Abstract: A method and system for application centric cloud management is provided. The system includes a cache memory for storing one or more metadata. The system also includes a discrete license refiner for discrete resource pricing. The system further includes a load balancer for obtaining resources. Further, the system includes a monitoring component for monitoring the availability resources. The method includes logging into a cloud network by a user. The method also includes authenticating the user for accessing the cloud network. The method further includes determining a cloud application associated with the user. Further, the method includes determining one or more resources associated with the cloud application. Moreover, the method includes determining a behavior of the user. The method also includes loading one or more resources associated with one or more metadata to a virtual machine. The method further includes assigning the virtual machine to the user.
A SYSTEM AND METHOD FOR APPLICATION CENTRIC CLOUD MANAGEMENT
FIELD OF THE INVENTION
[1] The present invention relates to the field of a method and a system for providing services, products and event handling to users in a cloud.
BACKGROUND
[2] In the recent days, cloud based computing is been widely utilized for rapid and scalable deployment of services. Examples of such services include, but not limited to, virtual web store, media outlets, e-store, internet shop, web-shop and other online sites. Conventionally, a cloud based architecture provided by a cloud service provider deploys resources that can be hosted by an internet service provider. The internet service provider provides connectivity of internet services to a user Examples of resources include, but are not limited to, one or more processors, operating system, display devices, one or more storage devices and the like. The resources are coupled to each other to form a virtual machine.
[3] The user can request the virtual machine from a cloud service provider to perform one or more intended tasks. The virtual machine is controlled by a central server for providing the resources to perform the one or more intended tasks by the user. Further, the cloud based architecture includes several virtual machines that can be scaled on demand. Furthermore, the several virtual machines included in the cloud architecture are communicably connected to a user utilizing an internet protocol (IP) network.
[4] Conventionally, the cloud service provider renders cloud computing services to the user based on factors such as trend analysis and pricing. The cloud service provider charges prices for rendering the cloud computing services based on historical computing trends, resource utilization, economic factors and the like. Further, the cloud service provider maintains a cache region for storing one or more data in the cloud computing architecture. The cache region may include one or more metadata utilized for computing the one or more data stored in the cache. In one example, the cache region may include a shopping cart that includes several products while the user is performing online shopping. The cloud service provider allows the user to add or delete a single product included in the shopping cart. Further, upon completion of the online shopping by the user, the cloud service provider can delete the shopping cart stored in the cache region. However, the cache region does not store a user behavior required for loading the data quickly upon subsequent log-in by the user.
[5] In another example, the cloud service provider provides a license agreement to the user. The license agreement allows the user to access the resources present in the cloud. Further, the license agreement also allows the user to install a software in one or more computing devices as validated in the license agreement. Similarly, license agreements of a plurality of users can be maintained in the cloud to service multiple users simultaneously. Further, the license agreement is independent of physical location of the user. However, the license agreement does not specify the allocation of resources to the user. Further, the license agreement provided by the cloud service provider currently lack provision of discrete pricing to the user.
[6] In yet another example, a monitor and control mechanism allows the user to monitor and control the access of a user's personal data that is maintained in the cloud. Monitoring is performed by an access control list (ACL) provided to the user by the cloud computing architecture. The user can utilize the ACL for either restricting access of the user's personal data or allowing access to the user's personal data or allowing limited access to the user's personal data. However, the monitor and control mechanism do not provide manipulation of the monitored and controlled data.
[7] Conventionally, the cloud computing architecture provides a load-balancing function and a scaling function to the resources present in the cloud. The cloud computing architecture is configured to monitor and allocate resources. A resource record is utilized for maintaining and allocating resources. The cloud computing architecture is configured to receive a request for resources from the user for initializing the virtual machine including the available resources. Further, during non-availability of resources, the cloud computing architecture acquires resources from a reserve resource server. Furthermore, if the resources are unavailable, the cloud computing architecture is configured to acquire resources from an external cloud network. However, the conventional cloud computing architecture does not acquire resources prior to the request for resources from the user. Hence a system for providing increased revenue to the cloud service provider and provide increased benefits to the user is desired.
[8] In the light of the foregoing discussion there is a need for a system and a method for an enhanced application centric cloud management that addresses the above mentioned limitations.
SUMMARY
[9] Embodiments of the present disclosure described herein provide system and method for an enhanced application centric cloud management.
[10] An example of a system for an enhanced application centric cloud management includes a cache memory for storing one or more metadata. The system also includes a discrete license refiner for discrete resource pricing. The system further includes a load balancer for obtaining one or more resources. Further, the system includes a monitoring component for monitoring the availability of the one or more resources. Moreover, the system includes a pattern study component for determining a behavior of a user.
