Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Filing Names

Ca Inc
Ca Inc_20131212

Ca Inc patents

Recent patent applications related to Ca Inc. Ca Inc is listed as an Agent/Assignee. Note: Ca Inc may have other listings under different names/spellings. We're not affiliated with Ca Inc, we're just tracking patents.

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Ca Inc-related inventors

Date Ca Inc patents (updated weekly) - BOOKMARK this page
10/19/17 new patent  Transferring data using a data bridge structure
10/05/17Establishing convergence points and determining time to convergence of related objects in motion
10/05/17Policy-based convergence point recommendations for convoys
10/05/17Creating, updating, sharing, managing, and monitoring a plurality of independent interactive system productivity facility (ispf) windows
10/05/17Visual modification and training of an anomaly detection image
10/05/17Multi-perspective application components dependencies
10/05/17Interface definition language compiler with version reconciliation
10/05/17Identifying and correlating semantic bias for code evaluation
10/05/17Java-based offload service in a mainframe environment
10/05/17Graph-enhanced event management
10/05/17Unified interface for development and testing of deployment resource architecture
10/05/17Virtual service localization
10/05/17Virtual service data set generation
10/05/17Transaction stitching definitions
10/05/17Automated model generation for a software system
10/05/17Transactional boundaries for virtualization within a software system
10/05/17Mainframe index database to supplement a system catalog
10/05/17Prevention of shoulder surfing
10/05/17Visual generation of an anomaly detection image
10/05/17Environment manager for continuous deployment
10/05/17Scenario coverage in test generation
10/05/17Delegating a reverse proxy session to its instantiating portlet session
10/05/17Geographically based access management for internet of things device data
09/28/17Effective defect management across multiple code branches
09/28/17Identification of distinguishable anomalies extracted from real time data streams
09/28/17Data boundary identification for identifying variable size data chunks
09/28/17Identification of distinguishing compound features extracted from real time data streams
09/28/17Providing data privacy in computer networks using personally identifiable information by inference control
09/28/17Queueing construct for x.509 digital certificates
09/28/17Short term or one-time-use x.509 digital certificates
09/28/17Context graph augmentation
09/28/17Fault detection of service chains in a sdn/nfv network environment
09/28/17Context graph generation
09/28/17Deploying a service from a selected cloud service provider based on an evaluation of migration ability using graph analytics
09/28/17Synchronized issuance of public x.509 digital certificates
09/28/17Synchronized issuance of public x.509 digital certificates
09/28/17Provisioning of network services based on virtual network function performance characteristics
09/21/17Efficient application feedback collection
09/21/17Generating a directed graph representing application program execution flow from an execution trace
09/21/17Escalation prediction based on timed state machines
09/21/17Document analysis system that uses machine learning to predict subject matter evolution of document content
09/21/17Method and repairing policies
09/21/17Proactive fault detection and diagnostics for networked node transaction events
09/21/17Systems and methods for monitoring servers for overloading conditions
09/21/17Identity authentication migration between different authentication systems
09/21/17Generation of application control blocks for an ims database using a cache memory
09/14/17Discriminating dynamic connection of disconnectable peripherals
09/14/17Infrastructure management system having scalable storage architecture
09/14/17Providing multi-factor security for electronic devices through body area network and radiofrequency network communications
09/14/17Coordinated thing-sourcing in an internet of things
09/14/17Method and discovering network devices
09/07/17Enhancement to customer feedback systems
08/31/17Hierarchical identifiers for html elements
08/31/17One-time use password systems and methods
08/24/17Maintaining database referential integrity using different primary and foreign key values
08/24/17Dynamic data collection profile configuration
08/17/17Touch-input display devices with force measurement using piezoelectric pillars
08/17/17Software application quality assessment
08/17/17Automatic data exchange between peer devices
08/10/17Automatic natural language processing based data extraction
08/10/17Anonymous messaging in an instant message group conversation
08/10/17Automated data risk assessment
08/03/17Weight adjusted dynamic task propagation
08/03/17Workload control in a workload scheduling system
08/03/17Debugging in-cloud distributed code in live load environment
Patent Packs
08/03/17Unified data model for integration between relational and non-relational databases
08/03/17Delegated authentication in an internet of things (iot) network
07/27/17Protection of confidential data being displayed or input in a mobile device
07/27/17Network device authentication based on hashing content of sequential messages
07/20/17Dynamic release baselines in a continuous delivery environment
07/20/17Dynamic release baselines in a continuous delivery environment
07/13/17Transaction flow visualization
07/13/17Transactional boundaries for software system profiling
07/13/17Transactional boundaries for software system debugging
07/13/17Graphical transaction model
07/13/17Transaction flow visualization
07/13/17Transaction flow visualization
07/13/17Restricting account use by controlled replenishment
07/13/17Interactive graphical user interface (gui) for managing sites
07/06/17Dynamic web page navigation
Patent Packs
07/06/17User authentication based on time variant fingerprint sequences
07/06/17Identity-to-account correlation and synchronization
