BMC Helix, Inc.

United States of America

Back to Profile

1-100 of 328 for BMC Helix, Inc. Sort by
Query
Aggregations
IP Type
        Patent 282
        Trademark 46
Jurisdiction
        United States 305
        Europe 11
        Canada 7
        World 5
Date
New (last 4 weeks) 1
2025 April 1
2025 March 2
2025 January 5
2025 (YTD) 8
See more
IPC Class
G06F 17/30 - Information retrieval; Database structures therefor 44
G06F 9/445 - Program loading or initiating 32
G06F 9/44 - Arrangements for executing specific programs 31
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 31
G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU] 30
See more
NICE Class
09 - Scientific and electric apparatus and instruments 39
42 - Scientific, technological and industrial services, research and design 25
16 - Paper, cardboard and goods made from these materials 3
35 - Advertising and business services 3
38 - Telecommunications services 3
See more
Status
Pending 19
Registered / In Force 309
  1     2     3     4        Next Page

1.

NARRATIVE GENERATION FOR SITUATION EVENT GRAPHS

      
Application Number 18478933
Status Pending
Filing Date 2023-09-29
First Publication Date 2025-04-03
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan
  • Souche, Benoit Christian Bernard

Abstract

Described systems and techniques determine an event graph of a causal chain of events representing a situation within a network, the event graph including event text characterizing at least one event of the causal chain of events. The event graph may then be processed using a large language model that includes at least one topological context adapter that includes a graph adapter and a text adapter, including processing the event graph with the graph adapter and the event text with the text adapter. The at least one topological context adapter may be trained using existing narratives describing past situations, and/or may be trained using worklog data describing past situations and corresponding actions taken to remedy the past situations. Outputs of the graph adapter and the text adapter may be combined to generate a narrative of the situation that explains the causal chain of events and/or instructions to remedy the situation.

IPC Classes  ?

  • G06F 40/20 - Natural language analysis
  • G06F 16/901 - IndexingData structures thereforStorage structures

2.

REMEDIATION GENERATION FOR SITUATION EVENT GRAPHS

      
Application Number 18478930
Status Pending
Filing Date 2023-09-29
First Publication Date 2025-03-06
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

Described systems and techniques determine an event graph of a causal chain of events representing a situation within a network, the event graph including event text characterizing at least one event of the causal chain of events. The event graph may then be processed using a large language model that includes at least one topological context adapter that includes a graph adapter and a text adapter, including processing the event graph with the graph adapter and the event text with the text adapter. The at least one topological context adapter may be trained using existing narratives describing past situations, and/or may be trained using worklog data describing past situations and corresponding actions taken to remedy the past situations. Outputs of the graph adapter and the text adapter may be combined to generate a narrative of the situation that explains the causal chain of events and/or instructions to remedy the situation.

IPC Classes  ?

3.

LOG RECORD ANALYSIS USING SIMILARITY DISTRIBUTIONS OF CONTEXTUAL LOG RECORD SERIES

      
Application Number 18241095
Status Pending
Filing Date 2023-08-31
First Publication Date 2025-03-06
Owner BMC HELIX, INC. (USA)
Inventor
  • Prasad, Vikas
  • Kumar, Ajoy

Abstract

A plurality of textual log records characterizing operations occurring within a technology landscape may be received and converted into numerical log record vectors. For a current log record vector and a preceding set of log record vectors of the numerical log record vectors, a similarity series may be computed that includes a similarity measure for each of a set of log record vector pairs, with each log record vector pair including the current log record vector and one of the preceding set of log record vectors. A similarity distribution of the similarity series may be generated, and an anomaly in the operations occurring within the technology landscape may be detected, based on the similarity distribution.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance

4.

PREDICTING PRIORITY OF SITUATIONS

      
Application Number 18511543
Status Pending
Filing Date 2023-11-16
First Publication Date 2025-01-30
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

A computer program product is tangibly embodied on a non-transitory computer-readable medium and includes instructions that, when executed by at least one computing device, are configured to cause the at least one computing device to input a situation event graph and a corresponding scenario into a neural network model, where the neural network model includes a plurality of scenarios and historical ticket data, the situation event graph represents a situation, and the corresponding scenario represents a plurality of situations similar to the situation. The neural network model processes the situation event graph and the corresponding scenario to determine a priority of the situation.

IPC Classes  ?

5.

ADAPTIVE SCENARIOS GENERATION FROM SITUATIONS

      
Application Number 18511530
Status Pending
Filing Date 2023-11-16
First Publication Date 2025-01-30
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

A computer program product is tangibly embodied on a non-transitory computer-readable medium and includes instructions that, when executed by at least one computing device, are configured to cause the at least one computing device to input a situation event graph, topology data associated with the situation event graph, and a knowledge graph associated with the situation event graph into a neural network model. The neural network model includes a plurality of scenarios received from a database, where the situation event graph represents a situation and each of the plurality of scenarios represents at least two similar situations. The neural network model processes the situation event graph, the topology data, and the knowledge graph to determine a similarity estimate between the situation event graph and the plurality of scenarios. The situation event graph is identified as a match to one of the plurality of scenarios based on the similarity estimate.

IPC Classes  ?

  • G06N 3/042 - Knowledge-based neural networksLogical representations of neural networks
  • G06F 18/26 - Discovering frequent patterns
  • G06N 5/02 - Knowledge representationSymbolic representation

6.

PREDICTING CAUSAL IMPACT FROM SCENARIOS

      
Application Number 18511550
Status Pending
Filing Date 2023-11-16
First Publication Date 2025-01-30
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

A computer program product is tangibly embodied on a non-transitory computer-readable medium and includes instructions that, when executed by at least one computing device, are configured to cause the at least one computing device to input a situation event graph and a corresponding scenario into a neural network model, where the neural network model includes a plurality of scenarios, the situation event graph represents a situation, and the corresponding scenario represents a plurality of situations similar to the situation. The neural network model processes the situation event graph and the corresponding scenario to determine a causal impact of the situation.

IPC Classes  ?

7.

HELIX

      
Serial Number 99015789
Status Pending
Filing Date 2025-01-23
Owner BMC Helix, Inc. ()
NICE Classes  ? 09 - Scientific and electric apparatus and instruments

Goods & Services

Downloadable software that provides real-time, integrated service management of other computer software, information systems, computer hardware, computer networks, and information databases

8.

OPTIMIZATION OF ATTRIBUTE ACCESS IN PROGRAMMING FUNCTIONS

      
Application Number 18345878
Status Pending
Filing Date 2023-06-30
First Publication Date 2025-01-02
Owner BMC HELIX, INC. (USA)
Inventor Grisby, Duncan Paul

Abstract

Systems and techniques for optimizing attribute accesses include receiving a first data structure, the first data structure including a first sequence of statements representing programming functions having an input and an output. The first sequence of statements is parsed to collect attribute accesses defined in the first sequence of statements. The first data structure and the first sequence of statements defining the attribute accesses are transformed to a second data structure including a second sequence of statements representing the programming functions having the input and the output, where the second sequence of statements defines a smaller number of the attribute accesses than the first sequence of statements. The second data structure is output, where the second data structure including the second sequence of statements generates a same output result as the first data structure including the second sequence of statements when executed by the at least one computing device.

IPC Classes  ?

9.

HELIX

      
Serial Number 98853091
Status Pending
Filing Date 2024-11-14
Owner BMC HELIX, INC. ()
NICE Classes  ? 42 - Scientific, technological and industrial services, research and design

Goods & Services

Software as a service (SAAS) services featuring software that provides real-time, integrated service management of other computer software, information systems, computer hardware, computer networks, and information databases

10.

SMART PATCH RISK PREDICTION AND VALIDATION FOR LARGE SCALE DISTRIBUTED INFRASTRUCTURE

      
Application Number 18194612
Status Pending
Filing Date 2023-03-31
First Publication Date 2024-10-03
Owner BMC HELIX, INC. (USA)
Inventor
  • Kamate, Vikram
  • Kumar, Ajoy

Abstract

Systems and techniques for implementing a change to a plurality of devices in a computing infrastructure include generating a risk prediction model, where the risk prediction model is trained using a combination of supervised learning and unsupervised learning and identifying, using the risk prediction model, a first set of devices from the plurality of devices having a low risk of failure due to implementing the change and a second set of devices from the plurality of devices having a high risk of failure due to implementing the change. A schedule is automatically generated for implementing the change to the first set of devices. The change is implemented on a portion of the first set of devices according to the schedule. The risk prediction model is updated using data obtained from implementing the change on the portion of the first set of devices.

IPC Classes  ?

  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 8/65 - Updates

11.

EFFICIENT TRAINING OF MACHINE LEARNING MODELS FOR LOG RECORD ANALYSIS

      
Application Number 18194190
Status Pending
Filing Date 2023-03-31
First Publication Date 2024-10-03
Owner BMC HELIX, INC. (USA)
Inventor
  • Prasad, Vikas
  • Tiwari, Rakesh
  • Mardhekar, Sameer
  • Kumar, Ajoy

Abstract

A plurality of log records characterizing operations occurring within a technology landscape may be received. The plurality of log records may be clustered into at least a first cluster of log records and a second cluster of log records, using at least one similarity algorithm. A first dissimilar subset of log records within the first cluster of log records, and a second dissimilar subset of log records within the second cluster of log record may be identified, using the at least one similarity algorithm. At least one machine learning model may be trained to process new log records characterizing the operations occurring within the technology landscape, using the first dissimilar subset and the second dissimilar subset.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

12.

DOMAIN-SPECIFIC HALLUCINATION DETECTION AND CORRECTION FOR MACHINE LEARNING MODELS

      
Application Number 18194547
Status Pending
Filing Date 2023-03-31
First Publication Date 2024-10-03
Owner BMC HELIX, INC. (USA)
Inventor
  • Kumar, Ajoy
  • Singhvi, Himanshu
  • Talwalkar, Priya Saurabh

Abstract

An incident ticket having a worklog field for a resolution field and a worklog providing a history of actions taken during attempts to resolve an incident may be received. The incident ticket may be processed using a domain-specific machine learning model trained using training data that includes a plurality of resolved incident tickets, to thereby generate at least one resolution statement. Source data used by the domain-specific machine learning model in providing the at least one resolution statement may be determined, the source data including one of the worklog and the training data. A hallucination score may be assigned to the at least one resolution statement, based on the source data, to identify hallucinated content within the at least one resolution statement. The at least one resolution statement may be modified to remove the hallucinated content and thereby obtain a resolution for inclusion in the resolution field.

IPC Classes  ?

13.

Recommendations for remedial actions

      
Application Number 18519822
Grant Number 12282386
Status In Force
Filing Date 2023-11-27
First Publication Date 2024-03-21
Grant Date 2025-04-22
Owner BMC Helix, Inc. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

Described systems and techniques determine causal associations between events that occur within an information technology landscape. Individual situations that are likely to represent active occurrences requiring a response may be identified as causal event clusters, without requiring manual tuning to determine cluster boundaries. Consequently, it is possible to identify root causes, analyze effects, predict future events, and prevent undesired outcomes, even in complicated, dispersed, interconnected systems.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 16/901 - IndexingData structures thereforStorage structures
  • G06N 3/08 - Learning methods
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition
  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/14 - Network analysis or design

14.

Domain-specific generative machine learning models

      
Application Number 18194204
Grant Number 11855860
Status In Force
Filing Date 2023-03-31
First Publication Date 2023-12-26
Grant Date 2023-12-26
Owner BMC HELIX, INC. (USA)
Inventor
  • Kumar, Ajoy
  • Singhvi, Himanshu
  • Talwalkar, Priya Saurabh

Abstract

A plurality of resolved incident tickets may each include a worklog providing a history of actions taken during attempts to resolve a corresponding resolved incident and a resolution having at least one resolution statement. An iterative processing of the plurality of resolved incident tickets may include processing each resolution statement of the resolution with at least one domain-specific statement classifier specific to the incident domain to either discard or retain a classified resolution statement; processing each retained classified resolution statement in conjunction with the worklog to determine whether to discard or retain the resolved incident; providing an updated resolution for the resolved incident when the resolved incident is retained, and adding the resolved incident with the updated resolution to the processed incident tickets. Then, at least one machine learning model may be trained to process a new incident ticket, using the processed incident tickets.

IPC Classes  ?

  • H04L 41/5074 - Handling of user complaints or trouble tickets
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

15.

APPLICATION STATE PREDICTION USING COMPONENT STATE

      
Application Number 18332336
Status Pending
Filing Date 2023-06-09
First Publication Date 2023-12-14
Owner BMC HELIX, INC. (USA)
Inventor
  • Kumar, Ajoy
  • Singh, Mantinder Jit
  • Pichappan, Smijith

Abstract

Described systems and techniques enable prediction of a state of an application at a future time, with high levels of accuracy and specificity. Accordingly, operators may be provided with sufficient warning to avert poor user experiences. Unsupervised machine learning techniques may be used to characterize current states of applications and underlying components in a standardized manner. The resulting data effectively provides labelled training data that may then be used by supervised machine learning algorithms to build state prediction models. Resulting state prediction models may then be deployed and used to predict an application state of an application at a specified future time.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 11/30 - Monitoring
  • G06N 20/00 - Machine learning
  • G06N 5/04 - Inference or reasoning models
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

16.

Application development platform

      
Application Number 17650759
Grant Number 11947938
Status In Force
Filing Date 2022-02-11
First Publication Date 2023-08-17
Grant Date 2024-04-02
Owner BMC HELIX, INC. (USA)
Inventor
  • Bhagwat, Anand Bhaskar
  • Deshpande, Ashutosh Abhay

Abstract

Systems and techniques for identifying performance issues and recommending actions during design-time application development include receiving a design-time user interface (UI) having multiple fields associated with data from a database, where the multiple fields including one or more types of fields. In response to receiving a trigger, the systems and techniques iterate through the multiple fields in the design-time UI by applying one or more rules related to the types of fields and cardinality of the data from the database. One or more recommendations are generated for one or more of the fields based on the applied rules to the multiple fields and the recommendations are output to a display. The systems and techniques may include changing the design-time UI without user input using the recommendations.

IPC Classes  ?

17.

Resource tuning with usage forecasting

      
Application Number 17649543
Grant Number 12288097
Status In Force
Filing Date 2022-01-31
First Publication Date 2023-08-03
Grant Date 2025-04-29
Owner BMC Helix, Inc. (USA)
Inventor
  • Front, Yaron
  • De Stefano, Michele
  • Bertoli, Marco
  • Sivasubramanian, Jeyashree
  • Padmawar, Komal
  • Yavin, Nir

Abstract

Described techniques determine performance metric values of a performance metric characterizing a performance of a system resource of an information technology (IT) system, and determine driver metric values of a driver metric characterizing an occurrence of an event that is at least partially external to the system resource. A correlation analysis may confirm a potential correlation between the performance metric values and the driver metric values as a correlation. A graph relating the performance metric to the driver metric may be generated. A plurality of extrapolation algorithms may be trained to obtain a plurality of trained extrapolation algorithms using a first subset of data points of the graph, and the plurality of trained extrapolation algorithms may be validated using a second subset of data points of the graph. A driver metric threshold corresponding to the performance metric threshold may be determined using a validated extrapolation algorithm.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06N 20/00 - Machine learning

18.

SEQUENCE PREDICTION EXPLANATION USING CAUSAL CHAIN EXTRACTION BASED ON NEURAL NETWORK ATTRIBUTIONS

      
Application Number 17646706
Status Pending
Filing Date 2021-12-31
First Publication Date 2023-07-06
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

Described systems and techniques perform causal chain extraction for an investigated event in a system, using a neural network trained to represent a temporalsequence of events within the system. Such neural networks, by themselves, may be successful in predicting or characterizing system events, without providing useful interpretations of causation between the system events. Described techniques use the representational nature of neural networks to perform intervention testing using the neural network, distinguish confounding events, and identify a probabilistic root cause of the investigated event.

IPC Classes  ?

  • G06N 5/04 - Inference or reasoning models
  • G06N 3/04 - Architecture, e.g. interconnection topology

19.

AUTOMATED SKILL DISCOVERY, SKILL LEVEL COMPUTATION, AND INTELLIGENT MATCHING USING GENERATED HIERARCHICAL SKILL PATHS

      
Application Number 17452998
Status Pending
Filing Date 2021-10-31
First Publication Date 2023-05-04
Owner BMC HELIX, INC. (USA)
Inventor
  • Kumar, Ajoy
  • Talwalkar, Priya Saurabh
  • Singh, Mantinder Jit

Abstract

A system, method, and computer program product for intelligent-skills-matching includes receiving a plurality of tickets, where each ticket in the plurality of tickets includes a plurality of fields and at least one agent who resolved the ticket is identified. A clustering algorithm is used on one or more of the plurality of fields to determine skills from the plurality of tickets. A taxonomy of the skills is generated using a taxonomy-construction algorithm. Using the taxonomy of the skills, a skills matrix or a skills knowledge graph is created with agents assigned to the skills.

IPC Classes  ?

  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06N 5/02 - Knowledge representationSymbolic representation
  • G06Q 10/10 - Office automationTime management

20.

CAUSAL EVENT PREDICTION FOR EVENTS

      
Application Number 17657625
Status Pending
Filing Date 2022-03-31
First Publication Date 2023-04-20
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

Described systems and techniques determine causal associations between events that occur within an information technology landscape. Individual situations that are likely to represent active occurrences requiring a response may be identified as causal event clusters, without requiring manual tuning to determine cluster boundaries. Consequently, it is possible to identify root causes, analyze effects, predict future events, and prevent undesired outcomes, even in complicated, dispersed, interconnected systems.

IPC Classes  ?

21.

Directed incremental clustering of causally related events using multi-layered small world networks

      
Application Number 17657622
Grant Number 11892904
Status In Force
Filing Date 2022-03-31
First Publication Date 2023-03-30
Grant Date 2024-02-06
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

Described systems and techniques determine causal associations between events that occur within an information technology landscape. Individual situations that are likely to represent active occurrences requiring a response may be identified as causal event clusters, without requiring manual tuning to determine cluster boundaries. Consequently, it is possible to identify root causes, analyze effects, predict future events, and prevent undesired outcomes, even in complicated, dispersed, interconnected systems.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 16/901 - IndexingData structures thereforStorage structures
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition
  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • H04L 41/12 - Discovery or management of network topologies
  • G06N 3/08 - Learning methods
  • H04L 41/14 - Network analysis or design

22.

Directed incremental clustering of causally related events

      
Application Number 17657623
Grant Number 11734101
Status In Force
Filing Date 2022-03-31
First Publication Date 2023-03-30
Grant Date 2023-08-22
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

Described systems and techniques determine causal associations between events that occur within an information technology landscape. Individual situations that are likely to represent active occurrences requiring a response may be identified as causal event clusters, without requiring manual tuning to determine cluster boundaries. Consequently, it is possible to identify root causes, analyze effects, predict future events, and prevent undesired outcomes, even in complicated, dispersed, interconnected systems.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 16/901 - IndexingData structures thereforStorage structures
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition
  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • H04L 41/069 - Management of faults, events, alarms or notifications using logs of notificationsPost-processing of notifications
  • H04L 41/12 - Discovery or management of network topologies
  • G06N 3/08 - Learning methods
  • H04L 41/14 - Network analysis or design

23.

Recommendations for remedial actions

      
Application Number 17657626
Grant Number 11874732
Status In Force
Filing Date 2022-03-31
First Publication Date 2023-03-30
Grant Date 2024-01-16
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

Described systems and techniques determine causal associations between events that occur within an information technology landscape. Individual situations that are likely to represent active occurrences requiring a response may be identified as causal event clusters, without requiring manual tuning to determine cluster boundaries. Consequently, it is possible to identify root causes, analyze effects, predict future events, and prevent undesired outcomes, even in complicated, dispersed, interconnected systems.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 16/901 - IndexingData structures thereforStorage structures
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition
  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • H04L 41/12 - Discovery or management of network topologies
  • G06N 3/08 - Learning methods
  • H04L 41/14 - Network analysis or design

24.

CCONTINUOUS KNOWLEDGE GRAPH GENERATION USING CAUSAL EVENT GRAPH FEEDBACK

      
Application Number 17934992
Status Pending
Filing Date 2022-09-23
First Publication Date 2023-03-30
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

Described systems and techniques determine causal associations between events that occur within an information technology landscape. Individual situations that are likely to represent active occurrences requiring a response may be identified as causal event clusters, without requiring manual tuning to determine cluster boundaries. Consequently, it is possible to identify root causes, analyze effects, predict future events, continuously generate a knowledge graph, and prevent undesired outcomes, even in complicated, dispersed, interconnected systems.

IPC Classes  ?

  • G06N 5/02 - Knowledge representationSymbolic representation
  • G06N 3/08 - Learning methods

25.

Probabilistic root cause analysis

      
Application Number 17657628
Grant Number 12135605
Status In Force
Filing Date 2022-03-31
First Publication Date 2023-03-30
Grant Date 2024-11-05
Owner BMC HELIX, INC. (USA)
Inventor
  • Garapati, Sai Eswar
  • Giral, Erhan

Abstract

Described systems and techniques determine causal associations between events that occur within an information technology landscape. Individual situations that are likely to represent active occurrences requiring a response may be identified as causal event clusters, without requiring manual tuning to determine cluster boundaries. Consequently, it is possible to identify root causes, analyze effects, predict future events, and prevent undesired outcomes, even in complicated, dispersed, interconnected systems.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06F 16/901 - IndexingData structures thereforStorage structures
  • G06N 3/08 - Learning methods
  • G06N 5/022 - Knowledge engineeringKnowledge acquisition
  • H04L 41/0631 - Management of faults, events, alarms or notifications using root cause analysisManagement of faults, events, alarms or notifications using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
  • H04L 41/12 - Discovery or management of network topologies
  • H04L 41/14 - Network analysis or design

26.

SELF-OPTIMIZING CONTEXT-AWARE PROBLEM IDENTIFICATION FROM INFORMATION TECHNOLOGY INCIDENT REPORTS

      
Application Number 17449538
Status Pending
Filing Date 2021-09-30
First Publication Date 2023-03-30
Owner BMC HELIX, INC. (USA)
Inventor
  • Singh, Mantinder Jit
  • Srivastava, Somesh Kumar
  • Kumar, Ajoy

Abstract

Information technology service management (ITSM) incident reports are converted from textual data to multiple vectors using an encoder and parameters are selected, where the parameters include a base cluster number and a threshold value. A base group of clusters is generated using an unsupervised machine learning clustering algorithm with the vectors and the parameters as input. A cluster quality score is computed for each of the base group of clusters. Each cluster from the base group of clusters with the cluster quality score above the threshold value is recursively split into new clusters until the cluster quality score for each cluster in the new clusters is below the threshold value. A final group of clusters is output, where each cluster from the final group of clusters represents ITSM incident reports related to a same problem.

IPC Classes  ?

  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • G06K 9/62 - Methods or arrangements for recognition using electronic means
  • G06N 20/00 - Machine learning

27.

Index generation and use with indeterminate ingestion patterns

      
Application Number 17446600
Grant Number 11947490
Status In Force
Filing Date 2021-08-31
First Publication Date 2023-03-02
Grant Date 2024-04-02
Owner BMC HELIX, INC. (USA)
Inventor
  • Davis, Joel Chandler
  • Anderson, Eric Michael

Abstract

Large numbers of files having widely varying structures and formats may be ingested, and used to generate dynamic slot indexes that enable fast and reliable searching of the files. Unique data patterns within the files are used to generate unique pattern models, which enable model-specific mappings of file fields to slots of a dynamic slot index. Accordingly, the dynamic slot indexes may reuse a single slot for multiple fields. Complex queries may then be processed in a time-efficient and resource-efficient manner, even when rapidly ingesting huge numbers of files having indeterminate data patterns from many different sources.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/13 - File access structures, e.g. distributed indices
  • G06F 16/14 - Details of searching files based on file metadata
  • G06F 16/178 - Techniques for file synchronisation in file systems

28.

Systems and methods for efficient transfer of log data

      
Application Number 17301377
Grant Number 11734012
Status In Force
Filing Date 2021-03-31
First Publication Date 2022-10-06
Grant Date 2023-08-22
Owner BMC HELIX, INC. (USA)
Inventor
  • Tiwari, Rakesh
  • Rao, Dasari Subramanyeswara
  • Parikh, Jatinkumar Jayantkumar

Abstract

According to one general aspect, a non-transitory computer readable medium includes instructions that, when executed by at least one processor, cause a computing device to read a string of a log file for an application, where the log file comprises multiple strings of log data, compare the string to signatures stored in a memory to find a matching signature, where each of the signatures is encoded with a signature identifier (ID), determine a deviation between the string and the matching signature, encode the string with the signature identifier (ID) of the matching signature and the deviation, and transfer the string to a destination computing device using the signature identifier (ID) of the matching signature, the deviation, and a timestamp of the string.

IPC Classes  ?

  • G06F 9/38 - Concurrent instruction execution, e.g. pipeline or look ahead
  • G06F 16/17 - Details of further file system functions
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • G06F 9/30 - Arrangements for executing machine instructions, e.g. instruction decode

29.

Use of graph databases for replicating topology and enriching monitoring data streams in complex information technology systems

      
Application Number 17655330
Grant Number 11960457
Status In Force
Filing Date 2022-03-17
First Publication Date 2022-10-06
Grant Date 2024-04-16
Owner BMC HELIX, INC. (USA)
Inventor
  • Roach, Robert Clayton
  • Mckeown, Robert Joseph
  • Pennell, Sr., David Joel

Abstract

The systems and techniques include storing topology from each of a plurality of source tools as a plurality of source subgraphs in a graph database using a source schema that mirrors a source topology model for each of the plurality of source tools. Each of the plurality of source subgraphs in the graph database is transformed to a plurality of destination subgraphs using a destination schema and transformation rules that mirror a destination topology model for each of a plurality of destination tools. The plurality of destination subgraphs are stored in the graph database. The topology is delivered to each of the plurality of destination tools by traversing the plurality of destination subgraphs in the graph database and invoking application programming interfaces (APIs) for each of the plurality of destination tools in the destination subgraphs in the graph database.

IPC Classes  ?

  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/26 - Visual data miningBrowsing structured data
  • G06F 16/901 - IndexingData structures thereforStorage structures

30.

Application state prediction using component state

      
Application Number 16948075
Grant Number 11675687
Status In Force
Filing Date 2020-09-01
First Publication Date 2022-03-03
Grant Date 2023-06-13
Owner BMC HELIX, INC. (USA)
Inventor
  • Kumar, Ajoy
  • Singh, Mantinder Jit
  • Pichappan, Smijith

Abstract

Described systems and techniques enable prediction of a state of an application at a future time, with high levels of accuracy and specificity. Accordingly, operators may be provided with sufficient warning to avert poor user experiences. Unsupervised machine learning techniques may be used to characterize current states of applications and underlying components in a standardized manner. The resulting data effectively provides labelled training data that may then be used by supervised machine learning algorithms to build state prediction models. Resulting state prediction models may then be deployed and used to predict an application state of an application at a specified future time.

IPC Classes  ?

  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 11/30 - Monitoring
  • G06N 20/00 - Machine learning
  • G06N 5/04 - Inference or reasoning models

31.

Synthetic objects in service models

      
Application Number 17445682
Grant Number 11736352
Status In Force
Filing Date 2021-08-23
First Publication Date 2021-12-16
Grant Date 2023-08-22
Owner BMC HELIX, INC. (USA)
Inventor
  • De Peuter, Geert
  • Palla, Stephen

Abstract

A method for determining a misconfiguration of components in an Information Technology (IT) infrastructure includes decomposing one or more components into sub parts, creating one or more synthetic objects, each synthetic object being associated with a sub part of a respective component, and including the components and the synthetic objects in a model of the IT infrastructure. The method further determines a relationship between a first component and a first synthetic object based on attributes of the first component and attributes of the first synthetic object, includes the determined relationship in the model of the IT infrastructure, and loads a graph of the IT infrastructure in a graph database with the first component and the synthetic object as nodes and the determined relationship as an edge in the graph. The method further determines the misconfiguration of components in the IT infrastructure by identifying components having improper relationships in the graph.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 41/0873 - Checking configuration conflicts between network elements
  • H04L 41/0853 - Retrieval of network configurationTracking network configuration history by actively collecting configuration information or by backing up configuration information
  • H04L 41/5041 - Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the time relationship between creation and deployment of a service
  • H04L 69/163 - In-band adaptation of TCP data exchangeIn-band control procedures
  • H04L 41/12 - Discovery or management of network topologies

32.

Search data curation and enrichment for deployed technology

      
Application Number 16835926
Grant Number 11386170
Status In Force
Filing Date 2020-03-31
First Publication Date 2021-09-30
Grant Date 2022-07-12
Owner BMC HELIX, INC. (USA)
Inventor
  • Anderson, Eric Michael
  • Iyer, G S Narayan
  • Kumar, Ajoy

Abstract

A content engine may utilize a configuration management database (CMDB) to manage a configuration of a technology landscape. A curation manager 102 may utilize a plurality of article sources to provide, in collaboration with the content engine, a plurality of enriched articles that are specific to the technology landscape. The enriched articles enable an IT administrator using the content engine to execute IT administration duties in a fast, efficient, reliable, and timely manner.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/9532 - Query formulation
  • H04L 67/00 - Network arrangements or protocols for supporting network services or applications
  • G06F 16/9538 - Presentation of query results
  • G06N 20/00 - Machine learning

33.

Cloud-native proxy gateway to cloud resources

      
Application Number 16836847
Grant Number 11625280
Status In Force
Filing Date 2020-03-31
First Publication Date 2021-09-30
Grant Date 2023-04-11
Owner BMC HELIX, INC. (USA)
Inventor
  • Anderson, Eric Michael
  • Farrell, Brendan
  • Rangwala, Saifuddin Fazlehusen
  • Kumar, Ajoy

Abstract

A cloud-native proxy gateway is reachable from a central server and from an isolated cloud VM. A method allows legacy (non-cloud native) solutions to establish a secure connection to the isolated cloud VM, even when incoming port flows are not enabled. The method involves transforming a TCP/IP network connection request into a cloud API call, ignoring IP addresses, and instead using a unique cloud resource identifier as the primary network routing methodology. In response to a communication connection request by the central server, the isolated VM establishes a reverse tunnel to the cloud-native proxy gateway. Communication flow initiated by the central server proceeds through the reverse tunnel to the isolated VM, avoiding an issue of duplicate IP addresses in the cloud.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/54 - Interprogram communication
  • H04L 12/46 - Interconnection of networks
  • H04L 12/66 - Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
  • H04L 9/40 - Network security protocols
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network

34.

Maintaining virtual machine templates

      
Application Number 17303808
Grant Number 11392404
Status In Force
Filing Date 2021-06-08
First Publication Date 2021-09-23
Grant Date 2022-07-19
Owner BMC HELIX, INC. (USA)
Inventor Savant, Pravin

Abstract

A non-transitory computer-readable storage medium may comprise instructions for determining health statuses of multiple virtual machine templates stored thereon. When executed by at least one processor, the instructions may be configured to cause a health status server to at least run multiple scripts against multiple virtual machines, each of the multiple virtual machines being generated from one of the multiple virtual machine templates, and generate, for each of the multiple virtual machines, an output report indicating success or failure for each of the multiple scripts.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines

35.

Reachability graph-based safe remediations for security of on-premise and cloud computing environments

      
Application Number 16750323
Grant Number 11637861
Status In Force
Filing Date 2020-01-23
First Publication Date 2021-07-29
Grant Date 2023-04-25
Owner BMC HELIX, INC. (USA)
Inventor
  • Burle, Siddharth Sukumar
  • Kumar, Ajoy
  • Jain, Manish

Abstract

A method for securing a networked computer system executing an application includes identifying a vulnerable computer resource in the networked computer system, determining all computer resources in the networked computer system that are accessible from, or are accessed by, the vulnerable computer resource, and prioritizing implementation of a remediation action to secure the vulnerable computer resource if a vulnerability path extends from the vulnerable computer resource to a critical computer resource that contains sensitive information. The remediation action to secure the vulnerable computer resource is a safe remediation action that does not impact availability of the application executing on the networked computer system.

IPC Classes  ?

36.

System and method for troubleshooting abnormal behavior of an application

      
Application Number 16730043
Grant Number 11526422
Status In Force
Filing Date 2019-12-30
First Publication Date 2021-05-20
Grant Date 2022-12-13
Owner BMC HELIX, INC. (USA)
Inventor
  • Drori, Eynan
  • Sangra, Sudhir

Abstract

A method for troubleshooting abnormal behavior of an application hosted on a networked computer system. The method may be implemented by a root cause analyzer. The method includes tracking a single application performance metric across all the clients of an application hosted on a networked computer system and analyzing an aggregated application based on the single application metric. The method involves determining outlier client attributes associated with an abnormal transaction of the application and ranking the outlier client attributes based on comparisons of historical and current abnormal transactions. The method associates one or more of the ranked outlier client attributes with the root cause of the current abnormal transaction. Association rule learning is used to associate one or more of the ranked outlier client attributes with the root cause.

IPC Classes  ?

  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 16/23 - Updating

37.

Cloud service interdependency relationship detection

      
Application Number 17248255
Grant Number 11233702
Status In Force
Filing Date 2021-01-15
First Publication Date 2021-05-06
Grant Date 2022-01-25
Owner BMC HELIX, INC. (USA)
Inventor
  • Navare, Nitin
  • Sodem, Sridhar
  • Scarpelli, Joseph
  • Rivington, Mark

Abstract

A computer system includes a processor, a memory, a data collector, a relationships analyzer, and a topological map generator. The data collector retrieves performance data in a specific set of performance categories for computing resources in a computing system for a time interval. The relationships analyzer, for each computing resource-to-computing resource pair in the computing system, performs a correlation analysis of the respective behavior values of the computing resources in the pair, and identifies the computing resource-to-computing resource pairs that have correlation values exceeding a pre-determined threshold level as having performance interdependencies. The topological map generator prepares an undirected graph of the computing resources that have performance interdependencies, and displays the undirected graph as a topographic map of the computing resources in the computing system.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

38.

Identifying change windows for performing maintenance on a service

      
Application Number 16836425
Grant Number 10972353
Status In Force
Filing Date 2020-03-31
First Publication Date 2021-04-06
Grant Date 2021-04-06
Owner BMC HELIX, INC. (USA)
Inventor
  • Sangra, Sudhir
  • Anderson, Eric Michael
  • Gole, Pravin Mahadeo
  • Sogam, Anil Chandrakant

Abstract

Systems and techniques for identifying a common change window for one or more services implemented on one or more hosts include querying time series performance data for each host of a service to identify time slots of low resource consumption on the host, annotating the time slots with service tags, where the service tags identify host information and service information, creating groups of time slots using the service tags, using dynamic clustering to create clusters of hosts using the groups of time slots, and generating at least one common change window by eliminating duplicate hosts from the clusters of the hosts.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

39.

System and method for installing, updating and uninstalling applications

      
Application Number 16793712
Grant Number 10922067
Status In Force
Filing Date 2020-02-18
First Publication Date 2021-02-16
Grant Date 2021-02-16
Owner BMC HELIX, INC. (USA)
Inventor Reeves, Robert E.

Abstract

One example system includes an export engine to generate an environment agnostic configuration file and an environment properties data structure based on a server program executing in the environment. The environment-agnostic configuration file includes representations of a set of environment dependent attributes from the set of configuration information, each representation for an environment dependent attribute including at least one token that replaces a value of the attribute in the representation, and representations of members of a set of environment independent attributes from the set of configuration information that are equivalent between two different environments. The environment properties data structure has, for each environment, a value that corresponds to the at least one token. An example system may compare previously generated files with current files to identify differences. Differences that represent malicious changes can trigger restoration of the configuration using the previously generated files.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 8/61 - Installation
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

40.

Synthetic objects in service models

      
Application Number 16389538
Grant Number 11102072
Status In Force
Filing Date 2019-04-19
First Publication Date 2020-10-22
Grant Date 2021-08-24
Owner BMC HELIX, INC. (USA)
Inventor
  • De Peuter, Geert
  • Palla, Stephen

Abstract

A method for determining a misconfiguration of components in an Information Technology (IT) infrastructure includes decomposing one or more components into sub parts, creating one or more synthetic objects, each synthetic object being associated with a sub part of a respective component, and including the components and the synthetic objects in a model of the IT infrastructure. The method further determines a relationship between a first component and a first synthetic object based on attributes of the first component and attributes of the first synthetic object, includes the determined relationship in the model of the IT infrastructure, and loads a graph of the IT infrastructure in a graph database with the first component and the synthetic object as nodes and the determined relationship as an edge in the graph. The method further determines the misconfiguration of components in the IT infrastructure by identifying components having improper relationships in the graph.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

41.

Cooperative naming for configuration items in a distributed configuration management database environment

      
Application Number 16946548
Grant Number 11514076
Status In Force
Filing Date 2020-06-26
First Publication Date 2020-10-15
Grant Date 2022-11-29
Owner BMC HELIX, INC. (USA)
Inventor
  • Rangarajan, Govindarajan
  • Kumar, Ajoy
  • Kumar, Narayan
  • Mueller, Douglas
  • Connors, Matthew D.
  • Wallace, Darius

Abstract

A first datastore discovers a configuration item (CI), without a persistent unique identifier in a distributed datastores environment. When the first datastore has authoritative naming rights, it determines an authoritative identification for the CI. When the first datastore has advisory naming rights, it suggests a name for the CI to a second datastore having authoritative naming rights. The second datastore determines that a pre-existing identification for the CI in the second datastore is the authoritative identification for the CI. If there is no pre-existing identification for the CI in the second data store, the second data store accepts the suggested name as the authoritative identification for the CI. When the first datastore has no naming rights for the CI, it sends the CI to a third data store having authoritative naming rights for the CI to get an authoritative identification for the CI.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor

42.

Creative and additive reconciliation of data records

      
Application Number 16289639
Grant Number 11561766
Status In Force
Filing Date 2019-02-28
First Publication Date 2020-09-03
Grant Date 2023-01-24
Owner BMC HELIX, INC. (USA)
Inventor
  • Mueller, Douglas
  • Grisby, Duncan Paul
  • Kumar, Ajoy

Abstract

A data management system includes a data reconciliation engine that identifies data sources that contain data records referencing a resource and determines whether each of the identified data sources is a creative data source or an additive data source. When all of the identified data sources are additive data sources, the reconciliation engine terminates a data reconciliation process. When all of the identified data sources are not additive data sources, the reconciliation engine finds a first creative data source from among the identified data sources, and initiates the data reconciliation process by merging data from the identified data sources including the first creative data source, one data source-by-one data source, into a reconciled data record.

IPC Classes  ?

  • G06F 7/14 - Merging, i.e. combining at least two sets of record carriers each arranged in the same ordered sequence to produce a single set having the same ordered sequence

43.

Methods and apparatus related to graph transformation and synchronization

      
Application Number 14798029
Grant Number 10733055
Status In Force
Filing Date 2015-07-13
First Publication Date 2020-08-04
Grant Date 2020-08-04
Owner BMC HELIX, INC. (USA)
Inventor Grisby, Duncan Paul

Abstract

In one general aspect, a computer system can include instructions configured to store on a non-transitory computer-readable storage medium. The computer system can include a subgraph transformer configured to transform a plurality of subgraphs of a source graph into a plurality of transformed subgraphs, and configured to define a target graph that is a transformed version of the source graph based on the plurality of transformed subgraphs. The computer system can include a change detector configured to receive an indicator that a portion of the source graph has been changed, and a synchronization module configured to synchronize a portion of the target graph with the changed portion of the source graph.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/901 - IndexingData structures thereforStorage structures

44.

Power saving through automated power scheduling of virtual machines

      
Application Number 16236939
Grant Number 10817046
Status In Force
Filing Date 2018-12-31
First Publication Date 2020-07-02
Grant Date 2020-10-27
Owner BMC HELIX, INC. (USA)
Inventor
  • Visconti, Stefano
  • Dhyani, Kanika
  • Sivasubramanian, Jeyashree
  • Bertoli, Marco
  • Poddigue, Luca

Abstract

A plurality of virtual machines executing on physical machines may be monitored, and performance data characterizing consumption of physical resources of the physical machines by the plurality of virtual machines during the observation time may be extracted. Each of the plurality of virtual machines may be classified as active or idle during each time division of a plurality of time divisions of the observation time, based on the performance data and on idleness criteria, to thereby generate an active-idle series for each of the plurality of virtual machines. For each active-idle series of each virtual machine of the plurality of virtual machines, at least one periodicity of recurring idle times within the observation time may be determined. Then, for each virtual machine with the at least one periodicity, an on-off schedule may be determined, and each of the virtual machines may be transitioned with the at least one periodicity between an on state and an off state in accordance with the on-off schedule.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 1/3287 - Power saving characterised by the action undertaken by switching off individual functional units in the computer system
  • G06F 1/28 - Supervision thereof, e.g. detecting power-supply failure by out of limits supervision
  • G06F 1/329 - Power saving characterised by the action undertaken by task scheduling

45.

Prioritized remediation of information security vulnerabilities based on service model aware multi-dimensional security risk scoring

      
Application Number 16194735
Grant Number 11677773
Status In Force
Filing Date 2018-11-19
First Publication Date 2020-05-21
Grant Date 2023-06-13
Owner BMC HELIX, INC. (USA)
Inventor
  • Iyer, G S Narayan
  • Kumar, Ajoy
  • Gupta, Amit

Abstract

A method for securing a service implemented on a computer network includes identifying network assets in the computer network used by the service. The method further includes identifying vulnerabilities in one or more of the network assets, determining an asset risk score for each of the network assets, and determining a service risk score for the service. The method involves implementing one or more vulnerability remediation actions on the computer network to reduce the service risk score and secure the service.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols

46.

Asset floor map

      
Application Number 15476573
Grant Number 10798538
Status In Force
Filing Date 2017-03-31
First Publication Date 2020-04-30
Grant Date 2020-10-06
Owner BMC HELIX, INC. (USA)
Inventor
  • Jain, Priyanka
  • Mardhekar, Sameer
  • Bhagwat, Anand

Abstract

A method includes receiving a floor map indicating a layout of a location, displaying at least a portion of the floor map, capturing signal strength data representing a signal field for at least one position on the floor map, identifying an asset within the layout of the location, determining at least one property that identifies the asset using one of a discovery process using a wireless protocol and an image processing application programming interface (API) configured to classify an image and detect individual within the image, updating the floor map with the asset and the at least one property, and communicating the asset and the at least one property to the remote computing device.

IPC Classes  ?

  • H04W 4/33 - Services specially adapted for particular environments, situations or purposes for indoor environments, e.g. buildings
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
  • H04W 4/02 - Services making use of location information
  • H04W 84/12 - WLAN [Wireless Local Area Networks]
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06K 9/00 - Methods or arrangements for reading or recognising printed or written characters or for recognising patterns, e.g. fingerprints
  • G06K 9/62 - Methods or arrangements for recognition using electronic means

47.

System and method for installing, updating and uninstalling applications

      
Application Number 15247666
Grant Number 10592222
Status In Force
Filing Date 2016-08-25
First Publication Date 2020-03-17
Grant Date 2020-03-17
Owner BMC HELIX, INC. (USA)
Inventor Reeves, Robert E.

Abstract

One example system includes an export engine to generate an installation atomic for a source program based on a source environment. The installation atomic can include an environment agnostic configuration file, an environment properties data structure, and compiled binary artifacts created based on the server program. The environment-agnostic configuration file includes representations of a set of environment dependent attributes from the set of configuration information, each representation for an environment dependent attribute including at least one token that replaces a value of the attribute in the representation, and representations of members of a set of environment independent attributes from the set of configuration information that are equivalent between the source environment and target environments. The environment properties data structure has, for each of a plurality of target environments, a value that corresponds to the at least one token.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06F 8/61 - Installation
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

48.

Graph expansion mini-view

      
Application Number 16680083
Grant Number 11132820
Status In Force
Filing Date 2019-11-11
First Publication Date 2020-03-12
Grant Date 2021-09-28
Owner BMC HELIX, INC. (USA)
Inventor Poston, Ricky

Abstract

A graphical representation of a service model provides a full view of a portion of the graphical representation. A sub graph view may be displayed for nodes of the graphical representation of the service model that are associated with a selected node, including nodes that may not be visible in the full view. The sub graph view may be interactive, providing additional information regarding the nodes displayed in the sub graph view, and allowing making nodes in the sub graph view visible or invisible in the full view. Information may be displayed in the sub graph view about the status of the components being modeled by the service model corresponding to nodes displayed in the sub graph view.

IPC Classes  ?

  • G06T 11/20 - Drawing from basic elements, e.g. lines or circles
  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance

49.

Extensibility of business logic shared across a business process orchestration engine, a rule engine, and a user interface

      
Application Number 16665645
Grant Number 11321668
Status In Force
Filing Date 2019-10-28
First Publication Date 2020-02-20
Grant Date 2022-05-03
Owner BMC HELIX, INC. (USA)
Inventor
  • Rajwade, Abhijit Anirrudha
  • Wong, Steve
  • Shapiro, David Lawrence
  • Gu, Jiayi
  • Gupta, Girish Kumar
  • Sulcer, David T.

Abstract

A method for codeless development of an application includes registering one or more actions in a registry. Each action is coded in a reusable block of code, each action having an action definition including an action type name, an input parameters map, and an output parameters map. The method further includes performing an action type name look up in the registry for an invoked action with an action service ensuring that a number of arguments included in the action definition matches a number of arguments specified by the action type, passing an input to and receiving a return value from the invoked action, updating the output parameters map included in the definition of the invoked action, and returning the updated output parameters map to an application in development for updating processing variables in the application.

IPC Classes  ?

  • G06Q 10/10 - Office automationTime management
  • G06F 9/445 - Program loading or initiating
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 8/30 - Creation or generation of source code
  • G06F 8/36 - Software reuse

50.

Rapid content deployment on a publication platform

      
Application Number 16411551
Grant Number 11170117
Status In Force
Filing Date 2019-05-14
First Publication Date 2019-12-12
Grant Date 2021-11-09
Owner BMC HELIX, INC. (USA)
Inventor Jha, Ashish Kumar

Abstract

A system for rapid deployment of content on a common publication platform. The system includes a rapid content deployment application hosted on a stand-alone or networked computer that is interfaced with the common publication platform. The rapid content deployment application includes a receiver to receive a file for publication on the common publication platform, a file existence checker to verify existence of a collaboration file on the common publication platform compatible with the received file, and a file preparer to prepare the received file for uploading to the common publication platform in compliance with one or more of governance, security, and change management policies including access control and authorization policies. The rapid content deployment application further includes a file uploader to upload the prepared file to the common publication platform for publication.

IPC Classes  ?

  • G06F 21/60 - Protecting data
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

51.

Application instrumentation code extension

      
Application Number 16446326
Grant Number 10896117
Status In Force
Filing Date 2019-06-19
First Publication Date 2019-10-03
Grant Date 2021-01-19
Owner BMC HELIX, INC. (USA)
Inventor Hulick, Jr., Walter T.

Abstract

The embodiments provide an application diagnostics apparatus including an instrumentation engine configured to monitor one or more methods of a call chain of the application in response to a server request according to an instrumentation file specifying which methods are monitored and which methods are associated with a code extension, an extension determining unit configured to determine that at least one monitored method is associated with the code extension based on code extension identification information, a class loading unit configured to load the code extension from a resource file when the at least one monitored method associated with the code extension is called within the call chain, a code extension execution unit configured to execute one or more data collection processes, and a report generator configured to generate at least one report for display based on collected parameters.

IPC Classes  ?

  • G06F 11/36 - Prevention of errors by analysis, debugging or testing of software
  • G06F 9/445 - Program loading or initiating
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • G06F 11/30 - Monitoring

52.

OPTIMIZATION OF PATH SELECTION FOR TRANSFERS OF FILES

      
Application Number 16434937
Status Pending
Filing Date 2019-06-07
First Publication Date 2019-09-19
Owner BMC HELIX, INC. (USA)
Inventor
  • Theroux, Michael Eric
  • Cefalo, Benjamin Patrick
  • Piazza, Jeffrey (jeff) Eugene

Abstract

A scheduling system for scheduling executions of tasks within a distributed computing system may include a file transfer manager configured to determine a file for transfer from a source location to a target location, the file being associated with file metadata characterizing the file, and with an organization. The file transfer manager may include an orchestrator configured to determine at least two transfer paths for the transfer, including at least a first transfer path utilizing a private wide area network (WAN) of the organization and a second transfer path utilizing a publicly available data hosting service, access transfer metadata characterizing the at least two transfer paths, and access organizational metadata characterizing organizational transfer path usage factors. The file transfer manager also may include a heuristics engine configured to execute path decision logic using the file metadata, the transfer metadata, and the organizational metadata, to thereby select a selected transfer path from the at least two transfer paths.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/707 - Route fault prevention or recovery, e.g. rerouting, route redundancy, virtual router redundancy protocol [VRRP] or hot standby router protocol [HSRP] using path redundancy

53.

Multi-entity normalization

      
Application Number 16407974
Grant Number 11010359
Status In Force
Filing Date 2019-05-09
First Publication Date 2019-08-29
Grant Date 2021-05-18
Owner BMC HELIX, INC. (USA)
Inventor
  • Kumar, Ajoy
  • Mueller, Douglas
  • George, Josie

Abstract

In accordance with aspects of the disclosure, systems and methods are provided for normalizing data representing entities and relationships linking the entities including defining one or more graph rules describing searchable characteristics for the data representing the entities and relationships linking the entities, applying the one or more graph rules to the data representing the entities and the relationships linking the entities, identifying one or more matching instances between the one or more graph rules and the data representing the entities and the relationships linking the entities, and performing one or more actions to update the one or more matching instances between the one or more graph rules and the data representing the entities and the relationships linking the entities.

IPC Classes  ?

  • G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/23 - Updating
  • G06F 16/901 - IndexingData structures thereforStorage structures

54.

Capacity risk management for virtual machines

      
Application Number 16374079
Grant Number 10896055
Status In Force
Filing Date 2019-04-03
First Publication Date 2019-07-25
Grant Date 2021-01-19
Owner BMC HELIX, INC. (USA)
Inventor
  • Sivasubramanian, Jeyashree
  • Apte, Sudheer

Abstract

An access data collector collects access assignment data characterizing active access assignment operations of a hypervisor in assigning host computing resources among virtual machines for use in execution of the virtual machines. Then, a capacity risk indicator calculator calculates a capacity risk indicator characterizing a capacity risk of the host computing resources with respect to meeting a prospective capacity demand of the virtual machines, based on the access assignment data.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring

55.

Automatic server classification in cloud environments

      
Application Number 15852758
Grant Number 10686682
Status In Force
Filing Date 2017-12-22
First Publication Date 2019-06-27
Grant Date 2020-06-16
Owner BMC HELIX, INC. (USA)
Inventor
  • Navare, Nitin
  • Sodem, Sridhar
  • Rivington, Mark

Abstract

A computer system for classifying one or more servers by server type in a networked computing system to institute server-type based monitoring and or maintenance of the networked computing system. The computer system includes a processor, a memory, a data receiver, a server signature generator, and a server-type tagging service. The data receiver collects server performance data for a first server over a time interval. The server signature generator determines a signature of the first server based on the collected server performance data. The server-type tagging service compares the signature of the first server to a signature of a second server of known server type, determines a similarity of the signature of the first server to the signature of the second server, and, based on the similarity, classifies the first server as being of the same server type as the second server.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06N 20/00 - Machine learning
  • G06F 11/30 - Monitoring

56.

Automatic creation of graph time layer of model of computer network objects and relationships

      
Application Number 16263952
Grant Number 11227079
Status In Force
Filing Date 2019-01-31
First Publication Date 2019-05-30
Grant Date 2022-01-18
Owner BMC HELIX, INC. (USA)
Inventor
  • Poston, Ricky
  • Cooper, Michael

Abstract

A method and system create a model of a set of relationships between a set of parent computer network objects and a set of corresponding child computer network objects, over a period of time, and output a user interface graphing the model in a single view to illustrate the set of relationships over the period of time. The parent computer network objects include virtual machines and the child computer network objects include hosts. The user interface includes a search option to provide for a search of problems with the child computer network objects over the period of time.

IPC Classes  ?

  • G06F 11/30 - Monitoring
  • G06F 30/18 - Network design, e.g. design based on topological or interconnect aspects of utility systems, piping, heating ventilation air conditioning [HVAC] or cabling
  • G06F 11/32 - Monitoring with visual indication of the functioning of the machine
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

57.

Statistical identification of instances during reconciliation process

      
Application Number 16254098
Grant Number 10877974
Status In Force
Filing Date 2019-01-22
First Publication Date 2019-05-23
Grant Date 2020-12-29
Owner BMC HELIX, INC. (USA)
Inventor
  • Morozov, Vitaly
  • Humphrey, Eric

Abstract

A system for reconciling object for a configuration management databases employs statistical rules to reduce the amount of manual identification required by conventional reconciliation techniques. As users manually identify matches between source and target datasets, statistical rules are developed based on the criteria used for matching. Those statistical rules are then used for future matching. A threshold value is adjusted as the statistical rules are used, incrementing the threshold value when the rule successfully matches source and target objects. If the threshold value exceeds a predetermined acceptance value, the system may automatically accept a match made by a statistical rule. Otherwise, suggestions of possibly applicable rules may be presented to a user, who may use the suggested rules to match objects, causing adjustment of the threshold value associated with the suggested rules used.

IPC Classes  ?

  • G06F 16/2455 - Query execution
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/23 - Updating
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/9032 - Query formulation

58.

Automatic server cluster discovery

      
Application Number 16227677
Grant Number 10715608
Status In Force
Filing Date 2018-12-20
First Publication Date 2019-04-25
Grant Date 2020-07-14
Owner BMC HELIX, INC. (USA)
Inventor
  • Koren, Eyal
  • Lavie, Nitsan Daniel
  • Kleyman, Sergey

Abstract

Systems and methods provide automatic discovery of cluster membership based on transaction processing. An example method includes, at a source node of a first tier of nodes, generating a service identifier for a transaction that requests a service hosted by a second tier, the service identifier being based on a logical identifier for the second tier. The method also includes sending the transaction, including the service identifier, from the source node to the service hosted by the second tier. The method includes, at a destination node in the second tier, obtaining the service identifier from the transaction and reporting the service identifier with a destination node identifier to a visibility server as cluster information. The method also includes, at the visibility server, receiving cluster information from a plurality of destination nodes and assigning each of the plurality of destination nodes to a cluster based on the service identifiers.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 12/24 - Arrangements for maintenance or administration

59.

Automated capacity provisioning method using historical performance data

      
Application Number 16224200
Grant Number 10942781
Status In Force
Filing Date 2018-12-18
First Publication Date 2019-04-25
Grant Date 2021-03-09
Owner BMC HELIX, INC. (USA)
Inventor
  • Ding, Yiping
  • Marron, Assaf
  • Johannessen, Fred

Abstract

The method may include collecting performance data relating to processing nodes of a computer system which provide services via one or more applications, analyzing the performance data to generate an operational profile characterizing resource usage of the processing nodes, receiving a set of attributes characterizing expected performance goals in which the services are expected to be provided, and generating at least one provisioning policy based on an analysis of the operational profile in conjunction with the set of attributes. The at least one provisioning policy may specify a condition for re-allocating resources associated with at least one processing node in a manner that satisfies the performance goals of the set of attributes. The method may further include re-allocating, during runtime, the resources associated with the at least one processing node when the condition of the at least one provisioning policy is determined as satisfied.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/927 - Allocation of resources based on type of traffic, QoS or priority
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

60.

Network based application management

      
Application Number 16166883
Grant Number 10826974
Status In Force
Filing Date 2018-10-22
First Publication Date 2019-04-25
Grant Date 2020-11-03
Owner BMC HELIX, INC. (USA)
Inventor
  • Mair, Geoff Ross
  • Geddes, Simon David
  • Toube, Larry Vaughan

Abstract

An environment for facilitating the management of content for users associated with specific partner networks is provided. Users may be granted access to such specific partner networks in accordance with each user's affiliation with one or more organizations. In accordance with the above, a content management system facilitates the content/information exchange by accepting software applications from content providers. Additionally, the content management system accepts software application specifications or manifests from partner network administrators. Accordingly, the content management system can audit and recommend actions to users regarding applicable software application based one user organizational associations. Still further, the content management system can facilitate requests from affiliated users for specific types of content that can be forwarded to content providers and later made available to affiliated users.

IPC Classes  ?

  • G06Q 10/10 - Office automationTime management
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 8/60 - Software deployment
  • G06Q 50/00 - Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
  • H04L 12/58 - Message switching systems

61.

Application monitoring for cloud-based architectures

      
Application Number 16205764
Grant Number 10749939
Status In Force
Filing Date 2018-11-30
First Publication Date 2019-03-28
Grant Date 2020-08-18
Owner BMC HELIX, INC. (USA)
Inventor
  • Moon, Cliff
  • Black, Benjamin

Abstract

An example system may include one or more collectors and an analyzer. The one or more collectors receive a plurality of data streams that include operational data for a plurality of application nodes. The plurality of data streams are captured and provided by a plurality of meters deployed on at least one cloud computing platform to respectively meter the plurality of application nodes. The analyzer processes the plurality of data streams to generate real-time performance data for a first application of a plurality of applications and generates, based on the real-time performance data for the application instances, statistics for data flows between components of the first application. The analyzer generates comparative statistics on the performance of the first application relative to the performance of the plurality of applications hosted, and reallocated, based on the comparative statistics, resources for the performance of the first application.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • G06F 11/30 - Monitoring

62.

System and method for extending the functionality of an application

      
Application Number 16166877
Grant Number 10831460
Status In Force
Filing Date 2018-10-22
First Publication Date 2019-02-21
Grant Date 2020-11-10
Owner BMC HELIX, INC. (USA)
Inventor
  • Cooper, Adam Charles
  • Thucydides, George
  • Mair, Geoffrey Ross
  • Buxton, Caleb Peter

Abstract

A method of administering a computing system, including a plurality of computing devices. The method includes selecting an application for download to a computing device, prior to downloading the application, decompiling the application, searching for string patterns in the decompiled application, replacing the string patterns in the decompiled application with another string pattern, the another string pattern being configured to intercept at least one of a system event or an Application Programming Interface (API) call, and associating logic with the application. The logic is configured to interact with the application via the at least one system event or API call, the logic is configured to provide additional functions to the application, the logic is configured to be shared between the application and at least one other application, and the logic is stored separate from the application.

IPC Classes  ?

63.

Monitoring network performance of encrypted communications

      
Application Number 16173587
Grant Number 10735297
Status In Force
Filing Date 2018-10-29
First Publication Date 2019-02-21
Grant Date 2020-08-04
Owner BMC HELIX, INC. (USA)
Inventor
  • Deschênes, Danny
  • Hsy, Joe Pei-Wen
  • Larose, Pierre

Abstract

According to one general aspect, a method of using a first probing device may include monitoring one or more encrypted communications sessions between a first computing device and a second computing device. In some implementations of the method, each encrypted communications session includes transmitting a plurality of encrypted data objects between the first and second computing devices. The method may include deriving, by the first probing device, timing information regarding an encrypted communications session. The method may also include transmitting, from the first probing device to a second probing device, the derived timing information.

IPC Classes  ?

  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol

64.

System and method for building business service model

      
Application Number 15915754
Grant Number 11386077
Status In Force
Filing Date 2018-03-08
First Publication Date 2019-02-14
Grant Date 2022-07-12
Owner BMC HELIX, INC. (USA)
Inventor
  • Trinon, Jean-Marc
  • Cline, Troy
  • Giroir, Walt
  • Crawford, Shane

Abstract

A modeling system has a database that: stores information of resources of a computer network service. A server f has a graphical user interface application for creating and editing service models. The application receives user-entered search criteria and searches information in the database based on the criteria. The search criteria can include a name, type, attribute, and other information of the resources. In addition, the search criteria can be a user-entered search query entered that has one or more logical or Boolean conditions relating resource attributes to attribute values. Using information obtained through searching, the application is used to create at least a portion of a service model of the computer network service. Once created, the application is used to initiate publishing of at least a portion of the service model to one or more impact managers of the computer network service.

IPC Classes  ?

  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/23 - Updating
  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/245 - Query processing
  • G06F 16/248 - Presentation of query results
  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 9/54 - Interprogram communication
  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06Q 30/02 - MarketingPrice estimation or determinationFundraising

65.

Determining statuses of computer modules

      
Application Number 16129156
Grant Number 10257022
Status In Force
Filing Date 2018-09-12
First Publication Date 2019-01-10
Grant Date 2019-04-09
Owner BMC HELIX, INC. (USA)
Inventor
  • Phadke, Nilesh
  • Phadke, Pallavi

Abstract

A non-transitory computer-readable storage medium may include instructions stored thereon for ranking multiple computer modules to reduce failure impacts. When executed by at least one processor, the instructions may be configured to cause a computing system implementing the multiple computer modules to at least associate the multiple computer modules with multiple services that rely on the multiple computer modules, at least one of the multiple services relying on more than one of the multiple computer modules, determine values of the multiple services, and rank the multiple computer modules based on the determined values of the multiple services with which the respective multiple computer modules are associated.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • H04L 12/24 - Arrangements for maintenance or administration

66.

Cooperative naming for configuration items in a distributed configuration management database environment

      
Application Number 16116292
Grant Number 10740352
Status In Force
Filing Date 2018-08-29
First Publication Date 2018-12-27
Grant Date 2020-08-11
Owner BMC HELIX, INC. (USA)
Inventor
  • Rangarajan, Govindarajan
  • Kumar, Ajoy
  • Kumar, Narayan
  • Mueller, Douglas
  • Connors, Matthew D.
  • Wallace, Darius

Abstract

Disclosed are methods and systems to provide coordinated identification of data items across a plurality of distributed data storage repositories (datastores). In one disclosed embodiment, a single configuration management database (CMDB) controls identification rights for all CIs as they are first identified in a master/slave relationship with all other CMDBs in the distributed environment. In a second embodiment, a plurality of CMDBs divide identification rights based upon coordination identification rules where certain CMDBs are assigned authoritative identification rights for CIs matching the rules of a particular CMDB in the distributed environment. In a third embodiment, one or more of the plurality of CMDBs may also have advisory identification rights for CIs which do not already have an identifiable unique identity and can coordinate with an authoritative CMDB to establish an identity for CIs.

IPC Classes  ?

  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database systemDistributed database system architectures therefor

67.

STREAMWEAVER

      
Serial Number 88212871
Status Registered
Filing Date 2018-11-30
Registration Date 2020-08-18
Owner BMC HELIX, INC. ()
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

computer software for the remote collection of data from IT operations management (ITOM) software; Computer software for integrating IT operations management (ITOM) software software as a service (SAAS) services featuring software for the remote collection of data from IT operations management (ITOM) software; software as a service (SAAS) services featuring software for integrating IT operations management (ITOM) software

68.

Cloud service interdependency relationship detection

      
Application Number 15476478
Grant Number 10931532
Status In Force
Filing Date 2017-03-31
First Publication Date 2018-10-04
Grant Date 2021-02-23
Owner BMC HELIX, INC. (USA)
Inventor
  • Navare, Nitin
  • Sodem, Sridhar
  • Scarpelli, Joseph
  • Rivington, Mark

Abstract

A computer system includes a processor, a memory, a data collector, a relationships analyzer, and a topological map generator. The data collector retrieves performance data in a specific set of performance categories for computing resources in a computing system for a time interval. The relationships analyzer, for each computing resource-to-computing resource pair in the computing system, performs a correlation analysis of the respective behavior values of the computing resources in the pair, and identifies the computing resource-to-computing resource pairs that have correlation values exceeding a pre-determined threshold level as having performance interdependencies. The topological map generator prepares an undirected graph of the computing resources that have performance interdependencies, and displays the undirected graph as a topographic map of the computing resources in the computing system.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

69.

Behavioral analytics in information technology infrasturcture incident management systems

      
Application Number 15476694
Grant Number 11657063
Status In Force
Filing Date 2017-03-31
First Publication Date 2018-10-04
Grant Date 2023-05-23
Owner BMC HELIX, INC. (USA)
Inventor
  • Pavon, Raul
  • Carpenter, Beth
  • Curlee, Gwendolyn

Abstract

A computer system for behavioral analytics of native Information Technology Service Management (ITSM) incident handling data includes a processor, a memory, a de-normalized target data source for behavioral analysis, a transformation processor, and a statistical processor. The transformation processor reads an identified portion of the ITSM data and creates new normalized fields for the de-normalized target data source by parsing selected text fields from the portion of ITSM data. The created new normalized fields include a working group field and an associated support level field. The transformation processor further creates new de-normalized aggregation fields for the incipient de-normalized target data source based on the newly created normalized fields. The newly created de-normalized aggregation fields include fields characterizing incident handling behavior. A statistical processor further processes target data for behavioral analytics. The transformation processor populates the target data source's de-normalized data fields with aggregated incident handling data and behavioral characterizations.

IPC Classes  ?

  • G06F 16/25 - Integrating or interfacing systems involving database management systems
  • H04L 41/142 - Network analysis or design using statistical or mathematical methods
  • G06F 16/2458 - Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
  • G06F 16/36 - Creation of semantic tools, e.g. ontology or thesauri
  • G06F 40/205 - Parsing

70.

Service placement techniques for a cloud datacenter

      
Application Number 15954037
Grant Number 11048490
Status In Force
Filing Date 2018-04-16
First Publication Date 2018-08-16
Grant Date 2021-06-29
Owner BMC HELIX, INC. (USA)
Inventor
  • Sharma, Abhijit
  • Phadke, Nilesh
  • Vul, Alexander
  • Karnati, Varun
  • Kamineni, Rajesh

Abstract

A container set manager may determine a plurality of container sets, each container set specifying a non-functional architectural concern associated with deployment of a service within at least one data center. A decision table manager may determine a decision table specifying relative priority levels of the container sets relative to one another with respect to the deployment. A placement engine may determine an instance of an application placement model (APM), based on the plurality of container sets and the decision table, determine an instance of a data center placement model (DPM) representing the at least one data center, and generate a placement plan for the deployment, based on the APM instance and the DPM instance.

IPC Classes  ?

  • G06F 8/60 - Software deployment
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

71.

Generic discovery for computer networks

      
Application Number 15940121
Grant Number 10523543
Status In Force
Filing Date 2018-03-29
First Publication Date 2018-08-02
Grant Date 2019-12-31
Owner BMC HELIX, INC. (USA)
Inventor
  • Spinelli, Lionel
  • Chabrier, Jean-Claude
  • Germain, Pierre

Abstract

A generic discovery methodology collects data pertaining to components of a computer network using various discovery technologies. From the collected data, the methodology identifies, filters and analyzes information related to inter-component communications. Using the communication and application information, the methodology determines reliable relationships for those components having sufficient information available. To qualify more components, the methodology implements a decision service to generate hypothetical relationships between components that are known and components that are unqualified or unknown. The hypothetical relationships are presented to a user for selection, and each hypothetical relationship is preferably associated with an indication of its reliability.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

72.

Automated scoring of unstructured events in information technology environments

      
Application Number 15418060
Grant Number 10419268
Status In Force
Filing Date 2017-01-27
First Publication Date 2018-08-02
Grant Date 2019-09-17
Owner BMC HELIX, INC. (USA)
Inventor
  • Scarpelli, Joseph
  • Phadake, Ramchandra
  • Xia, Mu
  • Pokarna, Sameer

Abstract

Detection of anomalous events in the operation of information technology (IT) components includes receiving messages, which describe events in the operation of the IT components in real time, and categorizing and condensing the messages received in a first time interval into message patterns by message pattern type. Based on a distribution of occurrences of the message patterns in the first time interval and in preceding time intervals, anomaly scores are assigned to the message patterns, and one or more of the message patterns are classified as being anomalous message patterns that correspond to potentially anomalous events in the operation of the IT infrastructure installation. A degree of correlation between occurrences of the anomalous message patterns and occurrences of application alarms is determined. Message patterns with high anomaly scores and having a high degree of correlation with application alarms are deemed significant and prioritized for display to users.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 12/24 - Arrangements for maintenance or administration
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

73.

Automated capacity provisioning method using historical performance data

      
Application Number 15222491
Grant Number 10169095
Status In Force
Filing Date 2016-07-28
First Publication Date 2018-06-28
Grant Date 2019-01-01
Owner BMC HELIX, INC. (USA)
Inventor
  • Ding, Yiping
  • Marron, Assaf
  • Johannessen, Fred

Abstract

The method may include collecting performance data relating to processing nodes of a computer system which provide services via one or more applications, analyzing the performance data to generate an operational profile characterizing resource usage of the processing nodes, receiving a set of attributes characterizing expected performance goals in which the services are expected to be provided, and generating at least one provisioning policy based on an analysis of the operational profile in conjunction with the set of attributes. The at least one provisioning policy may specify a condition for re-allocating resources associated with at least one processing node in a manner that satisfies the performance goals of the set of attributes. The method may further include re-allocating, during runtime, the resources associated with the at least one processing node when the condition of the at least one provisioning policy is determined as satisfied.

IPC Classes  ?

  • G06F 9/46 - Multiprogramming arrangements
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation
  • G06F 3/0484 - Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/927 - Allocation of resources based on type of traffic, QoS or priority
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure

74.

Generation of support data records using natural language processing

      
Application Number 15864712
Grant Number 11010413
Status In Force
Filing Date 2018-01-08
First Publication Date 2018-05-10
Grant Date 2021-05-18
Owner BMC HELIX, INC. (USA)
Inventor
  • Hall, Jonathan William
  • Chu, Sun Chun
  • Cline, Troy
  • Phadke, Nilesh

Abstract

A view generator receives support text characterizing a support requirement for available information technology (IT) support, the support text being received in sentence form via a graphical user interface (GUI). A text analyzer performs natural language processing on the support text and thereby identifies at least one sentence part and at least one named entity within the support text. A support record generator relates each of the at least one sentence part and the at least one named entity to a support record type, and generates a support data record for the support requirement, including filling individual fields of the support data record using the at least one sentence part and the at least one named entity.

IPC Classes  ?

75.

Automatic server cluster discovery

      
Application Number 15287151
Grant Number 10171596
Status In Force
Filing Date 2016-10-06
First Publication Date 2018-04-12
Grant Date 2019-01-01
Owner BMC HELIX, INC. (USA)
Inventor
  • Koren, Eyal
  • Lavie, Nitsan Daniel
  • Kleyman, Sergey

Abstract

Systems and methods provide automatic discovery of cluster membership based on transaction processing. An example method includes, at a source node of a first tier of nodes, generating a service identifier for a transaction that requests a service hosted by a second tier, the service identifier being based on a logical identifier for the second tier. The method also includes sending the transaction, including the service identifier, from the source node to the service hosted by the second tier. The method includes, at a destination node in the second tier, obtaining the service identifier from the transaction and reporting the service identifier with a destination node identifier to a visibility server as cluster information. The method also includes, at the visibility server, receiving cluster information from a plurality of destination nodes and assigning each of the plurality of destination nodes to a cluster based on the service identifiers.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]

76.

Creating models based on performance metrics of a computing workloads running in a plurality of data centers to distribute computing workloads

      
Application Number 15272011
Grant Number 10346204
Status In Force
Filing Date 2016-09-21
First Publication Date 2018-03-22
Grant Date 2019-07-09
Owner BMC HELIX, INC. (USA)
Inventor
  • Ginis, Boris
  • Northup, William
  • Distauro, Anthony
  • Fernandes, Kevin

Abstract

A system includes, for each individual data center of a multiplex data center, a collector component, a local data repository, and a model building component. The collector component collects performance metrics of a computing workload running in the each individual data center of the multiplex data center and stores the collected performance metrics in the local data repository. The model building component builds a respective individual model of data center resource use for each individual CPC in the individual data center using the stored performance metrics. The system further includes a model merging component configured to receive and combine the individual CPC models created by the model building components for the individual data centers into a single multiplex data center model applicable to the computing workload across the multiplex data center.

IPC Classes  ?

  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

77.

Application monitoring for cloud-based architectures

      
Application Number 15809380
Grant Number 10171565
Status In Force
Filing Date 2017-11-10
First Publication Date 2018-03-15
Grant Date 2019-01-01
Owner BMC HELIX, INC. (USA)
Inventor
  • Moon, Cliff
  • Black, Benjamin

Abstract

An example system may include one or more collectors and an analyzer. The one or more collectors receive a plurality of data streams that include operational data for a plurality of application nodes. The plurality of data streams are captured and provided by a plurality of meters deployed on at least one cloud computing platform to respectively meter the plurality of application nodes. The analyzer processes the plurality of data streams to generate real-time performance data for a first application of a plurality of applications and generates, based on the real-time performance data for the application instances, statistics for data flows between components of the first application. The analyzer generates comparative statistics on the performance of the first application relative to the performance of the plurality of applications hosted, and reallocated, based on the comparative statistics, resources for the performance of the first application.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • H04L 12/26 - Monitoring arrangements; Testing arrangements

78.

Application of business process management standards for dynamic information technology management

      
Application Number 15797714
Grant Number 10540617
Status In Force
Filing Date 2017-10-30
First Publication Date 2018-03-08
Grant Date 2020-01-21
Owner BMC HELIX, INC. (USA)
Inventor
  • Beno, Tal
  • Wong, Steve
  • Tavoularis, Artemios

Abstract

Processes and integrations include a method for managing a business process application development lifecycle. The method includes initiating, in a planning stage, requirements for an application based on adding new features to the application or a new application, implementing, in a development stage, a service process node (SPN) as a business process, and managing, in an operations stage, software code representing the application in a production environment. The SPN is configured to encapsulate at least one business service object and generate an interface configured to expose internal processes of the at least one business service object.

IPC Classes  ?

  • G06F 9/44 - Arrangements for executing specific programs
  • G06Q 10/06 - Resources, workflows, human or project managementEnterprise or organisation planningEnterprise or organisation modelling
  • G06F 8/70 - Software maintenance or management
  • G06F 8/20 - Software design

79.

Overlay dataset

      
Application Number 15699571
Grant Number 10585918
Status In Force
Filing Date 2017-09-08
First Publication Date 2018-01-11
Grant Date 2020-03-10
Owner BMC HELIX, INC. (USA)
Inventor
  • Mueller, Douglas
  • Chen, Jiani

Abstract

Overlay datasets provide an efficient, flexible and scalable mechanism to represent the logical replication of one or more prior defined datasets. Only changes made to an entity in an overlay dataset's underlying dataset are replicated into the overlay dataset (such changes do not affect the underlying dataset). Read operations directed to the overlay dataset will find entities in the overlay dataset if they exist and in the underlying dataset(s) if no overlay-specific entity exists. Accordingly, overlay datasets provide an efficient mechanism for making changes to an existing dataset without suffering the high processing time and storage overhead associated with prior art copying and versioning techniques. Overlay datasets also provide a natural mechanism to keep two or more datasets in synchronization because changes to a base or underlying dataset's entities are “visible” in its associated overlay dataset (unless the entity has been modified in the overlay dataset).

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

80.

Overlay dataset

      
Application Number 15699582
Grant Number 10339159
Status In Force
Filing Date 2017-09-08
First Publication Date 2018-01-11
Grant Date 2019-07-02
Owner BMC HELIX, INC. (USA)
Inventor
  • Mueller, Douglas
  • Chen, Jiani

Abstract

Overlay datasets provide an efficient, flexible and scalable mechanism to represent the logical replication of one or more prior defined datasets. Only changes made to an entity in an overlay dataset's underlying dataset are replicated into the overlay dataset (such changes do not affect the underlying dataset). Read operations directed to the overlay dataset will find entities in the overlay dataset if they exist and in the underlying dataset(s) if no overlay-specific entity exists. Accordingly, overlay datasets provide an efficient mechanism for making changes to an existing dataset without suffering the high processing time and storage overhead associated with prior art copying and versioning techniques. Overlay datasets also provide a natural mechanism to keep two or more datasets in synchronization because changes to a base or underlying dataset's entities are “visible” in its associated overlay dataset (unless the entity has been modified in the overlay dataset).

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models

81.

Mechanism for deprecating object oriented data

      
Application Number 15700932
Grant Number 10558642
Status In Force
Filing Date 2017-09-11
First Publication Date 2018-01-04
Grant Date 2020-02-11
Owner BMC HELIX, INC. (USA)
Inventor
  • Rangarajan, Govindarajan
  • Kumar, Narayan

Abstract

Techniques are described to allow the deprecation of classes in an object-oriented data model, such as a CDM for a CMDB. When a class is deprecated and replaced by another existing or new class, data associated with instances of the deprecated class may be migrated to the replacement class. A mapping between the deprecated class and its replacement class may be provided to allow existing applications to continue to access data using the deprecated class without change until the deprecated class is finally deleted or the application is updated to use the replacement class. New applications written to use the object-oriented data model after the deprecation may use the replacement class to access data instances created using the original data model.

IPC Classes  ?

  • G06F 17/30 - Information retrieval; Database structures therefor
  • G06F 16/23 - Updating
  • G06F 16/84 - MappingConversion
  • G06F 16/16 - File or folder operations, e.g. details of user interfaces specifically adapted to file systems
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 17/24 - Editing, e.g. insert/delete

82.

Progressive analysis for big data

      
Application Number 15672984
Grant Number 10706088
Status In Force
Filing Date 2017-08-09
First Publication Date 2017-12-21
Grant Date 2020-07-07
Owner BMC HELIX, INC. (USA)
Inventor Ginter, Jonathan

Abstract

According to one general aspect, a method may include receiving a data query request that includes one or more search parameters to be searched for within a plurality of files that are stored according to a hierarchical organizational structure, wherein each file includes at least one data record. The method may include scanning a plurality of files to determine if one or more files match a sub portion of the search parameters. The method may further include parsing the candidate files to determine which, if any, records included by the respective candidate files meet the search parameters. The method may include generating, by one or more result analyzers, query results from the resultant data. The method may also include streaming, to the user device, the query results as at least one query result becomes available and to start streaming before the query requests have been fully generated.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 16/33 - Querying
  • G06F 16/14 - Details of searching files based on file metadata
  • G06F 16/903 - Querying

83.

Graph expansion mini-view

      
Application Number 15650212
Grant Number 10475218
Status In Force
Filing Date 2017-07-14
First Publication Date 2017-11-09
Grant Date 2019-11-12
Owner BMC HELIX, INC. (USA)
Inventor Poston, Ricky L.

Abstract

A graphical representation of a service model provides a full view of a portion of the graphical representation. A sub graph view may be displayed for nodes of the graphical representation of the service model that are associated with a selected node, including nodes that may not be visible in the full view. The sub graph view may be interactive, providing additional information regarding the nodes displayed in the sub graph view, and allowing making nodes in the sub graph view visible or invisible in the full view. Information may be displayed in the sub graph view about the status of the components being modeled by the service model corresponding to nodes displayed in the sub graph view.

IPC Classes  ?

  • G06F 3/0482 - Interaction with lists of selectable items, e.g. menus
  • G06F 3/0481 - Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
  • G06T 11/20 - Drawing from basic elements, e.g. lines or circles

84.

Provisioning of containers for virtualized applications

      
Application Number 15450936
Grant Number 10693948
Status In Force
Filing Date 2017-03-06
First Publication Date 2017-09-07
Grant Date 2020-06-23
Owner BMC HELIX, INC. (USA)
Inventor
  • Neogi, Atanu
  • Kumar, Ajoy
  • Phatak, Soumee

Abstract

In a general aspect, a computer-implemented method can include receiving a request to provision a plurality of containers of an application across a plurality of data center hosts and iteratively placing the plurality of containers on the plurality of data center hosts. The containers can be selected for placement based on one of a locality constraint and an association with previously-placed containers. Placement of a selected container can be based on, at least, compute requirements of the selected container, network requirements of the selected container, configuration of the plurality of data center hosts, and performance metrics for the plurality of data center hosts.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • H04L 12/26 - Monitoring arrangements; Testing arrangements
  • H04L 12/733 - Selecting a path with minimum length or minimum hop count
  • H04L 12/911 - Network admission control and resource allocation, e.g. bandwidth allocation or in-call renegotiation

85.

Authentication proxy agent

      
Application Number 15593232
Grant Number 10104079
Status In Force
Filing Date 2017-05-11
First Publication Date 2017-08-31
Grant Date 2018-10-16
Owner BMC HELIX, INC. (USA)
Inventor Miller, Karl Frederick

Abstract

An authentication engine may be configured to receive an authentication request and credentials from a client. The authentication engine may then generate a proxy agent configured to interact with an identity provider to authenticate the client on behalf of the client, using the credentials. In this way, the authentication engine may receive an assertion of authentication of the client from the identity provider, by way of the proxy agent.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04W 12/04 - Key management, e.g. using generic bootstrapping architecture [GBA]
  • H04W 12/06 - Authentication
  • H04L 9/32 - Arrangements for secret or secure communicationsNetwork security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/00 - Arrangements for secret or secure communicationsNetwork security protocols

86.

Multi-entity normalization

      
Application Number 15436144
Grant Number 10324912
Status In Force
Filing Date 2017-02-17
First Publication Date 2017-08-10
Grant Date 2019-06-18
Owner BMC HELIX, INC. (USA)
Inventor
  • Kumar, Ajoy
  • Mueller, Douglas
  • George, Josie

Abstract

In accordance with aspects of the disclosure, systems and methods are provided for normalizing data representing entities and relationships linking the entities including defining one or more graph rules describing searchable characteristics for the data representing the entities and relationships linking the entities, applying the one or more graph rules to the data representing the entities and the relationships linking the entities, identifying one or more matching instances between the one or more graph rules and the data representing the entities and the relationships linking the entities, and performing one or more actions to update the one or more matching instances between the one or more graph rules and the data representing the entities and the relationships linking the entities.

IPC Classes  ?

  • G06F 16/215 - Improving data qualityData cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
  • G06F 16/00 - Information retrievalDatabase structures thereforFile system structures therefor
  • G06F 16/23 - Updating
  • G06F 16/901 - IndexingData structures thereforStorage structures

87.

Additive independent object modification

      
Application Number 15476609
Grant Number 11474830
Status In Force
Filing Date 2017-03-31
First Publication Date 2017-07-20
Grant Date 2022-10-18
Owner BMC HELIX, INC. (USA)
Inventor
  • Mueller, Douglas
  • Mousseau, Charles

Abstract

Disclosed is a method, a system and a computer readable medium for additive independent object modification. The method includes determining an association between an independent object modification and a base object of a software application, modifying at least one element of the base object based on the associated independent object modification, and configuring the software application to execute in a computer system using the modified base object.

IPC Classes  ?

  • G06F 9/445 - Program loading or initiating
  • G06F 8/71 - Version control Configuration management

88.

Enforcing referential integrity for object data documents

      
Application Number 15476677
Grant Number 10528548
Status In Force
Filing Date 2017-03-31
First Publication Date 2017-07-20
Grant Date 2020-01-07
Owner BMC HELIX, INC. (USA)
Inventor
  • Hutchins, Mark
  • Milousheff, Zack

Abstract

A metadata framework helps enforce referential integrity in object data documents. In one general aspect, a method includes generating a first data definition language statement, based on a class defined in a metadata framework, that creates a table in a relational database system to store an object data document. The table may include at least one column that corresponds to an identifying attribute in the object data document, at least one column that corresponds to a relationship attribute in the object data document, and a column that stores the object data document. The method may also include generating a second data definition language statement, based on the referential integrity metadata framework, that creates a foreign key constraint on the at least one column that corresponds to the relationship attribute when the relationship is not polymorphic, and issuing the first data definition language statement and the second data definition language statement.

IPC Classes  ?