[11] An example of a method for an enhanced application centric cloud management includes logging into a cloud network by a user. The method also includes authenticating the user for accessing the cloud network. The method further includes determining a cloud application associated with the user. Further, the method includes determining one or more resources associated with the cloud application. Moreover, the method includes determining a behavior of the user. The method also includes loading one or more resources associated with one or more metadata to a virtual machine. The method further includes assigning the virtual machine to the user.
BRIEF DESCRIPTION OF FIGURES
[12] The accompanying figure, similar reference numerals may refer to identical or functionally similar elements. These reference numerals are used in the detailed description to illustrate various embodiments and to explain various aspects and advantages of the present disclosure.
[13] FIG. 1 is a block diagram of an environment in accordance with which various embodiments can be implemented;
[14] FIG. 2 is a block diagram of a system for an enhanced application centric cloud management in accordance with one embodiment of the present invention;
[15] FIG. 3 is a flowchart illustrating a method for an enhanced application centric cloud management in accordance with one embodiment of the present invention;
[16] FIG. 4 is a flowchart illustrating a method for determining a user behavior in accordance with one embodiment of the present invention;
[17] FIG. 5 is a flowchart illustrating a method for providing license refinement for cloud resources in accordance with one embodiment of the present invention;
[18] FIG. 6 is a flowchart illustrating a method for obtaining load balancing for cloud resources in accordance with one embodiment of the present invention; and
[19] FIG. 7 is an exemplary illustration for providing discrete pricing of cloud application in accordance with one embodiment of the present invention.
DETAILED DESCRIPTION
[20] It should be observed the method steps and system components have been represented by conventional symbols in the figure, showing only specific details which are relevant for an understanding of the present disclosure. Further, details may be readily apparent to person ordinarily skilled in the art may not have been disclosed. In the present disclosure, relational terms such as first and second, and the like, may be used to distinguish one entity from another entity, without necessarily implying any actual relationship or order between such entities.
[21] Embodiments of the present disclosure described herein provide system and method for an enhanced application centric cloud management.
[22] FIG. 1 is a block diagram of an environment 100 in accordance with which various embodiments can be implemented. The environment 100 includes one or more users such as user 1 105a, user 2 105b and user 3 105c. The environment 100 also includes cloud service provider 110 connected to the internet 115.
[23] The cloud service provider 110 utilizes the internet 115 for providing cloud services. The cloud service provider 110 provides resources present in a cloud network to the user. The cloud service provider 110 allocates the resources to the user dynamically.
[24] The cloud service provider 110 utilizes internet hosting services for providing access to the internet 115. The cloud service provider 110 also provides access to the internet 115 utilizing cloud computing architecture. The cloud computing architecture allows for providing resources required for computation present in the cloud network. The cloud network can be regarded as network including multiple resources required for computing various tasks. Examples of resources include, but are not limited to, one or more processors, operating system, display devices, one or more storage devices and the like. The users can request for a task, in one example, word processing to the cloud service provider 110. The cloud service provider 110 communicates to the cloud network for initiating a virtual machine. The virtual machine includes resources such as hardware and software components required for processing the task. Upon processing, the result is displayed on a display unit of the user.
[25] Cloud computing architecture includes several virtual machines for providing multiple services to one or more users simultaneously. The cloud service provider 110 provides cloud computing architecture that is scalable. Further, the cloud service provider 110 performs billing based on one or more factors. Examples of the one or more factors include, but not limited to, trend, resource usage and utilization of cloud services during peak or off-peak hours and deployment speed.
[26] A system for providing an enhanced application centric cloud management is described in detail in FIG. 2.
[27] FIG. 2 is a block diagram of a system 200 for an enhanced application centric cloud management in accordance with one embodiment of the present invention. The system 200 includes a cache memory 205, a discrete license refiner 210, a load balancer 215, a pattern study component 220 and a monitoring component 225.
[28] The cache memory 205 further comprises a cache data. The cache data includes data associated with most frequently utilized cloud application by a user. Further, the cache data also includes recent cloud application utilized by the user. The cache data is stored in the cache memory 205. The cache memory 205 is utilized for obtaining a user behavior. Further, the cache memory 205 is utilized for loading the cache data when the user logs-in into the cloud application in future and obtains a virtual machine. The cache memory 205 is also utilized for identifying an area of interest of the user. In one example, the user utilizes a word prooessing application. The word processing application includes multiple features such as font, paragraph and the like. Software codes are utilized for executing each of the multiple features in a virtual machine. The cache memory 205 readily stores the software codes when the user logs-
in into the word processing application in future and hence enables quick loading.
Further, the cache memory 205 is utilized to reload the software codes into the virtual machine.
