Sign In to Follow Application
View All Documents & Correspondence

System And Method For Validating Configuration Settings

Abstract: The present invention relates to a system and method for providing a validation tool to automate in validation of the configuration settings of the computing devices and their interaction thereof for an enterprise application over a network. Also, the present invention validates the configurations of the enterprise application which is deployed and executed over the computing devices. Further, the present invention provides a method for verifying the configurations settings and applying the required configuration settings across the computing devices, if the existing configuration settings of said computing devices are not verified. Upon verifying and/or applying the configuration settings, said validation tool is configured to generate a compliance report and further notify said generated report to the intended user of a group. [FIG.l]

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
16 November 2012
Publication Number
21/2014
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application
Patent Number
Legal Status
Grant Date
2020-07-21
Renewal Date

Applicants

TATA CONSULTANCY SERVICES LIMITED
NIRMAL BUILDING, 9TH FLOOR, NARIMAN POINT, MUMBAI 400021, MAHARASHTRA, INDIA

Inventors

1. BALLA, RAMALINGESWARA RAO
FLAT NO 307, EMERALD BLOCK, MY HOME JEWEL, MADINAGUDA, HYDERABAD 500049, INDIA
2. DEVARAKONDA, JYOTHSNA
FLAT NO: 502, SWARANA LAXMI APARTMENTS, ROAD NO 23, SARDAR PATEL NAGAR, JNTU BACK SIDE, HYDERABAD- 500072, INDIA

Specification

FORM 2
THE PATENTS ACT, 1970
(39 of 1970)
&
THE PATENT RULES, 2003
COMPLETE SPECIFICATION
(See Section 10 and Rule 13)
Title of invention: SYSTEM
AND METHOD FOR VALIDATING CONFIGURATION SETTINGS
Applicant
TATA Consultancy Services Limited A company Incorporated in India under The Companies Act, 1956
Having address:
Nirmal Building, 9th Floor,
Nariman Point, Mumbai 400021,
Maharashtra, India
The following specification particularly describes the invention and the manner in which it is to be performed.

FIELD OF THE INVENTION:
The present invention generally relates to a field of validating configuration settings for an enterprise application.
BACKGROUND OF THE INVENTION:
Enterprise applications or web based applications are specific to business functions, performing various typical tasks over a network. The network comprises number of servers, end-user computers and other computing terminals over which these enterprise applications are deployed and executed. Proper validation of configuration settings is required for executing these enterprise applications over the network. Validating each server setup, end-user computer settings, application configuration settings as well as their interactions amongst them is a complex and an error prone process. In a globally controlled and locally managed (GCLM) environment, lots of manual intervention which requires key expertise availability and effort is required for validation and further it is a time consuming process too. Due to lot of manual intervention, risk of having manual errors gets increases. Also, due to the manual interventions, maintaining parallel coordination among the users having application specific knowledge of the enterprise applications over the network is another concern.
Also, there are number of check-points or checklists which are to be considered during the validation process, and therefore, the chances of missing these check-points are very high. Moreover, these enterprise applications are developed on various platforms and have specific requirements. These specific requirements are crucial and need to be understood and addressed for errorless and flawless execution of the applications over the servers and end-user computers. Thus, an automated method for validating the server setups and end-user computer settings according to the requirement of application's environment is not substantially addressed in the art of the invention.
Moreover, in the validation process, the configurations settings of the servers and end-user computers need to be verified in relative to the required parameters and environment. And,

after completion of the verification process, there is another major concern to apply the required configuration settings across the servers and end-user computers which may not be possible in the existing practice of validation process. Thus, there is a long felt need for a system and a method for providing an end-to-end tool for automating the validation of the configuration settings of the servers, end-user computers, application configurations as well as their interaction on a common platform.
OBJECTS OF THE INVENTION
The primary objective of a present invention is to provide a system and a method to validate the configuration settings of agnostic infrastructure including servers, end-users computers, application configurations and their interactions with a minimum human intervention.
Another object of the invention is to provide a system and method that enables automated validation of configuration settings with a one click action.
Yet another object of the present invention is to provide an adaptive system and a method to verify and/or apply the required configuration settings irrespective of bandwidth of technology, application type and infrastructure.
Yet another object of the present invention is to provide a system and a method that enables auditing and tracking the changes in the configuration settings.
Yet another object of the present invention is to provide an environment independent system and a method for validating the configuration settings based on the specific requirements of the enterprise applications.
Yet another object of the present invention is to provide a cost effective system and a method for validation of configuration settings among the computing devices irrespective of complexity.
Yet another object of the present invention is provide a system and a method to save time and provides improvement in operational efficiency during the validation process.

