Patents Assigned to Computer Associated Think, Inc.
  • Patent number: 7818586
    Abstract: Systems and methods are provided for encrypting data, generating encryption keys, and generating encryption indicators. The encryption indicators may be stored on a storage medium in a location separate from the location of stored encrypted data. The encryption indicator includes information indicative of the encryption key used for encrypting and decrypting the data. In one example, the storage medium is a tape, and the encryption indicator is stored in the user header label of the tape.
    Type: Grant
    Filed: April 18, 2006
    Date of Patent: October 19, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Russell A. Witt, Timothy R. Bruce, David L. Helsley, Osvaldo A. Ridner, John M. Casey
  • Patent number: 7818418
    Abstract: Anomalous behavior in a distributed system is automatically detected. Metrics are gathered for transactions, subsystems and/or components of the subsystems. The metrics can identify response times, error counts and/or CPU loads, for instance. Baseline metrics and associated deviation ranges are automatically determined and can be periodically updated. Metrics from specific transactions are compared to the baseline metrics to determine if an anomaly has occurred. A drill down approach can be used so that metrics for a subsystem are not examined unless the metrics for an associated transaction indicate an anomaly. Further, metrics for a component, application which includes one or more components, or process which includes one or more applications, are not examined unless the metrics for an associated subsystem indicate an anomaly. Multiple subsystems can report the metrics to a central manager, which can correlate the metrics to transactions using transaction identifiers or other transaction context data.
    Type: Grant
    Filed: March 20, 2007
    Date of Patent: October 19, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Jyoti Kumar Bansal, David Isaiah Seidman
  • Publication number: 20100261456
    Abstract: A voice messaging system includes a transceiver, an indicator, a microphone, and a speaker. The transceiver is operable to receive a message from the Internet, and the indicator is operable to announce that the message has been received. The microphone is operable to receive a verbal request to play the message, and the speaker is operable to play the recorded message in response to receiving the verbal request.
    Type: Application
    Filed: April 14, 2009
    Publication date: October 14, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Christopher J. Stakutis, Thomas M. Boyle, Steven L. Greenspan
  • Patent number: 7814192
    Abstract: A system and method for automatically deploying a network design is provided. Design deployment may be automated by a system that receives a machine-readable network design as an input, validates design topology requirements, and automatically deploys the design over actual hardware elements without manual intervention. Thus, the system and method provided may eliminate errors and streamline network design deployment, which may be particularly useful in a network characterized by a complex design, which may be difficult and tedious to configure manually.
    Type: Grant
    Filed: May 9, 2007
    Date of Patent: October 12, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Brajesh Kumar
  • Patent number: 7814056
    Abstract: Methods and apparatuses for backing up data to a database are provided. A specified data set to be backed up is broken down into a plurality of data blocks, each data block is associated with a data block digest, and the data blocks and associated data block digests are stored in the database. When one or more data blocks are subsequently changed, an update to the backup may be performed by adding to the backup data only the data blocks that have changed since the initial backup. Methods and apparatuses for restoring backup data from a database are also provided. Timestamp information associated with the data blocks in the database is used to select the data blocks to be restored.
    Type: Grant
    Filed: January 13, 2006
    Date of Patent: October 12, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Emma K. McGrattan, Stephen Ball, Sami R. Moucaddem, Jean-Francois Rivet, Chin L. Kuo, Frank H. Yang
  • Patent number: 7805510
    Abstract: Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components).
    Type: Grant
    Filed: November 30, 2006
    Date of Patent: September 28, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Jyoti K. Bansal, Ling Thio, Jeffrey R. Cobb
  • Publication number: 20100239087
    Abstract: According to one embodiment, encrypting passwords includes performing the following for each input password of a plurality of input passwords to yield encrypted passwords, where at least two input passwords have different lengths and the encrypted passwords have the same length. An input password and a random number are received at logic configured to perform a key derivation operation comprising a pseudorandom function. An encryption key is derived from the input password and the random number according to the key derivation operation. The encryption key and a user identifier are received at logic configured to perform a cipher-based message authentication code (CMAC) function. An encrypted password is generated from the encryption key and the user identifier according to the CMAC function.
