Patents Assigned to Computer Associates Think, Inc.
  • Publication number: 20130185716
    Abstract: The system and method described herein may provide a virtualized replication and high availability environment. In particular, a virtualized production server may run one or more virtual machines in one or more child partitions and have a replication and high availability engine installed in a parent partition. The replication and high availability engine may automatically discover the virtual machines running in the child partitions and automatically synchronize all files associated with the virtual machines to a virtualized replica server.
    Type: Application
    Filed: January 13, 2012
    Publication date: July 18, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Jinxing YIN, Pengcheng Dun
  • Publication number: 20130173789
    Abstract: A method and system for identifying a machine used for an online session with an online provider includes executing a lightweight fingerprint code from a provider interface during an online session to collect and transmit machine and session information; generating and storing a machine signature or identity including a machine effective speed calibration (MESC) which may be used to identify the machine when the machine is used in a subsequent online session by a method of matching the machine signature and MESC to a database of machine identities, analyzing a history of the machine's online sessions to identify one or more response indicators, such as fraud indicators, and executing one or more responses to the response indicators, such as disabling a password or denying an online transaction, where the response and response indicator may be provider-designated.
    Type: Application
    Filed: February 8, 2013
    Publication date: July 4, 2013
    Applicant: Computer Associates Think, Inc.
    Inventor: Computer Associates Think, Inc.
  • Publication number: 20130152194
    Abstract: A system and method for controlling access to virtual machine consoles. The system includes a console access controller configured to register an owner to a virtual machine to open a defined limit of consoles and capture the defined limit of consoles. An image console control is configured to receive a request to check-out one or more of the captured consoles in one of an exclusive mode and a shared mode and determine whether the check-out request was made by the owner. The console access controller is further configured to open the one or more captured consoles in the exclusive mode to the owner if the check-out request is made by the owner and recapturing the one ore more consoles in response to a check-in request from the owner.
    Type: Application
    Filed: December 7, 2011
    Publication date: June 13, 2013
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Nir Barak, Itzhak Fadida, Amir Jerbi
  • Publication number: 20130152064
    Abstract: An agent object can invoke one or more methods of an application object using a helper object. The application object passes a reference to itself to the agent object. The agent object identifies a class loader of the application from the reference. The agent object obtains byte code of a helper class and uses the byte code of the helper class to creating a helper class loader. A parent of the helper class loader is set as the class loader of the application. The helper class loader is used to load the helper class and define an instance of the helper object. Using the helper object, the one or more methods of the application object are invoked by the agent using casting, without having a direct class loader connection with the class loader of the application.
    Type: Application
    Filed: December 9, 2011
    Publication date: June 13, 2013
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventor: Marco Gagliardi
  • Publication number: 20130145349
    Abstract: A technique for updating agent software which controls an agent, including how the agent adds instrumentation to an application and how the agent process data from the instrumentation. A current configuration file and an updated configuration file are evaluated in view of rules, to create a merged configuration file. The files include metadata entries. The rules can include: delete a current configuration file, not merge a current configuration file with an updated configuration file, overwrite a current configuration file with an updated configuration file, delete a metadata entry, prefer an entry in the configuration file over a corresponding entry in the updated configuration file, and prefer an entry in the updated configuration file over the corresponding entry in the configuration file. Customized entries in the current configuration file can be maintained if appropriate. Entries which are not maintained are kept in the merged configuration file as inline comments for documentation.
    Type: Application
    Filed: December 5, 2011
    Publication date: June 6, 2013
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Indranil Basak, Dipasoke Chattopadhyay, Abhijit Bhadra, Gurumurthy R
  • Publication number: 20130139179
    Abstract: A method includes receiving event information corresponding to an event associated with the operation of a system. The method also includes identifying related event information corresponding to a plurality of events that occurred before the event, wherein the event is related to the plurality of events. The method also includes storing the event information and the related event information as a group of events. The method further includes determining whether the group of events occurred within a first specified amount of time by identifying a time window ending at the occurrence of the event and beginning the first specified amount of time before the occurrence of the event and determining whether each event of the group of events occurred during the identified time window. The method further includes identifying an incident associated with the group of events upon determining that the group of events occurred within the first specified amount of time.
