Patents by Inventor Carrie E. Gates
Carrie E. Gates has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9256748Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.Type: GrantFiled: March 14, 2013Date of Patent: February 9, 2016Assignee: CA, INC.Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
-
Patent number: 9208326Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.Type: GrantFiled: March 14, 2013Date of Patent: December 8, 2015Assignee: CA, INC.Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
-
Publication number: 20150288557Abstract: Methods for automatically generating help desk tickets in response to detecting performance and/or availability issues that occur throughout multiple layers of a networked computing environment are described. In some embodiments, in response to detecting an alert corresponding with a performance issue affecting the networked computing environment, a root cause identification tool may aggregate a plurality of alarms from a plurality of performance management tools monitoring the networked computing environment, generate a failure graph associated with the performance issue, identify a first leaf node of the failure graph, determine a first remedy associated with the first leaf node, and automatically generate a help desk ticket corresponding with the first leaf node and the first remedy. The automatically generated help desk ticket may specify the failure associated with the first leaf node, the first remedy, a location associated with the first remedy, and an estimated time to fix the failure.Type: ApplicationFiled: April 2, 2014Publication date: October 8, 2015Applicant: CA, INC.Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
-
Publication number: 20150288558Abstract: Methods for automatically generating a report in response to detecting performance and/or availability issues that occur throughout multiple layers of a networked computing environment based on a role of a target recipient of the report are described. In some embodiments, a failure graph may be generated by a root cause identification tool that aggregates data from a plurality of performance management tools monitoring the networked computing environment. The root cause identification tool may acquire a plurality of report templates, determine a first report template of the plurality of report templates based on the role associated with the target recipient, identify a set of variables or an ontology associated with the first report template, assign values to the set of variables using the failure graph, generate a first report based on the first report template, and output the first report to the target recipient.Type: ApplicationFiled: April 2, 2014Publication date: October 8, 2015Applicant: CA, INC.Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
-
Publication number: 20150280969Abstract: Methods for monitoring a networked computing environment and for identifying root causes of performance and availability issues that occur throughout multiple layers of the networked computing environment are described. In some embodiments, a software service provided by a networked computing environment may experience a service-related performance or availability issue. In response to detecting the service-related issue affecting the service, a root cause identification tool may aggregate data from a plurality of information technology management software tools monitoring the networked computing environment, identify causal relationships between a plurality of failures associated with the service-related issue based on the aggregated data, determine a chain of failures of the plurality of failures based on the causal relationships, identify a root cause of the service-related issue based on the chain of failures, and transmit an alarm corresponding with the root cause.Type: ApplicationFiled: April 1, 2014Publication date: October 1, 2015Applicant: CA, INC.Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
-
Publication number: 20150280968Abstract: Methods for monitoring a networked computing environment and for consolidating multiple alarms under a single root cause are described. In some embodiments, in response to detecting an alert corresponding with a performance issue in a networked computing environment, a root cause identification tool may aggregate a plurality of alarms from a plurality of performance management tools monitoring the networked computing environment. The root cause identification tool may then generate a failure graph associated with the performance issue based on the plurality of alarms, determine a first set of leaf nodes of the failure graph, determine a first chain of failures based on the first set of leaf nodes, suppress (or hide) alarms that are not associated with the first chain of failures, and output a consolidated alarm associated with the first chain of failures.Type: ApplicationFiled: April 1, 2014Publication date: October 1, 2015Applicant: CA, Inc.Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
-
Publication number: 20150281011Abstract: Methods for visualizing and accessing data associated with causal relationships between failures occurring within a networked computing environment are described. In some embodiments, a failure graph may be generated by a root cause identification tool that aggregates data from a plurality of performance management tools monitoring the networked computing environment. The aggregated data may include a plurality of alarms spanning multiple layers of the networked computing environment, as well as log file data. The root cause identification tool may generate a graphical representation of the failure graph including pointers to portions of the aggregated data supporting directed edges of the failure graph. The root cause identification tool may also provide a user interface for accessing the portions of the aggregated data pointed to by the various links within the failure graph.Type: ApplicationFiled: April 1, 2014Publication date: October 1, 2015Applicant: CA, INC.Inventors: Carrie E. Gates, Steven L. Greenspan, Maria C. Velez-Rojas, Serguei Mankovskii
-
Patent number: 9100540Abstract: Methods for providing feedback information regarding a person's focus of attention during a live video communication are described. The live video communication may comprise a live video conference. The feedback information may correspond with non-verbal cues such as who a speaking person is looking at when they are speaking and whether a listener is paying attention to the speaking person. In some embodiments, a dominant speaker in a live video conference may be determined and a live video stream that is being viewed by the dominant speaker may be identified. An identification of the live video stream may be transmitted to computing devices associated with other participants in the live video conference. Images associated with the live video stream being displayed to the other participants may be highlighted, enlarged, or moved to a different location on displays used by the other participants.Type: GrantFiled: March 14, 2013Date of Patent: August 4, 2015Assignee: CA, INC.Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
