Patents Assigned to Computer Associates Think, Inc.
-
Publication number: 20130185716Abstract: The system and method described herein may provide a virtualized replication and high availability environment. In particular, a virtualized production server may run one or more virtual machines in one or more child partitions and have a replication and high availability engine installed in a parent partition. The replication and high availability engine may automatically discover the virtual machines running in the child partitions and automatically synchronize all files associated with the virtual machines to a virtualized replica server.Type: ApplicationFiled: January 13, 2012Publication date: July 18, 2013Applicant: Computer Associates Think, Inc.Inventors: Jinxing YIN, Pengcheng Dun
-
Publication number: 20130173789Abstract: A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated.Type: ApplicationFiled: February 8, 2013Publication date: July 4, 2013Applicant: Computer Associates Think, Inc.Inventor: Computer Associates Think, Inc.
-
Publication number: 20130152194Abstract: A system and method for controlling access to virtual machine consoles. The system includes a console access controller configured to register an owner to a virtual machine to open a defined limit of consoles and capture the defined limit of consoles. An image console control is configured to receive a request to check-out one or more of the captured consoles in one of an exclusive mode and a shared mode and determine whether the check-out request was made by the owner. The console access controller is further configured to open the one or more captured consoles in the exclusive mode to the owner if the check-out request is made by the owner and recapturing the one ore more consoles in response to a check-in request from the owner.Type: ApplicationFiled: December 7, 2011Publication date: June 13, 2013Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Nir Barak, Itzhak Fadida, Amir Jerbi
-
Publication number: 20130152064Abstract: An agent object can invoke one or more methods of an application object using a helper object. The application object passes a reference to itself to the agent object. The agent object identifies a class loader of the application from the reference. The agent object obtains byte code of a helper class and uses the byte code of the helper class to creating a helper class loader. A parent of the helper class loader is set as the class loader of the application. The helper class loader is used to load the helper class and define an instance of the helper object. Using the helper object, the one or more methods of the application object are invoked by the agent using casting, without having a direct class loader connection with the class loader of the application.Type: ApplicationFiled: December 9, 2011Publication date: June 13, 2013Applicant: COMPUTER ASSOCIATES THINK, INC.Inventor: Marco Gagliardi
-
Publication number: 20130145349Abstract: A technique for updating agent software which controls an agent, including how the agent adds instrumentation to an application and how the agent process data from the instrumentation. A current configuration file and an updated configuration file are evaluated in view of rules, to create a merged configuration file. The files include metadata entries. The rules can include: delete a current configuration file, not merge a current configuration file with an updated configuration file, overwrite a current configuration file with an updated configuration file, delete a metadata entry, prefer an entry in the configuration file over a corresponding entry in the updated configuration file, and prefer an entry in the updated configuration file over the corresponding entry in the configuration file. Customized entries in the current configuration file can be maintained if appropriate. Entries which are not maintained are kept in the merged configuration file as inline comments for documentation.Type: ApplicationFiled: December 5, 2011Publication date: June 6, 2013Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Indranil Basak, Dipasoke Chattopadhyay, Abhijit Bhadra, Gurumurthy R
-
Publication number: 20130139179Abstract: A method includes receiving event information corresponding to an event associated with the operation of a system. The method also includes identifying related event information corresponding to a plurality of events that occurred before the event, wherein the event is related to the plurality of events. The method also includes storing the event information and the related event information as a group of events. The method further includes determining whether the group of events occurred within a first specified amount of time by identifying a time window ending at the occurrence of the event and beginning the first specified amount of time before the occurrence of the event and determining whether each event of the group of events occurred during the identified time window. The method further includes identifying an incident associated with the group of events upon determining that the group of events occurred within the first specified amount of time.Type: ApplicationFiled: November 28, 2011Publication date: May 30, 2013Applicant: COMPUTER ASSOCIATES THINK, INC.Inventor: Stuart L. Roll
-
