Patent application number | Description | Published |
20090204693 | OPTIMIZATION OF ASPECTS OF INFORMATION TECHNOLOGY STRUCTURES - A computer system and computer program product for optimizing an aspect of an Information Technology (IT) structure of an IT system. The aspect of the IT structure is optimized with respect to at least one control parameter. The IT structure includes a plurality of elements. Each element independently is a hardware element, a software element, or a combination of a hardware element and a software element. Each control parameter has a value that is specific to each element of the IT structure. | 08-13-2009 |
20120167215 | SYSTEM AND METHOD OF FACILITATING THE IDENTIFICATION OF A COMPUTER ON A NETWORK - A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack. | 06-28-2012 |
20120240217 | Computer Security - Computer security processes include displaying information elements on a computer display screen. Some of the information elements are mapped to corresponding parameters. The computer security processes also include receiving a selected information element from the information elements displayed on the computer display screen, and determining a value of a parameter associated with the selected information element based on a condition. The value of the parameter is changeable according to changes in the condition. The computer security processes further include comparing the selected information element with the value of the parameter, and upon determining the value of the parameter matches the selected information element, providing a user with access to a system resource. | 09-20-2012 |
20140013393 | SYSTEM AND METHOD OF FACILITATING THE IDENTIFICATION OF A COMPUTER ON A NETWORK - A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack. | 01-09-2014 |
20140122686 | AUTOMATION OF INFORMATION TECHNOLOGY SYSTEM DEVELOPMENT - A program product and system that implements a method for adding an Information Technology (IT) structure A to an IT structure X. A first list of all dependencies of elements in a composition of X is received. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs. A second list of all dependencies of A is received. It is determined that no dependency of A in the second list has an exclusion with a class Z to which an element E in the composition of X belongs. It is determined that no dependency of any element E in the composition of X in the first list has an exclusion with a class Y to which A belongs and ensuring that A's dependencies are satisfied followed by adding A to X. | 05-01-2014 |
20150020176 | Using Personalized URL for Advanced Login Security - Techniques for advanced login security using personalized, user-specific urls are provided. In one aspect, a method for authenticating a user is provided. The method includes the following steps. A personalized login url and credentials (e.g., username and password) are stored for the user. Upon receipt of a login url from the user, it is verified whether the login url matches the personalized url stored for the user. If the login url matches the personalized url for the user, then the user is provided with a user-specific login page where the user can enter credentials, otherwise access is denied. The user is authenticated only if the credentials the user enters match the credentials stored for the user, otherwise denying access. | 01-15-2015 |
20150040191 | SYSTEM AND METHOD OF FACILITATING THE IDENTIFICATION OF A COMPUTER ON A NETWORK - A system and method for facilitating identification of an attacking computer in a network is provided. A user attempting to login to a network application may be presented with a screen prior to the login which lists preconditions of gaining access to the application. If a user concurs with the preconditions, a security module is downloaded to the user's computer and executed which gathers various configuration settings and transmits the gathered information to a predetermined destination. The security module may also attempt to place a call to a predetermined destination over a modem in the computer to cause registration of caller-ID data when answered at the predetermined destination. Once the security check is completed, login may proceed with the network application. Any data gathered by the security module may be stored for later recall and use to identify the computer in the event of an attack. | 02-05-2015 |
20150199395 | ENABLING COLLABORATIVE DEVELOPMENT OF A DATABASE APPLICATION ACROSS MULTIPLE DATABASE MANAGEMENT SYSTEMS - An approach for enabling collaborative development of a database application is provided. Specifically, this approach provides a database development and collaboration tool (DDCT), which can be utilized by multiple developers involved in a particular software project, to enable automated synchronization and database version control by allowing a database development language and data changes to be stored in a metadata form that is general to more than one database management system (DBMS). Each developer is united and able to collaborate through the system, thus ensuring that a change to a database structure and/or data in a static data table created in a particular database language by one developer is automatically incorporated in the overall development process. Furthermore, the DDCT provides the opportunity to maintain a single repository entry for more than one DBMS, which simplifies synchronization. | 07-16-2015 |