Patents by Inventor Maria C. Velez-Rojas

Maria C. Velez-Rojas has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20160292885
    Abstract: Systems and methods may include receiving first and second motion data about first and second objects, respectively. The systems and methods may include applying an asymmetric correlation rule (ACR) to the first and second motion data. The ACR may define a baseline state of motion for the first object and a correlation relationship between the first and second objects. The systems and methods may include determining whether the first object is in the baseline state and, in response to determining that the first object is not in the baseline state, determining whether a first motion vector of the first object is sufficiently correlated with a second motion vector of the second object. The systems and methods may include, in response to determining both that the first object is not in the baseline state and that the first and second motion vectors are not sufficiently correlated, generating an anomalous behavior notification.
    Type: Application
    Filed: March 30, 2015
    Publication date: October 6, 2016
    Applicant: CA, Inc.
    Inventors: Steven L. GREENSPAN, Paul C. LIPTON, John J. HARRISON, Jr., Prashant PARIKH, Serguei MANKOVSKII, Maria C. VELEZ-ROJAS
  • Publication number: 20160277715
    Abstract: A system and method are disclosed for automatically updating a virtual model of a facility such as a datacenter, for example for use in maintaining an accurate thermal management plan. Photo images of the facility may periodically be captured. Thereafter, one or more image recognition algorithms may be run on the captured images to recognize positions and identities of equipment and structures in the facility. Using this information, the virtual model of the facility may be updated. In examples related to thermal management of a datacenter, once the virtual model of the facility is updated, the thermal management plan may be revised.
    Type: Application
    Filed: March 19, 2015
    Publication date: September 22, 2016
    Applicant: CA, INC.
    Inventors: Serguei Mankovskii, Maria C. Velez-Rojas, Howard A. Abrams
  • Publication number: 20160258845
    Abstract: Systems and methods may include receiving data of a physical system. The systems and methods may include determining whether an anomalous event has occurred based on the data. The systems and methods may include, in response to determining that the anomalous event has occurred, capturing data of the physical system and of an environment. The systems and methods may include generating a virtual representation of the physical system and the environment based on the captured data. The systems and methods may include repeatedly simulating data of the virtual representation by varying parameters of the captured data. The systems and methods may include determining which parameters are a root cause of the anomalous event based on the simulated performance data. The systems and methods may include determining particular values of the parameters that are likely the root cause of the anomalous event to use as a trigger for a proactive process.
    Type: Application
    Filed: March 2, 2015
    Publication date: September 8, 2016
    Applicant: CA, INC.
    Inventors: Serge MANKOVSKII, Steven L. GREENSPAN, Debra J. DANIELSON, Prashant PARIKH, Maria C. VELEZ-ROJAS, James D. RENO
  • Publication number: 20160259869
    Abstract: Systems and methods may include receiving performance data of a system. The systems and methods may include generating a virtual representation of the system based on the performance data. The systems and methods may include simulating interactions between the virtual representation and an environment based on the performance data. The systems and methods may include generating an alert indicating an occurrence of an anomalous event based on the simulated interactions. The systems and methods may include determining that the alert was a false positive indicator of the occurrence of the anomalous event. The systems and methods may include, in response to determining that the alert was a false positive indicator, determining differences between a behavior of the system and the simulated interactions. The systems and methods may include determining an adjustment to the virtual representation to mitigate the differences between the behavior of the system and the simulated interactions.
    Type: Application
    Filed: March 2, 2015
    Publication date: September 8, 2016
    Applicant: CA, INC.
    Inventors: Prashant PARIKH, Steven L. GREENSPAN, Debra J. DANIELSON, Serge MANKOVSKII, Maria C. VELEZ-ROJAS, James D. RENO
  • Patent number: 9324000
    Abstract: Image processing is performed to identify an image of a physical object within a digital image. A boundary of the image of the physical object may be determined. A coded reference identifier that is contained within the boundary of the image of the physical object may be recognized. A database record for the coded reference identifier may be associated with a database record for the physical object.
    Type: Grant
    Filed: July 25, 2014
    Date of Patent: April 26, 2016
    Assignee: CA, Inc.
    Inventors: Serguei Mankovskii, Maria C. Velez-Rojas, Howard Abrams
  • Patent number: 9276803
    Abstract: Methods for automatically generating a report in response to detecting performance and/or availability issues that occur throughout multiple layers of a networked computing environment based on a role of a target recipient of the report are described. In some embodiments, a failure graph may be generated by a root cause identification tool that aggregates data from a plurality of performance management tools monitoring the networked computing environment. The root cause identification tool may acquire a plurality of report templates, determine a first report template of the plurality of report templates based on the role associated with the target recipient, identify a set of variables or an ontology associated with the first report template, assign values to the set of variables using the failure graph, generate a first report based on the first report template, and output the first report to the target recipient.
    Type: Grant
    Filed: April 2, 2014
    Date of Patent: March 1, 2016
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
  • Patent number: 9258374
    Abstract: A system and method is provided for creating a trail of events. A plurality of data exchange events and a plurality of user interaction events are captured. A frame is generated based on the captured plurality of user interaction events. A cut is generated based on the captured plurality of data exchange events and the frame. The cut represents a historical trail of the plurality of user interaction events associated with the back-end data receive event and the back-end data send event.
    Type: Grant
    Filed: November 30, 2012
    Date of Patent: February 9, 2016
    Assignee: CA, Inc.
    Inventors: Serge Mankovskii, Maria C. Velez-Rojas
  • Patent number: 9256748
    Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: February 9, 2016
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
  • Publication number: 20160026888
    Abstract: Image processing is performed to identify an image of a physical object within a digital image. A boundary of the image of the physical object may be determined. A coded reference identifier that is contained within the boundary of the image of the physical object may be recognized. A database record for the coded reference identifier may be associated with a database record for the physical object.
