Patents by Inventor Steven L. Greenspan

Steven L. Greenspan has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170277908
    Abstract: Data privacy is provided in a computer network using a security inference control processor of a network device in the computer network which receives a query from a user device through a network interface circuit. In response to the query, a query result data set is generated based on information in a database stored in a non-volatile data storage device. Personally Identifiable Information (PII) exposure risk associated with the query result data set is determined based on an evaluation of combining the query result data set with an exposure storage log that includes result data sets from past queries associated with the user. Based on the PII exposure risk, the query result data set is provided to the user, so as to refrain from providing the query result data set if the PII exposure risk is greater than a risk threshold. Related methods, devices, and computer program products are provided.
    Type: Application
    Filed: March 22, 2016
    Publication date: September 28, 2017
    Applicant: CA, Inc.
    Inventors: Debra J. Danielson, Steven L. Greenspan, Kenneth William Scott Morrison
  • Patent number: 9769434
    Abstract: An application server based in a communication network facilitates help desk support for end users that employ a camera-equipped wearable device. Upon receiving a request from a user for assistance with a problem or task, the application server controls the wearable device to collect multimedia information—e.g., images, video, and sounds—associated with an object of the task. The application server then crowdsources the collected multimedia information to a plurality of other remote user devices. Based on helpful information received from users of the remote devices, and/or an analysis performed at the server, the application server categorizes the task. So categorized, the application server can retrieve pertinent assistance data associated with the task and send that information to the user.
    Type: Grant
    Filed: July 31, 2014
    Date of Patent: September 19, 2017
    Assignee: CA, Inc.
    Inventors: Connie Smallwood, Steven L. Greenspan
  • Publication number: 20170264710
    Abstract: Requirements for a thing-sourcing project that comprises a thing-sourcing task are posted to thing-sourcing participant devices. Electronic requests are received from a first group of the thing-sourcing participant devices, to participate in the task. The electronic request identifies a portion of the task that can be accomplished by the thing-sourcing participant device, but none of the electronic requests indicate that the task can be accomplished entirely by any one of the thing-sourcing participant devices. A second group of the thing-sourcing participant devices is selected from the first group of the thing-sourcing participant devices. The second group of the thing-sourcing participant devices can collectively accomplish the task, even though none of the second group of the thing-sourcing participant devices can accomplish the task individually. Execution of the thing-sourcing project by the second group of the thing-sourcing participant devices is then coordinated.
    Type: Application
    Filed: March 14, 2016
    Publication date: September 14, 2017
    Applicant: CA, Inc.
    Inventors: Victor Muntés Mulero, Steven L. Greenspan, Marc Solé Simo
  • Publication number: 20170230402
    Abstract: A method is described for receiving a plurality of node data streams through a data network from a plurality of source nodes, respectively, each of the plurality of node data streams comprising a plurality of node data. The method further comprises determining a respective risk assessment for each of the plurality of node data streams based on a plurality of elements, wherein the respective risk assessment indicates a level of trustworthiness of each of the plurality of node data streams. Moreover, the method comprises determining a plurality of respective actions for each of the plurality of source nodes, based on the respective risk assessment of the plurality of node data streams. The method further comprises instructing each of the plurality of source nodes to perform the respective action.
    Type: Application
    Filed: February 9, 2016
    Publication date: August 10, 2017
    Applicant: CA, Inc.
    Inventors: Steven L. GREENSPAN, Debra J. DANIELSON, Kenneth William Scott MORRISON
  • Patent number: 9716599
    Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: July 25, 2017
    Assignee: CA, Inc.
    Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
  • Patent number: 9639443
    Abstract: Systems and methods may include receiving real-time data from real components operating in a real-world environment. The systems and methods may further include generating a virtual representation of the real components based on the real-time data received from the real components and historical data associated with the real components. In addition, the systems and methods may include determining whether the real-time data from a component of the real components indicates an anomaly. The systems and methods also may include, in response to determining that the real-time data from the component indicates the anomaly, determining whether the anomaly indicated by the real-time data from the component is consistent with the virtual representation of the real components.
    Type: Grant
    Filed: March 2, 2015
    Date of Patent: May 2, 2017
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Debra J. Danielson, James D. Reno, John P. Kane, Prashant Parikh
  • Patent number: 9628459
    Abstract: A method includes receiving a request to initiate secure communications from a first client and authenticating the first client. The authenticating includes communicating with a second client using a second communication channel, and receiving a response from the first client, the response being transmitted over a first communication channel. The method also includes receiving a first set of message data from the first client, the first set of message data being transmitted over the first communication channel, and receiving a second set of message data from the second client, the second set of message data being transmitted over the second communication channel. The method additionally includes constructing the message using the first set of message data and the second set of message data.
    Type: Grant
    Filed: March 18, 2014
    Date of Patent: April 18, 2017
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, James Donald Reno, Ralf Dieter Saborowski, Charley Chell
  • Patent number: 9578004
    Abstract: A method includes detecting an incoming request from a first application to a second application. The method further includes performing an authentication that involves sending a challenge message to a first application. The challenge message may request an account of information associated with processed transactions between the first application and the second application during a particular period preceding the incoming request, a solution to a high-cost calculation associated with a high level of resource use, or a concatenated sequence of characters located at specific positions of a shared value. The authentication further involves receiving a challenge response to the challenge message from the first application, determining a verified response based on the challenge message, and determining whether the challenge response matches the verified response.
