addresses, names, operating systems, and hardware specifications, as well as details on server roles (e.g., database server, application server). The install/upgrade option refers to a choice provided to the user to either install a new application or upgrade an existing one.
[0045] Further, the path of application refers to a directory or a location on the server 115 where the application is to be installed or upgraded. The application configuration option refers to settings and parameters that define how the one or more applications will be configured during installation or upgrade. The library option related to the installation or upgrading of software libraries that the application depends on. The library option involves selecting specific versions of libraries, managing dependencies, or configuring paths to shared libraries. Other folders refer to additional directories that are involved in the installation or upgrade process of the one or more applications. The other folders include, but are not limited to folders for logs, temporary files, backups, or other application-specific data.
[0046] Upon receiving the one or more inputs pertaining to configurations, the transceiver 220 is specifically configured to handle the one or more inputs related to application management in the network 105. The transceiver 220 involves receiving commands from the UI 255, processing the commands, and thereafter communicating with other network components such as servers, routers, switches, and firewalls to process, store, and execute the installation or upgrading process of the one or more applications. Upon receiving the one or more inputs from the user by the transceiver 220, the transceiver 220 transmits the one or more inputs pertaining to the configurations to the checking unit 225.
[0047] The checking unit 225 is configured to check when the configurations received as the one or more inputs from the user match with one or more pre-defined configurations of a Global Configuration Table (GCT). The GCT is a centralized repository or database 260 that stores the one or more predefined configurations or rules that are globally accepted within the network 105. The one or more predefined configurations or rules include, but are not limited to, network policies, protocol configurations, API traffic rules, security configurations, and configuration templates. The GCT ensures that the configurations applied across the network 105 and include settings related to security, performance, compatibility, and other critical aspects. The checking unit 225 compares the configurations of the one or more inputs received from the user against the entries in the GCT. The comparison ensures that the configurations of the one or more inputs received from the user align with the predefined configurations or rules set within the GCT.
[0048] The one or more pre-defined configurations in the GCT are standardized settings or rules that are established to maintain consistency, security, and optimal performance across the network 105. The one or more pre-defined configurations in the GCT include, but not limited to, network security settings, application deployment configurations, user access controls, data retention policies, compliance and audit requirements, and system performance settings. In an exemplary embodiment, the system performance settings include the GCT might define how traffic should be distributed across the servers to ensure optimal performance and prevent any single server from becoming overloaded. The one or more predefined configurations specifies the maximum amount of time a user session can remain inactive before being automatically terminated, ensuring efficient use of resources.
[0049] The checking unit 225 is further configured to check when the configurations received as the one or more inputs from the user matches with the one or more predefined configurations of the GCT before at least one of, installing or upgrading the one or more applications in the network 105 in response to the user selecting a pre-check option. The pre-check option is performed before the installation or upgrade process begins. The pre-check option ensures that the system 120 meets all the prerequisites (e.g., sufficient disk space, compatible operating system, required dependencies) for the installation or upgrade of the one or more applications. Upon selecting the pre-check option, the checking unit 225 compares the configurations received as the one or more inputs from the user with the one or more predefined configurations of the GCT. When the configurations received as the one or more inputs from the user match the one or more predefined configurations of the GCT, the system 120 allows the installation or upgradation of the one or more applications to proceed.
[0050] In an exemplary embodiment, the user wants to install the one or more applications on the server 115 within the network 105. Before proceeding with the installation, the system 120 uses the checking unit 225 to ensure that the configurations of the one or more inputs meet the predefined configurations stored in the GCT. The configurations of the one or more inputs includes disk space requirement as 10GB of free disk space, and operating system version as Windows sever 2019. Therefore, the predefined configurations stored in the GCT includes disk space requirement as minimum 8 GB of free disk space required, and operating system version as Windows sever 2019. The user selects the pre-check option in the installation wizard, signaling the system to perform the validation before starting the actual installation process. The free disk space (e.g., 15 GB) compares with the predefined requirement (8 GB). The available disk space meets the requirement. The current operating system version (Windows Server 2019) compares with the predefined requirement (Windows Server 2019 or later). The operating system version is compatible. The checking unit 225 confirms that the configurations of the one or more inputs meet the predefined configurations in the GCT. Then, the system allows the installation process to proceed. In one embodiment, when the checking unit 225 identifies a mismatch between the one or more user inputs and the GCT, the checking unit 225 triggers the changing unit 230 for changing the configurations of the one or more inputs.