    Type: Application
    Filed: March 19, 2009
    Publication date: September 23, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: Terry W. Chaisson, Adam S. Hendrix, Frederic A.H. Duminy
  • Publication number: 20100241741
    Abstract: A distributed computing system conforms to a multi-level, hierarchical organizational model. One or more control nodes provide for the efficient and automated allocation and management of computing functions and resources within the distributed computing system in accordance with the organization model. The model includes four distinct levels: fabric, domains, tiers and nodes that provide for the logical abstraction and containment of the physical components as well as system and service application software of the enterprise. A user, such as a system administrator, interacts with the control nodes to logically define the hierarchical organization of distributed computing system. The control nodes are responsible for all levels of management in accordance with the model, including fabric management, domain creation, tier creation and node allocation and deployment.
    Type: Application
    Filed: March 23, 2010
    Publication date: September 23, 2010
    Applicant: Computer Associates Think, Inc.
    Inventors: James D. Engquist, Craig A. Vosburgh, Brian Berliner, Jerry R. Jackson, Craig A. Lindley, Doreen E. Collins, Jonathan D. Nordby, Dann M. Church, David L. Resch
  • Patent number: 7801931
    Abstract: A system and method for common storage object model is provided. In one aspect, one or more classes representing respective one or more storage devices are provided. One or more plugin modules are operable to discover and provision one or more storage devices connected to a storage network using the one or more classes. A wrapper module is operable to handle selecting and loading of the one or more plugin modules.
    Type: Grant
    Filed: March 28, 2005
    Date of Patent: September 21, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Emre Tunar, Alioune Thiam, Keywan H. Esfahani
  • Patent number: 7801846
    Abstract: A method for applying a transaction to a database, the method includes generating a global log sequence identifier (GLSI) value within a first node based on log sequence identifier (LSI) values from one or more additional nodes, generating a local log sequence identifier (LLSI) value within the first node based on the GLSI value generated within the first node, and applying the transaction to the database utilizing the generated LLSI value.
    Type: Grant
    Filed: April 4, 2006
    Date of Patent: September 21, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: John T. Devine, Chris Fanning
  • Patent number: 7797240
    Abstract: An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made.
    Type: Grant
    Filed: December 17, 2007
    Date of Patent: September 14, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Peter Bryan Malcolm
  • Patent number: 7797415
    Abstract: Application health is determined by calculating baseline deviation for one or more transactions based on past data having the same context as current data being examined. The performance data is generated in response to monitoring one or more applications that perform transactions during a time period. The performance data may include transaction metric data and the context data describing conditions under which one or more transactions were performed. A baseline is determined by predicting current or recent transaction performance data values using past transaction performance data associated with the same context. Based on the comparison of the actual and predicted data with the same or similar context, a deviation from the baseline value is determined for the transaction and reported, for example to a user through an interface.
    Type: Grant
    Filed: April 29, 2008
    Date of Patent: September 14, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Zahur Peracha
  • Patent number: 7797580
    Abstract: A system is disclosed that can determine whether a routine is stalled. The system does not require the developer of the routine to add code for the purpose of detecting whether the routine is stalled. Furthermore, the system can be used to monitor various routines at different levels of granularity, such as at the thread level, method level, or other levels. One embodiment of the present invention allows a user to specify a method and an expected time frame. Code for that method is modified to add additional code that implements a timing mechanism. The timing mechanism is used to detect when a thread enters that method and does not return within an approximation of the expected time frame. Other embodiments are also within the scope of the present invention.
    Type: Grant
    Filed: June 27, 2005
    Date of Patent: September 14, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Jeffrey R. Cobb, Lewis K. Cirne
  • Patent number: 7792855
    Abstract: A method for mapping an XML document to a directory includes providing an entry to the directory corresponding to the XML document, providing one or more search attributes to the entry containing one or more corresponding search terms, and providing a full-text attribute containing full text of the XML document to the entry.
