Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Similar
Filing Names

Ca Inc
Ca Inc_20131212

Ca Inc patents


Recent patent applications related to Ca Inc. Ca Inc is listed as an Agent/Assignee. Note: Ca Inc may have other listings under different names/spellings. We're not affiliated with Ca Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "C" | Ca Inc-related inventors


Intelligent replication factor tuning based on predicted scheduling

A replication factor tuner can use historical data about previous runs of compute jobs to predict execution time periods for jobs scheduled to run in a distributed system, which implements a software framework that utilizes data locality for parallelization of jobs or tasks of the jobs. The replication factor tuner... Ca Inc

Secondary authentication using user's login status

A method is described for storing a plurality of access tokens, each access token associated with a respective login credential of a plurality of login credentials, and each access token usable to access a respective account of a plurality of accounts of a user. The method further comprising receiving a... Ca Inc

Application-type independent dynamic plug-in evaluation tool

The plug-in tool is a generic and flexible application that can run plug-ins of different types. The plug-in tool allows modifications to the plug-in, its input(s) and/or output(s) without restarting the plug-in tool. The plug-in definition contains information about the plug-in inputs and outputs (e.g., type, syntax, etc.), allowing for... Ca Inc

Microservices version state visualization

In one embodiment, configuration information for a microservices application is obtained, the microservices application comprising a plurality of microservice containers, and the configuration information comprising version information for each of the plurality of microservice containers. A graphical representation of the microservices application is displayed, wherein the graphical representation of the... Ca Inc

Container image management using layer deltas

In one embodiment, a request for an updated version of a container image may be received from a client device, the request comprising an identification of a previous version of the container image. A delta may be determined between container layers of the previous version of the container image and... Ca Inc

Microservices application configuration based on runtime environment

In one embodiment, a microservice container of a microservices application may be launched. The runtime environment of the microservices application may be monitored to identify one or more microservice resources to configure for the microservices application. A microservice resource to configure for the microservices application may be identified based on... Ca Inc

Data validation across monitoring systems

A data validation system receives sets of performance metrics captured by a first monitoring system and a second monitoring system that are monitoring the same components within a data center. The data validation system pairs each set of performance metrics from the first monitoring system to a set of performance... Ca Inc

Controlling access to computer accounts managed by a computer account server to provide handoff to a nominee computer terminal

A computer account server receives a nominee identity from an account owner associated with owner access credentials. The nominee identity is stored in a data structure of a computer account that is selected based on the owner access credentials. Electronic access to information stored in the data structure is then... Ca Inc

Increasing precision of a process model with loops

A process model can be modified to be more precise by unrolling loops of the process model and evaluating or using the process model with the loops unrolled. After determining loops in a process model, sequential forward path executions of each loop identified in an input process model are counted... Ca Inc

Collaboration notification of development based on artifact analysis

Based on creation or assignment of a first artifact for a collaborative product development in an enterprise, identifying first text in the first artifact is identified. For each of a plurality of stored artifacts of the enterprise, a determination is made of whether the stored artifact includes a second text... Ca Inc

Determining the quality of a capacity projection from a computing system capacity management product

Some embodiments disclosed herein are directed to a capacity management node having a processor and a memory coupled to the processor and comprising computer readable program code that when executed by the processor causes the processor to perform operations including determining, using historical metric data that is used to determine... Ca Inc

Bot detection based on divergence and variance

A system automatically detects bots and/or botnets.... Ca Inc

Bot detection system based on deep learning

A system automatically detects bots and/or botnets.... Ca Inc

Bot detection based on behavior analytics

A system automatically detects bots and/or botnets.... Ca Inc

Authorization techniques for fund sharing between accounts

Techniques are disclosed relating to authorization of asset sharing between user accounts. In some embodiments, a server-side method includes storing account information for a first user account and receiving a first request to share funds from the first user account with a second user account. In some embodiments, the first... Ca Inc

