Patents Assigned to CA, Inc.
-
Patent number: 10430257Abstract: Provided is a process including: receiving, with an infrastructure monitoring application, metrics and events from a plurality of infrastructure agents executing on a plurality of computing devices; receiving an event record from a given computing device among a plurality of computing devices executing the distributed application; accessing a plurality of parameters of a computing device associated with the device identifier; determining one or more network-architecture topology host identifiers based on the plurality of parameters; and storing in memory a correlation between the event record and the one or more network-architecture topology host identifiers.Type: GrantFiled: March 9, 2018Date of Patent: October 1, 2019Assignee: CA, Inc.Inventors: Julio Cesar Garcia, James Perkins, Mark Costilow
-
Patent number: 10425312Abstract: In accordance with the teachings of the present disclosure, a method of generating a computer alarm is disclosed. The method includes determining a new instance of a characteristic of an element of a computing network to be monitored, identifying a relationship of the element to other elements of the computing network, and automatically creating an alarm threshold for the new instance of the characteristic based upon the relationship of the element to the other elements of the computing network.Type: GrantFiled: December 11, 2013Date of Patent: September 24, 2019Assignee: CA, Inc.Inventors: Andrew R. Lawrence, Hugh-John E. Flemming, David L. Ashley
-
Patent number: 10423651Abstract: A method by a network node includes generating logically associated clusters of reviews submitted by users regarding an application program executed on user equipments operated by the users, generating a separate summary for each of the clusters of the reviews, and communicating the summaries to a network node.Type: GrantFiled: March 27, 2015Date of Patent: September 24, 2019Assignee: CA, Inc.Inventor: Satnam Singh
-
Patent number: 10423523Abstract: Systems, methods and computer program products for performing software regression testing are provided. A sitemap comprising a hierarchy of nodes is displayed on a display, each node representing a block of source code for a program. An indication of a user selection of a plurality of nodes in the hierarchy is received. Responsive to receiving the indication, a lowest node of the nodes that is located at a lowest level of the hierarchy is determined and identified as a user selected node. A list of test cases to test the source code represented by the user selected node is displayed. Responsive to receiving an indication of a selection of one of the test cases in the list of test cases displayed, a message having an indication to execute the one of the test cases in the list of test cases displayed is transmitted, to a server device via a network.Type: GrantFiled: February 2, 2018Date of Patent: September 24, 2019Assignee: CA, Inc.Inventors: Madhusudhan Ganda, Kiran Kumar, Sumit Gupta, Pradeep Kumar Kanagaraj, Swapnel Shrivastava, Narendra Dhulipalla, Ramanuja Charyulu
-
Patent number: 10423647Abstract: In a datacenter setting, a summary of differences and similarities between two or more states of the same or similar systems are predicted. Initially, a Long Short-Term Memory (LSTM) neural network is trained with to predict a summary describing the state change between at least two states of the datacenter. Given a set of training data (at least two datacenter states that are annotated with a state change description), the LSTM neural network learns which similarities and differences between the datacenter states correspond to the annotations. Accordingly, given a set of test data comprising at least two states of a datacenter represented by context graphs that indicate a plurality of relationships among a plurality of nodes corresponding to components of a datacenter, the LSTM neural network is able to determine a state change description that summarizes the differences and similarities between the at least two states of the datacenter.Type: GrantFiled: December 28, 2016Date of Patent: September 24, 2019Assignee: CA, Inc.Inventors: Jaume Ferrarons Llagostera, David Solans Noguero, David Sanchez Charles, Alberto Huelamo Segura, Marc Sole Simo, Victor Muntes Mulero
-
Patent number: 10419427Abstract: In an embodiment, a password risk evaluator may receive a request including a user identifier (ID) and a password. The password risk evaluator may retrieve a password preference model associated with the user ID, and may determine a risk score indicating a likelihood that the password is associated with the user ID. For example, the password preference model may be based on previous passwords used by the user, and may identify one or more characteristics, formulas, rules, or other indicia typically employed by the user in creating passwords. If the password supplied in the request matches or is similar to one or more elements of the password preference model, it may be more likely that the password in the request is a password supplied by the user. That is, the risk score may be an authentication of the user, or part of the authentication of the user, in some embodiments.Type: GrantFiled: September 20, 2018Date of Patent: September 17, 2019Assignee: CA, Inc.Inventors: Steven L. Greenspan, Debra Danielson, Kenneth W. S. Morrison, Hongrui Gong
-
Patent number: 10417449Abstract: To protect confidential data, a mobile device determines whether the mobile device is at a location susceptible to visual capture of confidential data entered into the phone by external cameras. The mobile device determines whether focus of a display is on a field in which confidential data is entered. If the mobile device determines that it is at a location susceptible to an external imaging device visually capturing confidential data input into the input field, then the mobile device activate a light source on a same side as the screen presenting the display.Type: GrantFiled: January 10, 2018Date of Patent: September 17, 2019Assignee: CA, Inc.Inventors: Mohammed Mujeeb Kaladgi, Jameel Ahmed Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant
-
Patent number: 10417079Abstract: Embodiments of the present disclosure relate to a fault tolerant root cause analysis (RCA) system that is able to handle calculation failures during runtime. Calculations (e.g., evaluation of a diagnostic model for a specific component or device) that are performed during the RCA are integrated using different resources of the system under analysis. In order to make a final diagnosis, the resources exchange messages containing calculation inputs and outputs. Calculation problems due to calculation failures in a particular resource can be resolved efficiently which reduces resource utilization and minimizes failure propagation to other parts of the system. Accordingly, the system is able to recover and output a diagnosis even if some of the resources fail or generate problems.Type: GrantFiled: April 12, 2017Date of Patent: September 17, 2019Assignee: CA, Inc.Inventors: Michal Zasadzinski, Marc Sole Simo, Victor Muntes Mulero
-
Patent number: 10412077Abstract: An intermediary can securely migrate a security credential between systems despite different underlying encoding technologies used for authentication by the system. This intermediary can also securely migrate an identity between different authentication technologies. A secure login interface program code that is digitally signed by the intermediary is provided in advance to devices that will source authentication requests. The interface program code is at least secure because it has been digitally signed by the intermediary. An instance of the secure interface program code directs authentication requests entered into the interface instance to the intermediary, which is at least identified by the digital signature. After a successful authentication by a destination system identified by the authentication request, the intermediary can migrate the authenticated security credential to a migration target.Type: GrantFiled: March 21, 2016Date of Patent: September 10, 2019Assignee: CA, Inc.Inventor: Nikhil Kumar
-
Patent number: 10409367Abstract: Provided is a process of configuring a dashboard of a graphical user interface, the process including: obtaining identifiers of metrics; obtaining features that are properties of the metrics; accessing in a graph-effectiveness matrix effectiveness scores corresponding to the features; selecting a plurality of graphs to graphically represent the metrics in a dashboard; and instructing a computing device to display the dashboard.Type: GrantFiled: December 21, 2016Date of Patent: September 10, 2019Assignee: CA, Inc.Inventors: Maria Velez-Rojas, Ye Chen, Steven Greenspan, Jin Zhang
-
Patent number: 10402238Abstract: An announcement message is received on a control channel at a system controller hosted on a first software container in a software system from a first tool hosted on a second software container in the software system. Capabilities of the first tool are identified at the system controller and a first channel and a second channel are assigned to the first tool based on the capabilities. The first and second channels are software-based communication channels in the software system, the first channel assigned to the first tool for use in sending messages to other tools in the software system and the second channel assigned to the first tool for use in receiving messages from other tools. A channel assignment message is sent to the first tool on the control channel, where the channel assignment message indicates assignment of the first and second channels to the first tool.Type: GrantFiled: April 6, 2017Date of Patent: September 3, 2019Assignee: CA, Inc.Inventor: Nimal K. Gamage
-
Patent number: 10402751Abstract: A method includes performing, by a processor: receiving a document containing subject matter related to a course of action, the document comprising a plurality of sub-documents that are related to one another in a time sequence, converting the document to a vector format to generate a vectorized document that encodes a probability distribution of words in the document and transition probabilities between words, applying a machine learning algorithm to the vectorized document to generate an estimated vectorized document, associating the estimated vectorized document with a reference document; predicting future subject matter contained in a future sub-document of the document based on the reference document, and adjusting the course of action responsive to predicting the future subject matter.Type: GrantFiled: March 21, 2016Date of Patent: September 3, 2019Assignee: CA, Inc.Inventors: Jaume Ferrarons Llagostera, David Sánchez Charles, Victor Muntés Mulero
-
Patent number: 10397349Abstract: Efficiently identifying transactions processed by a software application, such as a server application is disclosed. In one embodiment, transactions are identified by applying a set of rules to communications between a client and server to determine whether certain patterns are in the communications. For example, the rules may look for some combination of parameters in the transactions. As a particular example, the rules may be used to look for parameters in HTTP requests. The rules are organized in a way that allows efficient processing. For example, the rules may be organized based on the frequency with which the parameters are expected to occur in the transactions and the frequency with which each transaction is expected to occur. The rules may be updated if the expected frequencies deviate from actual frequencies, such that the rules can be organized for more efficient processing.Type: GrantFiled: January 12, 2017Date of Patent: August 27, 2019Assignee: CA, Inc.Inventors: Marco Gagliardi, Neil Desai
-