    Type: Grant
    Filed: March 30, 2005
    Date of Patent: September 7, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Christopher Betts, Tony Rogers
  • Patent number: 7787863
    Abstract: The disclosure provides a wireless agent for a mobile device. In one embodiment, the example wireless agent is operable to dynamically determine an access point for wireless communications from a mobile device through a network. The wireless agent is further operable to automatically select one of a plurality of security profiles associated with a mobile device based, at least in part, on the determined access point, with each security profile including a plurality of security parameters for accessing at least one wireless network. The wireless agent then modifies at least one of plurality of network configuration options of the mobile device based on the selected security profile and automatically attempts to communicably connect the mobile device to the access point using the network configuration options.
    Type: Grant
    Filed: May 24, 2005
    Date of Patent: August 31, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: Joannes G. van de Groenendaal
  • Patent number: 7788723
    Abstract: Method and apparatus for providing computer security is provided. Subscriber information is stored in a repository and an exploit probe is sent to a subscriber's computer system. A probe message based on the computer system's response to the exploit probe is generated.
    Type: Grant
    Filed: May 17, 2005
    Date of Patent: August 31, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: David E. Huddleston
  • Patent number: 7788544
    Abstract: In general, the techniques of this invention are directed to determining whether a component failure in a distributed computing system is genuine. In particular, embodiments of this invention analyze monitoring data from other application nodes in a distributed computing system to determine whether the component failure is genuine. If the component failure is not genuine, the embodiments may adjust a fault tolerance parameter that caused the component failure to be perceived.
    Type: Grant
    Filed: April 30, 2007
    Date of Patent: August 31, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Donald M. Allen, Mark W. Emeis, James D. Engquist, Jerry R. Jackson, Randall L. Murrish
  • Publication number: 20100218104
    Abstract: Method and apparatus for service level management, wherein business processes are composed of services. A state of the service is defined by one or more service parameters, and the service parameters depend upon performance of network components that support the service, e.g., component parameters. The state of the service may depend, for example, on a collection of service parameter values for availability, reliability, security, integrity and response time. A service level agreement is a contract between a supplier and a customer that identifies services supported by a network, service parameters for the services, and service levels (e.g., acceptable levels) for each service parameter.
    Type: Application
    Filed: April 1, 2010
    Publication date: August 26, 2010
    Applicant: Computer Associates Think, Inc.
    Inventor: Lundy M. Lewis
  • Patent number: 7782828
    Abstract: According to one embodiment of the invention, a method for managing channels in a wireless network includes retrieving device parameters from a wireless network device communicating on a channel in the wireless network. The device parameters include a parameter indicative of a location of the wireless network device and a parameter indicative of the channel of the wireless network device. The channel is associated with a data transmission frequency. The method also includes generating a list of available channels for the wireless network device by determining a channel pattern in the wireless network. The method further includes specifying the channel on which the wireless network device should communicate based on the generated list of available channels to reduce channel interference to the wireless network device.
    Type: Grant
    Filed: August 22, 2006
    Date of Patent: August 24, 2010
    Assignee: Computer Associates Think, Inc.
    Inventors: Rahul Golash, Rohit Shankar, Sumit B. Deshpande, Navin Kumar Sharma, Rajesh Dharmalingam
  • Patent number: 7783679
    Abstract: A system receiving time series data will store the data in a first format suited for quick writing. That data will subsequently be converted from the first format to a second format better suited than the first format for compact storage and queries. Over time, the data in the second format can be aggregated and/or down sampled. In one embodiment, the first format includes a set of blocks of information, with each block of information storing data for a set of metrics during a time period. The second format includes a header, a set of blocks of data and a footer. Each bock of data in the second format stores information for a metric over multiple time periods. The footer includes pointers to each block of data.
    Type: Grant
    Filed: January 12, 2005
    Date of Patent: August 24, 2010
    Assignee: Computer Associates Think, Inc.
    Inventor: John B. Bley