    Type: Application
    Filed: November 28, 2011
    Publication date: May 30, 2013
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventor: Stuart L. Roll
  • Publication number: 20130138681
    Abstract: A method includes identifying a first set of metadata associated with a database and retrieving the first set of metadata from one or more first memory locations. The method also includes identifying, based on the first set of metadata, a second set of metadata associated with the database and retrieving the second set of metadata from one or more second memory locations. The method further includes combining the first set of metadata and the second set of metadata into a set of combined metadata.
    Type: Application
    Filed: November 28, 2011
    Publication date: May 30, 2013
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventors: Howard A. Abrams, Mark J. Addleman, Jay M. Cohen
  • Patent number: 8452015
    Abstract: A method for key distribution includes steps or acts of: deprecating a first key on a server; receiving a request from a client wherein the client request includes the deprecated key; verifying the client request by using the deprecated key provided in the client request to decrypt the client request; and sending a communication to the client advising that the first key has been updated. An additional step of sending instructions to the client on obtaining the updated key may also be provided. Additionally, instructions on obtaining the updated key may be sent to the client.
    Type: Grant
    Filed: May 10, 2007
    Date of Patent: May 28, 2013
    Assignee: Computer Associates Think, Inc.
    Inventor: Paul A. Gassoway
  • Publication number: 20130133066
    Abstract: Systems and methods are provided for intrusion detection. The systems and methods may include receiving transaction information related to one or more current transactions between a client entity and a resource server, accessing a database storing a plurality of transaction groups, analyzing the received transaction information with respect to information related to at least one of the plurality of transaction groups, and based on said analyzing, determining a possibility of an occurrence of an intrusion act at the resource server. The transaction groups may be formed based on a plurality of past transactions between a plurality of client entities and the resource server. Identity information of a user associated with the one or more current transactions may also be received along with the transaction information. The user may be associated with at least one of the plurality of transaction groups.
    Type: Application
    Filed: November 22, 2011
    Publication date: May 23, 2013
    Applicant: Computer Associates Think, Inc
    Inventors: Ramesh Natarajan, Timothy Gordon Brown, Carrie Elaine Gates
  • Publication number: 20130129161
    Abstract: According to one embodiment of the present disclosure, a method includes receiving session information including first fingerprint data corresponding to each of one or more fingers presented by an individual in a sequence on a sensor. The method also includes comparing the session information to stored information associated with the individual. The method further includes determining whether the identity of the individual is verified based on the session information and the sequence.
    Type: Application
    Filed: November 18, 2011
    Publication date: May 23, 2013
    Applicant: Computer Associates Think, Inc.
    Inventor: Amit Goel
  • Publication number: 20130132457
    Abstract: A system, method, and computer-readable storage medium for handling hand-offs in a cloud computing environment is provided. The method includes identifying, at a cloud governance module of a server device, a plurality of applications executing on a plurality of servers belonging to a plurality of cloud computing service providers. The method includes determining based upon information in a policy module, to hand-off an execution of at least one identified application executing on a first cloud computing service provider platform to a second cloud computing service provider, determining whether the second cloud computing service provider satisfies one or more governance policies associated with the at least one identified application, and handing-off the execution of the at least one identified application to a second cloud computing provider platform based upon the second cloud computing provider being compliant with the one or more governance policies associated with the at least one identified application.
    Type: Application
    Filed: November 18, 2011
    Publication date: May 23, 2013
    Applicant: Computer Associates Think, Inc.
    Inventor: Kiran P. Diwakar
  • Patent number: 8438299
    Abstract: A system and method is provided for facilitating data collection from storage devices. A generic low level module may be provided that can handle data collection for devices that store data according to particular variants of a storage standard such as SMI-S storage standard, SNMP protocol, and/or other storage standard.
    Type: Grant
    Filed: August 17, 2010
    Date of Patent: May 7, 2013
    Assignee: Computer Associates Think, Inc.
    Inventor: Mallajosyula Venkata Udai Shankar
  • Publication number: 20130111504
    Abstract: A computer implemented system and method includes accessing an application dialog from a computer readable storage device, wherein the application dialog contains process modules having interface operations and business logic. Process module commands are identified via the computer that are invalid for a service and identifying options for remediation of such commands. A completed process module that has invalid commands removed is compiled as a service procedure. A remote procedure definition and a service wrapper interface are created and stored in a computer readable storage device.