[0051] The changing unit 230 is configured to dynamically change the configurations of the one or more inputs to align with the GCT when the configurations of the one or more inputs do not match with the GCT. The changing unit 230 is responsible for dynamically adjusting or modifying the configurations of the one or more inputs and conforming to the rules and settings defined in the GCT. The changing unit 230 further acts as an automatic correction mechanism, ensuring consistency and compliance across the network 105 by aligning any divergent of the one or more inputs with the GCT. In an exemplary embodiment, the checking unit 225 identifies that the one or more inputs for memory allocation exceeds the limits set in the GCT, and that the security settings are not compliant with the organization’s policies. The changing unit 230 is triggered and automatically adjusts the memory allocation to the allowed limit and modifies the security settings to align with the GCT. The one or more applications are installed with configurations that fully comply with the network’s standards, ensuring optimal performance and security.
[0052] Upon checking when the configurations of the one or more inputs received from the user matches with the GCT, an applying unit 235 is configured to apply a GCT to at least one of, a plurality of applications or instances present in the network 105. The plurality of instances refers to individual, specific occurrences or deployments of the one or more applications within the network 105. Each instance operates independently and follows the same underlying application structure or software. The plurality of instances can vary based on one or more parameters. The one or more parameters include, but not limited to, configurations, environments, or user bases, and they might be running on different servers or virtual machines within the network 105. The one or more applications or instances refers to multiple applications or instances (e.g., virtual machines, containers, services) that are present and operating within the network 105. Upon applying the GCT to the plurality of applications or instances, the providing unit 250 provides an option to the user via the UI 255 to at least one of, install or upgrade at least one of the plurality of applications or the instances in the network 105. The applying unit 235 ensures that the configurations stored in the GCT are consistently applied across the network 105 when certain actions, such as installation or upgrading of the one or more applications, are initiated by the user. The GCT stores the one or more predefined configurations, rules, or settings that are adhered to by the one or more applications or instances within the network 105. The one or more predefined configurations of the GCT ensures consistency, security, and compliance across the network 105.
[0053] In one or more embodiments, the checking unit 225 is further configured to check when the configurations received as the one or more inputs from the user matches with the GCT subsequent to at least one of, installing or upgrading the one or more applications in the network 105 in response to the user selecting a post-check option. The post check option is performed after the installation or upgrade of the one or more applications is completed. The post-check option checks verify that the installation or upgrade of the one or more applications is successful, and that the one or more applications is functioning as expected. Upon selecting the post-check option, the checking unit 225 rechecks the final configurations of the installation or upgradation of the one or more applications. When the configurations of the one or more inputs still match with the GCT, the installation or upgradation process of the one or more applications is deemed successful, and the one or more applications is considered fully compliant with network standards. When discrepancies are found, the system 120 automatically adjusts the configurations of the one or more inputs, prompts the user to make corrections, or even roll back the changes to prevent issues.
[0054] Upon checking the configurations received as the one or more inputs from the user matches with the one or more predefined configurations of the GCT, the status checking unit 240 is configured to check when the one or more applications are at least one of, installed or upgraded. The status checking unit 240 verifies that the one or more applications or instances has been installed correctly, which involves checking when all necessary files and configurations are in place, when the one or more applications is operational, and meets the required specifications. The status checking unit 240 also checks whether the one or more applications or instances has been successfully upgraded, and involves confirming that a new version is installed, any previous issues are resolved, and that the application functions correctly with the new settings. Upon checking that the one or more applications are at least one of, installed or upgraded or not, the logging unit 245 is configured to log a timestamp for each step for at least one of, the installation or upgrading the one or more applications in the network 105. The logging unit 245 is to create logs that document each significant event or action that occurs during the installation or upgrade process of the one or more applications. The logs are essential for tracking progress, troubleshooting issues, and auditing. The timestamp is a precise record of the date and time when a particular event or action occurs. The logging unit 245 tracks each step involved in either installing a new application or upgrading an existing one within the network 105. The logging unit 245 captures the timestamp for each step, and provides a detailed, time-based record of the entire process to ensure that when any issues arise, the network operators can quickly identify the installation or upgradation of the one or more applications is successful or not, based on the logged timestamps.