Publication number: 20130138681Abstract: A method includes identifying a first set of metadata associated with a database and retrieving the first set of metadata from one or more first memory locations. The method also includes identifying, based on the first set of metadata, a second set of metadata associated with the database and retrieving the second set of metadata from one or more second memory locations. The method further includes combining the first set of metadata and the second set of metadata into a set of combined metadata.Type: ApplicationFiled: November 28, 2011Publication date: May 30, 2013Applicant: COMPUTER ASSOCIATES THINK, INC.Inventors: Howard A. Abrams, Mark J. Addleman, Jay M. Cohen
-
Patent number: 8452015Abstract: A method for key distribution includes steps or acts of: deprecating a first key on a server; receiving a request from a client wherein the client request includes the deprecated key; verifying the client request by using the deprecated key provided in the client request to decrypt the client request; and sending a communication to the client advising that the first key has been updated. An additional step of sending instructions to the client on obtaining the updated key may also be provided. Additionally, instructions on obtaining the updated key may be sent to the client.Type: GrantFiled: May 10, 2007Date of Patent: May 28, 2013Assignee: Computer Associates Think, Inc.Inventor: Paul A. Gassoway
-
Publication number: 20130133066Abstract: Systems and methods are provided for intrusion detection. The systems and methods may include receiving transaction information related to one or more current transactions between a client entity and a resource server, accessing a database storing a plurality of transaction groups, analyzing the received transaction information with respect to information related to at least one of the plurality of transaction groups, and based on said analyzing, determining a possibility of an occurrence of an intrusion act at the resource server. The transaction groups may be formed based on a plurality of past transactions between a plurality of client entities and the resource server. Identity information of a user associated with the one or more current transactions may also be received along with the transaction information. The user may be associated with at least one of the plurality of transaction groups.Type: ApplicationFiled: November 22, 2011Publication date: May 23, 2013Applicant: Computer Associates Think, IncInventors: Ramesh Natarajan, Timothy Gordon Brown, Carrie Elaine Gates
-
Publication number: 20130129161Abstract: According to one embodiment of the present disclosure, a method includes receiving session information including first fingerprint data corresponding to each of one or more fingers presented by an individual in a sequence on a sensor. The method also includes comparing the session information to stored information associated with the individual. The method further includes determining whether the identity of the individual is verified based on the session information and the sequence.Type: ApplicationFiled: November 18, 2011Publication date: May 23, 2013Applicant: Computer Associates Think, Inc.Inventor: Amit Goel
-
Publication number: 20130132457Abstract: A system, method, and computer-readable storage medium for handling hand-offs in a cloud computing environment is provided. The method includes identifying, at a cloud governance module of a server device, a plurality of applications executing on a plurality of servers belonging to a plurality of cloud computing service providers. The method includes determining based upon information in a policy module, to hand-off an execution of at least one identified application executing on a first cloud computing service provider platform to a second cloud computing service provider, determining whether the second cloud computing service provider satisfies one or more governance policies associated with the at least one identified application, and handing-off the execution of the at least one identified application to a second cloud computing provider platform based upon the second cloud computing provider being compliant with the one or more governance policies associated with the at least one identified application.Type: ApplicationFiled: November 18, 2011Publication date: May 23, 2013Applicant: Computer Associates Think, Inc.Inventor: Kiran P. Diwakar
-
Patent number: 8438299Abstract: A system and method is provided for facilitating data collection from storage devices. A generic low level module may be provided that can handle data collection for devices that store data according to particular variants of a storage standard such as SMI-S storage standard, SNMP protocol, and/or other storage standard.Type: GrantFiled: August 17, 2010Date of Patent: May 7, 2013Assignee: Computer Associates Think, Inc.Inventor: Mallajosyula Venkata Udai Shankar
-
Publication number: 20130111504Abstract: A computer implemented system and method includes accessing an application dialog from a computer readable storage device, wherein the application dialog contains process modules having interface operations and business logic. Process module commands are identified via the computer that are invalid for a service and identifying options for remediation of such commands. A completed process module that has invalid commands removed is compiled as a service procedure. A remote procedure definition and a service wrapper interface are created and stored in a computer readable storage device.Type: ApplicationFiled: October 28, 2011Publication date: May 2, 2013Applicant: Computer Associates Think, Inc.Inventors: David Alan Dillon, David C. Ross, David Edward Hearn
-