Still another object of the present invention is to provide a computer-implemented system having one or more processor executable modules for achieving at least one of the aforesaid objects of the present invention.
SUMMARY OF THE INVENTION
Before the present system and method, enablement are described, it is to be understood that this application is not limited to the particular system, and methodologies described, as there can be multiple possible embodiments which are not expressly illustrated in the present disclosure. It is also to be understood that the terminology used in the description is for the purpose of describing the particular versions or embodiments only, and is not intended to limit the scope of the present invention.
The present invention introduces a computer-implemented system and a computer-implemented method for enabling automation in validating requirement specific configuration settings for an enterprise application. The present invention facilitates verification of existing configuration settings and/ or applying of required configuration settings in relative to optimal configuration settings across multiple servers and end-user computer sequentially over a network in a one click action. The optimal configuration settings are the standard settings stored in the XML or config file against which the existing configuration settings are verified or the required configuration settings are applied over the computing devices. The present invention is further configured to validate the configuration settings of the enterprise application. The system is configured to set user-defined parameters of a configuration file depending on the server setup documents and end-user computer setup documents. After setting the parameters, an executable file is executed to invoke a validation tool through a graphical user interface (GUI) mode. Through the GUI mode, the user is prompted to select an appropriate option for validating the configuration settings. The appropriate option which may be selected by the user includes a verifying option for the purpose of verifying the existing configuration settings, applying option for the purpose of applying the required configuration settings, if the existing configuration settings are not in accordance with the server setup and end-user

computer setup documents. Upon capturing the user selected option, system responds by verifying the existing configuration settings across said servers and end-user computers based on the preset parameters complying with the enterprise applications. If the existing configuration settings of the computing devices are not complied in accordance with the enterprise application, the system is further configured to apply the required configuration settings to comply with the specific requirements of said enterprise application. The required configuration settings are stored in an xml or in a config file, where said xml or the config file is an in-built component of the validation tool.
A compliance report is generated based on the validation process of said requirement specific configuration settings and further, the system is enabled for notifying the generated report to the intended user or a group through an electronic communication.
BRIEF DESCRIPTION OF THE DRAWINGS
The foregoing summary, as well as the following detailed description of preferred embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the invention, there is shown in the drawings various stages of the invention; however, the invention is not limited to the specific apparatus and method disclosed in the drawings.
Figure 1 is the block diagram of the system (100) illustrating the multiple embodiments of the present invention.
Figure 2 is the flow diagram (200) illustrating the automated configuration settings validation process according to one aspect of the present invention.
Figure 3 is the illustration of the automated configuration settings validation method (300) across the computing devices in one aspect of the present invention.
DETAILED DESCRIPTION OF THE INVENTION
The invention will now be described with respect to various embodiments. The following description provides specific details for understanding of. and enabling description for,

these embodiments of the invention. The words "comprising," "having," "containing," and "including," and other forms thereof, are intended to be equivalent in meaning and be open ended in that an item or items following any one of these words is not meant to be an exhaustive listing of such item or items, or meant to be limited to only the listed item or items.
It will be readily understood that the components of the present invention, as generally described and illustrated in the Figures herein, could be arranged and designed in a wide variety of different configurations. Thus, the following more detailed description of the embodiments of the invention, as represented in the Figures and flowcharts, is not intended to limit the scope of the invention, as claimed, but is merely representative of certain examples of presently contemplated embodiments in accordance with the invention.
The presently described embodiments will be best understood by reference to the drawings, wherein like parts are designated by like numerals throughout. Moreover, flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
The present invention generally provides a computer-implemented system and a computer-implemented method for automatically validating requirement specific configuration settings across different levels of computing devices and among their interactions thereof. Also the present invention is enabled for validating configuration settings of the enterprise application which is to be deployed across the computing devices. The method of validation is conducted in an automated way with a one click action with minimum user intervention. Also, the method of validation can be conducted

in command line mode. Depending upon the user's choice, said validation tool is executed for the validation process.
In the present business solution or architecture, number of servers and end-user computers or computing devices is connected with each other over a network for achieving a specific goal. For achieving this goal, the present invention has configured an automated validation tool for the purpose of validating the configuration settings of the computing devices. The automated validation tool can be accessed through a GUI mode or command line mode. In GUI Mode, User, in the present invention is required to select appropriate options i.e... whether to verify the existing configuration settings or to apply the required configuration settings based on the requirement.
It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions or code. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
In an embodiment of the invention, said validation tool comprises of an input means for capturing the user input and various process-executable modules. Each said processor-executable module and the input means performs a particular set of task upon execution of the processor. The user in the present invention is required to set parameters of a configuration file through the input means. The parameters which are set by the user are accordance with the server setup documents and end-users computer setup documents, wherein upon the said servers and end-user computers the enterprise application is deployed and executed. The input means is also configured to capture the user selected appropriate option and their corresponding parameters from the invoked GUI. The GUI mode is invoked upon the execution of an executable file. The appropriate option which

may be selected by the user includes a verifying option for verifying the existing configuration settings or an applying option for applying the required configuration settings upon verifying the existing configuration settings.
The user can access the validation tool through the invoked GUI mode or through the command line mode. After setting the parameters and capturing the appropriate option selected by the user, a verification module, one the processor-executable module of the present invention is configured to verify the existing configuration settings of the computing devices in relative to the preset parameters sequentially across the network i.e., the servers and end-user computers and their interactions thereof. The verification module is also configured to verify the configuration settings of the enterprise application which is deployed and executed over said computing devices. The computing devices can be servers, end-user computers and other computing terminals connected over the network.
The validation tool also facilitates an applying module which is configured to apply the required configuration settings upon the computing devices sequentially over the network where the existing configuration settings of the computing devices are not present as per the optimal configuration settings or not complied with the requirements of the enterprise application. The optimal configuration settings are the standard settings stored in the XML or config file against which the existing configuration settings are verified or the required configuration settings are applied over the computing devices. The function of said applying module is to first verify the existing configuration settings of the computing devices and then apply the required configuration settings upon the computing devices, if said required configuration settings are not present in them. The entire diagnostic check of the computing devices and the application configuration i.e., either to verify or apply the requirement-specific configuration settings is performed in a one click action. The required configuration settings are stored in xml or a config file. The validation tool is adaptive in nature and can verify or apply the configuration settings irrespective of bandwidth of technology, application type and technology. The validation tool supports the configuration settings for .net 2.0, .net 3.0and .net 4.0 based applications. Also it supports settings for IIS 6 and IIS 7.5 and settings for, .net ASMX and WCF based web

services. The xml file or the config file contains the optimal configuration settings for a .net based web applications, Internet Information Services (IIS) where Windows Communication Foundation (WCF) and Active Server Methods (ASMX) based services and web applications are hosted, .net based web or windows applications which are invoking WCF and/or ASMX services and for Win-Form based applications. Further, the required or the optimal configuration settings can be updated or a new element can be added to it upon inclusion of additional servers or end-user computers or additional applications to the enterprise or upgrade to any these.
After verifying and applying the required configurations settings across the computing devices, a report generation module is configured to generate a compliance report. The compliance report comprises of a compliance percentage summary which is calculated based on the assigned score, priority and weightage to logical category, wherein said logical category comprises of different configuration settings and their respective attributes. The generated compliance report is further notified to intended user of a group through a notification module. The notification module notifies the intended user or the group by a means of an electronic communication. The electronic communication can be an e-mail communication or a short message service (SMS).
In another embodiment of the present invention the computer-implemented method is considered to provide automation in validating the configuration settings of the computing devices and application configuration over the network. For enabling the validation process, set of processor-enabled steps are performed by the processor-executable programmed modules, wherein said steps includes; setting the parameters of a configuration file according to an environment. The environment includes the server setup documents and end-user setup documents. The parameters are set by the user through the input means, wherein said parameters are accordance with the requirement of the enterprise application which is deployed and executed over the computing devices of the network.

After setting the parameters, step of executing an executable file is performed to invoke the graphical user interface (GUI). Through the invoked GUI mode, user can access the validation tool for the purpose of validating the configuration settings. From the invoked GUI, a step is performed for prompting the user to select an appropriate option and their corresponding parameters. The appropriate option which can be selected by the user includes a verifying option for verifying the existing configuration settings or an applying option for applying the required configuration settings, if the existing configuration setting is not in accordance with the requirement. Upon responding on the user selected option, step of verifying the existing configuration settings across the computing devices sequentially and their interactions amongst them are performed. The verification of the existing configuration settings are performed in relative to the preset parameters which are set by the user, for complying with the enterprise application. Also, the configuration of the enterprise application which is deployed on the computing devices is verified in the verification step.
An additional step is provided for applying the required configuration settings across said computing devices. According to this step, the required configuration settings are applied upon the computing devices where the existing or present configuration setting of said computing devices are not complied with the optimal configuration settings of the deployed enterprise application. This particular step firstly verifies the existing configuration settings and then applies the required configuration settings sequentially across the computing devices, if the existing configuration settings are not verified or complied in accordance with the requirement. The entire diagnostic check of the computing devices and the application configuration i.e., either to verify or apply the requirement-specific configuration settings is performed in a one click action. The required configuration settings are stored in xml or a config file. The xml file or the config file further contains the optimal configuration settings for a .net based web applications, Internet Information Services (IIS) where Windows Communication Foundation (WCF) and Active Server Methods (ASMX) based services and web applications are hosted, net based web or windows applications which are invoking WCF and/or ASMX services and

for Win-Form based applications. Further, the required or the optimal configuration settings can be updated or a new element can be added to it upon inclusion of additional servers or end-user computers or additional applications to the enterprise or upgrade to any these.
Upon verifying and applying the required configuration settings, step of generating a compliance report is performed. After generation of the report, the present invention is further configured for notifying said generated report to the intended user or a group. The notification is done through an electronic communication means which include an email communication and a short message service (SMS).
In another embodiment of the present invention, said validation tool is anticipative in nature and provides schedule downtime and predictive failures. The validation tool is capable of checking the presence of the optimal or required configuration settings as per the xml or the config file. Based on their presence, tool shares the compliance report which is an indication of the predictive failures. On the basis predictive failures, an administrator can schedule the downtime to increase the compliance, which minimizes the failures. Further, the tool has capability to verify the maintenance activities like restart, disk space usage, and disk clean up, disk fragmentation and verification/set of event viewer logs size. Tool verifies the availability of application and its services and based on these settings results, tool moderately notify predictive failures to administrator or stakeholder in the form of compliance reports.
Yet in another embodiment of the present invention, the validation tool is enabled for providing automation in calculating a compliance percentage after the validation of the configuration settings of the computing devices. The report generation module is configured to generate a Compliance percentage summary which is calculated for the different categories of the configuration settings. In an embodiment, the different categories for which compliance percentage is calculated includes Pre-Requisites, Registry Settings, Access Permissions, IIS Settings etc, Further, said tool is also capable for calculating the compliance percentage for the various attributes of the categories of the

configuration settings. For example, the attributes for the category Pre-Requisites are OS, Os patch, .net framework etc. The different categories of configuration settings and their attributes can be seen from Table 1 and Table 2 respectively.
One of the approaches for calculating the compliance percentage is to give same score and same priority to the logical category or group and each sub activity. Thus, compliance percentage is calculated on average method. Considering a case, where we need to verify total 10 settings in one group and among said 10 settings 5 settings are not as per standards. So the compliance is (5 /10) * 100 = 50%. Therefore, the overall compliance of the category is equal to the average of all items or activities as can be seen from Table 1.

Category Individual compliance
Pre-Requi sites 91%
Registry Settings 87%
Access Permissions 100%
Configurations 89%
IIS Settings 77%
System Settings 87%
Maintenance Activities 75%
Overall Compliance 86%
Table 1: Overall Compliance

Attribute Requisites under Pre- Status Individual compliance%
OS pass 100
OS Patch pass 100

IE pass 100
.Net Framework pass 100
.net Framework for WCF Extensions Fail 0
Visual Studio pass 100
Oracle pass 100
MS Office pass 100
IIS pass 100
Acrobat Reader pass 100
Symantec Antivirus pass 100
Category Compliance NA 91%
Table 1: Compliance at category
As per the present invention, another approach to calculate the compliance percentage can be understood with the reference of Table 3 and Table 4 given below. According to this approach weightage will be assigned to logical categories or the groups (egg: Prerequisites, IIS settings, Maintenance activities, etc) based on the priority. Similarly, the individual activities are also assigned with the weight age. Configurable option is be provided to consider either (Weightage -An only) or (Weightage -A & Weightage -B) as can been seen from the Table 3 and Table 4. Activity score will be set to 100 or 0 based on evaluation result (passed, failed, not selected or interrupted). Further, for calculating the compliance score of the activity can be calculated with the following formulae:
Compliance score of a activity = (score of a activity) * (weight of the activity)
Similarly, the normalized score of a group can be calculated with the following formulae:
Normalized score of a group = (Sum of the scores of the rules or groups under the group) / (sum of the weights of the rule or groups under the group)

Similarly, the Compliance score of a group can be calculated using the following formulae:
Compliance score of a group = (Normalized score)* (Weight of the group)
Similarly, the Total compliance can be calculated using the following formulae:
Total Compliance = (Sum of the scores of the groups) / (sum of the weights of the groups)

Attribute under Pre-Requisites Weightage-
A Status Individual
Compliance% Score
OS 5 pass 100 500
OS Patch 4 pass 100 400
IE 2 pass 100 200
.Net Framework 5 pass 100 500
.net
Framework for WCF Extensions 5 Fail 0 0
Visual Studio 4 pass 100 400
Oracle 5 pass 100 500
MSOffice 2 pass 100 200
IIS 5 pass 100 500
Acrobat Reader 3 pass 100 300
Symantec Antivirus 5 pass 100 500
Sum 45 4000
Category Compliance NA NA NA 4000/45 =89%
Table 3: Compliance at category

Category
Weigh tage-B Individual Compliance Score
Pre-Requisites 5 89 445
Registry Settings 4 100 400
Access Permissions 3 90 270
Configurations 3 89 267
IIS Settings 5 100 500
System Settings 5 70 350
Maintenance Activities 3 100 300
SUM 28 NA 2532
Overall Compliance NA NA 2352/28= 84%
Table 4: Overall Compliance
Next, the preferred embodiments of the present invention will be described below based on drawings.
Figure 1 is the block diagram of the system (100) illustrating the multiple embodiments of the present invention. The system (100) comprises a processor, a memory unit coupled with said processor having set of instruction stored therein, validation tool (102), which is accessible by the user. The said tool (102) further comprises of an input means (106) and a set of processor-executable programmed modules such as a verification module (108), applying module (110), report generation module (112) and a notification module (114). According to the various embodiments of the present invention, the methods described herein are intended for operation as computer programs modules running on a computer processor.

