Patents Assigned to Computer Associated Think, Inc.
-
Patent number: 7818586Abstract: Systems and methods are provided for encrypting data, generating encryption keys, and generating encryption indicators. The encryption indicators may be stored on a storage medium in a location separate from the location of stored encrypted data. The encryption indicator includes information indicative of the encryption key used for encrypting and decrypting the data. In one example, the storage medium is a tape, and the encryption indicator is stored in the user header label of the tape.Type: GrantFiled: April 18, 2006Date of Patent: October 19, 2010Assignee: Computer Associates Think, Inc.Inventors: Russell A. Witt, Timothy R. Bruce, David L. Helsley, Osvaldo A. Ridner, John M. Casey
-
Patent number: 7818418Abstract: Anomalous behavior in a distributed system is automatically detected. Metrics are gathered for transactions, subsystems and/or components of the subsystems. The metrics can identify response times, error counts and/or CPU loads, for instance. Baseline metrics and associated deviation ranges are automatically determined and can be periodically updated. Metrics from specific transactions are compared to the baseline metrics to determine if an anomaly has occurred. A drill down approach can be used so that metrics for a subsystem are not examined unless the metrics for an associated transaction indicate an anomaly. Further, metrics for a component, application which includes one or more components, or process which includes one or more applications, are not examined unless the metrics for an associated subsystem indicate an anomaly. Multiple subsystems can report the metrics to a central manager, which can correlate the metrics to transactions using transaction identifiers or other transaction context data.Type: GrantFiled: March 20, 2007Date of Patent: October 19, 2010Assignee: Computer Associates Think, Inc.Inventors: Jyoti Kumar Bansal, David Isaiah Seidman
-
Publication number: 20100261456Abstract: A voice messaging system includes a transceiver, an indicator, a microphone, and a speaker. The transceiver is operable to receive a message from the Internet, and the indicator is operable to announce that the message has been received. The microphone is operable to receive a verbal request to play the message, and the speaker is operable to play the recorded message in response to receiving the verbal request.Type: ApplicationFiled: April 14, 2009Publication date: October 14, 2010Applicant: Computer Associates Think, Inc.Inventors: Christopher J. Stakutis, Thomas M. Boyle, Steven L. Greenspan
-
Patent number: 7814192Abstract: A system and method for automatically deploying a network design is provided. Design deployment may be automated by a system that receives a machine-readable network design as an input, validates design topology requirements, and automatically deploys the design over actual hardware elements without manual intervention. Thus, the system and method provided may eliminate errors and streamline network design deployment, which may be particularly useful in a network characterized by a complex design, which may be difficult and tedious to configure manually.Type: GrantFiled: May 9, 2007Date of Patent: October 12, 2010Assignee: Computer Associates Think, Inc.Inventor: Brajesh Kumar
-
Patent number: 7814056Abstract: Methods and apparatuses for backing up data to a database are provided. A specified data set to be backed up is broken down into a plurality of data blocks, each data block is associated with a data block digest, and the data blocks and associated data block digests are stored in the database. When one or more data blocks are subsequently changed, an update to the backup may be performed by adding to the backup data only the data blocks that have changed since the initial backup. Methods and apparatuses for restoring backup data from a database are also provided. Timestamp information associated with the data blocks in the database is used to select the data blocks to be restored.Type: GrantFiled: January 13, 2006Date of Patent: October 12, 2010Assignee: Computer Associates Think, Inc.Inventors: Emma K. McGrattan, Stephen Ball, Sami R. Moucaddem, Jean-Francois Rivet, Chin L. Kuo, Frank H. Yang
-
Patent number: 7805510Abstract: Application runtime data is obtained from an application monitoring system which monitors execution of an application, and traffic monitoring data is obtained from a traffic monitoring system which monitors traffic to/from the application as the clients interact with the application. Corresponding application runtime data and traffic monitoring data can be selectively output to assist an operator in investigating an anomalous condition. The data can be classified and selectively output according to one or more hierarchies which characterize the interactions. The hierarchies can include a domain level, a business process level (where a domain is made up of a number of business processes), a business transaction level (where a business process is made up of different business transactions), an individual transaction level (where a business transaction is made up of different transactions), and a transaction component level (where a transaction is made up of one or more transaction components).Type: GrantFiled: November 30, 2006Date of Patent: September 28, 2010Assignee: Computer Associates Think, Inc.Inventors: Jyoti K. Bansal, Ling Thio, Jeffrey R. Cobb
-