Publication number: 20130104125Abstract: According to one embodiment of the present disclosure, a method includes receiving an event notification from a virtual machine manager operable to control the execution of one or more virtual machines, the event notification corresponding to a first virtual machine and indicating an event type associated with the first virtual machine. The method also includes updating an inventory indicating a number of active instances of one or more applications based on the event notification. The method further includes determining compliance or non-compliance with one or more license policies based on the inventory, each license policy corresponding to at least one of the one or more applications.Type: ApplicationFiled: October 25, 2011Publication date: April 25, 2013Applicant: Computer Associates Think, Inc.Inventors: Yellapragada Venkata Subrahmanya Sarma, Gautham Muthyala, Muthu Krishnan Sattanathan, Manigandan Bakthavatchalam
-
Publication number: 20130103990Abstract: A method is provided for managing changes to a computer system. The method includes generating a database configured with fields identifying one or more component changes and potential problems associated with each one or more component changes; populating the fields of the database with information as a change is made to a computer system; monitoring the computer system for issuance of error alerts; comparing issued error alerts against entries of potential problems in the database; and identifying a set of at least one of the component changes as a potential cause of the issued error alert based on the result of the comparing step. The method executes a corrective process in response to the identification of the potential cause of the issued error and updates the database entry of the set of at least one of the component changes to reflect the issued error as a confirmed error thereof.Type: ApplicationFiled: October 19, 2011Publication date: April 25, 2013Applicant: COMPUTER ASSOCIATES THINK, INC.Inventor: Robin Hopper
-
Publication number: 20130090915Abstract: Provided are systems and methods for providing multilingual support for users in a computing environment. The systems and methods may receive and store communications from a user in a first language. If the first language does not match a standard language of the environment, the communication may be translated to the standard language. If a subsequent access request for the stored communication is received, it may be determined whether a language associated with the request matches the standard or first language. If there is a match, the stored original user communication or the stored standard language version maybe returned. If the access request language does not match either language, the user communication may be translated to a language associated with the request directly from the stored original user communication.Type: ApplicationFiled: October 10, 2011Publication date: April 11, 2013Applicant: Computer Associates Think, Inc.Inventor: Dale L. Clark
-
Patent number: 8412701Abstract: A system and method is provided for partitioning a global index into multiple index datasets to house indexes and their index values. The index datasets may be stored in initialized physical index areas that are distinct from a standard physical index area.Type: GrantFiled: September 27, 2010Date of Patent: April 2, 2013Assignee: Computer Associates Think, Inc.Inventors: Kevin P. Shuma, Joseph B. Lynn
-
Publication number: 20130073714Abstract: According to one embodiment of the present disclosure, a method for synchronizing data sets includes receiving a request to synchronize a first data set associated with a first server and a second data set associated with a second server. The method also includes determining, with reference to one or more replication constraints, whether to begin synchronization. The method further includes applying one or more resource control actions in response to determining to begin synchronization.Type: ApplicationFiled: September 15, 2011Publication date: March 21, 2013Applicant: Computer Associates Think, Inc.Inventors: Xiaopin (Hector) Wang, Shisheng (Victor) Liu, Guoxian Shang, Haiyang Zhang
-
Publication number: 20130066854Abstract: A system includes a computer processor that is configured to implement an upper layer stateful application network journaling process. The process includes recording and managing individual client actions on each server in a network. The recording and managing of the individual client actions executes at an application layer of a network protocol stack of the network. The process also includes recording and managing a server status snapshot on a per client basis. The recording and managing of the server status snapshot executes at the application layer of the network protocol stack of the network.Type: ApplicationFiled: September 12, 2011Publication date: March 14, 2013Applicant: Computer Associates Think, Inc.Inventor: Anurag Ojha
-
Publication number: 20130064475Abstract: A system and method retrieve an image using a first computer processor, and transmit the image from the first computer processor to a second remote computer processor. The first computer processor and the second remote computer processor are coupled via a network connection. The image is received at the network connection, and the image is a lightweight operating system that is configured to be stored in and execute in a virtual memory coupled to the second remote computer processor. The second remote computer processor is not equipped with additional hardware or an agent to receive or execute the image.Type: ApplicationFiled: November 6, 2012Publication date: March 14, 2013Applicant: Computer Associates Think, Inc.Inventor: Computer Associates Think, Inc.