Abstract:
The present invention relates to a system and method for improving conversion of unresponsive web pages to responsive web design. The present invention particularly improves the conversion of unresponsive web pages to responsive web design dynamically by utilizing at least one track module (104) in communication with at least one machine readable device (106). at least one global storage (102) for storing a plurality of views and at least one queuing storage (108) for storing potential layout based on parameters in the machine readable device (106) and user behavior at real time. The queuing storage (108) further communicates with at least one unwanted layout storage (110) for storing a plurality of unwanted layouts. The present invention also utilizes elastic hierarchy for identifying potential layout to be used as web page design on respective machine readable device and the layout with highest elastic hierarchy percentage score will be used as layout design for the web page.
Abstract:
The present invention provides a method and system to retrieve relevant data based on linked-up service (704) with embedded access control. The method and system comprises authenticating a user, by a user authentication engine, that has raised a request (1) to retrieve data from an embedded access control list. This is followed by filtering data, by retrieval engine (2), based on data relevance, processed by a storage means (708), using meta data measured (3) by an orchestra meta flow use case engine to identify at least one data repository (702) from which the data will be retrieved. Thereafter, the method and system comprises storing in a virtual memory (706), data relevance in a relevance database (4) and data non-relevance in a non-relevance database (5), data relevance and data non-relevance is returned to the at least one data repository after a predetermined period of time (6). The most illustrative drawing: FIGURE 1
Abstract:
A SYSTEM FOR FORMING A VIRTUAL PRIVATE NETWORK COMPRISING A SERVER (708) INCLUDING ONE OR MORE RESOURCES (604), AND AT LEAST ONE CLIENT, A CLIENT ACCESSING THE RESOURCES BY: THE SERVER RECEIVING (105) LOGIN DETAILS FROM THE CLIENT WHICH BINDS THE CLIENT TO A PREDETERMINED ROLE (714) THAT DEFINES THE CLIENT’S ACCESS RIGHTS TO THE SERVER’S RESOURCES; THE SEWER CHECKING THE CLIENT’S SECURITY INTEGRITY; AND CHARACTERISED IN THAT IF ANY OF THE RESOURCES ARE MARKED AS COMPROMISED (608), ACCESS THERETO BY THE CLIENT IS PREVENTED. (FIGURE 1)
Abstract:
A method of integrating quantum key distribution with Internet key exchange protocol, wherein the method comprises exchanging quantum-shared secret index from a cryptographic key database in Phase 1 of the Internet key exchange protocol between an initiator and a responder (100), integrating a number of quantum-shared secret from the cryptographic key database with classic shared secret using a predetermined operation mode in Phase 2 of the Internet key exchange protocol (200) to generate an array of security associations to be used by the initiator and the responder during a single Internet key exchange session, and managing inbound and outbound of the array of security associations in a security association database (402) using a database structure.