[0055] Upon checking that the one or more applications are not at least one of, installed or upgraded, the providing unit 250 is configured to provide the option to the user to install or upgrade the one or more applications using a backup system when the one or more applications are not at least one of, installed or upgraded. The providing unit 250 is responsible for offering the option to the user for taking corrective actions when the one or more applications or instances are not successfully installed or upgraded. The option includes using the backup system to retry the installation or upgrade process. The backup system is a secondary system or set of tools that is used to restore or replicate the intended configurations or software installations. The backup system provides an alternative process to achieve successful installation or upgrade when the system 120 encounters issues. The providing unit 250 aids to handle the errors or issues that arise during the configuration process. When the initial attempt fails, the providing unit 250 ensures that the system 120 corrects the issue without manual intervention.
[0056] By managing the one or more applications in the network 105, the system 120 is able to, advantageously, avoids requirement of manual intervention, saves time, quickly updates and changes the configuration parameters based on the GCT, performs automation of pre and post checks, and utilizes the backup system to install or upgrade the one or more applications.
[0057] FIG. 3 is a schematic representation of a workflow of the system 120 of FIG. 2 communicably coupled with a User Equipment (UE), according to one or more embodiments of the present disclosure. More specifically, FIG. 3 illustrates the system 120 configured for managing the one or more applications in the network 105. It is to be noted that the embodiment with respect to FIG. 3 will be explained with respect to the first UE 110a for the purpose of description and illustration and should nowhere be construed as limited to the scope of the present disclosure.
[0058] As mentioned earlier in FIG.1, in an embodiment, the first UE 110a may encompass electronic apparatuses. These devices are illustrative of, but not restricted to, modems, routers, switches, laptops, tablets, smartphones (including phones), or other devices enabled for web connectivity. The scope of the first UE 110a explicitly extends to a broad spectrum of electronic devices capable of executing computing operations and accessing networked resources, thereby providing users with a versatile range of functionalities for both personal and professional applications. This embodiment acknowledges the evolving nature of electronic devices and their integral role in facilitating access to digital services and platforms. In an embodiment, the first UE 110a can be associated with multiple users. Each of the first UE 110a is communicatively coupled with the processor 205.
[0059] The first UE 110a includes one or more primary processors 305 communicably coupled to the one or more processors 205 of the system 120. The one or more primary processors 305 are coupled with a memory 310 storing instructions which are executed by the one or more primary processors 305. Execution of the stored instructions by the one or more primary processors 305 enables the first UE 110a to transmit the one or more inputs received from the user for at least one of, installation or upgrading the one or more applications in the network 105.
[0060] Furthermore, the one or more primary processors 305 within the first UE 110a are uniquely configured to execute a series of steps as described herein. This configuration underscores the processor 205 capability to manage the one or more applications in the network 105. The coordinated functioning of the one or more primary processors 305 and the additional processors, is directed by the executable instructions stored in the memory 310. The executable instructions facilitate seamless communication and compatibility among the one or more primary processors 305, optimizing performance and resource use.
[0061] As mentioned earlier in FIG.2, the system 120 includes the one or more processors 205, the memory 210, the user interface 255, and the database 260. The operations and functions of the one or more processors 205, the memory 210, the user interface 255, and the database 260 are already explained in FIG. 2. For the sake of brevity, a similar description related to the working and operation of the system 120 as illustrated in FIG. 2 has been omitted to avoid repetition.
[0062] Further, the processor 205 includes the validation unit 215, the transceiver 220, the checking unit 225, the changing unit 230, the applying unit 235, the status checking unit 240, the logging unit 245, and the providing unit 250. The operations and functions of the validation unit 215, the transceiver 220, the checking unit 225, the changing unit 230, the applying unit 235, the status checking unit 240, the logging unit 245, and the providing unit 250 are already explained in FIG. 2. Hence, for the sake of brevity, a similar description related to the working and operation of the system 120 as illustrated in FIG. 2 has been omitted to avoid repetition. The limited description provided for the system 120 in FIG. 3, should be read with the description provided for the system 120 in the FIG. 2 above, and should not be construed as limiting the scope of the present disclosure.
[0063] FIG. 4 is a block diagram of an architecture 400 that can be implemented in the system of FIG.2, according to one or more embodiments of the present disclosure.
[0064] The architecture 400 of the system 120 includes the Universal CLI platform (UCLI) 255. The UCLI 255 is configured to initiate auto installation or upgradation process, or scheduling of the installation or upgradation process of the one or more applications 410. In an embodiment, the one or more applications 410 include, but not limited to, a first application 410a, a second application 410b, a third application 410c, and a number of applications 410n. The auto installation or upgradation process 405 of the one or more applications manages large networks with multiple servers. In an embodiment, the one or more applications include but are not limited to, the IM, the CAPIF or other microservices. To schedule the installation or upgradation of the one or more applications 410, the validation unit 215 receives the credentials of the user. The validation unit 215 generates the user session with the user to receive the one or more inputs pertaining to the configurations for at least one of, the installation or upgrading of the one or more applications 410 in the network 105. Once the user session is created, the associated time dictates when the job will be executed, which allows for precise control over when the installations or upgradation of the one or more applications 410 occurs, minimizing disruption to network operations. One or more parameters related to the scheduled job are stored in a separate profile, ensuring that the scheduled process is well-organized and easy to manage. In an embodiment, the one or more parameters include, but are not limited to, a timestamp. The logging unit 245 is configured to log the timestamp for each step for at least one of, the installation or upgrading the one or more applications 410 in the network 105. The timestamp is the precise record of the date and time when a particular event or action occurs.