    Type: Application
    Filed: October 28, 2011
    Publication date: May 2, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: David Alan Dillon, David C. Ross, David Edward Hearn
  • Publication number: 20130104125
    Abstract: According to one embodiment of the present disclosure, a method includes receiving an event notification from a virtual machine manager operable to control the execution of one or more virtual machines, the event notification corresponding to a first virtual machine and indicating an event type associated with the first virtual machine. The method also includes updating an inventory indicating a number of active instances of one or more applications based on the event notification. The method further includes determining compliance or non-compliance with one or more license policies based on the inventory, each license policy corresponding to at least one of the one or more applications.
    Type: Application
    Filed: October 25, 2011
    Publication date: April 25, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Yellapragada Venkata Subrahmanya Sarma, Gautham Muthyala, Muthu Krishnan Sattanathan, Manigandan Bakthavatchalam
  • Publication number: 20130103990
    Abstract: A method is provided for managing changes to a computer system. The method includes generating a database configured with fields identifying one or more component changes and potential problems associated with each one or more component changes; populating the fields of the database with information as a change is made to a computer system; monitoring the computer system for issuance of error alerts; comparing issued error alerts against entries of potential problems in the database; and identifying a set of at least one of the component changes as a potential cause of the issued error alert based on the result of the comparing step. The method executes a corrective process in response to the identification of the potential cause of the issued error and updates the database entry of the set of at least one of the component changes to reflect the issued error as a confirmed error thereof.
    Type: Application
    Filed: October 19, 2011
    Publication date: April 25, 2013
    Applicant: COMPUTER ASSOCIATES THINK, INC.
    Inventor: Robin Hopper
  • Publication number: 20130090915
    Abstract: Provided are systems and methods for providing multilingual support for users in a computing environment. The systems and methods may receive and store communications from a user in a first language. If the first language does not match a standard language of the environment, the communication may be translated to the standard language. If a subsequent access request for the stored communication is received, it may be determined whether a language associated with the request matches the standard or first language. If there is a match, the stored original user communication or the stored standard language version maybe returned. If the access request language does not match either language, the user communication may be translated to a language associated with the request directly from the stored original user communication.
    Type: Application
    Filed: October 10, 2011
    Publication date: April 11, 2013
    Applicant: Computer Associates Think, Inc.
    Inventor: Dale L. Clark
  • Patent number: 8412701
    Abstract: A system and method is provided for partitioning a global index into multiple index datasets to house indexes and their index values. The index datasets may be stored in initialized physical index areas that are distinct from a standard physical index area.
    Type: Grant
    Filed: September 27, 2010
    Date of Patent: April 2, 2013
    Assignee: Computer Associates Think, Inc.
    Inventors: Kevin P. Shuma, Joseph B. Lynn
  • Publication number: 20130073714
    Abstract: According to one embodiment of the present disclosure, a method for synchronizing data sets includes receiving a request to synchronize a first data set associated with a first server and a second data set associated with a second server. The method also includes determining, with reference to one or more replication constraints, whether to begin synchronization. The method further includes applying one or more resource control actions in response to determining to begin synchronization.
    Type: Application
    Filed: September 15, 2011
    Publication date: March 21, 2013
    Applicant: Computer Associates Think, Inc.
    Inventors: Xiaopin (Hector) Wang, Shisheng (Victor) Liu, Guoxian Shang, Haiyang Zhang
  • Publication number: 20130066854
    Abstract: A system includes a computer processor that is configured to implement an upper layer stateful application network journaling process. The process includes recording and managing individual client actions on each server in a network. The recording and managing of the individual client actions executes at an application layer of a network protocol stack of the network. The process also includes recording and managing a server status snapshot on a per client basis. The recording and managing of the server status snapshot executes at the application layer of the network protocol stack of the network.
    Type: Application
    Filed: September 12, 2011
    Publication date: March 14, 2013
    Applicant: Computer Associates Think, Inc.
    Inventor: Anurag Ojha
  • Publication number: 20130064475
    Abstract: A system and method retrieve an image using a first computer processor, and transmit the image from the first computer processor to a second remote computer processor. The first computer processor and the second remote computer processor are coupled via a network connection. The image is received at the network connection, and the image is a lightweight operating system that is configured to be stored in and execute in a virtual memory coupled to the second remote computer processor. The second remote computer processor is not equipped with additional hardware or an agent to receive or execute the image.
    Type: Application
    Filed: November 6, 2012
    Publication date: March 14, 2013
    Applicant: Computer Associates Think, Inc.
    Inventor: Computer Associates Think, Inc.