The input means (106) is configured to allow the user (104) to set parameters of a configuration file. The parameters are set according to the server setup documents and end-user setup documents upon which the enterprise application is deployed and executed. The input means (106) also captures the user selected appropriate option and their corresponding parameters from the invoked GUI. The GUI mode is invoked upon the execution of an executable file. The appropriate option which is selected by the user can be a verifying option for verifying the existing configuration settings or an applying option for applying the required configuration settings, if the existing configuration setting is not complied with the requirement. .
Through the invoked GUI, the user can access the validation tool (102). Considering a scenario where the user selects the verifying option, a verification module (108) verifies the existing configuration settings of the computing devices sequentially and their interaction across the network in relative to the preset parameters. Also, the verification module (108) is configured to verify the configuration settings of the enterprise application which is deployed and executed over the computing devices. Here the computing devices can include servers, end-user computers and other computing terminals connected over the network. Considering an another scenario where the user selects the apply option from the invoked GUI, the applying module (110) of the tool (102), firstly verifies the existing configuration settings of the computing devices sequentially and thereafter said applying module is configured to apply the required configuration settings upon those computing devices over the network, where the existing configuration settings are not present as per the optimal configuration settings or it is not in accordance with the requirements. This entire diagnostic check of verifying the existing configuration settings of the computing devices or applying the required configuration settings across the computing devices is performed in a one click action through the invoked GUI. The required configuration settings are stored in xml or a config file (116).
After the verification of the existing configuration settings and/ or applying of the required configuration settings across the computing devices, the report generation module (112) is configured to generate the compliance report. The generated compliance report is further

notified by the notification module (114). The notification module (114) notifies the generated report to the intended user or the group by a means of an electronic communication. The electronic communication can be an e-mail communication or a short message service (SMS).
Figure 2 is the flow diagram (200) illustrating the automated configuration settings validation process according to one aspect of the present invention. For enabling the validation of the configuration settings, various processor executable steps are performed, wherein the steps includes; setting parameters of a configuration file (202), wherein the parameters are set by the user (104 of figure 1) through the input means (106 of figure 1). The parameters which are set by the user (104 of figure 1) are accordance with the server setup documents and end-user computer setup documents over which the enterprise applications are deployed and executed. After setting the parameters, step of executing an exe file to invoke a GUI (204) is performed. Through the invoked GUI mode, user (104 of figure 1) accesses the validation tool (102 of figure 1) for validating the configuration settings. The step of prompting the user to select an appropriate action (206) is performed, wherein the user can select a verify option or apply option to verify the existing configuration settings or apply the required configuration settings respectively over the computing devices.
Upon responding to the user selected option, where it is considered that the user has selected the verify option, step of verifying the existing configuration settings (208) is performed. The configuration settings of the computing devices and their interactions are verified in relative to the preset parameters. Also, the configuration of the enterprise application which is deployed on the computing devices is verified as per the specific requirement. Now considering the case where user has selected the apply option, step of applying the required configuration settings (210) is performed. According to the step (210), the tool (102 of figure 1) firstly verifies the existing configuration settings of the computing devices sequentially and applies the required configuration settings upon those computing devices where the existing configuration settings of said computing devices are

not present as per the optimal configuration settings or it is not in compliance with the deployed enterprise application.
The entire diagnostic check of the computing devices and the application configuration is performed in a one click action. The required configuration settings are stored in xml or a config file (116 of figure 1). After the verification of the existing configuration settings according to step (208) or applying the required configuration settings according to step (210), step of generating compliance report (212) is performed, where the compliance report upon the validation of the configuration settings is generated. After the report generation, step of notifying the intended user of a group (214) is performed. The notification is done through an electronic communication means which include an email communication and a short message service (SMS).
Figure 3 is the illustration of the configuration settings validation method (300) across the computing devices over a network in one aspect of the present invention. As can be seen from the figure 3, there are multiple end-user computers (304), web servers (306), application servers (308), active directory (AD) servers (310) and database servers (312) collectively referred as "computing devices" are connected with an Enterprise management server (302) over the network. The said computing devices are interconnected with each other through different network protocols such as HTTP (Hyper-Text transfer protocol), HTTPS (Hyper-Text transfer protocol secure), TCP (Transmission Control Protocol) and LDAP (Lightweight Directory Access Protocol). The enterprise management server (302) can be a separate server or one of a windows server. The enterprise management server (302) is configured for scheduling a job of the validation process across the computing devices. According to an embodiment of the present invention, any one of the computing devices on Windows can act like the enterprise management server (302). The management server (302) invokes the command line mode of the validation tool.
The validation tool (102 of figure 1) is capable for validating the configuration settings for a single server in a one click action or across multiple servers in a one click action. The

