Patents Assigned to CA, Inc.
  • Patent number: 10445222
    Abstract: A multi-device data processing machine system includes a plurality of network-connected cliental servers including first and second production servers coupled to a dynamic load balancer. The machine system also includes an SaaS development server that is configured to pass under-development process requests to the load balancer in combination with a mix command such that the load balancer routes a mix of routine production traffic and the under-development process requests to at least one of the production servers that is instrumented for enabling remote debugging of code executing therein so that the under-development process requests can be debugged under the full or partial stresses of a live production environment.
    Type: Grant
    Filed: September 13, 2018
    Date of Patent: October 15, 2019
    Assignee: CA, INC.
    Inventor: Serguei Mankovskii
  • Patent number: 10445415
    Abstract: A computer program product includes a computer readable storage medium with computer readable program code. The computer readable program code may be configured to store a plurality of classifiers. The computer readable program code may be configured to store a document with one or more first portions of text associated with a first classifier. The computer readable program code also may be configured to display the document. The computer readable program code may be configured to change a feature of the first portions of text displayed in the document to indicate that the first portions of text are associated with the first classifier.
    Type: Grant
    Filed: March 14, 2013
    Date of Patent: October 15, 2019
    Assignee: CA, Inc.
    Inventors: Peter C. Spellward, Howard C. Snart Woodhouse
  • Publication number: 20190310933
    Abstract: Aspects of the embodiments include a system, method, and computer program operations, including compiling unit test code by a compiler run on a hardware computing system; identifying in the unit test code a call for a mocked transaction based on a name of the mocked transaction within the unit test code; identifying a location of the mocked transaction in a mocked transaction repository, the mocked transaction repository comprising mocked transaction code associated with the mocked transaction; executing the mocked transaction code associated with the mocked transaction; and outputting a response to the mocked transaction based at least in part on the unit test code
    Type: Application
    Filed: April 10, 2018
    Publication date: October 10, 2019
    Applicant: CA, Inc.
    Inventors: Robert Williams, Stephen J. Tyler
  • Patent number: 10437704
    Abstract: In various embodiments, a method of automatically identifying back-end components of a processing system may be performed. The method may include logging socket communications as a plurality of stack traces. The method may further include filtering the plurality of stack traces to identify a transaction from a particular thread, where the transaction includes a write stack trace and a read stack trace. The method may further include identifying, based on an examination of common stack elements between the write stack trace and the read stack trace, a candidate software component as a back-end component that is communicating with an external software component.
    Type: Grant
    Filed: November 22, 2016
    Date of Patent: October 8, 2019
    Assignee: CA, Inc.
    Inventors: Karmjit Singh, Ramesh Mani, Martin Tali
  • Patent number: 10437712
    Abstract: Provided is a process, including: obtaining a model of an application program interface (“API”); receiving a request to generate a functional-test specification for the API; detecting sets of functionality identified by the model of the API and respective sets of parameters corresponding to the detected sets of functionality by parsing the model of the API; in response to receiving the request, generating the functional-test specification for the API by, for at least some respective detected sets of functionality, specifying respective sets of functional tests based on corresponding sets of parameters.
    Type: Grant
    Filed: June 20, 2018
    Date of Patent: October 8, 2019
    Assignee: CA, INC.
    Inventors: Stephen Tyler, Vijay Senapathi, Apoorva Choudhary, Wendell Beckwith, Naresh Pillarikuppam
  • Patent number: 10437626
    Abstract: Provided herein are systems and methods for providing isolated virtual image communication in a virtual computing environment. Initially, a guest virtual machine that is activated in a virtual computing environment may be isolated into a private network. A service request may then be formulated at the guest virtual machine and addressed to a predetermined non-existent address. The request is then ostensibly sent to the predetermined address, whereupon the service request is actually transmitted to a shared resource with a security appliance machine in the virtual computing environment. The request is then forwarded to the security appliance machine and a reply formulated. The reply is sent back to the guest virtual machine via the shared resource.
    Type: Grant
    Filed: October 10, 2017
    Date of Patent: October 8, 2019
    Assignee: CA, INC.
    Inventors: Igal Weinstein, Nir Barak
  • Patent number: 10438212
    Abstract: A system receives data relating to a ticket from a customer of a business organization. The system processes the data using an ensemble machine learning artificial intelligence processor. The ensemble machine learning artificial intelligence processor includes a natural text language processor for analyzing text exchanged between the customer and an agent of the business organization. The ensemble machine artificial intelligence processor also includes a plurality of multivariate machine learning processors for analyzing a handling of the ticket by the business organization. The system generates results from the analysis of the natural language text processor and the analyses of the plurality of multivariate machine learning processors, and provides the results to a meta-learner processor.