    Type: Grant
    Filed: September 12, 2014
    Date of Patent: February 21, 2017
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Charley Chell
  • Patent number: 9548886
    Abstract: Methods for automatically generating help desk tickets in response to detecting performance and/or availability issues that occur throughout multiple layers of a networked computing environment are described. In some embodiments, in response to detecting an alert corresponding with a performance issue affecting the networked computing environment, a root cause identification tool may aggregate a plurality of alarms from a plurality of performance management tools monitoring the networked computing environment, generate a failure graph associated with the performance issue, identify a first leaf node of the failure graph, determine a first remedy associated with the first leaf node, and automatically generate a help desk ticket corresponding with the first leaf node and the first remedy. The automatically generated help desk ticket may specify the failure associated with the first leaf node, the first remedy, a location associated with the first remedy, and an estimated time to fix the failure.
    Type: Grant
    Filed: April 2, 2014
    Date of Patent: January 17, 2017
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
  • Publication number: 20160379119
    Abstract: Systems and methods may include receiving, by an expert system, performance data for a monitored system. The systems and methods may include generating a prediction for the monitored system in response to determining that the performance data satisfies a condition. The prediction may identify an anomaly that is predicted to occur. The systems and methods may include receiving, by a filter system, the prediction, information identifying the condition, and user information. The user information may include user preference information and user feedback information. The systems and methods may include determining a filter criteria based on the user information. The filter criteria may be based on the preferences for predictions to be provided to the user and on the historical user feedback regarding the historical predictions. The systems and methods may include providing the prediction to the user in response to determining that the particular prediction satisfies the filter criteria.
    Type: Application
    Filed: June 29, 2015
    Publication date: December 29, 2016
    Applicant: CA, INC.
    Inventors: Preetdeep KUMAR, Rashmi GUPTA, Shweta TIWARI, Steven L. GREENSPAN, Serguei MANKOVSKII
  • Patent number: 9530222
    Abstract: Systems and methods may include receiving first and second motion data about first and second objects, respectively. The systems and methods may include applying an asymmetric correlation rule (ACR) to the first and second motion data. The ACR may define a baseline state of motion for the first object and a correlation relationship between the first and second objects. The systems and methods may include determining whether the first object is in the baseline state and, in response to determining that the first object is not in the baseline state, determining whether a first motion vector of the first object is sufficiently correlated with a second motion vector of the second object. The systems and methods may include, in response to determining both that the first object is not in the baseline state and that the first and second motion vectors are not sufficiently correlated, generating an anomalous behavior notification.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: December 27, 2016
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Paul C. Lipton, John J. Harrison, Jr., Prashant Parikh, Serguei Mankovskii, Maria C. Velez-Rojas
  • Patent number: 9519691
    Abstract: A method of tracking technologies may include providing a taxonomy wherein the taxonomy includes a plurality of technology/capability terms, and searching a data source using the technology/capability terms from the taxonomy. A plurality of text segments may be retrieved from the data source, with each of the text segments including at least one of the technology/capability terms from the taxonomy. A plurality of new technology/capability terms may be identified from the plurality of text segments retrieved from the data source, and a respective use frequency may be determined for each of the new technology/capability terms. Responsive to a respective use frequency of one of the new technology/capability terms being greater than a use frequency threshold, the taxonomy may be updated to include the new technology/capability term having the respective use frequency that is greater than the use frequency threshold.
    Type: Grant
    Filed: July 30, 2013
    Date of Patent: December 13, 2016
    Assignee: CA, Inc.
    Inventors: Debra J. Danielson, Steven L. Greenspan
  • Patent number: 9503860
    Abstract: Systems and methods may include receiving first motion data corresponding to a first object and receiving second motion data corresponding to a second object. The systems and methods may include determining whether the second object is following the first object based on the first motion data and the second motion data. The systems and methods may include receiving additional information corresponding to the second object. The systems and methods may include determining whether the second object poses a risk to the first object based on the additional information. The systems and methods may include performing processes in response to determining that the second object is following the first object and poses a risk to the first object. Such processes may include providing a notification to a subscribing party. The notification may indicate that the second object is following the first object and poses a risk to the first object.
    Type: Grant
    Filed: September 10, 2015
    Date of Patent: November 22, 2016
    Assignee: CA, Inc.
    Inventors: Serguei Mankovskii, Steven L. Greenspan, Maria C. Velez-Rojas
  • Patent number: 9497072
    Abstract: Methods for monitoring a networked computing environment and for consolidating multiple alarms under a single root cause are described. In some embodiments, in response to detecting an alert corresponding with a performance issue in a networked computing environment, a root cause identification tool may aggregate a plurality of alarms from a plurality of performance management tools monitoring the networked computing environment. The root cause identification tool may then generate a failure graph associated with the performance issue based on the plurality of alarms, determine a first set of leaf nodes of the failure graph, determine a first chain of failures based on the first set of leaf nodes, suppress (or hide) alarms that are not associated with the first chain of failures, and output a consolidated alarm associated with the first chain of failures.
