Produits

Solutions

Formation

CA Services & Support

Partenaires

Société

{{search ? 'Fermer':'Rechercher'}}

Patents

Supporting CA Technologies’ leadership by protecting its ideas

CA Strategic Research patent portfolio includes more than 70 granted patents on different topics, such as service authentication, root cause analysis, anomaly detection, internet-of-things, cloud computer and intelligent human-computer interfaces.

2018

2017

Multi-channel encryption for Mobile workers
Authors: Steven L. Greenspan, James Reno, Ralf Saborowski, Charley Chell

Trusted Hybrid and Public Infrastructure Grid Cloud for MSP
Authors: Eitan Hadar, Michael Kletskin, Nir Barak, Amir Jerbi, Yaacov Bezalel

Recommending alternatives for providing a service
Authors: Eitan Hadar, Jason Davis

Entropy weighted message matching for opaque service virtualization
Authors: Steven C. Versteeg, John S. Bird, Nathan A. Hastings, Miao Du, Jean-David Dahan

Authentication of API-based endpoints
Authors: Steven L. Greenspan, Charley Chell

System and method for codification and representation of situational and complex application behavioral patterns
Authors: Eitan Hadar, Irit Hadar

Pattern-based password with dynamic shape overlay
Authors: Gowtham Sen Potnuru, Surya Kiran Satyavarapu, Souptik Sen, Steven C. Versteeg

Help desk ticket tracking integration with root cause analysis
Authors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii

2016

Detecting divergence or convergence of related objects in motion and applying asymmetric rules
Authors: Steven L. Greenspan, Paul C. Lipton, John J. Harrison Jr., Prashant Parikh, Serguei Mankovskii, Maria C. Velez-Rojas

Methods of tracking technologies and related systems and computer program products
Authors: Debra J. Danielson, Steven L. Greenspan

Intelligent pursuit detection
Authors: Serguei Mankovskii, Steven L. GreenspanMaria C. Velez-Rojas

Self-adaptive and proactive virtual machine images adjustment to environmental security risks in a cloud environment
Authors: Itzhak Fadida, Nir Barak, Eitan Hadar

Identifying alarms for a root cause of a problem in a data processing system
Authors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-RojasSerguei Mankovskii

Multi-hop root cause analysis
Authors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-RojasSerguei Mankovskii

System and method for reconciling duplicate configuration items in a configuration management database
Authors: Marvin Waschke, Steven L. Greenspan

Alarm notification based on detecting anomalies in big data
Authors: Nir Barak, Yaacov Bezalel, Serguei Mankovskii

Certification of correct behavior of cloud services using shadow rank
Authors: Serguei Mankovskii, Steven L. Greenspan, Peter B. Matthews

Graphical model-driven system for knowledge management tools
Authors: Eitan Hadar

System and method for virtual image security in a cloud environment
Authors: Nir Barak, Eitan Hadar

Holistic non-invasive evaluation of an asynchronous distributed software process
Authors: Grant A. Gibson, Eitan Hadar

Solution modeling and analysis toolset for enterprise software architecture
Authors: Eitan Hadar, Irit Hadar, Jason Davis

System and method for enforcement of security controls on virtual machines throughout life cycle state changes
Authors: Nir Barak, Amir Jerbi, Eitan Hadar, Michael Kletskin

Determining and using power utilization indexes for servers
Authors: Serguei Mankovskii, Subhasis Khatua, Douglas M. Neuse, Ramanjaneyulu Malisetti, Rajasekhar Gogula

System and method for dynamic access control based on individual and community usage patterns
Authors: Carrie E. Gates, Timothy G. Brown, Anil Somayaji, Yiru Li

Detecting, using, and sharing it design patterns and anti-patterns
Authors: Eitan Hadar, Kieron John James Connelly, Olga Lagunova, Peter A. Lazzaro

System and method for assigning a business value rating to documents in an enterprise
Authors: Carrie E. Gates

Generating a proposal for selection of services from cloud service providers based on an application architecture description and priority parameters
Authors: Victor Muntés-Mulero, Peter B. Matthews, Jacek Dominiak

Identifying objects in an image using coded reference identifiers
Authors: Serguei Mankovskii, Maria C. Velez-Rojas, Howard A. Abrams

Methods providing configuration management for mobile devices based on location
Authors: Steven L. Greenspan, Debra J. Danielson

System and method for dissemination of relevant knowledge
Authors: Steven L. Greenspan, Carrie E. Gates

System, apparatus, and method for identifying related content based on eye movements
Authors: Steven L. Greenspan, Carrie E. Gates

System and method for visual role engineering
Authors: Steven C. Versteeg, Avraham Rosenzweig, Ron Marom

Role based translation of data
Authors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii

Method and system for capturing expertise of a knowledge worker in an integrated breadcrumb trail of data transactions and user interactions
Authors: Serguei MankovskiiMaria C. Velez-Rojas

Visual based malicious activity detection
Authors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei MankovskiiSteven L. Greenspan

Solution modeling and analysis toolset for enterprise software architecture and skeleton architecture
Authors: Eitan Hadar, Irit Hadar, Jason Davis

Information technology system collaboration
Authors: Serguei Mankovskii

2015

Exponential histogram based database management for combining data values in memory buckets
Authors: Victor Muntés-Mulero, Sari Setianingsih, Sergio Gomez

Managing and predicting privacy preferences based on automated detection of physical reaction
Authors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan

Solution modeling and analysis toolset for enterprise software architecture and architecture roadmaps
Authors: Eitan Hadar, Irit Hadar, Jason Davis

System and method for a distributed graphical user interface
Authors: Steven L. Greenspan, Howard A. Abrams, Stanislav Mitranic, Gabriel M. Silberman

Virtual stand-in computing service for production computing service
Authors: Victor Ooi, Steven C. Versteeg, Robert Williams

System and method for analysis of process data and discovery of situational and complex applications
Authors: Eitan Hadar, Irit Hadar

Centralized, policy-driven maintenance of storage for virtual machine disks (VMDKS) and/or physical disks
Authors: Miron Gross, Eitan Hadar, Nir Barak

Multi-person video conference with focus detection
Authors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei MankovskiiSteven L. Greenspan

Automated false statement alerts
Authors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-RojasSerguei MankovskiiSteven L. Greenspan

Detecting false statement using multiple modalities
Authors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-RojasSerguei MankovskiiSteven L. Greenspan

Automated attention detection
Authors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-RojasSerguei MankovskiiSteven L. Greenspan

Management of package delivery
Authors: Steven L. Greenspan, Stefan Ionescu, John Kane

Secured deletion of information
Authors: Miron Gross, Eitan Hadar, Boaz Navott, Itzhak Fadida

Managing security clusters in cloud computing environments using autonomous security risk negotiation agents
Authors: Itzhak Fadida, Nir Barak, Eitan Hadar

Embedding performance monitoring into mashup application development
Authors: Eitan Hadar

Self-generation of virtual machine security clusters
Authors: Nir Barak, Itzhak Fadida, Eitan Hadar

Brokering and payment optimization for cloud computing
Authors: Eitan Hadar, Debra J. Danielson

Method and apparatus for layered overview in visualization of large enterprise it environment
Authors: Serguei Mankovskii, Maria C. Velez-Rojas, Michael C. Roberts, Esin Kiris

2014

System and method for restricting access to requested data based on user location
Authors: Srikanth Mandava, Steven L. Greenspan

Emerging topic discovery
Authors: Radek Marik

Managing access to resources of computer systems using codified policies generated from policies
Authors: Eitan Hadar

Automated message transmission prevention based on a physical reaction
Authors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei MankovskiiSteven L. Greenspan

Agile re-engineering of information systems
Authors: Eitan Hadar, Kieron John James Connelly, Olga Lagunova, Mitchell E. Engel, Peter A. Lazzaro

Effective visualization of an information technology environment through social scoring
Authors: Esin Kiris, Serguei MankovskiiMaria C. Velez-Rojas

Automated message transmission prevention based on environment
Authors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-RojasSerguei MankovskiiSteven L. Greenspan

System and method for virtual image security in a cloud environment
Authors: Nir Barak, Eitan Hadar

System and method for virtual machine data protection in a public cloud
Authors: Serguei Mankovskii, Eitan Hadar

System and method for self-aware virtual machine image deployment enforcement
Authors: Amir Jerbi, Michael Kletskin, Eitan Hadar

Transaction-based intrusion detection
Authors: Ramesh Natarajan, Timothy G. Brown, Carrie E. Gates

System and method for evaluating and selecting software components and services
Authors: Eitan Hadar, Yaakov Noson Shapiro

Method and system for providing low-complexity voice messaging
Authors: Christopher J. Stakutis, Thomas M. Boyle, Steven L. Greenspan

2012

Certified IT services in-a-box
Authors: Debra J. Danielson, Eitan Hadar

System and method for modifying execution of scripts for a job scheduler using deontic logic
Authors: Serguei Mankovskii, Colin Banger, Jody Steele, Tomas Gray

2010

System and method for job scheduling and distributing job scheduling
Authors: Serguei Mankovskii, Hans-Arno Jacobsen, Eli Fidler, David Matheson, Pengcheng Wan, Alex Cheung, Guoli Li

Meet the CA Strategic Research team.

Get to know the distinguished researchers, engineers and staff behind CA Strategic Research and the Office of the CTO.

Explore our publications

Teams working together and getting results