06/29/17Event chain detection
06/29/17Detecting flapping in resource measurements
06/29/17Mobile near field communication payment for banking activities from an automated teller machine
06/29/17Methods and authenticating and authorizing secondary accounts
06/29/17Magnitude based alarm flap detection
06/29/17Configuring distributed monitoring systems
06/29/17System and customizing standard device-orientated services within a high scale deployment
06/29/17Data translation using a proxy service
06/22/17Dynamic virtual service
06/22/17Pattern password with variable hint pattern
06/22/17Parameter-mapped one-time passwords (otp) for authentication and authorization
06/22/17Alarm to event tracing
06/22/17Identification of networking component application programming interfaces
06/22/17Multi-factor user authentication based on user credentials and entry timing
06/22/17System and managing virtual hard disks in cloud environments
06/22/17Multi-factor user authentication based on decoy security questions
06/08/17Periodic data replication
06/08/17Ensuring determinism during programmatic replay in a virtual machine
06/08/17Annotations management for electronic documents handling
06/08/17Document handling using triple identifier
06/08/17Generating a graphical user interface from performance data
06/08/17Event-triggered, graph-centric predictive cache priming
05/25/17Method and system for determining logging statement code coverage
05/18/17Pattern analytics for real-time detection of known significant pattern signatures
05/18/17Using machine learning to predict big data environment performance
05/18/17Pattern analytics for real-time detection of known significant pattern signatures
05/11/17Role based configuration and management tool based on snmp and ldap
05/11/17Copy and paste between devices
Social Network Patent Pack
05/04/17Enhanced metadata tracking in a change management system
05/04/17Display window contextual visualization for application performance monitoring
05/04/17Selecting a flow data source
05/04/17Separation of lot network thing identification data at a network edge device
05/04/17Rule organization for efficient transaction pattern matching
05/04/17Intelligent edge device for filtering internet of things (iot) data
04/27/17Ensuring determinism during programmatic replay in a virtual machine
04/27/17Lightweight software management shell
04/27/17Accessing enterprise communication systems from external networks
04/20/17User interface testing abstraction
Patent Packs
04/13/17Mobile application configuration agnostic to operating system versions
04/13/17Subsystem dataset utilizing cloud storage
04/06/17Generating tests for testing software applications
03/30/17Fault tolerant event management system
03/30/17System and providing a virtualized replication and high availability environment
03/30/17Using augmented reality to assist data center operators
03/30/17Fetching vendor specific policy events and corresponding device feature mappings from a policy server at mobile device runtime of a managed application
03/30/17Personal computing device for editing mainframe data
03/23/17Current behavior evaluation with multiple process models
03/23/17Key network entity detection
03/23/17Security authorization for service level agreements
03/23/17Fetching a policy definition library from a policy server at mobile device runtime of an application package to control access to mobile device resources
03/16/17Automated system documentation generation
03/16/17Visualization of transaction overlaps
03/16/17Distributed fault isolation in connected networks
03/16/17Mechanism for building normalized service model to expose web apis
03/16/17Unified-interface for storage provisioning
03/09/17Applying a partial captcha
03/09/17Verification and provisioning of mobile payment applications
03/09/17Proactive infrastructure fault, root cause, and impact management
03/09/17Server public key pinning by url
03/02/17Controlling repetitive check-in of intermediate versions of source code from a developer's computer to a source code repository
03/02/17Wrapped applications providing operational insight to users based on rules for acceptable operational state performance
03/02/17Providing application operational insights to users based on crowd sourced performance metrics for operational states
03/02/17Verification and payment for package delivery
03/02/17Api provider insights collection
03/02/17Data center cable indentification
03/02/17Health metric for an information technology service
03/02/17Restricting access to content based on measurements of user terminal operational performance
03/02/17Alertness based authorization
Patent Packs
03/02/17Real time data streaming from a mainframe computer to off platform destinations
03/02/17Controlling display devices to interfere with imaging by mobile terminals
02/23/17Generic test automation for graphical user interface (gui) applications
02/23/17Generic test automation for restful web services applications
02/23/17Grid-based authentication on touch-aware devices
02/23/17Dynamic, proxied reset of user credentials
02/23/17Access control policy selection based upon user classification
02/23/17System, method, and software for providing access control enforcement capabilities in cloud computing systems
02/16/17Method and recommending regression tests
02/16/17Generic test automation for application programming interface applications
02/16/17Anomaly detection and user-context driven authorization request for automatic payments through mobile devices
02/16/17Controlling mobile payment transactions based on risk scores for point-of-sale terminals determined from locations reported by mobile terminals
02/09/17Operations to avoid wrapped mobile application operational errors due to interference from wrapper logic components
02/09/17Capturing unique screenshots
02/09/17Determining transaction risk from similarity of parameters characterizing a user terminal which originated a transaction to a user terminal identified from the transaction
02/09/17Dynamic management of enterprise policies