[0065] When the time is scheduled, a scheduler automatically initiates the installation or upgrade process of the one or more applications 410 in the network 105, which reduces the need for manual intervention, ensuring that the process starts exactly as planned. After the installation or upgrade process of the one or more applications 410 is completed, a report is generated. The report includes details about the process, such as which servers are affected, whether the process is successful, and any issues that are encountered. The architecture 400 of the system 120 provides various advantages including minimizing the manual intervention required during the process of installation, upgradation, or any configuration change. The option is provided that allows the configurations of the one or more inputs to be matched with the GCT via the UCLI 255. When the GCT is not matched, then the error may be immediately removed or solved before the process starts.
[0066] In an embodiment, a workflow is created by the user for installation or upgradation of the one or more applications 410. The architecture 400 of the system 120 automatically performs the pre-check before installation and the post-check after installation to ensure that everything aligns with the GCT standards. The architecture 400 of the system 120 allows for the pre-check and the post-check to be defined for each individual step of the installation process. When any of these checks fail, the error is displayed to the user via the UCLI 255. The automated error detection is an advantage over manual processes, where such detailed checks might not be feasible or consistent. The architecture 400 of the system 120 provides the option to apply the GCT-based configuration to all instances in the network 105, which ensures that all servers or instances are uniformly configured according to the GCT standards, saving time and reducing the configuration errors.
[0067] Further, the GCT is applied to all the instances, simultaneously the multiple applications can be upgraded, ensuring uniformity and saving significant time compared to upgrading each instance individually. When the multiple instances are running, then all the instances can be upgraded at the same time. In an exemplary embodiment, the upgrade can be scheduled for midnight/idle time, i.e. when the traffic is less. Based on the scheduling, the upgrade will be executed automatically at the scheduled time and all the reports and logs will be generated. Further, an alarm will be generated for the user who can check whether the instances have been successfully upgraded or any problem is encountered.
[0068] In one embodiment, the option is provided for taking the backup of the existing data by the user via the UCLI 255 so that the data can be restored, when the installation or upgradation of the one or more applications 410 fails. Therefore, the backup process allows the full or partial data before starting the installation or upgradation of the one or more applications 410. Various files may exist in the system including libraries, configuration, binaries. However, all the files may not be required. In this regard, the option is provided that allows choosing the files that can be backed up. In an exemplary embodiment, when the backup of a complete container is to be done, then a snapshot of the complete container can be taken and stored. In case of an upgrade failure, the snapshot can be applied on the instance. Similarly, the backup of a single file can be taken. Logging of the files along with the time stamp and identity of the user performed for a particular activity, to enable tracking of the records.
[0069] Further, the option includes using the backup system to retry the installation or upgrade process of the one or more applications. The backup system provides the alternative process to achieve successful installation or upgrade of the one or more applications when the system 120 encounters issues. The architecture 400 of the system 120 aids to handle the errors or issues that arise during the configuration process. When the initial attempt fails, the system 120 corrects the issue without manual intervention.
[0070] FIG. 5 is a flow diagram illustrating a method 500 for managing the one or more applications in the network 105, according to one or more embodiments of the present disclosure. For the purpose of description, the method 500 is described with the embodiments as illustrated in FIG. 2 and should nowhere be construed as limiting the scope of the present disclosure.
[0071] At step 505, the method 500 includes the step of receiving the one or more inputs pertaining to configurations from the user by the transceiver 220. In an embodiment, the one or more inputs is at least one of, installation or upgrading the one or more applications in the network 105. In another embodiment, the one or more inputs received from the user include at least one of, the one or more applications data, server details, install/upgrade option, path of application, application configuration option, library option, other folders, pre-check and post-check, and/or backup options. The transceiver 220 is specifically configured to handle the one or more inputs related to application management in the network 105. Upon receiving the one or more requests from the user by the transceiver 220, the transceiver 220 transmits the request to the checking unit 225.
[0072] At step 510, the method 500 includes the step of checking when the configurations received as the one or more inputs from the user match with the one or more predefined configurations of the Global Configuration Table (GCT) by the checking unit 225. The GCT is the centralized repository or database 260 that stores predefined configurations or rules that are globally accepted within the network 105. The checking unit 225 compares the configurations received as the one or more inputs from the user against the entries in the GCT. The comparison ensures that the configurations received as the one or more inputs from the user align with the one or more predefined configurations or rules set within the GCT.
