-
公开(公告)号:US10007563B2
公开(公告)日:2018-06-26
申请号:US14981496
申请日:2015-12-28
Applicant: CA, Inc.
Inventor: James Andrew Perkins , Richard Bennett Whitner
CPC classification number: G06F9/542 , G06F11/3024
Abstract: A first event indication is received. In response to receiving the first event indication, it is determined that the first event indication has not been tagged. In response to determining that the first event indication has not been tagged, the first event indication is tagged as comprising an event chain. It is also determined that an event count associated with the event chain does not exceed a threshold. In response to determining that the event count does not exceed the threshold, the first event indication is processed.
-
公开(公告)号:US10110419B2
公开(公告)日:2018-10-23
申请号:US14973468
申请日:2015-12-17
Applicant: CA, Inc.
Inventor: Richard Bennett Whitner , James Andrew Perkins
Abstract: An alarm might not have information helpful to resolve the alarm to its contributing events. Thousands of events can occur in a system in a relatively short period of time, and any number of those events can contribute to various alarms. Tracing contributing events to an alarm can provide some helpful insight or at least efficiently provide a starting point for resolving or investigating an alarm. A system can determine, maintain, and persist associations at least among events, rule instances, and alarms to allow alarm-to-contributory event tracing.
-
公开(公告)号:US20180218173A1
公开(公告)日:2018-08-02
申请号:US15421331
申请日:2017-01-31
Applicant: CA, Inc.
Inventor: James Andrew Perkins , Nicholas D. Thayer , Corey Adam Cohen
CPC classification number: G06F21/6254 , H04L63/0421
Abstract: A system can be designed that shares transaction data across different organizations while preserving data privacy and anonymizing the source organization. Organizations can enter into an agreement to share transaction data with each other through a trusted data sharing system. The organizations can input user records that include primary and secondary explicit user identifiers into the data sharing system. The data sharing system can correlate explicit user identifiers of a user across organizations via an internal identifier without exposing explicit user identifiers. The data sharing system comprises a data anonymizer agent for each sharing organization. A data anonymizer agent selectively applies anonymization filters to quasi-identifiers in the transaction data based on quasi-identifier type to extend data privacy protection measures to quasi-identifiers without drastically reducing or eradicating the utility of the quasi-identifiers.
-
公开(公告)号:US09804829B2
公开(公告)日:2017-10-31
申请号:US15087116
申请日:2016-03-31
Applicant: CA, Inc.
Inventor: Josiah Daniel Haswell , James Andrew Perkins
IPC: G06F9/45
Abstract: An interface definition language compiler can be designed to generate different versions of stubs or library files from a same IDL source code. A developer can maintain a single IDL file with code for various versions by using version directives. As part of front end compiling, the IDL compiler will determine which sections of IDL code are compatible with a specified version and compile those determined sections of IDL code. When performing semantic analysis, the IDL compiler will determine whether changes across versions create semantic issues that can be resolved in the target program language by the backend of the compiler. For those changes that cannot be resolved in the target program language, the IDL compiler can generate error notifications.
-
公开(公告)号:US20180285591A1
公开(公告)日:2018-10-04
申请号:US15473550
申请日:2017-03-29
Applicant: CA, Inc.
Inventor: Nicholas D. Thayer , James Andrew Perkins , Ward Duncan McKonly
IPC: G06F21/62
Abstract: A data security framework can be designed that allows separation of sensitive values from non-sensitive values while substituting obfuscation values for the sensitive values in a document that originally contained both. The data security framework detects a document/form being submitted to a server and determines those values of the document that are sensitive or confidential. The data security framework redacts the document to protect the sensitive values. The data security framework redacts the document by substituting the sensitive values in the document with obfuscation values. The data security framework stores the document or the values of the document (i.e., payload) with the substitute obfuscation values. The data security framework stores the sensitive values in a secure repository distinct from the repository in which the payload or document is stored.
-
公开(公告)号:US20170286077A1
公开(公告)日:2017-10-05
申请号:US15087116
申请日:2016-03-31
Applicant: CA, Inc.
Inventor: Josiah Daniel Haswell , James Andrew Perkins
IPC: G06F9/45
Abstract: An interface definition language compiler can be designed to generate different versions of stubs or library files from a same IDL source code. A developer can maintain a single IDL file with code for various versions by using version directives. As part of front end compiling, the IDL compiler will determine which sections of IDL code are compatible with a specified version and compile those determined sections of IDL code. When performing semantic analysis, the IDL compiler will determine whether changes across versions create semantic issues that can be resolved in the target program language by the backend of the compiler. For those changes that cannot be resolved in the target program language, the IDL compiler can generate error notifications.
-
公开(公告)号:US20170185459A1
公开(公告)日:2017-06-29
申请号:US14981496
申请日:2015-12-28
Applicant: CA, Inc.
Inventor: James Andrew Perkins , Richard Bennett Whitner
CPC classification number: G06F9/542 , G06F11/3024
Abstract: A first event indication is received. In response to receiving the first event indication, it is determined that the first event indication has not been tagged. In response to determining that the first event indication has not been tagged, the first event indication is tagged as comprising an event chain. It is also determined that an event count associated with the event chain does not exceed a threshold. In response to determining that the event count does not exceed the threshold, the first event indication is processed.
-
公开(公告)号:US20170180187A1
公开(公告)日:2017-06-22
申请号:US14973468
申请日:2015-12-17
Applicant: CA, Inc.
Inventor: Richard Bennett Whitner , James Andrew Perkins
CPC classification number: H04L41/0631 , H04L41/069 , H04L43/10
Abstract: An alarm might not have information helpful to resolve the alarm to its contributing events. Thousands of events can occur in a system in a relatively short period of time, and any number of those events can contribute to various alarms. Tracing contributing events to an alarm can provide some helpful insight or at least efficiently provide a starting point for resolving or investigating an alarm. A system can determine, maintain, and persist associations at least among events, rule instances, and alarms to allow alarm-to-contributory event tracing.
-
-
-
-
-
-
-