Patent application number | Description | Published |
20120185232 | SYSTEM AND METHOD FOR PROVIDING A STATIC MODEL MAP OF BEHAVIORS IN A MIDDLEWARE SYSTEM, FOR USE IN IDENTIFYING SYSTEM PROBLEMS - A system and method for providing a static model map of behaviors in a middleware system, for use in identifying system problems. In accordance with an embodiment, the system provides a view of the system, such as a middleware system, which allows for analysis of the various components involved, such that analysis of one component does not affect the analysis of a second component. Locations within the middleware system where a particular request spends its time before returning a response are broadly categorized into either “wait” or “execution” locations. Irrespective of which request calls a component, the components exhibit the same behaviors which affect the response time of the request serviced. These exhibited behaviors are static and can be predefined for different types of components and analyzed independently of each other. In turn the behaviors can be similarly classified as either “wait” or “execution”, each of which can be considered aspects of a component. Each aspect of a component must satisfy the same efficiency/inefficiency as defined by the requirements on the middleware system. An aspect that does not meet the criteria is considered a “problem aspect” and is analyzed further to find the cause of the problem. | 07-19-2012 |
20120185441 | EFFICIENT DATA COLLECTION MECHANISM IN MIDDLEWARE RUNTIME ENVIRONMENT - A mechanism for efficient collection of data is described for runtime middleware environments. Two frequencies are used, a collection frequency (CF) to collect the data and an aggregation frequency (AF) to aggregate and persist the data in a repository. The collection cycle is a shorter time interval than the aggregation cycle. An agent residing in the container periodically collects a set of data upon every collection cycle from the components of the middleware system and caches the set of data locally. Upon every aggregation cycle, the agent applies an aggregation function to the collected set of data and persists the set of data into a repository after the aggregation function has been applied. The aggregation function is such that it resulting data represents the behavior of the runtime environment in the total duration of the aggregation cycle. | 07-19-2012 |
20120185732 | METHOD OF MEASURING AND DIAGNOSING MISBEHAVIORS OF SOFTWARE COMPONENTS AND RESOURCES - Systems and methods are described for diagnosing behavior of software components in an application server. The application server can comprise a plurality of components that process incoming requests. A diagnostics advisor can be deployed with the application server and can determine an efficiency and/or inefficiency of each of the components of the application server or other middleware system. The efficiency determined by computing a ratio of a number of requests that completed execution in the component during a particular sampling time period to the number of requests that were received by the component during the sampling time period. The inefficiency is the inverse of efficiency, i.e. it is a ratio of the number of requests that are still being executed by the one or more components at the end of the sampling time period to the number of requests that were received by the one or more components during the sampling time period. The diagnostics advisor employs the determined efficiency and/or inefficiency to diagnose a misbehavior or other problem of the components in the application server. | 07-19-2012 |
20120185735 | SYSTEM AND METHOD FOR DETERMINING CAUSES OF PERFORMANCE PROBLEMS WITHIN MIDDLEWARE SYSTEMS - A method of determining a root cause of a performance problem is provided. The method comprises analyzing a plurality of performance indicators/metrics in a first time period and determining that at least one performance indicators/metric is exhibiting abnormal behavior. The method further comprises analyzing the plurality of performance indicators/metrics over a second time period, the second time period is longer than the first time period, and determining trend information for each performance indicators/metric over the second time period. The method further comprises correlating the trend information for each performance indicators/metric with performance problem information stored in a knowledge base, identifying a potential cause of the abnormal behavior based on the correlation, and alerting a user of the potential cause. | 07-19-2012 |
20120185736 | SYSTEM AND METHOD FOR USING DEPENDENCY IN A DYNAMIC MODEL TO RELATE PERFORMANCE PROBLEMS IN A COMPLEX MIDDLEWARE ENVIRONMENT - A method of isolating relevant components associated with a performance problem. The method comprises creating a static model of a system under test, including determining relationships between components in a middleware system. The method also comprises creating a dynamic problem tree by applying the static model to the system at runtime. The method further comprises identifying a link probability for each relationship in the dynamic problem tree; and traversing the dynamic problem tree to detect redundant components. A component is redundant if it has a link probability with its downstream component greater than a pre-determined threshold value. The method also comprises removing redundant components from the dynamic problem tree; and returning a set of components which are potential components to be analyzed further to determine the root causes of the performance problem. | 07-19-2012 |