[0073] The checking unit 225 is further configured to check when the configurations received as the one or more inputs from the user matches with the one or more predefined configurations of the GCT before at least one of, installing or upgrading the one or more applications in the network 105 in response to the user selecting the pre-check option. In one or more embodiments, the checking unit 225 is further configured to check when the configurations received as the one or more inputs from the user matches with the one or more predefined configurations of the GCT subsequent to at least one of, installing or upgrading the one or more applications in the network 105 in response to the user selecting the post-check option.
[0074] At step 515, the method 500 includes the step of dynamically changing the configurations received as the one or more inputs to align with the one or more predefined configurations of the GCT by the changing unit 230 when the configurations of the one or more inputs do not match with the GCT. The changing unit 230 is responsible for dynamically adjusting or modifying the configurations of the one or more inputs and conforming to the rules and settings defined in the GCT. The changing unit 230 further acts as an automatic correction mechanism, ensuring consistency and compliance across the network 105 by aligning any divergent of the one or more inputs with the GCT.
[0075] FIG. 6 is a flow diagram illustrating the method 600 for managing the one or more applications in the network 105, according to one or more embodiments of the present disclosure. For the purpose of description, the method 600 is described with the embodiments as illustrated in FIG. 2 and should nowhere be construed as limiting the scope of the present disclosure.
[0076] At step 605, the method 600 includes the step of checking when the one or more applications are at least one of, installed or upgraded by the status checking unit 240. The status checking unit 240 verifies that the one or more applications or instances has been installed correctly, which involves checking when all necessary files and configurations are in place, when the one or more applications is operational, and meets the required specifications. The status checking unit 240 also checks whether the one or more applications or instances has been successfully upgraded, and involves confirming that a new version is installed, any previous issues are resolved, and that the application functions correctly with the new settings. Upon checking that the one or more applications are not at least one of, installed or upgraded, the status checking unit 240 transfers the information to the providing unit 250.
[0077] At step 610, the method 600 includes the step of providing the option to the user to install or upgrade the one or more applications using the backup system by the providing unit 250 when the one or more applications are not at least one of, installed or upgraded. The providing unit 250 is responsible for offering the option to the user for taking corrective actions when the one or more applications or instances are not successfully installed or upgraded. The option includes using the backup system to retry the installation or upgrade process. The backup system provides an alternative process to achieve successful installation or upgrade when the system 120 encounters issues. The providing unit 250 aids to handle the errors or issues that arise during the configuration process. When the initial attempt fails, the providing unit 250 ensures that the system 120 corrects the issue without manual intervention.
[0078] The present invention further discloses a non-transitory computer-readable medium having stored thereon computer-readable instructions. The computer-readable instructions are executed by the processor 205. The processor 205 is configured to receive one or more inputs pertaining to configurations from a user for at least one of, installation or upgrading the one or more applications in the network 105. The processor 205 is configured to check when the configurations received as the one or more inputs from the user match with the one or more predefined configurations of a Global Configuration Table (GCT). The processor 205 is configured to dynamically change the configurations received as the one or more inputs to align with the one or more predefined configurations of the GCT when the configurations received as the one or more inputs do not match with the one or more predefined configurations of the GCT.
[0079] A person of ordinary skill in the art will readily ascertain that the illustrated embodiments and steps in description and drawings (FIG.1-6) are set out to explain the exemplary embodiments shown, and it should be anticipated that ongoing technological development will change the manner in which particular functions are performed. These examples are presented herein for purposes of illustration, and not limitation. Further, the boundaries of the functional building blocks have been arbitrarily defined herein for the convenience of the description. Alternative boundaries can be defined so long as the specified functions and relationships thereof are appropriately performed. Alternatives (including equivalents, extensions, variations, deviations, etc., of those described herein) will be apparent to persons skilled in the relevant art(s) based on the teachings contained herein. Such alternatives fall within the scope and spirit of the disclosed embodiments.
[0080] The present disclosure provides technical advancement for managing the one or more applications in the network, by configuring the one or more inputs received from the user matches with the GCT. The present disclosure is able to, advantageously, avoids requirement of manual intervention, saves time, quickly updates and changes the configuration parameters based on the GCT, performs automation of pre and post checks, and utilizes the backup system to install or upgrade the one or more applications.
[0081] The present invention offers multiple advantages over the prior art and the above listed are a few examples to emphasize on some of the advantageous features. The listed advantages are to be read in a non-limiting manner.