02/02/17Causal engine and correlation engine based log analyzer
02/02/17Detecting text truncation in a graphical user interface
02/02/17Detecting overlapping web elements in a graphical user interface
02/02/17Streamlined enrollment of credit cards in mobile wallets
Social Network Patent Pack
02/02/17Determining risk of transactions based on patterns of wireless devices observed by a user terminal
02/02/17Handling errors when transferring data
02/02/17Reachability fault isolation and recovery using asynchronous notifications
02/02/17Enterprise authentication server
01/26/17System and diagnosing information technology systems in multiple virtual parallel universes
01/26/17Executing privileged code in a process
01/26/17Ticket generator for alternate authentication environments
01/12/17Application screen mapping for mobile analytics
01/12/17Routing outputs from jobs submitted on a mainframe system
01/12/17Adding functionality to existing code at exits
01/12/17Dynamic creation of job control language cards
01/12/17Selecting application wrapper logic components for wrapping a mobile application based on wrapper performance feedback from user electronic devices
01/05/17Detection of application topology changes
01/05/17Detecting operational variances and determining variance intensities
01/05/17Apparatus and graphically displaying transaction logs
01/05/17Alert damage index
12/29/16Automatic discovery of comparable features based on n-gram analysis
12/29/16Selecting application wrapper logic components based on features of a mobile application to be wrapped
12/29/16Methods of running applications on mobile devices including notifications/blocking responsive to resource consumption
12/29/16Tracking health status in software components
Social Network Patent Pack
12/29/16Debugging using program state definitions
12/29/16Feedback and customization in expert systems for anomaly prediction
12/29/16Efficient management of network configuration-dependent network functionality
12/29/16Normalized software-defined networking interface
12/22/16Secure user input mode for electronic devices using randomized mathematical operators and operands
12/22/16Diagnosing anomalies based on deviation analysis
12/15/16Identifying data offsets using binary masks
12/15/16Risk-assessment based decision support system for strategic product localization
12/15/16Alternate primary account number generation
12/15/16System and virtual image security in a cloud environment
12/08/16Payment tokenization using format preserving encryption for secure transactions
12/08/16Trusted public infrastructure grid cloud
12/01/16Authorization server access system
11/24/16Interactive log file visualization tool
11/24/16Coverage policy-based testing in computer networks
11/17/16System and providing server application services with high availability and a many-to-one hardware configuration
11/17/16Hierarchical temporal clustering, metric clustering and attribute clustering of electronic terminal reports to identify electronic terminals for analysis
11/10/16Data normalization for internet of things (iot) devices
10/27/16Solution modeling and analysis toolset for enterprise software architecture
10/13/16System and enforcement of security controls on virtual machines throughout life cycle state changes
10/06/16Authenticating a user with a passcode using a passcode entry table
10/06/16Dynamic provision of debuggable program code
10/06/16Effective defect management across multiple code branches
10/06/16Presenting diagnostic headlines using simple linguistic terms
10/06/16Preventing and servicing system errors with event pattern correlation
10/06/16Low-latency lossy processing of machine data
10/06/16Capacity planning for systems with multiprocessor boards
10/06/16Continuously authenticating a user of voice recognition services
10/06/16Collaborative space planning for a data center
10/06/16Authenticating a user with a passcode using a passcode entry table
Social Network Patent Pack
10/06/16Detecting divergence or convergence of related objects in motion and applying asymmetric rules
10/06/16Dynamic configuration of entity polling using network topology and entity status
10/06/16Hub filtering
10/06/16Discovering and aggregating data from hubs
10/06/16Selectively deploying probes at different resource levels
10/06/16Routing policy impact simulation
09/29/16Pseudo-doppler shift three dimensional location mapping
09/29/16Initiating actions on wearable devices
09/29/16Adaptive tour interface engine
09/29/16Editing software products using text mapping files
09/29/16Dynamic adapter design pattern
09/29/16Co-existential wrapping system for mobile applications
09/29/16Transparent and near-real time code deploys
09/29/16Modeling real capacity consumption changes using process-level data
09/29/16Graphical mapping of application programming interface parameters
09/29/16Anomaly classification, analytics and resolution based on annotated event logs
09/29/16Monitoring environmental parameters associated with computer equipment
09/29/16Virtualization of purpose-built devices
09/29/16Transferring data using a data bridge structure
09/29/16Analysis of mobile application reviews based on content, reviewer credibility, and temporal and geographic clustering
09/29/16Grouping of database objects
09/29/16Analyzing sorted mobile application operational state sequences based on sequence metrics
09/29/16Grouping of database objects
09/29/16Pattern-based password with dynamic shape overlay
09/29/16Secure user input mode for electronic devices using randomized locations of selection indicia
09/29/16Decision making in an elastic interface environment
09/29/16System and method to use multi-factor capacity constraints for product-based release and team planning
09/29/16Payment de-tokenization with risk evaluation for secure transactions
09/29/16Minimized installation of point of presence software agents by use of pre-installed browser

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Ca Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Ca Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by