20130198138 | MODEL FOR CAPTURING AUDIT TRAIL DATA WITH REDUCED PROBABILITY OF LOSS OF CRITICAL DATA - An aspect of the present invention provides for capturing of audit trail data related to processing of requests. In an embodiment, the received requests are classified into a first category and a second category. For each request in the first category, the corresponding audit trail data is stored directly into non-volatile storage upon processing of the request. On the other hand, for each request in the second category, the audit trail data is first stored into a volatile memory upon processing of the request, and then later copied from the volatile memory to non-volatile storage. Thus, the audit trail data corresponding to both categories of requests is eventually available stored on non-volatile storage. | 08-01-2013 |
20130325822 | CONTENT MANAGEMENT SYSTEM AND METHOD OF MANAGING RETENTION AND DISPOSITION OF CONTENT ITEMS - In specific embodiments, a content management system operable on one or more microprocessors comprises a content repository storing a plurality of content items and a content usage analyzer. The computer is usable to perform one or more operations on one or more contents items stored in the content repository, and when an operation is performed on a content item, audit data is captured related to the operation. The content usage analyzer is configured to identify an idle content item within the content repository based on the captured audit data. | 12-05-2013 |
20130333046 | SYSTEM AND METHOD OF AUTOMATICALLY DETECTING OUTLIERS IN USAGE PATTERNS - A system and method for detecting an outlier in a usage pattern comprises a computer accessible to perform an operation. The system includes an audit forensics engine having an outlier detection module. When an instance occurs where the operation is performed, audit trail data is captured related to the operation. The outlier detection module determines for the instance where the operation is performed whether the instance is an outlier in a usage pattern based on a comparison of the audit trail data to the usage pattern. | 12-12-2013 |
20140012797 | FEATURE AND DEPLOYMENT RECOMMENDATION SYSTEMS AND METHODS FOR CONTENT MANAGEMENT SYSTEMS TO PROVIDE RECOMMENDATIONS FOR ENHANCED FEATURE USAGE BASED ON USAGE PATTERNS - Feature and deployment recommendation systems and methods for content management systems comprises a vendor-site deployment and one or more customer-site deployments. The vendor-site deployment is configured to recommend an adaptation of any of the one or more customer-site deployments. The vendor-site deployment including a customer configuration repository adapted to store content usage metrics received from one or more customer-site deployments, an analytical engine configured to generate content usage patterns based on the stored content usage metrics, and a recommendation engine configured to recommend the adaptation. | 01-09-2014 |
20150039989 | ENTRY OF VALUES INTO MULTIPLE FIELDS OF A FORM USING TOUCH SCREENS - An aspect of the present disclosure facilitates users of touch screens to conveniently provide values for fields of a form. In an embodiment, a mapping is maintained to map symbols to corresponding profiles, with each profile being defined to specify a respective value for each of a corresponding set of fields. A form is sent for display on a touch screen, and a user is permitted to perform a touch action constituting a sequence of touch points (and representing input symbol) on the touch screen. The mapping is examined to determine a first symbol matching the input symbol, and a first profile corresponding to the first symbol is identified. The form is then auto-filled with values specified by the first profile. The user can continue interaction with the form with such auto-filled values. | 02-05-2015 |
Patent application number | Description | Published |
20120260307 | SECURE DISPLAY SYSTEM FOR PREVENTION OF INFORMATION COPYING FROM ANY DISPLAY SCREEN SYSTEM - Devices, methods, and computer programs are presented for displaying information output of a host. One apparatus includes a housing that includes a panel, a scalar, a sensor, an integrated circuit (IC), and a communications device. The panel includes a plurality of light emitting devices arranged to define an area for displaying information output from the host. The scalar is for receiving pixel data from the host computer to be displayed on the panel, and the sensor is for capturing data proximate to the panel. The IC is in communication with the scalar and the panel, the integrated circuit configured to intercept the information output from the host computer, the data of the sensor being analyzed for security control when the information output is to be presented to the scalar. The communications device is for enabling the IC to communicate with a remote computer without communicating through the host computer. | 10-11-2012 |
20130205367 | Methods and Systems for Active Data Security Enforcement During Protected Mode Use of a System - Systems and method are provided for enforcing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information. The authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information, such that while the access is provided the capturing of the image data of the user is maintained. The method includes recording data of user interactive input and viewed images displayed on the screen while the access provided. The method disables the access to the database of secure information upon detecting a predefined security enforcement violation associated with an activity by the user during access to the database. The method being executed by a processor. | 08-08-2013 |