Distinguishing human-generated input from programmatically-generated input

Provided is a process, including: sending, via a first channel, to a client computing device, a challenge of a test to determine whether a human or a computer is generating input; receiving, via a second channel, a response to the challenge, wherein the second channel and the first channel are... Ca Inc

Visualization of security entitlement relationships to identify security patterns and risks

A visualization depicting visual relationships between identities and entitlements is provided by a visualization device to enable patterns corresponding to the relationships to be readily identifiable. Initially, data comprising identities and entitlements is received and utilized to create the visualization. The visualization is optimized to depict potential risks associated with... Ca Inc

Co-existential wrapping system for mobile applications

A computer program product according to some embodiments causes a processor to perform operations including disassembling executable code of an application program to provide disassembled code, identifying first wrapping code in the disassembled code, receiving second wrapping code, generating a consolidated application wrapper that manages operation of both the first... Ca Inc

Reservation of hardware resources in a computer system based on utilization measurements during time ranges

A resource management computer node obtains hardware utilization values measured for a hardware resource of a computer system being used by a software application. For a set of the utilization values that were measured during a same time-of-day range on a same day of week, the node determines a count... Ca Inc

Data center monitoring based on electromagnetic wave detection

A non-intrusive system which monitors a data center by detecting electromagnetic waves alleviates a resource burden on components and is inexpensive to deploy and scale within a data center. The system detects waves using omnidirectional antennas positioned throughout the data center, thus alleviating the need to physically attach directional antennas... Ca Inc

Merging file storage directory structures through user interface visualization of refactoring decisions

Representations of hierarchical structures identified by source and target file storage directories are displayed on a display device. Inconsistencies are identified between the hierarchical structures identified by the source and target file storage directories. Graphical interconnections are displayed that extend at least partially between locations of at least some of... Ca Inc

Automated correlation and deduplication of identities

An automated correlation and deduplication of identities process enables a single identity to be utilized across the enterprise for a user. During a user enrollment process, a requesting system captures user attributes. The requesting system sends a message with a portion of the attributes across a message bus that other... Ca Inc

System and generating system testing data

A method includes providing a hierarchy of pattern definitions, wherein each pattern definition in the hierarchy of pattern definitions is associated with a parameter that is used to simulate operation of a computer system, and wherein each pattern definition in the hierarchy of pattern definitions comprises at least a value... Ca Inc

Publicly readable blockchain registry of personally identifiable information breaches

A registry is utilized to identify personally identifiable information (PII) that has been breached. The registry is a distributed database shared by multiple organizations to track which PII has been breached in other organizations. A first service provider initially receives PII and corresponding signed descriptor from a user. The PII... Ca Inc

Identifying user equipment using tuple of browser type and elapsed hash time for challenge data set

A historical repository of UE identifiers associated with sets of prior mean values and prior standard deviation values, is maintained. A browser request message is received from a web browser on a suspect UE and requests access to an electronic resource. An identification challenge message is sent toward the web... Ca Inc

Detecting and mitigating wardriving

Determining the physical location of wirelessly connected devices within a network can provide a number of security benefits. However, manually determining and configuring the physical location of each device within a system can be burdensome. To ease this burden, devices within a network are equipped with a location detection sensor... Ca Inc

Password breach registry

A password breach registry is utilized to secure a service provided by a service provider. The password breach registry is a publicly accessible registry and includes password tokens written by breached service providers. The password tokens indicate passwords used to access breached service providers that may have been breached. A... Ca Inc

Assigning client virtual machines based on location

Provisioning virtual machines can include receiving a first request from an administrator or a first client device associated with a user, the request comprising information related to provisioning one of a plurality of virtual machines, and wherein the first request comprises a first location of the first client device. In... Ca Inc

Networked device management data collection

A data collection workflow architecture can streamline data collection from a heterogeneous network and leverage plug-ins of various technologies for data collection from the heterogeneous network. The data collection workflow architecture uses a workflow definition which is an abstracted series of data collection tasks. The workflow definition expresses the data... Ca Inc