validation too! (102 of figure 1) is installed over the each of the computing devices over the network. The enterprise management server (302) is configured to invoke the validation tool (102 of figure 1) through a command line mode of GUI mode. Further, the validation tool (102 of figure 1) is configured for verifying the existing configuration settings of the computing devices in accordance with the requirements of the enterprise application. The step of verification of the existing configuration settings is performed by the verification module (108 of figure 1). Along with the verification, the validation tool (102 of figure 1) also provides an apply option for applying the required configuration settings on the computing devices. The step of applying the required configuration settings is performed by the applying module (110 of figure 1). The applying module (110 of figure 1) is configured to firstly verify the existing configuration settings across the computing devices and then apply the required configuration settings across said computing devices; if the existing configuration setting is not present as per the optimal configuration settings or it is not in accordance with the requirements. Upon verifying the existing configuration settings and applying the required configuration settings, a compliance report is generated. The generated compliance report is further notified to the intended user of the group through an electronic communication.
The methodology and techniques described with respect to the exemplary embodiments can be performed using a computer-implemented system or other computing device within which a set of instructions, when executed, may cause the said computer-implemented system to perform any one or more of the methodologies discussed above. The said computer-implemented system may include a processor embedded within the said computer-implemented system which is configured for executing the said programmed instructions or the said set of instructions. The said computer-implemented system is configured from different modules; each module is configured for executing programmed instructions or set of instruction to perform a particular task. According to the embodiments of the present invention, the computer-implemented system may also operate as a standalone device.

In accordance with various embodiments of the present disclosure, the methods described herein are intended for operation as software programs running on a computer processor-[processor embedded within the said computer-implemented system].
Although the invention has been described in terms of specific embodiments and applications, persons skilled in the art can, in light of this teaching, generate additional embodiments without exceeding the scope or departing from the spirit of the invention described herein.

We Claim:
1. An automated method for validating requirement-specific configuration settings across different levels of computing devices and their interactions thereof for running an enterprise application, characterized in sequentially verifying and applying existing and required configuration settings respectively in relative to optimal configuration settings across said computing devices in a one click action, said method comprising processor implemented steps of:
a. setting parameters of a configuration file according to an environment, wherein
said environment includes server setup documents and end-users computer
setup documents;
b. executing an .exe file to invoke a graphical user interface (GUI);
c. prompting a user to select an appropriate option and their corresponding
parameters through the invoked GUI to execute the validation process;
d. responding to the user selected option by:
i. verifying the existing configuration settings across said computing devices and their interactions thereof in relative to the preset parameters for complying with the enterprise application: OR
ii. applying required configuration settings based on the preset parameters across the computing devices, if said existing configuration settings of the computing devices are not complied with the optimal configuration settings, wherein said required configuration settings are stored in a xml or a config file;
e. generating a compliance report upon the validation of said requirement-specific
configuration settings; and
f. notifying the generated report to an intended person or a group by a means of
an electronic communication.
2. The method as claimed in claim 1, wherein said optimal configuration settings are the standard settings stored in the XML or config file against which the

existing configuration settings are verified or the required configuration settings are applied over the computing devices.
3. The method as claimed in claim I, wherein said different levels of computing devices include server level computing devices, end-user level computing devices and application level computing devices.
4. The method as claimed in claim 1, wherein said appropriate option which is selected by the user includes a verifying option for verifying the required configuration settings, an applying option for applying the required configuration settings or both.
5. The method as claimed in claim 1, wherein said xml or said config file further include the optimal configuration settings for:
a. .net based web applications;
b. Internet Information Services (IIS) where Windows Communication
Foundation (WCF) and Active Server Methods (ASMX) based services
and web applications are hosted;
c. .net based web or windows applications which are invoking WCF
and/or ASMX services;
d. Win-Form applications.
6. The method as claimed in claim 1, wherein said required configuration settings can be updated or a new element can be added to it upon inclusion of additional servers or end-user computers or additional applications to the enterprise or upgrade to any these.
7. The method as claimed in claim 1, wherein said compliance report comprises of a compliance percentage summary which is calculated based on the assigned