[29] The discrete license refiner 210 is utilized to refine a license of the user. The discrete license refiner 210 is utilized for a resource pricing. The resource pricing can be regarded as amount charged by a cloud service provider for one or more sub applications included within the cloud application utilized by the user. The discrete license refiner 210 enables the user to select the one or more sub applications included within the cloud application. A component selector is utilized for specifying the one or more sub applications. Further, the component selector can also analyze the user behavior to identify the one or more sub applications. The one or more sub applications may be utilized by the user frequently. In one example, if the user utilizes sub applications such as the paragraph and the font in the word processing application, then the discrete license refiner 210 refines the license of the user to provide a refined license. The refined license enables the user to utilize the paragraph and the font included within the word processing application. Further, the refined license enables resource pricing allowing the user to pay for the sub applications such as the paragraph and the font and not for the word processing application altogether.
[30] Furthermore, the discrete license refiner 210 enables the cloud service provider to build virtual machines with less over-head since sub applications included within the cloud application that are not utilized by the user are eliminated. The method utilized by the discrete license refiner 210 for refining the license of the user is explained in detail in conjunction with FIG. 5.
[31] The load balancer 215 is utilized for maintaining one or more resources. The one or more resources maintained by the load balancer 215 enables the user to perform computation of frequently utilized cloud applications. The load balancer 215 utilizes the user behavior for maintaining the one or more resources and hence maintains resources that are required by the user in future. Further, the load balancer 215 obtains a lock for the one or more resources. The lock enables the user to utilize the resources for a specified period of time.
[32] Furthermore, during initialization of the virtual machine, the load balancer 215 enables the cloud service provider to acquire the resources from an external cloud when the resources required for computation of the applications are not available within cloud network of the user. The process utilized by the load balancer 215 for maintaining the resources is explained in detail in conjunction with FIG. 6.
[33] The pattern study component 220 is utilized for identifying the user behavior. Identification is performed by storing the codes of one or more frequently utilized applications by the user. The pattern study component 220 is also utilized for storing a cloud application of interest of the user. Storing enables the cloud service provider to initialize the virtual machine for computing the desired application of the user quickly.
[34] The monitoring component 225 enables the cloud service provider to monitor the availability of the resources when it is obtained from an external cloud network. Upon determining the availability of the resources in the cloud network, the monitoring component 225 returns the resources obtained to the external cloud. The method utilized by the monitoring component 225 for monitoring the resources is explained in detail in conjunction with FIG. 6
[35] FIG. 3 is a flowchart illustrating a method for an enhanced application centric cloud management in accordance with one embodiment of the present invention. The method starts at step 305. At step 310 a user logs-in into a cloud network. A username and a password are required for logging-in into the cloud network. Logging-in provides access to the cloud network. The user obtains the username and the password from a cloud service provider. The user enters the username and the password to obtain access to the cloud network.
[36] At step 315 the user is authenticated for accessing the cloud network. Authentication is performed by comparing the username and the password entered by the user with a list of usernames and corresponding passwords of a plurality of authenticated users of the cloud network. Upon authentication, the user is enabled to deploy a plurality of cloud applications. Further, the user is enabled to perform numerous tasks as desired.
[37] At step 320 a cloud application associated with the user is determined. In one example, the cloud application can include access to a Gmail account of the user. The user can configure the settings of the Gmail account. In one example, settings can include multiple options such as enabling saving draft messages, deleting sent messages and the like. Each of the options is enabled by deploying respective software codes. In another example, the user wishes to utilize a word processing application. The word processing application includes multiple sub applications such as a font, a paragraph, page set-up, alignments and the like. Each of the sub applications are deployed using respective software codes.
[38] At step 325 one or more resources associated with the cloud application is determined. The one or more resources include components such as hardware and software components required for deploying the cloud application. In one example, the resources include the software codes and the corresponding hardware for enabling the multiple options chosen by the user for configuring the settings of the Gmail account. In another example, the one or more resources including the resources for running the software codes for multiple sub applications such as a font, a paragraph, page set-up, alignments and the like are determined.
[39] At step 330 a user behavior is determined. In one example, the user behavior indicates a frequently utilized cloud application by the user. In another example, the user behavior indicates most recently utilized cloud application by the user. The user behavior is determined by storing the software codes of the cloud applications in a cache memory.
[40] In another embodiment, the user behavior is determined by storing the resources including the hardware and software components required for storing at least one of the frequently utilized cloud applications by the user or the most recently utilized cloud application by the user.
[41] At step 335 one or more resources associated with one or more metadata are loaded to a virtual machine. The one or more metadata includes information associated to at least one of the frequently utilized cloud applications by the user or the most recently utilized cloud application by the user. Upon loading, the virtual machine includes all the necessary resources required for deploying a cloud application by the user and for performing the necessary tasks by the user.
[42] The loading of resources to the virtual machine is based on a refined license of the user. The refined license allows access to the cloud applications chosen by the user. Further, the refined license allows access to the sub application within the cloud applications that are frequently utilized by the user. Hence, the over head of the virtual machine is reduced since resources for deploying only chosen cloud applications or the sub applications within the cloud application is loaded.