20130205410 | Methods and Systems for Securing Data by Providing Continuous User-System Binding Authentication - Devices, methods, and computer programs are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method proceeds to authenticating of the user identification information. The authenticating includes capturing image data of a user associated with the user identification information. The method further includes providing access to the database of secure information upon authenticating the user identification information, such that while the access is provided the capturing of the image data of the user is maintained. The method includes recording data of user interactive input and viewed images displayed on the screen while the access provided. The method binds the captured image data of the user to the recorded data to produce audit data for the user when accessing the database of secure information. The method is executed by a processor. | 08-08-2013 |
20130219463 | Methods and Systems for Enterprise Data Use Monitoring and Auditing User-Data Interactions - A method for managing data use of an enterprise is disclosed. The method includes receiving login parameters from a user associated with user identification information. The method authenticates the login parameters and the user information to determine if the login parameters match the user identification information. The method provides access to specific data in a database that stores enterprise information. Upon providing access, initiating video capture of a viewing space for the screen, the viewing space being configured to include a location where the user associate with the user identification information is predefined to reside when accessing the specific data. During the video capture, capturing image data presented on the screen and input received for the user interface of the screen. The method acts to bind the video capture and the captured image data presented on the screen and the input received. | 08-22-2013 |
20130219518 | Methods and Systems for Generating History Data of System Use and Replay Mode for Identifying Security Events Showing Data and User Bindings - Devices and methods are presented for managing data security. One example method includes receiving user identification information from a screen of a device that is connectable to a database of secure information. The method includes authenticating the user identification information, the authenticating includes capturing image data of a user associated with the user identification information. The method provides access to the database of secure information upon authenticating the user identification information. The method records data of user interactive input and viewed images displayed on the screen while the access provided. The method stores audit data for the user when accessing the database of secure information, the audit data being associated with a history of use by the user. The audit data including a plurality of events associated with the use. The method enables replay of the audit data for at least one of the plurality of events associated with the use. | 08-22-2013 |
20140282965 | Ongoing Authentication and Access Control with Network Access Device - Methods, systems, and computer programs are presented for securing network access. One method includes an operation for granting a user access to remote computer resources after authenticating a login request from the user sent from a secured computer device. In addition, the method includes an operation for receiving a network access request from a network access device to allow the user to access the remote computer resources through the network access device. A network access granted message for the user is sent to the network access device when the user currently has been granted access to the remote computer resources, where the secured computer device performs periodic authentication operations to validate an identification of the user based on biometric data taken of the user. Further, the method includes operations for receiving notification from the secured computer device that one of the authentication operations has failed, and for sending a network access denied for the user to the network access device in response to the notification. | 09-18-2014 |
20140283016 | Security Device, Methods, and Systems for Continuous Authentication - Methods, systems, and computer programs are presented for securing a computing device. One security device includes a processor, memory and a connector. The memory includes a computer program that, when executed by the processor, performs a method. The method includes operations for detecting that the connector is coupled to a second computing device, and for determining a user associated with the security computing device. In addition, the method includes operations for receiving periodic images from an image capture device coupled to the second computing device, and for performing continuous authentication operations to validate an identification of the user based on the periodic images. The user is disabled from using the second computing device after an authentication operation fails. | 09-18-2014 |
20140283059 | Continuous Monitoring of Computer User and Computer Activities - Methods, systems, and computer programs are presented for securing a computer device. One method includes an operation for capturing interaction data for a user interfacing with the computer device, the interaction data including keyboard inputs and screen captures taken periodically. Further, the method includes operations for extracting semantic meaning of the interaction data, and generating a schema, based on the extracted semantic meaning, to create meaningful tags for the interaction data. The schema is analyzed based on a model in order to identify security threats, and an alarm is created when non-conforming behavior for the model is detected. | 09-18-2014 |