score, priority and weightage to logical category, wherein said logical category comprises of different configuration settings and their respective attributes.
8. The method as claimed in claim 1, wherein said means of electronic communication can be an e-mail communication or a short message service (SMS).
9. A system for validating requirement-specific configuration settings across different levels of computing devices and their interactions thereof for running an enterprise application, characterized in simultaneously verifying and applying existing and required configuration settings respectively in relative to optimal configuration settings across said computing devices in an one click action, said system comprises of: a memory unit for storing a set of instructions; a processor coupled to said memory unit, wherein said processor, responsive to said set of instructions further enables:
a. an input means configured to:
i. set parameters of a configuration file according to an environment, wherein said environment includes server setup documents and end-users computer setup documents; and ii. capture the user input for selecting an appropriate option and their corresponding parameters through the invoked graphical user interface (GUI), wherein said GUI is invoked upon executing an exe file;
b. a verification module, in response of the user selected option, is configured to
verify the existing configuration settings across the computing devices and
their interaction thereof in relative to the preset parameters for complying with
the enterprise application; OR
c. an applying module configured to apply required configuration settings based
on the preset parameters, if said existing configuration settings of the
computing devices are not complied with the optimal configuration settings,

wherein said required configuration settings are stored in a xml file or a config file;
d. a report generation module configured to generate a compliance report upon
the validation of said requirement-specific configuration settings; and
e. a notification module configured to notify the generated report to an intended
person or a group by a means of an electronic communication.
10. The system as claimed in claim 9, wherein said optimal configuration settings are the standard settings stored in the XML or config file against which the existing configuration settings are verified or the required configuration settings are applied over the computing devices.
11. The system as claimed in claim 9, wherein said different levels of computing devices include server level computing devices, end-user level computing devices and application level computing devices.
12. The system as claimed in claim 9, wherein said xml or the config file further contains the optimal configuration settings for:
a. net based web applications;
b. Internet Information Services (IIS) where Windows Communication
Foundation (WCF) and Active Server Methods (ASMX) based services
and web applications are hosted;
c. net based web or windows applications which are invoking WCF and/or
ASMX services; and
d. Win-Form applications.
13. The system as claimed in claim 9, wherein said required configuration settings
can be updated or a new element can be added to it upon inclusion of additional
servers or end-user computers or additional applications to the enterprise or
upgrade to any these.

14. The system as claimed in claim 9, wherein said means of electronic communication can be an e-mail communication or a short message service (SMS).
15. The system as claimed in claim 9, wherein said system is an anticipative tool to schedule downtime and predictive failures.
16. The system as claimed in claim 9, wherein said compliance report comprises of a compliance percentage summary which is calculated based on the assigned score, priority and weightage to logical category, wherein said logical category comprises of different configuration settings and their respective attributes.