    Type: Grant
    Filed: November 4, 2013
    Date of Patent: October 8, 2019
    Assignee: CA, Inc.
    Inventors: Abdul Khader Jilani, Narayanabhatla Lalithakishore
  • Patent number: 10437686
    Abstract: To eliminate additional development for monolithic applications, the high availability services are externalized from the application and performed by an agent executing alongside an application on a server or computing device. The agent is provided resources for verifying that an application is active and for controlling the application. The agent can use the provided resources to initialize a failover instance of the application as needed. Additionally, the agent can communicate and broadcast the status of its monitored application(s) to other agents through a shared database so that an agent on another server can initialize a failover instance of the application as needed. The agent can synchronize configuration files among the one or more instances of an application so that the application executes uniformly across all instances. The file synchronization is performed externally from the application and does not require additional development or modification of the existing monolithic application.
    Type: Grant
    Filed: September 29, 2017
    Date of Patent: October 8, 2019
    Assignee: CA, Inc.
    Inventors: Yang Yang, Patricia Ann Harasta
  • Patent number: 10439987
    Abstract: Provided is a method for securing network traffic flow in a multi-service containerized application, including: obtaining, with one or more processors, a composition record defining a multi-service containerized application; analyzing, with one or more processors, the composition record to look for one or both of network traffic patterns and network traffic flow; adding, with one or more processors, to the composition record a configured firewall container definition of a network traffic enforcement container that upon execution of the multi-service containerized application is communicatively coupled between a first container and a second container of the multi-service containerized application, wherein the first container and the second container are configured to communicate with each other across a first virtualized network; and converting, with one or more processors, the first virtualized network between the first container and the second container into a second virtualized network and a third virtualiz
    Type: Grant
    Filed: June 12, 2017
    Date of Patent: October 8, 2019
    Assignee: CA, INC.
    Inventors: Dann M. Church, Mark Emeis, Prabodh Joshi, James DOuglas Engquist, Bob Hendrich
  • Publication number: 20190303626
    Abstract: According to one aspect of the present disclosure, an interactive graphical user interface (GUI) is presented on a display of a personal computing device, and it is determined that the GUI includes an entry field for receipt of sensitive information from a user of the personal computing device. An interaction with the entry field is detected, and at least a portion of the GUI near the entry field is automatically modified to provide a view of physical surroundings near the personal computing device. The portion of the GUI remains modified while the user inputs the sensitive information to the entry field, and the portion of the GUI is modified in response to detecting the interaction and based on determining that the GUI includes a request for entry of sensitive information.
    Type: Application
    Filed: March 28, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Kiran Kumar BS, Mahendra Nimishakavi
  • Publication number: 20190303115
    Abstract: A current context is determined for use of a software development tool by a user during a particular time. The current context includes attributes of a particular software coding project, and the software development tool is used to edit the particular software coding project during the particular time. A webpage is identified for presentation in a web browser and a segment of sample source code is detected within content of the webpage. Values are determined in the segment of sample source code corresponding to the attributes of the particular software coding project. The values in the segment of sample source code are autonomously replaced with project-specific values to cause a project-specific version of the segment of sample source code to be presented in the webpage during a session corresponding to the particular time, the project-specific values based on the attributes of the particular software coding project.
    Type: Application
    Filed: March 30, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventors: Ian Aloysious Kelly, Peter Ian Oliveira
  • Publication number: 20190303140
    Abstract: A request is received for a computing system to automatically identify a peer reviewer for a particular source code component. A copy of the particular source code component is accessed from computer memory and analyzed to determine a set of characteristics of the particular source code component. A plurality of other source code components are analyzed, where were authored by a plurality of other users to determine a particular one of the other users as authoring source code with characteristics similar to the set of characteristics. Data is generated to identify selection of the particular user as a peer review candidate for reviewing the particular software component.
    Type: Application
    Filed: March 30, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventor: Ian Aloysious Kelly
  • Publication number: 20190303037
    Abstract: Aspects of the embodiments include a computer-implemented method including identifying one or more data buffer locations from a least recently used (LRU) buffer pool structure for writing data into a data buffer; writing data into the identified one or more data buffer locations; reading the data from the one or more data buffer locations; and assigning the one or more data buffer locations to a least recently used buffer locations in the LRU.