Mapping devices to a physical space

Determining the physical location of wirelessly connected devices within a network can provide a number of security benefits. However, manually determining and configuring the physical location of each device within a system can be burdensome. To ease this burden, devices within a network are equipped with a location detection sensor... Ca Inc

Performance metric contextualization in a distributed computing environment

Embodiments provide contextualization for collecting performance metrics of various application components based on values of attributes of an incoming request (a calling context). This contextualization is not limited to the highest level of the application stack. Rather, this contextualization based on attributes' values of an incoming request can be carried... Ca Inc

Performance metric contextualization in a distributed computing environment

In response to executing a first application component of a distributed application stack to process a first request to perform a first transaction received at a first device hosting the first application component and a second application component, operations are performed. The operations include determining a first context defining a... Ca Inc

Data collection and estimation using an internet of things

A thing-sourcing project request including requirements for a thing-sourcing task that requires data input by a thing-sourcing device is received from a requestor device. A determination is made if real-time data is needed in order to complete the thing-sourcing task. In response to determining that real-time data is not needed,... Ca Inc

Maintaining distributed state among stateless service clients

Techniques for managing distributed state for stateless transactions are disclosed herein. In some embodiments a distributed state manager detects a state-changing event that corresponds to a stateless transaction between a node and an application server. The stateless transaction is generated from a first instance of an application that is executing... Ca Inc

System and synthetic ideation

A method includes receiving product data relating to a first computer software product, selecting from the product data a set of epics that describe functional aspects of the first computer software product, and generating a product description ontology of the first computer software product from the selected set of epics.... Ca Inc

02/15/18 / #20180048516

Management system cross domain connectivity discovery

Techniques for determining target system connectivity between service domains are disclosed herein. For each of multiple service domains configured as a distributed management system, a discovery unit identifies subnets having at least one target system component within the service domain. The discovery unit determines from among the identified subnets, subnets... Ca Inc

02/08/18 / #20180041509

Unique device authentication via a browser

Techniques are disclosed relating to unique device authentication via browser. In one embodiment, a server computer system receives, from a browser program executing on a client computer system, a request to authenticate to a private network. The server computer system causes a script to be downloaded to the client computer... Ca Inc

02/01/18 / #20180031371

Location detection sensors for physical devices

Determining the physical location of wirelessly connected devices within a network can provide a number of security benefits. However, manually determining and configuring the physical location of each device within a system can be burdensome. To ease this burden, devices within a network are equipped with a location detection sensor... Ca Inc

02/01/18 / #20180032180

Touch-input display devices with force measurement using piezoelectric pillars

A touch-input display device includes a substrate, piezoelectric pillars that are on and extend away from a surface of the substrate, and light emitter devices each coupled to a different one of the piezoelectric pillars. The substrate has power lines and signal lines. The piezoelectric pillars are electrically isolated from... Ca Inc

02/01/18 / #20180032358

Cross-address space offloading of multiple class work items

A JVM can be used for secure and efficient processing of work items from different processors for a mainframe environment. The JVM provides the infrastructure that allows a hierarchy of Java programs to run within the JVM to efficiently manage work items placed within the JVM address space. A work... Ca Inc

02/01/18 / #20180032364

System and isolated virtual image and appliance communication within a cloud environment

Provided herein are systems and methods for providing isolated virtual image communication in a virtual computing environment. Initially, a guest virtual machine that is activated in a virtual computing environment may be isolated into a private network. A service request may then be formulated at the guest virtual machine and... Ca Inc

02/01/18 / #20180032563

Merging filtered out anomaly data with normal data from device polling

For each of a plurality of time intervals over which metric data is collected from periodic polling of a network of devices, a determination is made of whether metric data of the time interval satisfies a criterion for normal data values defined for a metric corresponding to the metric data.... Ca Inc