[43] At step 340 the virtual machine loaded with the necessary resources are assigned to the user. The virtual machine includes the necessary hardware and software components required by the user for performing various tasks as desired. Further, the virtual machine includes the hardware and software components required for deploying sub-applications within the cloud application as specified in the refined license. Furthermore, the refined license enables the user to pay for the chosen sub applications and not for the complete cloud application. The method stops at step 345.
[44] FIG. 4 is a flowchart illustrating a method for determining a user behavior in accordance with one embodiment of the present invention. The method starts at step 405. At step 410 a behavior of a user is analyzed. Analysis is performed by identifying the one or more resources utilized by the user to deploy cloud applications. Analysis is also performed by determining the most frequently utilized hardware and software components by the user for performing various tasks.
[45] At step 415, it is analyzed to determine if a behavioral study algorithm is required for determining the behavior of the user. One or more behavioral study algorithms may be utilized for determining the behavior of the user. The behavioral study algorithm identifies the behavior of the user by storing frequently utilized hardware and software components. If the behavioral study algorithm is required then the step 415 branches to step 420 else the step 415 branches to step 425 where cloud management server identifies the user behavior using cache data analysis.
[46] At step 420 the behavior of the user is monitored. Monitoring includes identifying frequently utilized cloud applications by the user. Monitoring also includes identifying most recent cloud applications by the user. Further, monitoring includes identifying an area of interest of the user. In one example, if the user is utilizing only a font application within the word processing application then the area of interest is considered to be the font application. Furthermore, monitoring includes identifying one or more resources associated with the area of interest of the user.
[47] At step 425 the behavior of the user is analyzed utilizing the cache data. Analysis includes identifying frequently utilized cloud applications by the user. Analysis further includes identifying most recent cloud applications by the user. Further, the one or more resources associated with the frequently utilized cloud applications, the most recent cloud applications and the area of interest of the user is identified.
[48] In one embodiment, an application centric server is also utilized for analyzing the behavior of the user.
[49] At step 430 the behavior of the user is obtained. The behavior of the user is obtained from monitoring as described in step 420. Further, the behavior of the user is obtained from analyzing as described in step 425.
[50] At step 435 the behavior of the user obtained is stored in the cache memory. The cache memory stores cache data dynamically. The cache data includes resources associated with the interest of the user. Further, the cache data also includes resources associated with most frequently utilized cloud application of the user. The cache data enables to load the resources onto a virtual machine quickly. Further, the cache data reduces over head of the virtual machine since it includes resources associated with at least one of the frequently utilized cloud application and the resources associated with the interest of the user. The method ends at step 440.
[51] FIG. 5 is a flowchart illustrating a method for providing license refinement for cloud resources in accordance with one embodiment of the present invention. The method starts at step 505. At step 510 a user behavior is obtained. The user behavior is. obtained as described in FIG. 4. The user behavior, in one example, includes sub applications within a cloud application that is frequently utilized by the user, the cloud application of interest to the user and the like.
[52] At step 515 a list of sub applications within the cloud application is specified by the user. In one example, a word processing application includes a plurality of sub applications such as font, paragraph, alignment and the like. The user may utilize the font and the paragraph application frequently. Hence, the user can specify the font and paragraph in the list of sub applications.
[53] At step 520 the list of sub applications within the cloud application specified by the user is obtained. The user can select the sub applications within the cloud application and submit the specified list to a cloud service provider.
[54] At step 525 the list of sub applications within the cloud application that are frequently utilized by the user are added to the cache memory. The user can further add or delete sub applications and update the cache memory. The cache memory stores resources required for deploying the sub applications specified by the user.
[55] At step 530 a refined license is established. The refined license allows the user to access the sub applications specified in the list. The refined license enables the user to pay for the specified list of sub applications and not the complete cloud application.
[56] At step 535 one or more resources for enabling the sub applications specified in the list is loaded onto a virtual machine. The virtual machine enables the user to perform a plurality of tasks as desired. The virtual machine loaded with the one or more resources includes less overhead and hence can be made available to the user quickly. The virtual machine includes less overhead since only resources associated with the specified list is aggregated and loaded and not resources associated with the complete cloud application. Further, the virtual machine loaded with one or more resources for enabling the sub applications is provided to the user at runtime.
[57] At step 540 it is analyzed to identify if the user wishes to refine the license at runtime. Refining includes at least one of adding or deleting the sub application from the list of sub applications specified for license refinement. If the user wishes to refine the license at runtime then step 540 branches to step 550 else step 540 branches to step 545. Further, if the user wishes to add a sub application to the list then the user is required to specify the sub application to be added.