Publication number: 20100239087Abstract: According to one embodiment, encrypting passwords includes performing the following for each input password of a plurality of input passwords to yield encrypted passwords, where at least two input passwords have different lengths and the encrypted passwords have the same length. An input password and a random number are received at logic configured to perform a key derivation operation comprising a pseudorandom function. An encryption key is derived from the input password and the random number according to the key derivation operation. The encryption key and a user identifier are received at logic configured to perform a cipher-based message authentication code (CMAC) function. An encrypted password is generated from the encryption key and the user identifier according to the CMAC function.Type: ApplicationFiled: March 19, 2009Publication date: September 23, 2010Applicant: Computer Associates Think, Inc.Inventors: Terry W. Chaisson, Adam S. Hendrix, Frederic A.H. Duminy
-
Publication number: 20100241741Abstract: A distributed computing system conforms to a multi-level, hierarchical organizational model. One or more control nodes provide for the efficient and automated allocation and management of computing functions and resources within the distributed computing system in accordance with the organization model. The model includes four distinct levels: fabric, domains, tiers and nodes that provide for the logical abstraction and containment of the physical components as well as system and service application software of the enterprise. A user, such as a system administrator, interacts with the control nodes to logically define the hierarchical organization of distributed computing system. The control nodes are responsible for all levels of management in accordance with the model, including fabric management, domain creation, tier creation and node allocation and deployment.Type: ApplicationFiled: March 23, 2010Publication date: September 23, 2010Applicant: Computer Associates Think, Inc.Inventors: James D. Engquist, Craig A. Vosburgh, Brian Berliner, Jerry R. Jackson, Craig A. Lindley, Doreen E. Collins, Jonathan D. Nordby, Dann M. Church, David L. Resch
-
Patent number: 7801931Abstract: A system and method for common storage object model is provided. In one aspect, one or more classes representing respective one or more storage devices are provided. One or more plugin modules are operable to discover and provision one or more storage devices connected to a storage network using the one or more classes. A wrapper module is operable to handle selecting and loading of the one or more plugin modules.Type: GrantFiled: March 28, 2005Date of Patent: September 21, 2010Assignee: Computer Associates Think, Inc.Inventors: Emre Tunar, Alioune Thiam, Keywan H. Esfahani
-
Patent number: 7801846Abstract: A method for applying a transaction to a database, the method includes generating a global log sequence identifier (GLSI) value within a first node based on log sequence identifier (LSI) values from one or more additional nodes, generating a local log sequence identifier (LLSI) value within the first node based on the GLSI value generated within the first node, and applying the transaction to the database utilizing the generated LLSI value.Type: GrantFiled: April 4, 2006Date of Patent: September 21, 2010Assignee: Computer Associates Think, Inc.Inventors: John T. Devine, Chris Fanning
-
Patent number: 7797240Abstract: An information management system is described comprising one or more workstations running applications to allow a user of the workstation to connect to a network, such as the Internet. Each application has an analyzer, which monitors transmission data that the application is about to transmit to the network or about to receive from the network and which determines an appropriate action to take regarding that transmission data. Such actions may be extracting data from the transmission data, such as passwords and usernames, digital certificates or eCommerce transaction details for storage in a database; ensuring that the transmission data is transmitted at an encryption strength appropriate to the contents of the transmission data; determining whether a check needs to be made as to whether a digital certificate received in transmission data is in force, and determining whether a transaction about to be made by a user of one of the workstations needs third party approval before it is made.Type: GrantFiled: December 17, 2007Date of Patent: September 14, 2010Assignee: Computer Associates Think, Inc.Inventor: Peter Bryan Malcolm
-
Patent number: 7797415Abstract: Application health is determined by calculating baseline deviation for one or more transactions based on past data having the same context as current data being examined. The performance data is generated in response to monitoring one or more applications that perform transactions during a time period. The performance data may include transaction metric data and the context data describing conditions under which one or more transactions were performed. A baseline is determined by predicting current or recent transaction performance data values using past transaction performance data associated with the same context. Based on the comparison of the actual and predicted data with the same or similar context, a deviation from the baseline value is determined for the transaction and reported, for example to a user through an interface.Type: GrantFiled: April 29, 2008Date of Patent: September 14, 2010Assignee: Computer Associates Think, Inc.Inventor: Zahur Peracha
-
Patent number: 7797580Abstract: A system is disclosed that can determine whether a routine is stalled. The system does not require the developer of the routine to add code for the purpose of detecting whether the routine is stalled. Furthermore, the system can be used to monitor various routines at different levels of granularity, such as at the thread level, method level, or other levels. One embodiment of the present invention allows a user to specify a method and an expected time frame. Code for that method is modified to add additional code that implements a timing mechanism. The timing mechanism is used to detect when a thread enters that method and does not return within an approximation of the expected time frame. Other embodiments are also within the scope of the present invention.Type: GrantFiled: June 27, 2005Date of Patent: September 14, 2010Assignee: Computer Associates Think, Inc.Inventors: Jeffrey R. Cobb, Lewis K. Cirne