02/01/18 / #20180032874

Document analysis system that uses process mining techniques to classify conversations

A method includes performing, by a processor: receiving a first document, the first document comprising a first plurality of sub-documents that are related to one another in a first time sequence; converting the first plurality of sub-documents to a vector format to generate a vectorized document that encodes a probability... Ca Inc

02/01/18 / #20180032929

Risk-adaptive agile software development

Techniques are disclosed herein for implementing risk-adaptive system development. A model generator generates a displayed system model comprising displayed system components. A cycle generator determines a risk management cycle comprising a multiple risk management phases. The cycle generator generates a displayed risk management interface which includes multiple displayed risk management... Ca Inc

01/25/18 / #20180025344

Communicating authentication information between mobile devices

Techniques are disclosed relating to authentication for user transactions. In some embodiments, a first device of the user provides an option for the user to transfer payment and device signature information to a second device of the user. The second device, in some embodiments, then uses the payment information for... Ca Inc

01/25/18 / #20180025361

Database management methods, systems, and devices for identifying related customer support tickets

A network device associated with a database management system receives information associated with a customer support ticket. Based on information in the database management system, a direct relationship between the received customer support ticket and a customer support ticket in the database may be determined. A graph including nodes representing... Ca Inc

01/25/18 / #20180026962

Tokenized account information with integrated authentication

Techniques are disclosed relating to tokenized account information with integrated authentication. In some embodiments, a shared secret key is used for tokenization and authentication. In some embodiments, a payment device stores an encrypted version of the secret key and decrypts the secret key based on a user-provided password. In some... Ca Inc

01/18/18 / #20180018251

Display window contextual visualization for application performance monitoring

A method and system for displaying application performance data. In an embodiment, performance data is collected from an application during display by the application of a first display window. Performance data is also collected from the application during display by the application of a second display window. On a display... Ca Inc

01/18/18 / #20180018657

Mobile terminals providing secure user interfaces

A mobile terminal performs operations that include receiving an authentic account identifier through a user interface from a user. Responsive to a request to enroll an account in a mobile wallet application executed by the processor of the mobile terminal, an enrollment request message is communicated via a network interface... Ca Inc

01/18/18 / #20180020074

Test proxy between client applications and web services

A client request originating from a client device and destined for a server via a network is intercepted. The server is configured to perform a service in response to the client request. A determination is made of whether the request action and the request resource of the client request matches... Ca Inc

01/11/18 / #20180012012

System and controlling state tokens

The system and method for controlling state tokens described herein may secure sensitive application state tokens, link one application state token to other state tokens that represent certain identities or communication sessions, and maintain application state tokens to integrate various different systems or applications. In particular, the system and method... Ca Inc

01/11/18 / #20180012134

Identifying computer devices based on machine effective speed calibration

A historical repository of device identifiers associated with sets of prior mean values and prior standard deviation values, is maintained. A device identification message is received from a suspect computer device and contains a device identifier and a measured device signature value. A mean value and a standard deviation value... Ca Inc

01/04/18 / #20180005235

Electronic transaction risk assessment based on digital identifier trust evaluation

For a comprehensive view of the parties involved in a transaction, a transaction risk assessment system can collect and persist digital credentials of entities' involved in a requested electronic transaction. With the entity credentials, the transaction risk assessment system performs an on-demand risk analysis of the requested electronic transaction based,... Ca Inc

01/04/18 / #20180006871

Serving channelized interactive data collection requests from cache

Expressions to calculate values from data collection can often involve additional data collection queries causing duplicate requests for SNMP data collection. The duplicate requests can lead to increased latency or even data loss as SNMP data collection requests are throttled in a network. To eliminate duplicate requests, data collection channels... Ca Inc