[58] At step 550 it is determined if the sub application the user wishes to add during run time is generated. If the sub application is generated then the generated sub application is added to the list and the cache memory is further updated as described in step 525 else the user is required to specify the list of sub application that includes the sub application to be added during run time as shown in step 515. The method ends at step 545.
[60] FIG. 6 is a flowchart illustrating a method for obtaining load balancing for cloud resources in accordance with one embodiment of the present invention. The method starts at step 605. At step 610 a virtual machine is initialized. A cloud service provider initializes the virtual machine to a user to perform one or more tasks as desired. Further, the user can deploy one or more cloud applications utilizing the virtual machine assigned by the cloud service provider.
[60] At step 615 a user behavior is read to obtain pattern of usage. The pattern of usage in one example includes most frequently utilized resources by the user. In another example, the pattern of usage also includes resources associated with an area of interest of the user. The user behavior is read from a cache memory. The user behavior is read to maintain the resources associated with the pattern of usage within a cloud network provided by the internet service provider.
[61] At step 620 one or more resources associated with the user behavior is determined. The one or more resources can be regarded as one or more hardware and software components required for performing multiple tasks as desired by the user. The user can pose a request for obtaining the one or more resources.
[62] At step 625 it is determined if the one or more resources associated with the user behavior are available in the cloud network provided by the cloud service provider to the user. The cloud network includes resources such as a plurality of web/cloud servers, hardware and software components, a plurality of cloud applications and storage devices. If the one or more resources are available then step 625 branches to step 630 else step 625 branches to step 635.
[63] At step 630 a virtual machine is assigned to the user. The virtual machine is loaded with the one or more resources. The one or more resources are obtained from the cloud provided by the cloud service provider. The virtual machine enables the user to perform one or more tasks as desired.
[64] At step 635 the one or more resources are obtained from an external cloud since the resources are unavailable in the cloud network provided by the cloud service provider. A reserve resource server can also be utilized to obtain the resources that are unavailable. The one or more resources can be obtained for a specified period of time. The cloud service provider posts a request to the external cloud for obtaining the resources.
[65] At step 640 the cloud network provided by the cloud service provider is monitored for the availability of resources. Monitoring includes determining the availability of the resources within the cloud network provided by the cloud service provider. A monitoring component is utilized for determining the availability of the resources within the cloud network.
[66] At step 645 it is determined if the resources associated with the pattern of usage are available within the cloud network provided by the cloud service provider. The monitoring component is utilized for determining the availability. If the resources are available within the cloud network provided by the cloud service provider then step 645 branches to step 650 else monitoring for the availability of the resources is continued as described in step 640.
[67] If the resources are available within the cloud network provided by the cloud service provider then at step 650 the resources obtained from the external cloud are released. The resources are released to save cost of borrowing from the external cloud.
[68] At step 655 the resources present in the cloud network provided by the cloud service provider is obtained. The resources obtained are loaded to the virtual and is further assigned to the user as described in step 630. The method ends at step 660.
[69] Advantageously the disclosed invention records the user behavior such as most frequently utilized cloud application and the most recent data processed by the user. The present invention utilizes the recorded information to obtain resources associated with the behavior thereby aiding the user for quick log-in subsequently. The present invention also allows the cloud service provider to maintain resources based on the interest of the user.
[70] The present invention further provides resource pricing thereby enabling the user to pay for the resources associated with the interest and not for the entire cloud application. The present invention reduces providing costly license to the user. Further, the present invention enables creation of license in accordance with the business needs of the cloud service provider.
[71] The present invention enables the cloud service provider to obtain resources from an external cloud in case of non-availability of resources in the cloud network provided by the cloud service provider. The present invention also provides the advantage of monitoring the resources for availability. Upon the availability of resources, the resources obtained from the external cloud are returned and thereby enabling the cloud service provider for paying reduced service charge for obtaining the resources. The present invention also provides increased system efficiency.
[72] FIG. 7 is an exemplary illustration for providing discrete pricing of cloud application in accordance with one embodiment of the present invention. The table 705 includes columns such as category, sub-category, price, number of days for license and percent of usage. The category can be regarded as a cloud application. The subcategory can be regarded as sub-application within the cloud application. Price indicates the cost of the sub-application within the cloud application. The discrete license provided in the current example includes providing access to sub applications within the cloud application. In the current example, the formatting is the cloud application and font is regarded as the sub-application within the cloud application. The 0.2$ price indicates the cost required for utilizing the font application within the formatting application.
[73] Further, the font application costing 0.2$ is validated for a period of 10 days. The percentage of usage indicates the resource utilization factor. The license further provides access to sub application paragraph within the cloud application formatting. The cloud service provider charges 0.4$ for utilizing the sub application paragraph for a period of 10 days. The discrete license further enables the user to alter the validity period.