    Type: Grant
    Filed: April 1, 2014
    Date of Patent: November 15, 2016
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
  • Patent number: 9497071
    Abstract: Methods for monitoring a networked computing environment and for identifying root causes of performance and availability issues that occur throughout multiple layers of the networked computing environment are described. In some embodiments, a software service provided by a networked computing environment may experience a service-related performance or availability issue. In response to detecting the service-related issue affecting the service, a root cause identification tool may aggregate data from a plurality of information technology management software tools monitoring the networked computing environment, identify causal relationships between a plurality of failures associated with the service-related issue based on the aggregated data, determine a chain of failures of the plurality of failures based on the causal relationships, identify a root cause of the service-related issue based on the chain of failures, and transmit an alarm corresponding with the root cause.
    Type: Grant
    Filed: April 1, 2014
    Date of Patent: November 15, 2016
    Assignee: CA, INC.
    Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
  • Patent number: 9467466
    Abstract: Determining potential harm associated with a network endpoint external to an enterprise includes receiving information about a network-based communication by a resource of the enterprise directed to the network endpoint external to the enterprise, and calculating a plurality of individual scores related to a risk associated with the network-based communication, wherein each individual score corresponds to a different category of risk. The determination also includes receiving data specifying a policy related to rules defined by the enterprise regarding usage of cloud services; calculating a composite risk score related to the network-based communication, wherein the composite risk score is based on the individual scores and the policy; and notifying an entity of the enterprise about the composite risk score.
    Type: Grant
    Filed: October 31, 2014
    Date of Patent: October 11, 2016
    Assignee: CA, Inc.
    Inventors: Serguei Mankovskii, Steven L. Greenspan, Peter Brian Matthews
  • Publication number: 20160292885
    Abstract: Systems and methods may include receiving first and second motion data about first and second objects, respectively. The systems and methods may include applying an asymmetric correlation rule (ACR) to the first and second motion data. The ACR may define a baseline state of motion for the first object and a correlation relationship between the first and second objects. The systems and methods may include determining whether the first object is in the baseline state and, in response to determining that the first object is not in the baseline state, determining whether a first motion vector of the first object is sufficiently correlated with a second motion vector of the second object. The systems and methods may include, in response to determining both that the first object is not in the baseline state and that the first and second motion vectors are not sufficiently correlated, generating an anomalous behavior notification.
    Type: Application
    Filed: March 30, 2015
    Publication date: October 6, 2016
    Applicant: CA, Inc.
    Inventors: Steven L. GREENSPAN, Paul C. LIPTON, John J. HARRISON, Jr., Prashant PARIKH, Serguei MANKOVSKII, Maria C. VELEZ-ROJAS
  • Publication number: 20160282824
    Abstract: A user selects an appliance or other device to control using a wearable computing device, such as an augmented eyewear device, for example. Based on the selection, data regarding a current operating state and one or more subsequent operating states are provided for display to the user. Using the wearable computing device, the user selects one of the subsequent states and controls the appliance to transition from its current state to the selected subsequent state. The commands for controlling the transition may be proxied for the wearable computing device by a mobile device or a network server, for example, via one or more established communication links.
    Type: Application
    Filed: March 26, 2015
    Publication date: September 29, 2016
    Inventors: Connie Smallwood, Steven L. Greenspan
  • Publication number: 20160269436
    Abstract: Systems and methods may include receiving performance data of components in a system. The performance data may include data for parameters for each of the components. The systems and methods may include determining aggregate data for each group of similar components of the components. The aggregate data for each group of similar components may include a group characteristic for each of the parameters. The systems and methods may include, for each group of similar components, determining whether the data for each of the parameters for each component is consistent with the group characteristic for the respective parameter. The systems and methods may include, for each component of the respective group determining that the component is anomalous in response to determining that the data for a parameter for the component is not consistent with the group characteristic for the parameter.
    Type: Application
    Filed: March 10, 2015
    Publication date: September 15, 2016
    Applicant: CA, Inc
    Inventors: Debra J. DANIELSON, Steven L. GREENSPAN, James D. RENO, Prashant PARIKH
  • Publication number: 20160259699
    Abstract: Systems and methods may include receiving real-time data from real components operating in a real-world environment. The systems and methods may further include generating a virtual representation of the real components based on the real-time data received from the real components and historical data associated with the real components. In addition, the systems and methods may include determining whether the real-time data from a component of the real components indicates an anomaly. The systems and methods also may include, in response to determining that the real-time data from the component indicates the anomaly, determining whether the anomaly indicated by the real-time data from the component is consistent with the virtual representation of the real components.
    Type: Application
    Filed: March 2, 2015
    Publication date: September 8, 2016
    Applicant: CA, INC.
    Inventors: Steven L. GREENSPAN, Debra J. DANIELSON, James D. RENO, John P. KANE, Prashant PARIKH