01/04/18 / #20180006873

Variable snmp data collection with embedded queries

Although MIB extensions allow for access to a rich dataset about a variety of SNMP-enabled devices, utilizing the rich dataset for various management tasks can involve collection of a vast amount of data from an SNMP-enabled device. For instance, a network management system may collect several tables of utilization data... Ca Inc

12/28/17 / #20170372081

Executing privileged code in a process

A system and method for executing privileged code in a process are described. The method includes establishing, by an authorized library, a privileged function. The privileged function has a first privilege level used by a processor that is executing the privileged function, while preserving a different privilege level for a... Ca Inc

12/28/17 / #20170372212

Model based root cause analysis

A root cause analysis system utilizes ACs corresponding to component types in a network to construct a diagnosis model. The system generates the ACs based on component models for each component type in the network and may perform offline evaluation of the ACs using determined conditional probabilities and potential state... Ca Inc

12/28/17 / #20170373957

Minimized installation of point of presence software agents by use of pre-installed browser

A multi-device data processing machine system includes a plurality of network-connected cliental servers and an SaaS server that is configured to download by way of the network to the cliental servers of web pages having browser-executable code, the browser-executable code being configured to automatically repeatedly monitor performance attributes of respective... Ca Inc

12/21/17 / #20170366553

Restricting access to content based on a posterior probability that a terminal signature was received from a previously unseen computer terminal

A method by a content server includes maintaining a historical repository of terminal signature tuples received from computer terminals. Each of the terminal signature tuples contains a terminal identifier for a computer terminal and a terminal signature characterizing a measured operation by the computer terminal. An access request message is... Ca Inc

12/21/17 / #20170366977

Geographically based access management for internet of things device data

The proliferation of TOT devices has led to an increase in sensitive, cloud-stored data. To provide further protection, TOT device data may be secured by geographically based access controls as a supplement to or in place of traditional password protection. A geographically based access control restricts data accessibility to designated... Ca Inc

12/14/17 / #20170357569

System and automatic root cause detection

A system, method, and computer-readable storage medium are provided to automatically detect a root cause for an error that occurred during execution of functionality in a system. When a request is executed, a log associated with the execution of the request may be stored at the storage. The log may... Ca Inc

12/07/17 / #20170353470

Password setup management

A technique is disclosed to manage password setup such as may be integrated within a login authentication setup process. In response to an initiated password setup process associated with an active client account, a password manager determines whether at least two functional keyboard layouts are associated with the active client... Ca Inc

11/30/17 / #20170346842

Ordered correction of application based on dependency topology

For each event detected during execution of a monitored application comprising a plurality of application components, a determination is made of which of the plurality of application components corresponds to the detected event. Also, a dependency subgroup that includes the application component that corresponds to the detected event is identified,... Ca Inc

11/23/17 / #20170337044

Composite virtual services

Composite virtual service models can be defined to model various business transactions. A request of a particular component in a first transaction is identified and a composite virtual service model can be identified that corresponds to the particular component. The composite virtual service model models a plurality of transactions comprising... Ca Inc

11/16/17 / #20170329944

Two-way authentication in single password with agent

Systems and methods for enabling user authentication using a first computing device (e.g., a tablet computer) for providing user credentials including an obfuscated password to an application server for authenticating the user credentials and a second computing device different from the first computing device (e.g., a mobile phone) for generating... Ca Inc

Patent Packs
11/09/17 / #20170324734

Computer security based on mouse device speed setting authentication

A method of performing operations by a processor of a computer terminal, includes determining an operation system (OS) speed scaling gain used by the OS to transform mouse movement data, which is received from a mouse device via a device interface circuit, into mouse speed data that controls positioning of... Ca Inc

11/02/17 / #20170315795

Monitoring containerized applications

Methods and systems for monitoring containerized applications are disclosed herein. In one aspect, a containerized application that includes application program instructions and application runtime environment components is installed within an application server. An application manager determines an operational configuration of the containerized application within the application server. The application manager... Ca Inc