[74] The discrete license further provides access to the sub application style within the cloud application formatting. The table 705 indicates the cloud service provider charging 0.6$ for utilizing the sub application style within the cloud application formatting for a period of 10 days. The discrete license also provides access to the sub application set-up within the cloud application layout. The table 705 indicates the cloud service provider charging 0.7$ for utilizing the sub application style within the cloud application formatting for a period of 5 days. Further, the discrete license provides access to the sub application themes within the cloud application layout. The table 705 indicates the cloud service provider charging 0.5$ for utilizing the sub application themes within the cloud application formatting for a period of 3 days. The cloud service provider can introduce varying cost at varying periods for enabling the users to access a sub application within a cloud application based on business requirements.
I/We claim:
1 A system for enhanced application centric cloud management, the system comprising:
a cache memory for storing one or more metadata; a discrete license refiner for discrete resource pricing; a load balancer for obtaining one or more resources;
a monitoring component for monitoring the availability of the one or more resources; and
a pattern study component for determining a behavior of a user
2 The system as claimed in claim 1, wherein the cache memory comprising a cache data, the cache data being utilized for identifying the behavior of the user.
3 The system as claimed in claim l, wherein the metadata includes at least one of a frequently used cloud application by the user and a recent data processed by the user.
4 The system as claimed in claim 3, wherein the metadata is utilized for assigning a virtual machine to the user by a cloud service provider.
5 The system as claimed in claim 1, wherein the discrete license refiner establishes a license for utilizing a component within the cloud application by the user.
6 The system as claimed in claim 5, wherein the component of the cloud application comprising a frequently used sub application within the cloud application by the user.
7 The system as claimed in claim 1, wherein the one or more resources being obtained from one of a local cloud network and an external cloud network.
8 A method for enhanced application centric cloud management, the method comprising:
logging into a cloud network by a user;
authenticating the user for accessing the cloud network;
determining a cloud application associated with the user;
determining one or more resources associated with the cloud application;
determining a behavior of the user;
loading one or more resources associated with one or more metadata to a virtual machine; and assigning the virtual machine to the user.
9 The method as claimed in claim 8, wherein the cloud network is provided by a cloud service provider.
10 The method as claimed in claim 8, wherein the cloud application includes a software code.
11 The method as claimed in claim 10, wherein the software code is executed on the virtual machine.
12 The method as claimed in claim 8, wherein the one or more resources comprising at least one of:
one or more processors; one or more operating systems; one or more cloud servers; and one or more software codes.
13 The method as claimed in claim 8 further comprises storing one or more metadata, storing being utilized for providing quick access to the user during logging into the cloud network.
14 The method as claimed in claim 8 further comprises storing cache data, the cache data being utilized for determining the behavior of the user.
15 The method as claimed in claim13, wherein the metadata includes at least one of a frequently used cloud application by the user and a data utilized by the user.
16 The method as claimed in claim 13, wherein the metadata determines the behavior of the user.
17 The method as claimed in claim 8, wherein the behavior of the user includes one of a pattern usage, settings, service of interest and a cloud application service.
18 The method as claimed in claim 8 further comprising identifying a component of a cloud application.
19 The method as claimed in claim 18, wherein the component includes a sub application of the cloud application.
20 The method as claimed in claim 8 further includes classifying the component of the cloud application.
21 The method as claimed in claim 20 further includes establishing a revised license upon classification.
22 The method as claimed in claim 8 further comprises loading one or more resources upon the revised license establishment.