    Type: Application
    Filed: March 30, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventor: Richard Stephen Williamson
  • Publication number: 20190303928
    Abstract: According to one aspect of the present disclosure, a payment initiation request is received at a point of sale (POS) device from a user device. A challenge string stored at the POS device is transmitted from the POS device to the user device based on the payment initiation request. Payment information and a signed version of the particular challenge string are received at the POS device from the user device. The signed version of the particular challenge string is based on a private key associated with the user device and the particular challenge string. An authentication request including the signed version of the particular challenge string is transmitted from the POS device to a server device. An indication of whether the user device is authenticated is received at the POS device, from the server device, based on the authentication request, and a payment protocol is executed using the payment information.
    Type: Application
    Filed: March 29, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant, Sandeep Banisetti
  • Publication number: 20190303107
    Abstract: Lines of code entered in a source code editor graphical user interface (GUI) in a particular coding project are identified and similarities are autonomously determined between the particular coding project and a subset of coding project templates in a plurality of coding project templates based on the lines of code. The subset of coding project templates is based on a set of other coding projects, and the similarities are determined based at least in part on a correlation between the lines of code of the particular coding project and lines of code in the set of other coding projects. Code suggestions are determined, which are defined according to the subset of code templates, for lines of code following the particular lines of code. A particular GUI window is presented for display with the source code editor GUI, where the suggestions are presented within the particular GUI window.
    Type: Application
    Filed: March 30, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventor: Ian Aloysious Kelly
  • Publication number: 20190306221
    Abstract: Embodiments are provided herein for applying adaptive encryption in checkpoint recovery of a file transfer. An embodiment includes establishing a first connection between a first node and a second node, generating a first ciphertext object at the second node by encrypting first input data received from the first node based, at least in part, on an encryption algorithm and an input block, and storing the first ciphertext object in an output file. The embodiment further includes, subsequent to a communication failure via the first connection, establishing a second connection between the first node and the second node, obtaining a last block stored in the output file, and generating a second ciphertext object by encrypting second input data received from the first node based, at least in part, on the encryption algorithm and the last block. More specific embodiments include storing a current file offset based on detecting the communication failure.
    Type: Application
    Filed: March 28, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventors: Dayakar Reddy Venkivolu, Machhindra Narayan Nale
  • Publication number: 20190306091
    Abstract: According to one aspect of the present disclosure, a text-based message is received on a device. The text-based message includes an access control indicator in a body of the text-based message. The text-based message is parsed to locate the access control indicator, and it is determined whether the access control indicator is associated with a particular entry in an access control table. The access control table includes associations between one or more access control indicators and one or more applications on the device. It is determined that the text-based message is associated with a particular one of the applications on the device based on determining that the access control indicator is associated with the particular entry, and access to the text-based message by the particular application on the device is allowed based on determining, from the access control indicator, that the text-based message is associated with the particular application.
    Type: Application
    Filed: March 28, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Mahendra Nimishakavi
  • Publication number: 20190303110
    Abstract: In one embodiment, source code associated with a computing application is accessed, and based on an analysis of the source code, an application architecture associated with the computing application is identified, and a three-dimensional representation of the application architecture is generated. Moreover, a user perspective within a virtual reality system is identified based on an input from the virtual reality system. A virtual development environment for the computing application is generated and is further caused to be displayed by the virtual reality system, wherein the virtual development environment comprises a three-dimensional rendering of the computing application, and wherein the three-dimensional rendering is based on the three-dimensional representation of the application architecture and the user perspective within the virtual reality system.
    Type: Application
    Filed: March 29, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventor: Susan L. Brude
  • Publication number: 20190303476
    Abstract: Aspects of the embodiments are directed to a computer-implemented method that may include receiving a request for data records from an application; determining that a hit ratio for finding the data records in one or more data buffers within a data buffer pool is below a threshold hit ratio value; and writing the data records to an application-specific data buffer pool, the application-specific data buffer pool associated with the application that requested the data records.
    Type: Application
    Filed: March 30, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventor: Richard Stephen Williamson
  • Publication number: 20190303564
    Abstract: A cursor is detected within a line of code presented in a source code editor window of a graphical user interface (GUI) of an integrated development environment (IDE), and a particular segment of code within a software program is determined to correspond to the line of code. A level of risk associated with the particular segment of code is determined from data comprising a repository of code changes relating to the particular segment of code, where the level of risk indicates a likelihood that changes to source code of the software program relating to the particular segment of code will jeopardize successful operation of the software program. At least a portion of the line of code is automatically highlighted within the source code editor window based on the level of risk and responsive to the placement of the cursor within the line of code.
    Type: Application
    Filed: March 30, 2018
    Publication date: October 3, 2019
    Applicant: CA, Inc.
    Inventor: Ian Aloysious Kelly