REFERENCE NUMERALS

[0082] Environment - 100
[0083] Network-105
[0084] User equipment- 110
[0085] Server - 115
[0086] System -120
[0087] Processor - 205
[0088] Memory – 210
[0089] Validation unit 215
[0090] User interface-255
[0091] Transceiver – 220
[0092] Checking unit– 225
[0093] Changing unit – 230
[0094] Applying unit- 235
[0095] Status checking unit- 240
[0096] Logging unit 245
[0097] Providing unit- 250
[0098] Database– 260
[0099] Primary processor- 305
[00100] Memory– 310
[00101] Architecture- 400
,CLAIMS:CLAIMS
We Claim:
1. A method (500) to manage one or more applications in a network (105), the method (500) comprises the steps of:
receiving, by one or more processors (205), one or more inputs pertaining to configurations from a user for deploying the one or more applications in the network (105);
checking, by the one or more processors (205), when the configurations received as the one or more inputs from the user matches with one or more pre-defined configurations of a Global Configuration Table (GCT); and
dynamically changing, by the one or more processors (205), the configurations received as the one or more inputs to align with the one or more pre-defined configurations of the GCT, when the configurations received as the one or more inputs do not match with the one or more pre-defined configurations of the GCT.

2. The method (500) as claimed in claim 1, wherein the configurations received as the one or more inputs from the user pertain to at least one of, the one or more applications data, server details, install/upgrade option, path of application, application configuration option, library option, other folders, pre-check and post-check, and/or backup options.

3. The method (500) as claimed in claim 1, wherein deploying the one or more applications includes, at least one of, installing or upgrading the one or more applications in the network (105).

4. The method (500) as claimed in claim 1, wherein the step of, checking, when the configurations received as the one or more inputs from the user matches with one or more pre-defined configurations of a Global Configuration Table (GCT), includes the steps of:
in response to the user selecting a pre-check option, checking, by the one or more processors (205), when the configurations received as the one or more inputs from the user matches with the one or more pre-defined configurations of the GCT before at least one of, installing or upgrading the one or more applications in the network (105); and
in response to the user selecting a post-check option, checking, by the one or more processors (205), when the configurations received as the one or more inputs from the user matches with the one or more pre-defined configurations of the GCT subsequent to at least one of, installing or upgrading the one or more applications in the network (105).

5. The method (500) as claimed in claim 1, wherein the method (500) further comprises the step of:
applying, by the one or more processors (205), the one or more pre-defined configurations from the GCT to at least one of, a plurality of applications or instances present in the network (105) in response to the user providing an option via a User Interface (UI) (255) to at least one of, install or upgrade at least one of, the plurality of applications or the instances in the network (105) as per the one or more pre-defined configurations from the GCT.

6. The method (500) as claimed in claim 1, wherein the method (500) further comprises the steps of:
checking, by the one or more processors (205), when the one or more applications are at least one of, installed or upgraded; and
when the one or more applications are not at least one of, installed or upgraded, providing by the one or more processors (205), an option to the user to install or upgrade the one or more applications using a back-up system.

7. The method (500) as claimed in claim 1, wherein the one or more processors (205), validates the user prior to receiving, the one or more inputs pertaining to the configurations from the user for at least one of, the installation or upgrading the one or more applications in the network (105), the one or more processors (205), validates the user by:
receiving, by the one or more processors (205), credentials of the user;
checking, by the one or more processors (205), when the credentials received from the user match with pre-stored credentials of the user; and
when the credentials received from the user match with the pre-stored credentials of the user, generating, by the one or more processors (205), a user session with the user to receive the one or more inputs pertaining to the configurations for at least one of, the installation or upgrading the one or more applications in the network (105).

8. The method (500) as claimed in claim 1, wherein the method (500) further comprises the step of:
logging, by the one or more processors (205), a timestamp for each step for at least one of, the installation or upgrading the one or more applications in the network (105).

9. A system (120) to manage one or more applications in a network (105), the system (120) comprising:
a transceiver (220), configured to, receive, one or more inputs pertaining to configurations from a user for deploying the one or more applications in the network (105);
a checking unit (225), configured to, check, when the configurations received as the one or more inputs from the user matches with one or more pre-defined configurations of a Global Configuration Table (GCT); and
when the configurations received as the one or more inputs do not match with the one or more pre-defined configurations of the GCT, a changing unit (230), configured to, dynamically change, the configurations received as the one or more inputs to align with the one or more pre-defined configurations of the GCT.

10. The system (120) as claimed in claim 9, wherein the configurations received as the one or more inputs from the user pertain to at least one of, the one or more applications data, server details, install/upgrade option, path of application, application configuration option, library option, other folders, pre-check and post-check, and/or backup options.

11. The system (120) as claimed in claim 9, wherein deploying of the one or more applications includes, at least one of, installing or upgrading the one or more applications in the network (105).

12. The system (120) as claimed in claim 9, wherein the checking unit (225), checks, when the configurations received as the one or more inputs from the user matches with the one or more pre-defined configurations of the GCT, by:
in response to the user selecting a pre-check option, checking, when the configurations received as the one or more inputs from the user matches with the one or more pre-defined configurations of the GCT before at least one of, installing or upgrading the one or more applications in the network (105);
in response to the user selecting a post-check option, checking, when the configurations received as the one or more inputs from the user matches with the one or more pre-defined configurations of the GCT subsequent to at least one of, installing or upgrading the one or more applications in the network (105).

13. The system (120) as claimed in claim 9, wherein the system (120) further comprising:
an applying unit (235), configured to, apply, the one or more pre-defined configurations from the GCT to at least one of, a plurality of applications or instances present in the network (105) in response to the user providing an option via a User Interface (UI) (255) to at least one of, install or upgrade at least one of, the plurality of applications or the instances in the network (105) as per the one or more pre-defined configurations from the GCT.

14. The system (120) as claimed in claim 9, wherein the system (120) further comprising:
a status checking unit (240), configured to, check, when the one or more applications are at least one of, installed or upgraded; and
when the one or more applications are not at least one of, installed or upgraded, a providing unit (250), configured to, provide, an option to the user to install or upgrade the one or more applications using a back-up system.

15. The system (120) as claimed in claim 9, wherein a validation unit (215) validates the user prior to receiving, the one or more inputs pertaining to the configurations from the user for at least one of, the installation or upgrading the one or more applications in the network (105), the validation unit (215), validates the user by:
receiving, credentials of the user;
checking, when the credentials received from the user match with pre-stored credentials of the user; and
when the credentials received from the user match with the pre-stored credentials of the user, generating, a user session with the user to receive the one or more inputs pertaining to the configurations for at least one of, the installation or upgrading the one or more applications in the network (105).

16. The system (120) as claimed in claim 9, wherein the system (120) further comprising:
a logging unit (245), configured to, log, a timestamp for each step for at least one of, the installation or upgrading the one or more applications in the network (105).

17. A User Equipment (UE) (110), comprising:
one or more primary processors (305) communicatively coupled to one or more processors (205), the one or more primary processors (305) coupled with a memory (310), wherein said memory (310) stores instructions which when executed by the one or more primary processors (305) causes the UE (110) to:
transmit, one or more inputs received from a user for deploying the one or more applications in the network (105);
wherein the one or more processors (205) is configured to perform the steps as claimed in claim 1.

Documents

Application Documents

# Name Date
1 202321060017-STATEMENT OF UNDERTAKING (FORM 3) [06-09-2023(online)].pdf 2023-09-06
2 202321060017-PROVISIONAL SPECIFICATION [06-09-2023(online)].pdf 2023-09-06
3 202321060017-FORM 1 [06-09-2023(online)].pdf 2023-09-06
4 202321060017-FIGURE OF ABSTRACT [06-09-2023(online)].pdf 2023-09-06
5 202321060017-DRAWINGS [06-09-2023(online)].pdf 2023-09-06
6 202321060017-DECLARATION OF INVENTORSHIP (FORM 5) [06-09-2023(online)].pdf 2023-09-06
7 202321060017-FORM-26 [17-10-2023(online)].pdf 2023-10-17
8 202321060017-Proof of Right [12-02-2024(online)].pdf 2024-02-12
9 202321060017-DRAWING [05-09-2024(online)].pdf 2024-09-05
10 202321060017-COMPLETE SPECIFICATION [05-09-2024(online)].pdf 2024-09-05
11 Abstract 1.jpg 2024-10-01
12 202321060017-Power of Attorney [24-01-2025(online)].pdf 2025-01-24
13 202321060017-Form 1 (Submitted on date of filing) [24-01-2025(online)].pdf 2025-01-24
14 202321060017-Covering Letter [24-01-2025(online)].pdf 2025-01-24
15 202321060017-CERTIFIED COPIES TRANSMISSION TO IB [24-01-2025(online)].pdf 2025-01-24
16 202321060017-FORM 3 [29-01-2025(online)].pdf 2025-01-29
17 202321060017-Power of Attorney [03-02-2025(online)].pdf 2025-02-03
18 202321060017-Form 1 (Submitted on date of filing) [03-02-2025(online)].pdf 2025-02-03
19 202321060017-Covering Letter [03-02-2025(online)].pdf 2025-02-03
20 202321060017-CERTIFIED COPIES TRANSMISSION TO IB [03-02-2025(online)].pdf 2025-02-03
21 202321060017-FORM 18 [20-03-2025(online)].pdf 2025-03-20