| # | Name | Date |
|---|---|---|
| 1 | 2164-CHE-2011 POWER OF ATTORNEY 27-06-2011.pdf | 2011-06-27 |
| 1 | 2164-CHE-2011-PROOF OF ALTERATION [16-01-2023(online)].pdf | 2023-01-16 |
| 2 | 2164-CHE-2011-IntimationOfGrant16-06-2022.pdf | 2022-06-16 |
| 2 | 2164-CHE-2011 FORM-5 27-06-2011.pdf | 2011-06-27 |
| 3 | 2164-CHE-2011-PatentCertificate16-06-2022.pdf | 2022-06-16 |
| 3 | 2164-CHE-2011 FORM-3 27-06-2011.pdf | 2011-06-27 |
| 4 | 2164-CHE-2011-Correspondence And POA_12-11-2021.pdf | 2021-11-12 |
| 4 | 2164-CHE-2011 FORM-2 27-06-2011.pdf | 2011-06-27 |
| 5 | 2164-CHE-2011-US(14)-HearingNotice-(HearingDate-14-09-2021).pdf | 2021-10-03 |
| 5 | 2164-CHE-2011 FORM-1 27-06-2011.pdf | 2011-06-27 |
| 6 | 2164-CHE-2011-AMENDED DOCUMENTS [28-09-2021(online)].pdf | 2021-09-28 |
| 6 | 2164-CHE-2011 DRAWINGS 27-06-2011.pdf | 2011-06-27 |
| 7 | 2164-CHE-2011-FORM 13 [28-09-2021(online)].pdf | 2021-09-28 |
| 7 | 2164-CHE-2011 DESCRIPTION(COMPLETE) 27-06-2011.pdf | 2011-06-27 |
| 8 | 2164-CHE-2011-MARKED COPIES OF AMENDEMENTS [28-09-2021(online)].pdf | 2021-09-28 |
| 8 | 2164-CHE-2011 CORRESPONDENCE OTHERS 27-06-2011.pdf | 2011-06-27 |
| 9 | 2164-CHE-2011-RELEVANT DOCUMENTS [28-09-2021(online)].pdf | 2021-09-28 |
| 9 | 2164-CHE-2011 CLAIMS 27-06-2011.pdf | 2011-06-27 |
| 10 | 2164-CHE-2011 ABSTRACT 27-06-2011.pdf | 2011-06-27 |
| 10 | 2164-CHE-2011-Written submissions and relevant documents [28-09-2021(online)].pdf | 2021-09-28 |
| 11 | 2164-CHE-2011 POWER OF ATTORNEY 05-11-2012.pdf | 2012-11-05 |
| 11 | 2164-CHE-2011-FORM-26 [10-09-2021(online)].pdf | 2021-09-10 |
| 12 | 2164-CHE-2011 CORRESPONDENCE OTHERS 05-11-2012.pdf | 2012-11-05 |
| 12 | 2164-CHE-2011-Correspondence to notify the Controller [08-09-2021(online)].pdf | 2021-09-08 |
| 13 | 2164-CHE-2011 FORM-18 25-04-2013.pdf | 2013-04-25 |
| 13 | 2164-CHE-2011-Response to office action [20-07-2020(online)].pdf | 2020-07-20 |
| 14 | 2164-CHE-2011 FORM-13 15-07-2015.pdf | 2015-07-15 |
| 14 | Correspondence by Agent_Power of Attorney_21-10-2019.pdf | 2019-10-21 |
| 15 | 2164-CHE-2011-ABSTRACT [11-10-2019(online)].pdf | 2019-10-11 |
| 15 | Form 13_Address for service.pdf | 2015-07-17 |
| 16 | 2164-CHE-2011-CLAIMS [11-10-2019(online)].pdf | 2019-10-11 |
| 16 | Amended Form 1.pdf | 2015-07-17 |
| 17 | 2164-CHE-2011-COMPLETE SPECIFICATION [11-10-2019(online)].pdf | 2019-10-11 |
| 17 | 2164-CHE-2011-FORM-26 [27-11-2017(online)].pdf | 2017-11-27 |
| 18 | 2164-CHE-2011-DRAWING [11-10-2019(online)].pdf | 2019-10-11 |
| 18 | 2164-CHE-2011-RELEVANT DOCUMENTS [22-02-2018(online)].pdf | 2018-02-22 |
| 19 | 2164-CHE-2011-FER_SER_REPLY [11-10-2019(online)].pdf | 2019-10-11 |
| 19 | 2164-CHE-2011-Changing Name-Nationality-Address For Service [22-02-2018(online)].pdf | 2018-02-22 |
| 20 | 2164-CHE-2011-FER.pdf | 2019-04-12 |
| 20 | 2164-CHE-2011-FORM 3 [11-10-2019(online)].pdf | 2019-10-11 |
| 21 | 2164-CHE-2011-Information under section 8(2) (MANDATORY) [11-10-2019(online)].pdf | 2019-10-11 |
| 21 | 2164-CHE-2011-RELEVANT DOCUMENTS [10-10-2019(online)].pdf | 2019-10-10 |
| 22 | 2164-CHE-2011-FORM-26 [10-10-2019(online)].pdf | 2019-10-10 |
| 22 | 2164-CHE-2011-PETITION UNDER RULE 137 [11-10-2019(online)].pdf | 2019-10-11 |
| 23 | 2164-CHE-2011-FORM 13 [10-10-2019(online)].pdf | 2019-10-10 |