11/02/17 / #20170317899

Using traffic data to determine network topology

A network topology may be determined based on flow data exported from a network. A topology generator analyzes flow data and determines a topology based on devices and connections between the devices indicated in the flow data. The topology generator may also infer types of the devices based on communication... Ca Inc

10/26/17 / #20170310683

Computer security based on hierarchical cache latency signature authentication

A processor is coupled to a hierarchical memory structure which includes a plurality of levels of cache memories that hierarchically cache data that is read by the processor from a main memory. The processor is integrated within a computer terminal. The processor performs operations that include generating a hierarchical cache... Ca Inc

10/19/17 / #20170300501

Transferring data using a data bridge structure

A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first... Ca Inc

10/05/17 / #20170284816

Establishing convergence points and determining time to convergence of related objects in motion

A method includes determining a convergence point for a first object and a second object from position data, capability data, and environment data that are all associated with the first and second object, wherein the convergence point is determined in accordance with a policy. The method also includes determining a... Ca Inc

10/05/17 / #20170284817

Policy-based convergence point recommendations for convoys

A method includes applying a correlation rule defining a correlation relationship between a first and second object and determining, using a processor, whether a first motion vector of the first object is correlated at a threshold level of correlation with a second motion vector of the second object, the correlation... Ca Inc

10/05/17 / #20170285886

Creating, updating, sharing, managing, and monitoring a plurality of independent interactive system productivity facility (ispf) windows

A user terminal executes a control application that generates and outputs a plurality of windows to a user terminal within a single emulator session and under a single user login. Each window corresponds to a particular application executing at the mainframe, and is sizable and immovable relative to the other... Ca Inc

10/05/17 / #20170285917

Visual modification and training of an anomaly detection image

A method includes formatting for display, on a visual screen, an image comprising: (1) a coordinate system, (2) a plurality of distinguishable areas within the coordinate system, each distinguishable area graphically representing a respective formula, and (3) a plurality of data points. The method also includes receiving user input comprising... Ca Inc

10/05/17 / #20170285923

Multi-perspective application components dependencies

A dependency graph is created that indicates dependencies among a plurality of components of an application based, at least in part, on interactions among the plurality of components determined from at least one execution of the application. In response to selection of a first attribute of a plurality of attributes,... Ca Inc

10/05/17 / #20170286077

Interface definition language compiler with version reconciliation

An interface definition language compiler can be designed to generate different versions of stubs or library files from a same IDL source code. A developer can maintain a single IDL file with code for various versions by using version directives. As part of front end compiling, the IDL compiler will... Ca Inc

10/05/17 / #20170286103

Identifying and correlating semantic bias for code evaluation

System and techniques are disclosed for associating annotation semantic bias with program code. A pre-processor partitions an annotation from program statements contained within one or more source files. A lexical parser generates program statement tokens corresponding to the program statements, wherein each of the program statement tokens associates program statement... Ca Inc

10/05/17 / #20170286140

Java-based offload service in a mainframe environment

A JVM can be used as a conduit for transferring work items and results for work items between different processes/processors for a mainframe environment. The JVM provides infrastructure that allows a Java program running within the JVM to invoke native methods (e.g., assembly code methods) with a Java Native Interface... Ca Inc

10/05/17 / #20170286189

Graph-enhanced event management

A first event notification is received. The first event notification is associated with a first event. Criteria is determined based, at least in part, on the first event notification. A first component is identified based, at least in part, on the criteria a component graph. An operational status associated with... Ca Inc

10/05/17 / #20170286266

Unified interface for development and testing of deployment resource architecture

Embodiments of the disclosure pertain to providing, via a graphical user interface, a set of user-selectable resources available for defining a resource architecture for an application in development; receiving, via the graphical user interface, a selection of a first resource for the application; receiving, via the graphical user interface, a... Ca Inc

Patent Packs
10/05/17 / #20170286272

Virtual service localization

A virtual service is instantiated from a service model that is operable to receive requests intended for a particular software component in a system and generate simulated responses of the particular software component based on a service model modeling responses of the particular software component. A particular request intended for... Ca Inc

10/05/17 / #20170286273

Virtual service data set generation

A virtual service is instantiated from a service model that is operable to receive requests intended for a particular one of a plurality of software components in a system and generate simulated responses of the particular software component based on a service model modeling responses of the particular software component.... Ca Inc

10/05/17 / #20170286274

Transaction stitching definitions

Transaction data is accessed that describes a plurality of transactions and includes a plurality of frames, with each frame describing a respective portion of a corresponding one of the plurality of transactions. A user-defined stitching definition is accessed that is related to a particular one of the plurality of transactions.... Ca Inc

10/05/17 / #20170286277

Automated model generation for a software system

Transaction data is accessed that has been generated from monitoring of a plurality of transactions in a system that includes a plurality of software components. The transaction data is assessed to identify that a particular one of the plurality of transactions meets a particular one of a set of conditions... Ca Inc

10/05/17 / #20170286281

Transactional boundaries for virtualization within a software system

Transaction data is received identifying characteristics of a particular transaction involving the first software component and a second software component as observed by an agent during operation of the system. The particular transaction is contemporaneous with another transaction involving software components in the system. It is determined, from the transaction... Ca Inc

10/05/17 / #20170286463

Mainframe index database to supplement a system catalog

A request for a particular file stored in memory of a mainframe computing system is received and the particular file is determined not to be registered in a catalog of the mainframe computing system. An index database separate from the catalog is searched for a record associated with the particular... Ca Inc

10/05/17 / #20170286715

Prevention of shoulder surfing

In accordance with the teachings of the present disclosure, a method is provided for reducing the chances of shoulder surfing. The method may include determining an approximate angle of orientation of a mobile device and selecting one of first or second input key layouts, based upon the approximate angle of... Ca Inc

10/05/17 / #20170287178

Visual generation of an anomaly detection image

A method includes formatting for display, on a visual screen, an image comprising a coordinate system and a plurality of data points within the coordinate system, wherein the plurality of data points define historical performance data for a computer system. The method further includes receiving a user input defining a... Ca Inc

10/05/17 / #20170288967

Environment manager for continuous deployment

Aspects of the embodiments are directed to designing a deployment environment for a continuous delivery tenant. Embodiments include receiving, via a natural language input, a set of parameters for building a deployment environment for an application; determining, by a natural language processing engine, a resource to satisfy a parameter of... Ca Inc

10/05/17 / #20170289008

Scenario coverage in test generation

Transaction data is generated during monitoring of a plurality of transactions in a system and a respective flow is determined, from the transaction data, for each of the plurality of transactions. Each of the determined flows involves participation of a respective subset of software components of the system. A plurality... Ca Inc

10/05/17 / #20170289269

Delegating a reverse proxy session to its instantiating portlet session

A method for allowing a web application server to encapsulate the features and functionality of an external application while gating access to it through authenticated portlet sessions includes receiving, at a web-based application server, a content request from an external application, and in response to receiving the content request, instantiating... Ca Inc

10/05/17 / #20170289806

Geographically based access management for internet of things device data

The proliferation of IOT devices has led to an increase in sensitive, cloud-stored data. To provide further protection, IOT device data may be secured by geographically based access controls as a supplement to or in place of traditional password protection. A geographically based access control restricts data accessibility to designated... Ca Inc

09/28/17 / #20170277534

Effective defect management across multiple code branches

A computer-implemented method is disclosed which detects that new source code linked to a defect identifier has been checked in to a source code repository for a given code branch of a software application. The new source code is automatically checked in to additional code branches of the software application... Ca Inc

09/28/17 / #20170277582

Identification of distinguishable anomalies extracted from real time data streams

A big data processing system includes a workload trimming function that separates out from among a set of identified anomalies, those that are clearly outliers, rather than ones residing within clusters of anomalies as mapped within an anomalies distribution space. The outlier anomalies are not subjected to a computationally-intensive anomalies... Ca Inc

09/28/17 / #20170277599

Data boundary identification for identifying variable size data chunks

A system and method obtain a set of data and identify successive subsets of data within the set of data. A boundary identifying hash is calculated on a subset of data and compared with a boundary indicating value. If the calculated boundary identifying hash matches the boundary indicating value, a... Ca Inc

09/28/17 / #20170277727

Identification of distinguishing compound features extracted from real time data streams

A big data processing system includes a features permutations testing function that separates out from among a set of identified compound features, those compound feature permutations that have better capabilities for distinguishing between anomalies observed in respective multi-dimensional feature spaces having as their axes the features of the identified compound... Ca Inc

09/28/17 / #20170277908

Providing data privacy in computer networks using personally identifiable information by inference control

Data privacy is provided in a computer network using a security inference control processor of a network device in the computer network which receives a query from a user device through a network interface circuit. In response to the query, a query result data set is generated based on information... Ca Inc

09/28/17 / #20170279607

Queueing construct for x.509 digital certificates

A method includes, for respective queues of a plurality of queues stored in a storage: generating, using a processor, a private key—public key pair; and storing the private key—public key pair to a back of the queue. The private key—public key pair may include a private key and a public... Ca Inc

09/28/17 / #20170279618

Short term or one-time-use x.509 digital certificates

A method includes receiving a request from a certificate user to utilize a short-term private key-public key pair. The short-term private key-public key pair includes a short-term private key and a public key. The short-term private key may expire after a period less than a year in length. The method... Ca Inc

09/28/17 / #20170279660

Context graph augmentation

As a network increases in size and complexity, it becomes increasingly difficult to monitor and record relationships between components in the network. The lack of knowledge regarding component relationships can make it difficult to adequately and timely perform analysis of network issues or conditions. As a result, automated generation of... Ca Inc

09/28/17 / #20170279668

Fault detection of service chains in a sdn/nfv network environment

An electronic device includes a processor and a memory coupled to the processor and storing computer readable program code that when executed by the processor causes the processor to perform operations including generating, at given time intervals, a plurality of topology graphs that correspond to a service chain that comprises... Ca Inc

09/28/17 / #20170279687

Context graph generation

As a network increases in size and complexity, it becomes increasingly difficult to monitor and record relationships between components in the network. The lack of knowledge regarding component relationships can make it difficult to adequately and timely perform analysis of network issues or conditions. As a result, automated generation of... Ca Inc

09/28/17 / #20170279692

Deploying a service from a selected cloud service provider based on an evaluation of migration ability using graph analytics

A method includes performing by a processor of a server: receiving a requirement description of a service for a software application, generating a migration graph that comprises vertices representing candidate service providers for the service, respectively, identifying migration capability information between the vertices of the migration graph by connecting a... Ca Inc

09/28/17 / #20170279784

Synchronized issuance of public x.509 digital certificates

A method includes receiving, from a certificate requestor: a request for a public key certificate and a list of a plurality of distribution addresses. The request may include a public key for the certificate requestor. The plurality of distribution addresses may belong to a plurality of third parties. The method... Ca Inc

09/28/17 / #20170279785

Synchronized issuance of public x.509 digital certificates

A method includes generating, using a processor, a private key-public key pair. The private key-public key pair may include a private key and a public key. The method also includes generating a request for a public key certificate. The request may include the public key. The method further includes sending... Ca Inc

09/28/17 / #20170279923

Provisioning of network services based on virtual network function performance characteristics

A method includes performing, by a processor: receiving a selection of a network service, determining a plurality of Virtual Network Functions (VNFs) and a plurality of Virtual Machines (VMs) based on the selection of the network service, the plurality of VNFs being configured to run on the plurality of VMs,... Ca Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Ca Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Ca Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###