SEARCH RESULTS for assignee:"ca"

Showing 1 to 20 of 158 results

Last Update Patent(s) Assignor(s) Orig. Assignee(s) Assignee(s) Reel/Frame
14-Jun-2018

(X0) 1: System for Extracting Data from a Database in a User Selected Format and Related Methods and Computer Program Products

(A1) 2: System for Extracting Data from a Database in a User Selected Format and Related Methods and Computer Program Products

CA, INC.

40720/963

12-Jun-2018

(X0) 1: IDENTIFICATION OF DISTINGUISHABLE ANOMALIES EXTRACTED FROM REAL TIME DATA STREAMS

(A1) 2: IDENTIFICATION OF DISTINGUISHABLE ANOMALIES EXTRACTED FROM REAL TIME DATA STREAMS

(B2) 9: IDENTIFICATION OF DISTINGUISHABLE ANOMALIES EXTRACTED FROM REAL TIME DATA STREAMS

CHEN, YE

ZHANG, JIN

XU, LAN

ZHANG, CHI

XIAO, YUE

CA, INC.

38115/820

31-May-2018

(X0) 1: AUTOMATED COLLABORATION WORKFLOW GENERATION IN THING-SOURCING ENVIRONMENTS

(A1) 2: AUTOMATED COLLABORATION WORKFLOW GENERATION IN THING-SOURCING ENVIRONMENTS

SIMÓ, MARC SOLÉ

MULERO, VICTOR MUNTÉS

GREENSPAN, STEVEN L.

CA, INC.

40444/832

31-May-2018

(X0) 1: GENERATING TOKENS DYNAMICALLY USING PAYMENT KEYS

(A1) 2: GENERATING TOKENS DYNAMICALLY USING PAYMENT KEYS

KUMAR, SHARATH L.

BANISETTI, SANDEEP

KALADGI, MOHAMMED MUJEEB

SAWANT, YASHWANT RAMKISHAN

CA, INC.

40455/202

29-May-2018

(X0) 1: CONTROLLING REPORTING BY AN INSTRUMENT ENCAPSULATION MODULE ENCAPSULATING AN APPLICATION PROGRAM ON A USER TERMINAL

(A1) 2: CONTROLLING REPORTING BY AN INSTRUMENT ENCAPSULATION MODULE ENCAPSULATING AN APPLICATION PROGRAM ON A USER TERMINAL

(B2) 9: CONTROLLING REPORTING BY AN INSTRUMENT ENCAPSULATION MODULE ENCAPSULATING AN APPLICATION PROGRAM ON A USER TERMINAL

CA, INC.

34558/765

29-May-2018

(X0) 1: DEVICE IDENTIFICATION BASED ON DEEP FINGERPRINT INSPECTION

(A1) 2: DEVICE IDENTIFICATION BASED ON DEEP FINGERPRINT INSPECTION

(B2) 9: DEVICE IDENTIFICATION BASED ON DEEP FINGERPRINT INSPECTION

DESAI, SURIL

NARAYANAN, SWAMINATHAN

RAI, AKASH

CA, INC.

34783/151

29-May-2018

(X0) 1: PAYMENT DE-TOKENIZATION WITH RISK EVALUATION FOR SECURE TRANSACTIONS

(A1) 2: PAYMENT DE-TOKENIZATION WITH RISK EVALUATION FOR SECURE TRANSACTIONS

(B2) 9: PAYMENT DE-TOKENIZATION WITH RISK EVALUATION FOR SECURE TRANSACTIONS

CHITRAGAR, MAHESH MALATESH

KALYANASUNDARAM, DHIVYA

KUMAR, SHARATH LAKSHMAN

SALIAN, VISHWANATHA

CA, INC.

35271/787

29-May-2018

(X0) 1: TRANSACTION FLOW VISUALIZATION

(A1) 2: TRANSACTION FLOW VISUALIZATION

(B2) 9: TRANSACTION FLOW VISUALIZATION

CA, INC.

37601/71

29-May-2018

(X0) 1: HIERARCHICAL IDENTIFIERS FOR HTML ELEMENTS

(A1) 2: HIERARCHICAL IDENTIFIERS FOR HTML ELEMENTS

(B2) 9: HIERARCHICAL IDENTIFIERS FOR HTML ELEMENTS

CA, INC.