| 24 | 2164-CHE-2011-FORM-26 [10-10-2019(online)].pdf | 2019-10-10 |
| 24 | 2164-CHE-2011-PETITION UNDER RULE 137 [11-10-2019(online)].pdf | 2019-10-11 |
| 25 | 2164-CHE-2011-RELEVANT DOCUMENTS [10-10-2019(online)].pdf | 2019-10-10 |
| 25 | 2164-CHE-2011-Information under section 8(2) (MANDATORY) [11-10-2019(online)].pdf | 2019-10-11 |
| 26 | 2164-CHE-2011-FORM 3 [11-10-2019(online)].pdf | 2019-10-11 |
| 26 | 2164-CHE-2011-FER.pdf | 2019-04-12 |
| 27 | 2164-CHE-2011-Changing Name-Nationality-Address For Service [22-02-2018(online)].pdf | 2018-02-22 |
| 27 | 2164-CHE-2011-FER_SER_REPLY [11-10-2019(online)].pdf | 2019-10-11 |
| 28 | 2164-CHE-2011-DRAWING [11-10-2019(online)].pdf | 2019-10-11 |
| 28 | 2164-CHE-2011-RELEVANT DOCUMENTS [22-02-2018(online)].pdf | 2018-02-22 |
| 29 | 2164-CHE-2011-COMPLETE SPECIFICATION [11-10-2019(online)].pdf | 2019-10-11 |
| 29 | 2164-CHE-2011-FORM-26 [27-11-2017(online)].pdf | 2017-11-27 |
| 30 | 2164-CHE-2011-CLAIMS [11-10-2019(online)].pdf | 2019-10-11 |
| 30 | Amended Form 1.pdf | 2015-07-17 |
| 31 | 2164-CHE-2011-ABSTRACT [11-10-2019(online)].pdf | 2019-10-11 |
| 31 | Form 13_Address for service.pdf | 2015-07-17 |
| 32 | 2164-CHE-2011 FORM-13 15-07-2015.pdf | 2015-07-15 |
| 32 | Correspondence by Agent_Power of Attorney_21-10-2019.pdf | 2019-10-21 |
| 33 | 2164-CHE-2011 FORM-18 25-04-2013.pdf | 2013-04-25 |
| 33 | 2164-CHE-2011-Response to office action [20-07-2020(online)].pdf | 2020-07-20 |
| 34 | 2164-CHE-2011 CORRESPONDENCE OTHERS 05-11-2012.pdf | 2012-11-05 |
| 34 | 2164-CHE-2011-Correspondence to notify the Controller [08-09-2021(online)].pdf | 2021-09-08 |
| 35 | 2164-CHE-2011 POWER OF ATTORNEY 05-11-2012.pdf | 2012-11-05 |
| 35 | 2164-CHE-2011-FORM-26 [10-09-2021(online)].pdf | 2021-09-10 |
| 36 | 2164-CHE-2011 ABSTRACT 27-06-2011.pdf | 2011-06-27 |
| 36 | 2164-CHE-2011-Written submissions and relevant documents [28-09-2021(online)].pdf | 2021-09-28 |
| 37 | 2164-CHE-2011-RELEVANT DOCUMENTS [28-09-2021(online)].pdf | 2021-09-28 |
| 37 | 2164-CHE-2011 CLAIMS 27-06-2011.pdf | 2011-06-27 |
| 38 | 2164-CHE-2011-MARKED COPIES OF AMENDEMENTS [28-09-2021(online)].pdf | 2021-09-28 |
| 38 | 2164-CHE-2011 CORRESPONDENCE OTHERS 27-06-2011.pdf | 2011-06-27 |
| 39 | 2164-CHE-2011-FORM 13 [28-09-2021(online)].pdf | 2021-09-28 |
| 39 | 2164-CHE-2011 DESCRIPTION(COMPLETE) 27-06-2011.pdf | 2011-06-27 |
| 40 | 2164-CHE-2011-AMENDED DOCUMENTS [28-09-2021(online)].pdf | 2021-09-28 |
| 40 | 2164-CHE-2011 DRAWINGS 27-06-2011.pdf | 2011-06-27 |
| 41 | 2164-CHE-2011-US(14)-HearingNotice-(HearingDate-14-09-2021).pdf | 2021-10-03 |
| 41 | 2164-CHE-2011 FORM-1 27-06-2011.pdf | 2011-06-27 |
| 42 | 2164-CHE-2011-Correspondence And POA_12-11-2021.pdf | 2021-11-12 |
| 42 | 2164-CHE-2011 FORM-2 27-06-2011.pdf | 2011-06-27 |
| 43 | 2164-CHE-2011 FORM-3 27-06-2011.pdf | 2011-06-27 |
| 43 | 2164-CHE-2011-PatentCertificate16-06-2022.pdf | 2022-06-16 |
| 44 | 2164-CHE-2011 FORM-5 27-06-2011.pdf | 2011-06-27 |
| 44 | 2164-CHE-2011-IntimationOfGrant16-06-2022.pdf | 2022-06-16 |
| 45 | 2164-CHE-2011 POWER OF ATTORNEY 27-06-2011.pdf | 2011-06-27 |
| 45 | 2164-CHE-2011-PROOF OF ALTERATION [16-01-2023(online)].pdf | 2023-01-16 |
| 1 | 2019-04-1112-29-32_11-04-2019.pdf |