Documents

Orders

Section Controller Decision Date

Application Documents

# Name Date
1 3307-MUM-2012-RELEVANT DOCUMENTS [27-09-2023(online)].pdf 2023-09-27
1 ABSTRACT1.jpg 2018-08-11
2 3307-MUM-2012-FORM 3.pdf 2018-08-11
2 3307-MUM-2012-RELEVANT DOCUMENTS [30-09-2022(online)].pdf 2022-09-30
3 3307-MUM-2012-IntimationOfGrant21-07-2020.pdf 2020-07-21
3 3307-MUM-2012-FORM 2[TITLE PAGE].pdf 2018-08-11
4 3307-MUM-2012-PatentCertificate21-07-2020.pdf 2020-07-21
4 3307-MUM-2012-FORM 26(4-12-2012).pdf 2018-08-11
5 3307-MUM-2012-Written submissions and relevant documents [25-02-2020(online)].pdf 2020-02-25
5 3307-MUM-2012-FORM 2.pdf 2018-08-11
6 3307-MUM-2012-PETITION UNDER RULE 137 [24-02-2020(online)].pdf 2020-02-24
6 3307-MUM-2012-FORM 18.pdf 2018-08-11
7 3307-MUM-2012-RELEVANT DOCUMENTS [24-02-2020(online)].pdf 2020-02-24
7 3307-MUM-2012-FORM 1.pdf 2018-08-11
8 3307-MUM-2012-FORM 1(7-12-2012).pdf 2018-08-11
8 3307-MUM-2012-Correspondence to notify the Controller [06-02-2020(online)].pdf 2020-02-06
9 3307-MUM-2012-DRAWING.pdf 2018-08-11
9 3307-MUM-2012-FORM-26 [06-02-2020(online)].pdf 2020-02-06
10 3307-MUM-2012-DESCRIPTION(COMPLETE).pdf 2018-08-11
10 3307-MUM-2012-Response to office action [06-02-2020(online)].pdf 2020-02-06
11 3307-MUM-2012-CORRESPONDENCE.pdf 2018-08-11
11 3307-MUM-2012-HearingNoticeLetter-(DateOfHearing-10-02-2020).pdf 2020-01-09
12 3307-MUM-2012-CLAIMS [05-03-2019(online)].pdf 2019-03-05
12 3307-MUM-2012-CORRESPONDENCE(7-12-2012).pdf 2018-08-11
13 3307-MUM-2012-COMPLETE SPECIFICATION [05-03-2019(online)].pdf 2019-03-05
13 3307-MUM-2012-CORRESPONDENCE(4-12-2012).pdf 2018-08-11
14 3307-MUM-2012-CLAIMS.pdf 2018-08-11
14 3307-MUM-2012-DRAWING [05-03-2019(online)].pdf 2019-03-05
15 3307-MUM-2012-ABSTRACT.pdf 2018-08-11
15 3307-MUM-2012-FER_SER_REPLY [05-03-2019(online)].pdf 2019-03-05
16 3307-MUM-2012-FER.pdf 2018-09-06
16 3307-MUM-2012-OTHERS [05-03-2019(online)].pdf 2019-03-05
17 3307-MUM-2012-OTHERS [05-03-2019(online)].pdf 2019-03-05
17 3307-MUM-2012-FER.pdf 2018-09-06
18 3307-MUM-2012-ABSTRACT.pdf 2018-08-11
18 3307-MUM-2012-FER_SER_REPLY [05-03-2019(online)].pdf 2019-03-05
19 3307-MUM-2012-CLAIMS.pdf 2018-08-11
19 3307-MUM-2012-DRAWING [05-03-2019(online)].pdf 2019-03-05
20 3307-MUM-2012-COMPLETE SPECIFICATION [05-03-2019(online)].pdf 2019-03-05
20 3307-MUM-2012-CORRESPONDENCE(4-12-2012).pdf 2018-08-11
21 3307-MUM-2012-CLAIMS [05-03-2019(online)].pdf 2019-03-05
21 3307-MUM-2012-CORRESPONDENCE(7-12-2012).pdf 2018-08-11
22 3307-MUM-2012-CORRESPONDENCE.pdf 2018-08-11
22 3307-MUM-2012-HearingNoticeLetter-(DateOfHearing-10-02-2020).pdf 2020-01-09
23 3307-MUM-2012-DESCRIPTION(COMPLETE).pdf 2018-08-11
23 3307-MUM-2012-Response to office action [06-02-2020(online)].pdf 2020-02-06
24 3307-MUM-2012-FORM-26 [06-02-2020(online)].pdf 2020-02-06
24 3307-MUM-2012-DRAWING.pdf 2018-08-11
25 3307-MUM-2012-FORM 1(7-12-2012).pdf 2018-08-11
25 3307-MUM-2012-Correspondence to notify the Controller [06-02-2020(online)].pdf 2020-02-06
26 3307-MUM-2012-RELEVANT DOCUMENTS [24-02-2020(online)].pdf 2020-02-24
26 3307-MUM-2012-FORM 1.pdf 2018-08-11
27 3307-MUM-2012-PETITION UNDER RULE 137 [24-02-2020(online)].pdf 2020-02-24
27 3307-MUM-2012-FORM 18.pdf 2018-08-11
28 3307-MUM-2012-Written submissions and relevant documents [25-02-2020(online)].pdf 2020-02-25
28 3307-MUM-2012-FORM 2.pdf 2018-08-11
29 3307-MUM-2012-PatentCertificate21-07-2020.pdf 2020-07-21
29 3307-MUM-2012-FORM 26(4-12-2012).pdf 2018-08-11
30 3307-MUM-2012-IntimationOfGrant21-07-2020.pdf 2020-07-21
30 3307-MUM-2012-FORM 2[TITLE PAGE].pdf 2018-08-11
31 3307-MUM-2012-FORM 3.pdf 2018-08-11
31 3307-MUM-2012-RELEVANT DOCUMENTS [30-09-2022(online)].pdf 2022-09-30
32 3307-MUM-2012-RELEVANT DOCUMENTS [27-09-2023(online)].pdf 2023-09-27
32 ABSTRACT1.jpg 2018-08-11

Search Strategy

1 search3307MUM2012_06-09-2018.pdf

ERegister / Renewals

3rd: 19 Oct 2020

From 16/11/2014 - To 16/11/2015

4th: 19 Oct 2020

From 16/11/2015 - To 16/11/2016

5th: 19 Oct 2020

From 16/11/2016 - To 16/11/2017

6th: 19 Oct 2020

From 16/11/2017 - To 16/11/2018

7th: 19 Oct 2020

From 16/11/2018 - To 16/11/2019

8th: 19 Oct 2020

From 16/11/2019 - To 16/11/2020

9th: 19 Oct 2020

From 16/11/2020 - To 16/11/2021

10th: 10 Nov 2021

From 16/11/2021 - To 16/11/2022

11th: 16 Nov 2022

From 16/11/2022 - To 16/11/2023

12th: 16 Nov 2023

From 16/11/2023 - To 16/11/2024

13th: 15 Nov 2024

From 16/11/2024 - To 16/11/2025

14th: 06 Nov 2025

From 16/11/2025 - To 16/11/2026