-
Patent number: 7792855Abstract: A method for mapping an XML document to a directory includes providing an entry to the directory corresponding to the XML document, providing one or more search attributes to the entry containing one or more corresponding search terms, and providing a full-text attribute containing full text of the XML document to the entry.Type: GrantFiled: March 30, 2005Date of Patent: September 7, 2010Assignee: Computer Associates Think, Inc.Inventors: Christopher Betts, Tony Rogers
-
Patent number: 7787863Abstract: The disclosure provides a wireless agent for a mobile device. In one embodiment, the example wireless agent is operable to dynamically determine an access point for wireless communications from a mobile device through a network. The wireless agent is further operable to automatically select one of a plurality of security profiles associated with a mobile device based, at least in part, on the determined access point, with each security profile including a plurality of security parameters for accessing at least one wireless network. The wireless agent then modifies at least one of plurality of network configuration options of the mobile device based on the selected security profile and automatically attempts to communicably connect the mobile device to the access point using the network configuration options.Type: GrantFiled: May 24, 2005Date of Patent: August 31, 2010Assignee: Computer Associates Think, Inc.Inventor: Joannes G. van de Groenendaal
-
Patent number: 7788723Abstract: Method and apparatus for providing computer security is provided. Subscriber information is stored in a repository and an exploit probe is sent to a subscriber's computer system. A probe message based on the computer system's response to the exploit probe is generated.Type: GrantFiled: May 17, 2005Date of Patent: August 31, 2010Assignee: Computer Associates Think, Inc.Inventor: David E. Huddleston
-
Patent number: 7788544Abstract: In general, the techniques of this invention are directed to determining whether a component failure in a distributed computing system is genuine. In particular, embodiments of this invention analyze monitoring data from other application nodes in a distributed computing system to determine whether the component failure is genuine. If the component failure is not genuine, the embodiments may adjust a fault tolerance parameter that caused the component failure to be perceived.Type: GrantFiled: April 30, 2007Date of Patent: August 31, 2010Assignee: Computer Associates Think, Inc.Inventors: Donald M. Allen, Mark W. Emeis, James D. Engquist, Jerry R. Jackson, Randall L. Murrish
-
Publication number: 20100218104Abstract: Method and apparatus for service level management, wherein business processes are composed of services. A state of the service is defined by one or more service parameters, and the service parameters depend upon performance of network components that support the service, e.g., component parameters. The state of the service may depend, for example, on a collection of service parameter values for availability, reliability, security, integrity and response time. A service level agreement is a contract between a supplier and a customer that identifies services supported by a network, service parameters for the services, and service levels (e.g., acceptable levels) for each service parameter.Type: ApplicationFiled: April 1, 2010Publication date: August 26, 2010Applicant: Computer Associates Think, Inc.Inventor: Lundy M. Lewis
-
Patent number: 7782828Abstract: According to one embodiment of the invention, a method for managing channels in a wireless network includes retrieving device parameters from a wireless network device communicating on a channel in the wireless network. The device parameters include a parameter indicative of a location of the wireless network device and a parameter indicative of the channel of the wireless network device. The channel is associated with a data transmission frequency. The method also includes generating a list of available channels for the wireless network device by determining a channel pattern in the wireless network. The method further includes specifying the channel on which the wireless network device should communicate based on the generated list of available channels to reduce channel interference to the wireless network device.Type: GrantFiled: August 22, 2006Date of Patent: August 24, 2010Assignee: Computer Associates Think, Inc.Inventors: Rahul Golash, Rohit Shankar, Sumit B. Deshpande, Navin Kumar Sharma, Rajesh Dharmalingam
-
Patent number: 7783679Abstract: A system receiving time series data will store the data in a first format suited for quick writing. That data will subsequently be converted from the first format to a second format better suited than the first format for compact storage and queries. Over time, the data in the second format can be aggregated and/or down sampled. In one embodiment, the first format includes a set of blocks of information, with each block of information storing data for a set of metrics during a time period. The second format includes a header, a set of blocks of data and a footer. Each bock of data in the second format stores information for a metric over multiple time periods. The footer includes pointers to each block of data.Type: GrantFiled: January 12, 2005Date of Patent: August 24, 2010Assignee: Computer Associates Think, Inc.Inventor: John B. Bley