Patent number: 10395200Abstract: A control computer implements a multi-stage process to automatically repair errors in a policy using selectable, pluggable repair modules. In the first stage, the control computer identifies the errors that caused the policies to fail the validation process, and associates the errors with corresponding repair modules. The repair modules comprise information that is needed to correct or repair the errors. In the second stage, the control computer generates commands for correcting the errors based on the information in the repair modules. In a third stage, the control computer applies the commands to the policies that failed the validation process to correct the errors.Type: GrantFiled: March 17, 2016Date of Patent: August 27, 2019Assignee: CA, Inc.Inventors: Mikhail Gurevich, Stephan Erickson, William Cohen, Uzi Cohen
-
Patent number: 10394583Abstract: Transaction data is accessed that has been generated from monitoring of a plurality of transactions in a system that includes a plurality of software components. The transaction data is assessed to identify that a particular one of the plurality of transactions meets a particular one of a set of conditions based on an attribute of the particular transaction. A portion of the transaction data describing the particular transaction is selected based on the particular transaction meeting the particular condition. A model of a particular one of the software components involved in the particular transaction is generated using the selected portion of the transaction data. The model is used to launch a computer-implemented simulation of the particular software component within subsequent transactions of the system.Type: GrantFiled: March 31, 2016Date of Patent: August 27, 2019Assignee: CA, Inc.Inventors: Rich J. Lau, Bing Li
-
Patent number: 10395232Abstract: Methods for enabling secure online transactions using a mobile device are described. A mobile device may capture an image associated with a banking card in order to generate checkout information and to automatically populate checkout fields with the checkout information prior to completing an online transaction. In some cases, the mobile device may be used to select items to be purchased from an online merchant, access a checkout page of the online merchant for purchasing the selected items, acquire an image that encodes checkout information, acquire a personal code associated with an end user of the mobile device, generate the checkout information using the acquired image and the personal code, automatically populate one or more fields associated with the checkout page with the checkout information, delete the checkout information from the mobile device, and submit the checkout information to complete the purchase of the selected items.Type: GrantFiled: October 1, 2014Date of Patent: August 27, 2019Assignee: CA, Inc.Inventors: Rajendra Gopalakrishna, Tarun Agrawal, Roshini Thyagaraj
-
Patent number: 10397311Abstract: A thing-sourcing project request including requirements for a thing-sourcing task that requires data input by a thing-sourcing device is received from a requestor device. A determination is made if real-time data is needed in order to complete the thing-sourcing task. In response to determining that real-time data is not needed, a determination is made if a similar thing-sourcing task has been previously completed. If not, the method determines if the thing-sourcing task can be completed using pre-existing data. If so, a data archive is searched for relevant pre-existing data that can be used to complete the thing-sourcing task. The thing-sourcing task is completed using the relevant pre-existing data, and a response to the thing-sourcing project request is transmitted to the requestor device.Type: GrantFiled: August 16, 2016Date of Patent: August 27, 2019Assignee: CA, Inc.Inventors: Steven L. Greenspan, Victor Muntés Mulero, Marc Solé Simo
-
Publication number: 20190258827Abstract: An authentication server receives an item authentication query message requesting authentication of an item that is available from a computer server. An authentication score for the item is generated based on information contained in the item authentication query message. The authentication score is then provided for display at a client terminal. Authentication of the information contained in the item authentication query provides a level of computer security to end-users.Type: ApplicationFiled: February 19, 2018Publication date: August 22, 2019Applicant: CA, Inc.Inventors: Mohammed Mujeeb Kaladgi, Junaid Ahmed Jameel, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant, Sangharsh Aglave
-
Patent number: 10387498Abstract: Provided is a process including: receiving, from a first service-provider computer system, via a network, with an identity-provider computer system, a request to authenticate a user computing device; forming, with the identity-provider computer system, a first reply-configuration specification from a first plurality of configuration components; determining, with the identity-provider computer system, whether to provide authentication; forming, with the identity-provider computer system, based on the first reply-configuration specification, a reply to the request, the reply including a result of the authentication determination; and sending, with the identity-provider computer system, the reply.Type: GrantFiled: February 15, 2017Date of Patent: August 20, 2019Assignee: CA, Inc.Inventors: Michael Moerk, Joanne Pelkey, Doreen Collins, William Pollard, Vinay Jha
-
Patent number: 10387884Abstract: A method for preventing mobile payment is described. The method comprises generating an authorization request, via a payment module, based on sensitive data on a mobile device. The authorization request is transmitted from the payment module to an issuer system. The issuer system sends a neutralization trigger. In response to receiving the neutralization trigger, the payment module is disabled.Type: GrantFiled: March 18, 2015Date of Patent: August 20, 2019Assignee: CA, Inc.Inventors: Sharath Lakshman Kumar, Mahesh Malatesh Chitragar, Vishwanatha Salian, Stephen Prasad