Patents by Inventor Richard L. Schertz

Richard L. Schertz has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9720919
    Abstract: A computer-implemented system and method performs an iterative process to assess the installation of an upgrade version of a database product for consistency with a baseline version of the database product. To assess the installation, the baseline version and the upgrade version are reconciled by modifying one or both of the baseline and upgrade versions. The modified baseline and upgrade versions are then analyzed to determine whether any remaining inconsistencies exist. Any remaining inconsistencies are then identified and classified, and reconciled. Thereafter, the process is repeated iteratively until the upgrade version is reconciled with the baseline version.
    Type: Grant
    Filed: December 5, 2014
    Date of Patent: August 1, 2017
    Assignee: CA, Inc.
    Inventors: Robert C. Rose, Richard L. Schertz
  • Patent number: 9705733
    Abstract: Throttling polling may include sending a request to an agent device and determining whether a response to the sent request is successfully received from the agent device. A result of the determination may be stored in a memory and associated with the agent device. Further, a success rate is calculated for the agent device based on a plurality of the results. A metric related to the sent request and a subsequently sent request is adjusted for the agent device in accordance with an algorithm based on the calculated success rate for the agent device. The metric may be an amount of time between the sent request and a subsequently sent request for the agent device or a number of subsequently sent requests for the agent device.
    Type: Grant
    Filed: August 7, 2012
    Date of Patent: July 11, 2017
    Assignee: CA, Inc.
    Inventors: Mark C. Zelek, Richard L. Schertz
  • Patent number: 8938424
    Abstract: A computer-implemented system and method performs an iterative process to assess the installation of an upgrade version of a database product for consistency with a baseline version of the database product. To assess the installation, the baseline version and the upgrade version are reconciled by modifying one or both of the baseline and upgrade versions. The modified baseline and upgrade versions are then analyzed to determine whether any remaining inconsistencies exist. Any remaining inconsistencies are then identified and classified, and reconciled. Thereafter, the process is repeated iteratively until the upgrade version is reconciled with the baseline version.
    Type: Grant
    Filed: October 31, 2012
    Date of Patent: January 20, 2015
    Assignee: CA, Inc.
    Inventors: Robert C. Rose, Richard L. Schertz
  • Publication number: 20140122446
    Abstract: A computer-implemented system and method performs an iterative process to assess the installation of an upgrade version of a database product for consistency with a baseline version of the database product. To assess the installation, the baseline version and the upgrade version are reconciled by modifying one or both of the baseline and upgrade versions. The modified baseline and upgrade versions are then analyzed to determine whether any remaining inconsistencies exist. Any remaining inconsistencies are then identified and classified, and reconciled. Thereafter, the process is repeated iteratively until the upgrade version is reconciled with the baseline version.
    Type: Application
    Filed: October 31, 2012
    Publication date: May 1, 2014
    Inventors: Robert C. Rose, Richard L. Schertz
  • Publication number: 20140047000
    Abstract: Throttling polling may include sending a request to an agent device and determining whether a response to the sent request is successfully received from the agent device. A result of the determination may be stored in a memory and associated with the agent device. Further, a success rate is calculated for the agent device based on a plurality of the results. A metric related to the sent request and a subsequently sent request is adjusted for the agent device in accordance with an algorithm based on the calculated success rate for the agent device. The metric may be an amount of time between the sent request and a subsequently sent request for the agent device or a number of subsequently sent requests for the agent device.
    Type: Application
    Filed: August 7, 2012
    Publication date: February 13, 2014
    Applicant: CA, INC.
    Inventors: Mark C. ZELEK, Richard L. SCHERTZ
  • Publication number: 20030159060
    Abstract: The present invention comprises a method of defining security conditions of a computer system. The method comprises the steps of specifying an identity of attack, specifying at least one attribute of the specified attack, and specifying at least one policy definition with respect to the specified attack, specifying at least one attribute of the specified policy definition.
    Type: Application
    Filed: October 31, 2001
    Publication date: August 21, 2003
    Inventors: George S. Gales, Craig D. Anderson, Richard L. Schertz, Richard P. Tarquini
  • Publication number: 20030135749
    Abstract: The present invention comprises a method of defining security conditions of a computer system for the purpose of detecting vulnerabilities. The method comprises the steps of specifying a attack representing a recognized vulnerability of the computer system, specifying at least one attribute of the specified attack, specifying at least one policy definition with respect to detecting the vulnerability of the specified attack, specifying at least one attribute of the specified policy definition, and specifying a remedy for the specified vulnerability.
    Type: Application
    Filed: October 31, 2001
    Publication date: July 17, 2003
    Inventors: George S. Gales, Richard L. Schertz, Richard P. Tarquini, Craig D. Anderson
  • Publication number: 20030084340
    Abstract: In an embodiment of the present invention, a method of displaying data related to an intrusion event on a computer system comprising the steps of capturing data related to the intrusion event, decoding the captured data from a predetermined format to a predetermined format decipherable by humans, the decoded data comprising data components intrusion signature, data summary, and detailed data, correlating data components of the intrusion signature, data summary and detailed data to one another. The method further comprises the steps of retrieving an web browser-based template, and graphically displaying the correlated decoded data components using the web browser-based template.
    Type: Application
    Filed: October 31, 2001
    Publication date: May 1, 2003
    Inventors: Richard L. Schertz, Craig D. Anderson
  • Publication number: 20030084322
    Abstract: A computer comprising an operating system that controls the computer resources. An intrusion detection system is integrated with the operating system and operable to monitor the computer resources to detect, prevent and report intrusion attempts. An anti-virus system is further integrated with the operating system and operable to detect the presence of at least one virus in the computer resources.
    Type: Application
    Filed: October 31, 2001
    Publication date: May 1, 2003
    Inventors: Richard L. Schertz, George S. Gales, Richard P. Tarquini
  • Publication number: 20030083847
    Abstract: In accordance with the present invention, a method of presenting data related to an intrusion event on a computer system comprises the steps of capturing data related to the intrusion event and decoding the captured data from a predetermined format to a predetermined format decipherable by humans. The decoded data comprises intrusion event data, data summary, and detailed data. The method then presents the decoded data to a user.
    Type: Application
    Filed: October 31, 2001
    Publication date: May 1, 2003
    Inventors: Richard L. Schertz, Craig D. Anderson
  • Publication number: 20030084318
    Abstract: In accordance with the present invention, a method of displaying data related to an intrusion event on a computer system comprises data components of the steps of capturing data related to the intrusion event and decoding the captured data from a predetermined format to a predetermined format decipherable by humans. The decoded data comprises data components of the intrusion signature, data summary, and detailed data. The method further comprises data components of the steps of correlating data components of the intrusion signature, data summary and detailed data to one another, and then graphically displaying the correlated decoded data components.
    Type: Application
    Filed: October 31, 2001
    Publication date: May 1, 2003
    Inventor: Richard L. Schertz