37832/865

29-May-2018

(X0) 1: CROSS-DEVICE AUTHENTICATION

(B1) 9: CROSS-DEVICE AUTHENTICATION

BHABBUR, GYANESHWAR

BEHERA, NIRUPAMA

CA, INC.

44196/591

24-May-2018

(X0) 1: Workflow Job Distribution in a Data Processing System with Agent Time Window Constraints

(A1) 2: Workflow Job Distribution in a Data Processing System with Agent Time Window Constraints

CA, INC.

40389/985

24-May-2018

(X0) 1: METHODS AND DEVICES FOR MONITORING OVERLAPPED IP ADDRESSES IN A MULTI-TENANCY ENVIRONMENT

(A1) 2: METHODS AND DEVICES FOR MONITORING OVERLAPPED IP ADDRESSES IN A MULTI-TENANCY ENVIRONMENT

KAKANI, BALRAM REDDY

VATSAVAI, TRISHUL VARMA

CA, INC.

40391/842

24-May-2018

(X0) 1: USER-DEFINED DYNAMIC PASSWORD

(A1) 2: USER-DEFINED DYNAMIC PASSWORD

KASIBHATLA, KRISHNA CHAITHANYA

SHANKAR, M.V. UDAI

CA, INC.

40399/788

24-May-2018

(X0) 1: BACK-END COMPONENT IDENTIFICATION SYSTEM

(A1) 2: BACK-END COMPONENT IDENTIFICATION SYSTEM

SINGH, KARMJIT

MANI, RAMESH

TALI, MARTIN

CA, INC.

40400/8

22-May-2018

(X0) 1: Method and Apparatus for Providing a Media Content from a Collaborative Meeting to a Remote User

(B1) 9: Method and Apparatus for Providing a Media Content from a Collaborative Meeting to a Remote User

GREENSPAN, STEVEN L.

ABRAMS, HOWARD A.

CA, INC.

30202/933

22-May-2018

(X0) 1: DYNAMIC ADAPTER DESIGN PATTERN

(A1) 2: DYNAMIC ADAPTER DESIGN PATTERN

(B2) 9: DYNAMIC ADAPTER DESIGN PATTERN

LAMBERT, GREGORY J.

PATEL, SHEENA

CA, INC.

35254/989

22-May-2018

(X0) 1: DIAGNOSING ANOMALIES BASED ON DEVIATION ANALYSIS

(A1) 2: DIAGNOSING ANOMALIES BASED ON DEVIATION ANALYSIS

(B2) 9: DIAGNOSING ANOMALIES BASED ON DEVIATION ANALYSIS

MULLARKEY, PETER WILLIAM

DAVIS, KEVIN EUGENE

JOHNS, MICHAEL CHARLES

CA, INC.

35875/512

22-May-2018

(X0) 1: DIAGNOSING ANOMALIES BASED ON DEVIATION ANALYSIS

(A1) 2: DIAGNOSING ANOMALIES BASED ON DEVIATION ANALYSIS

(B2) 9: DIAGNOSING ANOMALIES BASED ON DEVIATION ANALYSIS

MULLARKEY, PETER WILLIAM

DAVIS, KEVIN EUGENE

JOHNS, MICHAEL CHARLES

CA, INC.

36417/564

22-May-2018

(X0) 1: PROVIDING DATA PRIVACY IN COMPUTER NETWORKS USING PERSONALLY IDENTIFIABLE INFORMATION BY INFERENCE CONTROL

(A1) 2: PROVIDING DATA PRIVACY IN COMPUTER NETWORKS USING PERSONALLY IDENTIFIABLE INFORMATION BY INFERENCE CONTROL

(B2) 9: PROVIDING DATA PRIVACY IN COMPUTER NETWORKS USING PERSONALLY IDENTIFIABLE INFORMATION BY INFERENCE CONTROL

DANIELSON, DEBRA J.

GREENSPAN, STEVEN L.

MORRISON, KENNETH WILLIAM SCOTT

CA, INC.

38067/401

22-May-2018

(X0) 1: CONTEXT GRAPH GENERATION

(A1) 2: CONTEXT GRAPH GENERATION

(B2) 9: CONTEXT GRAPH GENERATION

MUNTÉS-MULERO, VICTOR

MANKOVSKII, SERGUEI

SOLÉ SIMÓ, MARC

CA, INC.

38116/643