Event chain detection
    1.
    发明授权

    公开(公告)号:US10007563B2

    公开(公告)日:2018-06-26

    申请号:US14981496

    申请日:2015-12-28

    Applicant: CA, Inc.

    CPC classification number: G06F9/542 G06F11/3024

    Abstract: A first event indication is received. In response to receiving the first event indication, it is determined that the first event indication has not been tagged. In response to determining that the first event indication has not been tagged, the first event indication is tagged as comprising an event chain. It is also determined that an event count associated with the event chain does not exceed a threshold. In response to determining that the event count does not exceed the threshold, the first event indication is processed.

    Alarm to event tracing
    2.
    发明授权

    公开(公告)号:US10110419B2

    公开(公告)日:2018-10-23

    申请号:US14973468

    申请日:2015-12-17

    Applicant: CA, Inc.

    Abstract: An alarm might not have information helpful to resolve the alarm to its contributing events. Thousands of events can occur in a system in a relatively short period of time, and any number of those events can contribute to various alarms. Tracing contributing events to an alarm can provide some helpful insight or at least efficiently provide a starting point for resolving or investigating an alarm. A system can determine, maintain, and persist associations at least among events, rule instances, and alarms to allow alarm-to-contributory event tracing.

    PRIVACY PRESERVING CROSS-ORGANIZATIONAL DATA SHARING WITH ANONYMIZATION FILTERS

    公开(公告)号:US20180218173A1

    公开(公告)日:2018-08-02

    申请号:US15421331

    申请日:2017-01-31

    Applicant: CA, Inc.

    CPC classification number: G06F21/6254 H04L63/0421

    Abstract: A system can be designed that shares transaction data across different organizations while preserving data privacy and anonymizing the source organization. Organizations can enter into an agreement to share transaction data with each other through a trusted data sharing system. The organizations can input user records that include primary and secondary explicit user identifiers into the data sharing system. The data sharing system can correlate explicit user identifiers of a user across organizations via an internal identifier without exposing explicit user identifiers. The data sharing system comprises a data anonymizer agent for each sharing organization. A data anonymizer agent selectively applies anonymization filters to quasi-identifiers in the transaction data based on quasi-identifier type to extend data privacy protection measures to quasi-identifiers without drastically reducing or eradicating the utility of the quasi-identifiers.

    Interface definition language compiler with version reconciliation

    公开(公告)号:US09804829B2

    公开(公告)日:2017-10-31

    申请号:US15087116

    申请日:2016-03-31

    Applicant: CA, Inc.

    CPC classification number: G06F8/436 G06F8/40 G06F8/41 G06F8/42 G06F8/433 G06F8/71

    Abstract: An interface definition language compiler can be designed to generate different versions of stubs or library files from a same IDL source code. A developer can maintain a single IDL file with code for various versions by using version directives. As part of front end compiling, the IDL compiler will determine which sections of IDL code are compatible with a specified version and compile those determined sections of IDL code. When performing semantic analysis, the IDL compiler will determine whether changes across versions create semantic issues that can be resolved in the target program language by the backend of the compiler. For those changes that cannot be resolved in the target program language, the IDL compiler can generate error notifications.

    DOCUMENT REDACTION WITH DATA ISOLATION
    5.
    发明申请

    公开(公告)号:US20180285591A1

    公开(公告)日:2018-10-04

    申请号:US15473550

    申请日:2017-03-29

    Applicant: CA, Inc.

    Abstract: A data security framework can be designed that allows separation of sensitive values from non-sensitive values while substituting obfuscation values for the sensitive values in a document that originally contained both. The data security framework detects a document/form being submitted to a server and determines those values of the document that are sensitive or confidential. The data security framework redacts the document to protect the sensitive values. The data security framework redacts the document by substituting the sensitive values in the document with obfuscation values. The data security framework stores the document or the values of the document (i.e., payload) with the substitute obfuscation values. The data security framework stores the sensitive values in a secure repository distinct from the repository in which the payload or document is stored.

    INTERFACE DEFINITION LANGUAGE COMPILER WITH VERSION RECONCILIATION

    公开(公告)号:US20170286077A1

    公开(公告)日:2017-10-05

    申请号:US15087116

    申请日:2016-03-31

    Applicant: CA, Inc.

    CPC classification number: G06F8/436 G06F8/40 G06F8/41 G06F8/42 G06F8/433 G06F8/71

    Abstract: An interface definition language compiler can be designed to generate different versions of stubs or library files from a same IDL source code. A developer can maintain a single IDL file with code for various versions by using version directives. As part of front end compiling, the IDL compiler will determine which sections of IDL code are compatible with a specified version and compile those determined sections of IDL code. When performing semantic analysis, the IDL compiler will determine whether changes across versions create semantic issues that can be resolved in the target program language by the backend of the compiler. For those changes that cannot be resolved in the target program language, the IDL compiler can generate error notifications.

    EVENT CHAIN DETECTION
    7.
    发明申请

    公开(公告)号:US20170185459A1

    公开(公告)日:2017-06-29

    申请号:US14981496

    申请日:2015-12-28

    Applicant: CA, Inc.

    CPC classification number: G06F9/542 G06F11/3024

    Abstract: A first event indication is received. In response to receiving the first event indication, it is determined that the first event indication has not been tagged. In response to determining that the first event indication has not been tagged, the first event indication is tagged as comprising an event chain. It is also determined that an event count associated with the event chain does not exceed a threshold. In response to determining that the event count does not exceed the threshold, the first event indication is processed.

    ALARM TO EVENT TRACING
    8.
    发明申请

    公开(公告)号:US20170180187A1

    公开(公告)日:2017-06-22

    申请号:US14973468

    申请日:2015-12-17

    Applicant: CA, Inc.

    CPC classification number: H04L41/0631 H04L41/069 H04L43/10

    Abstract: An alarm might not have information helpful to resolve the alarm to its contributing events. Thousands of events can occur in a system in a relatively short period of time, and any number of those events can contribute to various alarms. Tracing contributing events to an alarm can provide some helpful insight or at least efficiently provide a starting point for resolving or investigating an alarm. A system can determine, maintain, and persist associations at least among events, rule instances, and alarms to allow alarm-to-contributory event tracing.

Patent Agency Ranking