-
Patent number: 9055071Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.Type: GrantFiled: March 14, 2013Date of Patent: June 9, 2015Assignee: CA, INC.Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
-
Patent number: 9047253Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.Type: GrantFiled: March 14, 2013Date of Patent: June 2, 2015Assignee: CA, INC.Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
-
Patent number: 9041766Abstract: Methods for providing feedback information regarding a person's focus of attention during a live video communication are described. The live video communication may comprise a live video conference. The feedback information may correspond with non-verbal cues such as who a speaking person is looking at when they are speaking and whether a listener is paying attention to the speaking person. In some embodiments, a dominant speaker in a live video conference may be determined and a live video stream that is being viewed by the dominant speaker may be identified. An identification of the live video stream may be transmitted to computing devices associated with other participants in the live video conference. Images associated with the live video stream being displayed to the other participants may be highlighted, enlarged, or moved to a different location on displays used by the other participants.Type: GrantFiled: March 14, 2013Date of Patent: May 26, 2015Assignee: CA, INC.Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
-
Patent number: 8887300Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.Type: GrantFiled: March 14, 2013Date of Patent: November 11, 2014Assignee: CA, Inc.Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
-
Patent number: 8850597Abstract: Methods for preventing the transmission of sensitive information to locations outside of a secure network by a person who has legitimate access to the sensitive information are described. In some embodiments, in order for an end user of a computing device to establish a secure connection with a secure network and access data stored on the secure network, a client application running on the computing device may be required by the secure network. The client application may monitor visual cues (e.g., facial expressions and gestures) associated with the end user, detect suspicious activity performed by the end user based on the visual cues, and in response to detecting suspicious activity may perform mitigating actions to prevent the transmission of sensitive information such as alerting human resources personnel or requiring authorization prior to sending information to locations outside of the secure network.Type: GrantFiled: March 14, 2013Date of Patent: September 30, 2014Assignee: CA, Inc.Inventors: Carrie E. Gates, Gabriel M. Silberman, Maria C. Velez-Rojas, Serguei Mankovskii, Steven L. Greenspan
-
Publication number: 20130325463Abstract: An apparatus, system, and method for identifying related content based on eye movements are disclosed. The system, apparatus, and method display content to a user concurrently in two or more windows, identify areas in each of the windows where a user's eyes focus, extract keywords from the areas where the user's eyes focus in each of the windows, search a communications network for related content using the keywords, and notify the user of the related content by displaying it concurrently with the two or more windows. The keywords are extracted from one or more locations in the two or more windows in which the user's eyes pause for a predetermined amount of time or, when the user's eyes pause on an image, from at least one of the text adjacent to and the metadata associated with that image.Type: ApplicationFiled: May 31, 2012Publication date: December 5, 2013Applicant: CA, INC.Inventors: Steven L. GREENSPAN, Carrie E. GATES
-
Publication number: 20110307408Abstract: A system and method for managing information in an enterprise is disclosed. In one embodiment, the method comprises receiving a document from a component of an enterprise network, determining one or more characteristics associated with the document, assigning a priority score to a user associated with the document, assigning a business value rating to the document, and performing an operation with the document based on the business value rating. In another embodiment, the system includes a processor operable to receive a document, determine one or more characteristics associated with the document, determine a priority score to a user associated with the document, assign a business value rating to the document, and perform an operation with the document based on the business value rating.Type: ApplicationFiled: June 14, 2010Publication date: December 15, 2011Applicant: Computer Associates Think, Inc.Inventor: Carrie E. Gates
-
Patent number: 8069242Abstract: A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Infrastructure Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources.Type: GrantFiled: September 16, 2009Date of Patent: November 29, 2011Assignee: Cisco Technology, Inc.Inventors: Ethan Hadar, Carrie E. Gates, Kouros Hodaee Esfahany, Michael Ralph Chiaramonte, Efraim Moscovich, Gregory L. Bodine
-
Publication number: 20100125664Abstract: A method for integrating cloud computing systems includes establishing a connection between a cloud computing system architecture and cloud computing systems. Each of the cloud computing systems includes computing resources. The method further includes integrating the computing resources with an external integration architecture by establishing a second connection between the cloud computing system architecture and the external integration architecture. The external integration architecture includes IT Information Library (ITIL) software components. The cloud computing system architecture includes management components that provide integration points to connect the ITIL software components with the computing resources.Type: ApplicationFiled: September 16, 2009Publication date: May 20, 2010Applicant: Computer Associates Think, Inc.Inventors: Ethan Hadar, Carrie E. Gates, Kouros Hodaee Esfahany, Michael Ralph Chiaramonte, Efraim Moscovich, Gregory L. Bodine
-
Publication number: 20090281990Abstract: A method comprises extracting one or more document identifiers from a document currently displayed on the user's computer screen. The method further comprises searching an enterprise network, using the one or more document identifiers, for one or more related documents that are related to the document currently displayed on the user's computer screen. The one or more related documents may then be filtered, and the user may be notified of the one or more filtered related documents.Type: ApplicationFiled: May 7, 2008Publication date: November 12, 2009Applicant: Computer Associates Think, Inc.Inventors: Steven L. Greenspan, Carrie E. Gates