    Type: Application
    Filed: July 25, 2014
    Publication date: January 28, 2016
    Inventors: Serguei Mankovskii, Maria C. Velez-Rojas, Howard Abrams
  • Patent number: 9208326
    Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: December 8, 2015
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
  • Publication number: 20150288558
    Abstract: Methods for automatically generating a report in response to detecting performance and/or availability issues that occur throughout multiple layers of a networked computing environment based on a role of a target recipient of the report are described. In some embodiments, a failure graph may be generated by a root cause identification tool that aggregates data from a plurality of performance management tools monitoring the networked computing environment. The root cause identification tool may acquire a plurality of report templates, determine a first report template of the plurality of report templates based on the role associated with the target recipient, identify a set of variables or an ontology associated with the first report template, assign values to the set of variables using the failure graph, generate a first report based on the first report template, and output the first report to the target recipient.
    Type: Application
    Filed: April 2, 2014
    Publication date: October 8, 2015
    Applicant: CA, INC.
    Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
  • Publication number: 20150288557
    Abstract: Methods for automatically generating help desk tickets in response to detecting performance and/or availability issues that occur throughout multiple layers of a networked computing environment are described. In some embodiments, in response to detecting an alert corresponding with a performance issue affecting the networked computing environment, a root cause identification tool may aggregate a plurality of alarms from a plurality of performance management tools monitoring the networked computing environment, generate a failure graph associated with the performance issue, identify a first leaf node of the failure graph, determine a first remedy associated with the first leaf node, and automatically generate a help desk ticket corresponding with the first leaf node and the first remedy. The automatically generated help desk ticket may specify the failure associated with the first leaf node, the first remedy, a location associated with the first remedy, and an estimated time to fix the failure.
    Type: Application
    Filed: April 2, 2014
    Publication date: October 8, 2015
    Applicant: CA, INC.
    Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
  • Publication number: 20150281011
    Abstract: Methods for visualizing and accessing data associated with causal relationships between failures occurring within a networked computing environment are described. In some embodiments, a failure graph may be generated by a root cause identification tool that aggregates data from a plurality of performance management tools monitoring the networked computing environment. The aggregated data may include a plurality of alarms spanning multiple layers of the networked computing environment, as well as log file data. The root cause identification tool may generate a graphical representation of the failure graph including pointers to portions of the aggregated data supporting directed edges of the failure graph. The root cause identification tool may also provide a user interface for accessing the portions of the aggregated data pointed to by the various links within the failure graph.
    Type: Application
    Filed: April 1, 2014
    Publication date: October 1, 2015
    Applicant: CA, INC.
    Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
  • Publication number: 20150280969
    Abstract: Methods for monitoring a networked computing environment and for identifying root causes of performance and availability issues that occur throughout multiple layers of the networked computing environment are described. In some embodiments, a software service provided by a networked computing environment may experience a service-related performance or availability issue. In response to detecting the service-related issue affecting the service, a root cause identification tool may aggregate data from a plurality of information technology management software tools monitoring the networked computing environment, identify causal relationships between a plurality of failures associated with the service-related issue based on the aggregated data, determine a chain of failures of the plurality of failures based on the causal relationships, identify a root cause of the service-related issue based on the chain of failures, and transmit an alarm corresponding with the root cause.
    Type: Application
    Filed: April 1, 2014
    Publication date: October 1, 2015
    Applicant: CA, INC.
    Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
  • Publication number: 20150280968
    Abstract: Methods for monitoring a networked computing environment and for consolidating multiple alarms under a single root cause are described. In some embodiments, in response to detecting an alert corresponding with a performance issue in a networked computing environment, a root cause identification tool may aggregate a plurality of alarms from a plurality of performance management tools monitoring the networked computing environment. The root cause identification tool may then generate a failure graph associated with the performance issue based on the plurality of alarms, determine a first set of leaf nodes of the failure graph, determine a first chain of failures based on the first set of leaf nodes, suppress (or hide) alarms that are not associated with the first chain of failures, and output a consolidated alarm associated with the first chain of failures.
    Type: Application
    Filed: April 1, 2014
    Publication date: October 1, 2015
    Applicant: CA, Inc.
    Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
  • Patent number: 9100540
    Abstract: Methods for providing feedback information regarding a person's focus of attention during a live video communication are described. The live video communication may comprise a live video conference. The feedback information may correspond with non-verbal cues such as who a speaking person is looking at when they are speaking and whether a listener is paying attention to the speaking person. In some embodiments, a dominant speaker in a live video conference may be determined and a live video stream that is being viewed by the dominant speaker may be identified. An identification of the live video stream may be transmitted to computing devices associated with other participants in the live video conference. Images associated with the live video stream being displayed to the other participants may be highlighted, enlarged, or moved to a different location on displays used by the other participants.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: August 4, 2015
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
  • Patent number: 9055071
    Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: June 9, 2015
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
  • Patent number: 9047253
    Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: June 2, 2015
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
  • Patent number: 9041766
    Abstract: Methods for providing feedback information regarding a person's focus of attention during a live video communication are described. The live video communication may comprise a live video conference. The feedback information may correspond with non-verbal cues such as who a speaking person is looking at when they are speaking and whether a listener is paying attention to the speaking person. In some embodiments, a dominant speaker in a live video conference may be determined and a live video stream that is being viewed by the dominant speaker may be identified. An identification of the live video stream may be transmitted to computing devices associated with other participants in the live video conference. Images associated with the live video stream being displayed to the other participants may be highlighted, enlarged, or moved to a different location on displays used by the other participants.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: May 26, 2015
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
  • Patent number: 8887300
    Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: November 11, 2014
    Assignee: CA, Inc.
    Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan