new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Filing Names

Ca Inc
Ca Inc_20131212

Ca Inc patents

Recent patent applications related to Ca Inc. Ca Inc is listed as an Agent/Assignee. Note: Ca Inc may have other listings under different names/spellings. We're not affiliated with Ca Inc, we're just tracking patents.

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Ca Inc-related inventors

Date Ca Inc patents (updated weekly) - BOOKMARK this page
04/27/17 new patent  Ensuring determinism during programmatic replay in a virtual machine
04/27/17 new patent  Lightweight software management shell
04/27/17 new patent  Accessing enterprise communication systems from external networks
04/20/17User interface testing abstraction
04/13/17Mobile application configuration agnostic to operating system versions
04/13/17Subsystem dataset utilizing cloud storage
04/06/17Generating tests for testing software applications
03/30/17Fault tolerant event management system
03/30/17System and providing a virtualized replication and high availability environment
03/30/17Using augmented reality to assist data center operators
03/30/17Fetching vendor specific policy events and corresponding device feature mappings from a policy server at mobile device runtime of a managed application
03/30/17Personal computing device for editing mainframe data
03/23/17Current behavior evaluation with multiple process models
03/23/17Key network entity detection
03/23/17Security authorization for service level agreements
03/23/17Fetching a policy definition library from a policy server at mobile device runtime of an application package to control access to mobile device resources
03/16/17Automated system documentation generation
03/16/17Visualization of transaction overlaps
03/16/17Distributed fault isolation in connected networks
03/16/17Mechanism for building normalized service model to expose web apis
03/16/17Unified-interface for storage provisioning
03/09/17Applying a partial captcha
03/09/17Verification and provisioning of mobile payment applications
03/09/17Proactive infrastructure fault, root cause, and impact management
03/09/17Server public key pinning by url
03/02/17Controlling repetitive check-in of intermediate versions of source code from a developer's computer to a source code repository
03/02/17Wrapped applications providing operational insight to users based on rules for acceptable operational state performance
03/02/17Providing application operational insights to users based on crowd sourced performance metrics for operational states
03/02/17Verification and payment for package delivery
03/02/17Api provider insights collection
03/02/17Data center cable indentification
03/02/17Health metric for an information technology service
03/02/17Restricting access to content based on measurements of user terminal operational performance
03/02/17Alertness based authorization
03/02/17Real time data streaming from a mainframe computer to off platform destinations
03/02/17Controlling display devices to interfere with imaging by mobile terminals
02/23/17Generic test automation for graphical user interface (gui) applications
02/23/17Generic test automation for restful web services applications
02/23/17Grid-based authentication on touch-aware devices
02/23/17Dynamic, proxied reset of user credentials
02/23/17Access control policy selection based upon user classification
02/23/17System, method, and software for providing access control enforcement capabilities in cloud computing systems
02/16/17Method and recommending regression tests
02/16/17Generic test automation for application programming interface applications
02/16/17Anomaly detection and user-context driven authorization request for automatic payments through mobile devices
02/16/17Controlling mobile payment transactions based on risk scores for point-of-sale terminals determined from locations reported by mobile terminals
02/09/17Operations to avoid wrapped mobile application operational errors due to interference from wrapper logic components
02/09/17Capturing unique screenshots
02/09/17Determining transaction risk from similarity of parameters characterizing a user terminal which originated a transaction to a user terminal identified from the transaction
02/09/17Dynamic management of enterprise policies
02/02/17Causal engine and correlation engine based log analyzer
02/02/17Detecting text truncation in a graphical user interface
02/02/17Detecting overlapping web elements in a graphical user interface
02/02/17Streamlined enrollment of credit cards in mobile wallets
02/02/17Determining risk of transactions based on patterns of wireless devices observed by a user terminal
02/02/17Handling errors when transferring data
02/02/17Reachability fault isolation and recovery using asynchronous notifications
02/02/17Enterprise authentication server
01/26/17System and diagnosing information technology systems in multiple virtual parallel universes
01/26/17Executing privileged code in a process
01/26/17Ticket generator for alternate authentication environments
01/12/17Application screen mapping for mobile analytics
01/12/17Routing outputs from jobs submitted on a mainframe system
01/12/17Adding functionality to existing code at exits
01/12/17Dynamic creation of job control language cards
Patent Packs
01/12/17Selecting application wrapper logic components for wrapping a mobile application based on wrapper performance feedback from user electronic devices
01/05/17Detection of application topology changes
01/05/17Detecting operational variances and determining variance intensities
01/05/17Apparatus and graphically displaying transaction logs
01/05/17Alert damage index
12/29/16Automatic discovery of comparable features based on n-gram analysis
12/29/16Selecting application wrapper logic components based on features of a mobile application to be wrapped
12/29/16Methods of running applications on mobile devices including notifications/blocking responsive to resource consumption
12/29/16Tracking health status in software components
12/29/16Debugging using program state definitions
12/29/16Feedback and customization in expert systems for anomaly prediction
12/29/16Efficient management of network configuration-dependent network functionality
12/29/16Normalized software-defined networking interface
12/22/16Secure user input mode for electronic devices using randomized mathematical operators and operands
12/22/16Diagnosing anomalies based on deviation analysis
Patent Packs
12/15/16Identifying data offsets using binary masks
12/15/16Risk-assessment based decision support system for strategic product localization
12/15/16Alternate primary account number generation
12/15/16System and virtual image security in a cloud environment
12/08/16Payment tokenization using format preserving encryption for secure transactions
12/08/16Trusted public infrastructure grid cloud
12/01/16Authorization server access system
11/24/16Interactive log file visualization tool
11/24/16Coverage policy-based testing in computer networks
11/17/16System and providing server application services with high availability and a many-to-one hardware configuration
11/17/16Hierarchical temporal clustering, metric clustering and attribute clustering of electronic terminal reports to identify electronic terminals for analysis
11/10/16Data normalization for internet of things (iot) devices
10/27/16Solution modeling and analysis toolset for enterprise software architecture
10/13/16System and enforcement of security controls on virtual machines throughout life cycle state changes
10/06/16Authenticating a user with a passcode using a passcode entry table
10/06/16Dynamic provision of debuggable program code
10/06/16Effective defect management across multiple code branches
10/06/16Presenting diagnostic headlines using simple linguistic terms
10/06/16Preventing and servicing system errors with event pattern correlation
10/06/16Low-latency lossy processing of machine data
10/06/16Capacity planning for systems with multiprocessor boards
10/06/16Continuously authenticating a user of voice recognition services
10/06/16Collaborative space planning for a data center
10/06/16Authenticating a user with a passcode using a passcode entry table
10/06/16Detecting divergence or convergence of related objects in motion and applying asymmetric rules
10/06/16Dynamic configuration of entity polling using network topology and entity status
10/06/16Hub filtering
10/06/16Discovering and aggregating data from hubs
10/06/16Selectively deploying probes at different resource levels
10/06/16Routing policy impact simulation
Social Network Patent Pack
09/29/16Pseudo-doppler shift three dimensional location mapping
09/29/16Initiating actions on wearable devices
09/29/16Adaptive tour interface engine
09/29/16Editing software products using text mapping files
09/29/16Dynamic adapter design pattern
09/29/16Co-existential wrapping system for mobile applications
09/29/16Transparent and near-real time code deploys
09/29/16Modeling real capacity consumption changes using process-level data
09/29/16Graphical mapping of application programming interface parameters
09/29/16Anomaly classification, analytics and resolution based on annotated event logs
Patent Packs
09/29/16Monitoring environmental parameters associated with computer equipment
09/29/16Virtualization of purpose-built devices
09/29/16Transferring data using a data bridge structure
09/29/16Analysis of mobile application reviews based on content, reviewer credibility, and temporal and geographic clustering
09/29/16Grouping of database objects
09/29/16Analyzing sorted mobile application operational state sequences based on sequence metrics
09/29/16Grouping of database objects
09/29/16Pattern-based password with dynamic shape overlay
09/29/16Secure user input mode for electronic devices using randomized locations of selection indicia
09/29/16Decision making in an elastic interface environment
09/29/16System and method to use multi-factor capacity constraints for product-based release and team planning
09/29/16Payment de-tokenization with risk evaluation for secure transactions
09/29/16Minimized installation of point of presence software agents by use of pre-installed browser
09/29/16Voip route selection using call metrics
09/29/16Privacy preserving limiting communications to targeted recipients using behavior-based categorizing of recipients
09/29/16Payment de-tokenization with risk evaluation for secure transactions
09/22/16Height measurement to verify position of equipment in a data center rack
09/22/16Application performance monitoring using evolving functions
09/22/16Image capture in application lifecycle management for documentation and support
09/22/16Data center floor plan mapping using location-aware device
09/22/16Monitoring space usage in a computer rack
09/22/16System and method to generate a transaction count using filtering
09/22/16Simplified two factor authentication for mobile payments
09/22/16Method of receiving payment confirmation in emv contactless mobile payment
09/22/16System and contactless mobile payment verification
09/22/16System and neutralizing mobile payment
09/22/16System for preventing mobile payment
09/22/16Providing a customer interaction style to a support technician
09/22/16Modleing application performance using evolving functions
09/22/16System and mobile authentication
Patent Packs
09/22/16Response prototypes with robust substitution rules for service virtualization
09/22/16Method and system for automated datacenter floor volume calculation applied to datacenter thermal management
09/15/16Assessing trust of components in systems
09/15/16Automatic wireframing using images
09/15/16Single click in a partially protected cell of a table
09/15/16Machine learning-derived universal connector
09/15/16Selecting resources for automatic modeling using forecast thresholds
09/08/16Self-learning simulation environments
09/08/16Composite virtual services
09/08/16Multi-component and mixed-reality simulation environments
09/08/16Rebuilding an execution flow from an execution grid
09/08/16Self-learning simulation environments
09/08/16Multi-component and mixed-reality simulation environments
09/08/16Anomaly detection based on cluster transitions
08/25/16Automatic modeling of virtual resources with sizing recommendations
08/25/16Authorizations for computing devices to access a protected resource
08/18/16Automated software deployment
08/18/16Pre-distribution of artifacts in software deployments
08/18/16Monitoring ecommerce transactions using transaction metrics statistics for different combinations of transaction attributes and values
08/18/16System and securely transferring payment for an online transaction
Social Network Patent Pack
08/18/16Provide insensitive summary for an encrypted document
08/18/16Intelligent content ghosting on mobile devices
08/18/16Context and environmentally aware notifications on mobile devices
08/11/16Monitoring aspects of organizational culture for improving agility in development teams
08/11/16System and reducing data in a storage system
08/11/16Generating state predictive metrics based on markov chain model from application operational state sequences
08/11/16Secure user input mode using randomized mapping between ordered sets of symbols
08/04/16Load balancing using improved component capacity estimation
08/04/16System and distributing processes stored in a common database
08/04/16Seeding of mobile application management policies
08/04/16Mobile content collaboration with one click multimedia capability
07/28/16Infrastructure performance enhancement with adaptive resource preservation
07/28/16Using patterns and anti-patterns to improve system performance
07/28/16Database virtualization
07/28/16Policy conflict resolution engine for mobile application management
07/21/16Managing distribution and retrieval of security key fragments among proxy storage devices
07/14/16Selective authentication based on similarities of ecommerce transactions from a same user terminal across financial accounts
07/07/16Managing embedded digital signature locations in a stream of data files
07/07/16Virtual service automation
07/07/16Multi-tenancy governance in a cloud computing environment
Social Network Patent Pack
06/30/16Optimized placement of data
06/30/16Virtual chip card payment
06/30/16Alternative account identifier
06/30/16Privileged shared account password sanitation
06/23/16User interface testing abstraction
06/23/16Adapting user terminal advertisements responsive to measured user behavior
06/23/16Controlling reporting by an instrument encapsulation module encapsulating an application program on a user terminal
06/23/16Adapting user terminal application operation responsive to measured user behavior
06/23/16Mobile content management for offline content access
06/16/16Notifying a backup application of a backup key change
06/16/16Supporting multiple backup applications using a single change tracker
06/16/16Monitoring user terminal applications using performance statistics for combinations of different types of reported characteristic dimensions and values
06/16/16Adaptive compression
06/16/16Protected application stack and method and system of utilizing
06/09/16Monitoring and modifying allocated computing resources
06/09/16Collaboration pattern creation by crowdsourcing participants
06/09/16Monitoring user terminal applications using performance statistics for combinations of different reported characteristic dimensions and values
06/09/16Detection of privilege escalation vulnerabilities using bag of words
06/02/16Security for multi-tenant deduplication datastore against other tenants
06/02/16Device identification based on deep fingerprint inspection
05/26/16Prioritizing and distributing workloads between storage resource classes
05/19/16Monitoring overtime of tasks
05/12/16Loading user devices with lists of proximately located broadcast beacons and associated service identifiers
05/05/16Database virtualization
05/05/16Arrangement of native applications on a mobile device user interface based on usage patterns
05/05/16Certification of correct behavior of cloud services using shadow rank
04/28/16Concurrent virtual tape usage
04/28/16Single sign on for native and wrapped web resources on mobile devices
04/28/16Single sign on across multiple devices using a unique machine identification
04/28/16Counter sets for copies of one time password tokens
Social Network Patent Pack
04/21/16System and merging continuous volume snapshots
04/21/16Automatic identity reconciliation using image processing
04/21/16Anomaly detection and alarming based on capacity and placement planning
04/21/16Anomaly detection for access control events
04/21/16Mobile applications incorporating mobile-based transactions detection and monitoring means
04/14/16User interface testing abstraction
04/14/16Partitioning log records based on term frequency and type for selective skipping during full-text searching
04/14/16Evaluating productivity costs of enterprise mobility management (emm) tools based on mobile device metrics
04/07/16Methods for enabling mobile payments
03/24/16Stratified sampling of log records for approximate full-text search
03/24/16Correcting resource descriptive framework statements based on similarity of terms to web ontology
03/17/16Authentication of api-based endpoints
03/17/16Transformation rules for one-time passwords
03/17/16Productive spend metric based resource management for a portfolio of distributed computing systems
03/17/16Crowdsourcing-based detection, identification, and tracking of electronic devices
03/10/16Batch processed data structures in a log repository referencing a template repository and an attribute repository
03/03/16Automated instrumentation of applications
03/03/16State based adaptive compression of performance traces
03/03/16Identifying a cloud service using network traffic and other data
03/03/16Identifying a cloud service using machine learning and online data
02/25/16Pre-join tags for entity-relationship modeling of databases
02/25/16Service broker for service-oriented architecture
02/11/16Identifying unauthorized changes to network elements and determining the impact of unauthorized changes to network elements on network services
02/04/16Indexing and searching log records using templates index and attributes index
02/04/16Broadcasting incident resolution information to service desk staff members
02/04/16Accessing network services from external networks
02/04/16Accessing enterprise communication systems from external networks
01/28/16Personalized wiki-book annotation
01/28/16Identifying objects in an image using coded reference identifiers

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Ca Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Ca Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by