  • G06F 7/00 - Methods or arrangements for processing data by operating upon the order or content of the data handled
  • G06F 16/23 - Updating
  • G06F 16/21 - Design, administration or maintenance of databases
  • G06F 16/28 - Databases characterised by their database models, e.g. relational or object models
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/2455 - Query execution

89.

System and method for resource reconciliation in an enterprise management system

      
Application Number 15476704
Grant Number 10795643
Status In Force
Filing Date 2017-03-31
First Publication Date 2017-07-20
Grant Date 2020-10-06
Owner BMC HELIX, INC. (USA)
Inventor
  • Kumar, Narayan
  • Mueller, Douglas
  • Mayfield, Richard

Abstract

A method to reconcile multiple instances of a single computer resource identified by resource discovery operations includes: (1) accessing information describing one or more resources; (2) identifying, via the accessed information, at least one resource that has been detected or discovered by at least two of the discovery operations; and (3) merging attributes associated with the identified resource from each of the at least two discovery operations into a single, reconciled resource object. Illustrative “resources” include, but are not limited to, computer systems, components of computer systems, data storage systems, switches, routers, memory, software applications (e.g., accounting and database applications), operating systems and business services (e.g., order entry or change management and tracking services).

IPC Classes  ?

  • G06F 7/32 - Merging, i.e. combining data contained in ordered sequence on at least two record carriers to produce a single carrier or set of carriers having all the original data in the ordered sequence
  • G06F 7/20 - Comparing separate sets of record carriers arranged in the same sequence to determine whether at least some of the data in one set is identical with that in the other set or sets
  • G06F 7/14 - Merging, i.e. combining at least two sets of record carriers each arranged in the same ordered sequence to produce a single set having the same ordered sequence
  • G06F 7/36 - Combined merging and sorting
  • G06F 16/22 - IndexingData structures thereforStorage structures
  • G06F 16/2457 - Query processing with adaptation to user needs
  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 7/16 - Combined merging and sorting

90.

Management of annotated location aware assets

      
Application Number 15476528
Grant Number 10788326
Status In Force
Filing Date 2017-03-31
First Publication Date 2017-07-20
Grant Date 2020-09-29
Owner BMC HELIX, INC. (USA)
Inventor
  • Cline, Troy
  • He, Ting
  • Gere, Wesley
  • Graham, Jason L.
  • Behnia, Kia

Abstract

A method includes receiving a map indicating a layout of a location, receiving a point-of-interest (POI) data structure representing a POI, and POI metadata associated with the POI, generating an annotated floor map, based on the map, the annotated floor map including a POI indicator placed on the map at the location of the POI, the POI indicator indicating the type of the POI and the status of the POI, displaying at least a portion of the annotated floor map, in response to the client computing device moving within the location or out of the location, transmitting location information to a map selector and receiving one or more maps selected by the map selector, the one or more maps include or bound by the location information.

IPC Classes  ?

  • G06F 17/00 - Digital computing or data processing equipment or methods, specially adapted for specific functions
  • G01C 21/20 - Instruments for performing navigational calculations
  • G06T 11/20 - Drawing from basic elements, e.g. lines or circles
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]
  • H04W 4/80 - Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
  • G06F 16/24 - Querying
  • G06F 16/29 - Geographical information databases
  • G06F 16/245 - Query processing
  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/021 - Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
  • G06Q 30/02 - MarketingPrice estimation or determinationFundraising
  • G06T 11/60 - Editing figures and textCombining figures or text
  • H04W 4/02 - Services making use of location information
  • H04W 4/029 - Location-based management or tracking services

91.

Using multi-factor context for resolving customer service issues

      
Application Number 15175711
Grant Number 10810600
Status In Force
Filing Date 2016-06-07
First Publication Date 2017-06-22
Grant Date 2020-10-20
Owner BMC HELIX, INC. (USA)
Inventor
  • Adrian, Thomas L.
  • Young, Cedric
  • Adams, Peter
  • Wong, Jek-Sun
  • Chu, Sun Chun
  • Elaprolu, Dinesh
  • Zaik, Brian
  • Mardhekar, Sameer

Abstract

In a general aspect, a system can include a user interface with at least one input field for receiving input associated with an information technology (IT) customer service issue and a response area for displaying results in response to the input. The system can further include a context generation engine that receives the input associated with the IT customer service issue from the user interface and determines, based on the input, a multi-factor context. The system can also include a relevance-based search engine configured to search, based on the multi-factor context, a plurality of resources; assign, based on the multi-factor context, a respective relevancy score to each of the plurality of resources; and provide, to the user interface for display in the results area, a ranked list of a subset of the plurality of resources that is ordered based on the respective relevancy scores of the subset of the resources.

IPC Classes  ?

92.

Behavioral rules discovery for intelligent computing environment administration

      
Application Number 15388382
Grant Number 10692007
Status In Force
Filing Date 2016-12-22
First Publication Date 2017-04-13
Grant Date 2020-06-23
Owner BMC HELIX, INC. (USA)
Inventor
  • Dang, Derek
  • Mitbander, Bharat

Abstract

A management system for determining causal relationships among system entities may include a causal relationship detector configured to receive events from a computing environment having a plurality of entities, and detect causal relationships among the plurality of entities, during runtime of the computing environment, based on the events, and a rules converter configured to convert one or more of the causal relationships into at least one behavioral rule. The at least one behavioral rule may indicate a causal relationship between at least two entities of the plurality of entities.

IPC Classes  ?

  • G06N 5/02 - Knowledge representationSymbolic representation
  • G06N 5/04 - Inference or reasoning models

93.

Application wrapping system and method

      
Application Number 15385216
Grant Number 10133564
Status In Force
Filing Date 2016-12-20
First Publication Date 2017-04-13
Grant Date 2018-11-20
Owner BMC HELIX, INC. (USA)
Inventor
  • Cooper, Adam Charles
  • Thucydides, George
  • Mair, Geoffrey Ross
  • Buxton, Caleb Peter

Abstract

A method of administering a computing system, including a plurality of computing devices. The method includes selecting an application for inclusion in a menu of applications downloadable to a computing device and interposing a wrapper on the application before the computing device downloads the application, the wrapper being configured to control an operation of the application. Interposing the wrapper on the application includes decompiling the application, searching for string patterns, and replacing the string patterns with another string pattern, the another string pattern being configured to intercept at least one of a system event or an Application Programming Interface (API) call and associating logic with the application. The logic is configured to interact with the application via the at least one system event or API call, the logic is configured to provide additional functions to the application, and the logic is stored separate from the application.

IPC Classes  ?

94.

Managing a server template

      
Application Number 15363860
Grant Number 09760396
Status In Force
Filing Date 2016-11-29
First Publication Date 2017-03-23
Grant Date 2017-09-12
Owner BMC HELIX, INC. (USA)
Inventor
  • Apte, Sujit
  • Ghaisas, Abhay

Abstract

A non-transitory computer-readable storage medium may comprise instructions for managing a server template stored thereon. When executed by at least one processor, the instructions may be configured to cause at least one computing system to at least convert the server template to a corresponding virtual machine, manage the corresponding virtual machine, and convert the corresponding virtual machine back into a template format.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/445 - Program loading or initiating

95.

Extensibility of business logic shared across a business process orchestration engine, a rule engine, and a user interface

      
Application Number 14840954
Grant Number 10504064
Status In Force
Filing Date 2015-08-31
First Publication Date 2017-02-23
Grant Date 2019-12-10
Owner BMC HELIX, INC. (USA)
Inventor
  • Rajwade, Abhijit Anirrudha
  • Wong, Steve
  • Shapiro, David Lawrence
  • Gu, Jiayi
  • Gupta, Girish Kumar
  • Sulcer, David T.

Abstract

In one general aspect, a method can include creating an action, the creating including annotating a block of code with metadata, and encapsulating the annotated block of code into a reusable building block of code. The method can further include publishing the action, the publishing including registering the action in a service registry. The method can further include dynamically discovering the action in the service registry by an application during runtime, invoking the action by the application, and executing the action by the application, the executing performing a method specified by the action.

IPC Classes  ?

96.

Capacity risk management for virtual machines

      
Application Number 15335343
Grant Number 10296364
Status In Force
Filing Date 2016-10-26
First Publication Date 2017-02-16
Grant Date 2019-05-21
Owner BMC HELIX, INC. (USA)
Inventor
  • Sivasubramanian, Jeyashree
  • Apte, Sudheer

Abstract

An access data collector collects access assignment data characterizing active access assignment operations of a hypervisor in assigning host computing resources among virtual machines for use in execution of the virtual machines. Then, a capacity risk indicator calculator calculates a capacity risk indicator characterizing a capacity risk of the host computing resources with respect to meeting a prospective capacity demand of the virtual machines, based on the access assignment data.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

97.

Capacity risk management for virtual machines

      
Application Number 15335350
Grant Number 10289440
Status In Force
Filing Date 2016-10-26
First Publication Date 2017-02-16
Grant Date 2019-05-14
Owner BMC HELIX, INC. (USA)
Inventor
  • Sivasubramanian, Jeyashree
  • Apte, Sudheer

Abstract

An access data collector collects access assignment data characterizing active access assignment operations of a hypervisor in assigning host computing resources among virtual machines for use in execution of the virtual machines. Then, a capacity risk indicator calculator calculates a capacity risk indicator characterizing a capacity risk of the host computing resources with respect to meeting a prospective capacity demand of the virtual machines, based on the access assignment data.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

98.

Capacity risk management for virtual machines

      
Application Number 15335349
Grant Number 09983900
Status In Force
Filing Date 2016-10-26
First Publication Date 2017-02-16
Grant Date 2018-05-29
Owner BMC HELIX, INC. (USA)
Inventor
  • Sivasubramanian, Jeyashree
  • Apte, Sudheer

Abstract

An access data collector collects access assignment data characterizing active access assignment operations of a hypervisor in assigning host computing resources among virtual machines for use in execution of the virtual machines. Then, a capacity risk indicator calculator calculates a capacity risk indicator characterizing a capacity risk of the host computing resources with respect to meeting a prospective capacity demand of the virtual machines, based on the access assignment data.

IPC Classes  ?

  • G06F 9/455 - EmulationInterpretationSoftware simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/30 - Monitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

99.

Determining statuses of computer modules

      
Application Number 14750549
Grant Number 10079713
Status In Force
Filing Date 2015-06-25
First Publication Date 2016-12-29
Grant Date 2018-09-18
Owner BMC HELIX, INC. (USA)
Inventor
  • Phadke, Nilesh
  • Phadke, Pallavi

Abstract

A non-transitory computer-readable storage medium may include instructions stored thereon for ranking multiple computer modules to reduce failure impacts. When executed by at least one processor, the instructions may be configured to cause a computing system implementing the multiple computer modules to at least associate the multiple computer modules with multiple services that rely on the multiple computer modules, at least one of the multiple services relying on more than one of the multiple computer modules, determine values of the multiple services, and rank the multiple computer modules based on the determined values of the multiple services with which the respective multiple computer modules are associated.

IPC Classes  ?

  • H04L 12/24 - Arrangements for maintenance or administration
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/00 - Error detectionError correctionMonitoring
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

100.

PATROL

      
Application Number 016187346
Status Registered
Filing Date 2016-12-19
Registration Date 2017-05-15
Owner BMC Helix, Inc. (USA)
NICE Classes  ?
  • 09 - Scientific and electric apparatus and instruments
  • 42 - Scientific, technological and industrial services, research and design

Goods & Services

Computer software; operating system utility computer programs; computer software and programs for managing computer systems, databases and applications, namely providing data management, application management and performance optimization and recovery of mainframe and distributed systems computers and the database and business applications, programs and systems that operate therein; all of the aforesaid goods not being for optical, signalling, checking (supervision) and lifesaving apparatus and instruments, alarms, optical signal transmitter, and acoustic signal transmitter. Software as a service (SaaS) services; software as a service (Saas) services featuring operating system utility computer programs; Software as a service (Saas) services featuring software and programs for managing computer systems, databases and applications, namely providing data management, application management and performance optimization and recovery of mainframe and distributed systems computers and the database and business applications, programs and systems that operate therein; all of the aforesaid services not being for optical, signalling, checking (supervision) and lifesaving apparatus and instruments, alarms, optical signal transmitter, and acoustic signal transmitter.
  1     2     3     4        Next Page