Patents Assigned to CA, Inc.
  • Patent number: 10387003
    Abstract: A method, system and computer program product for providing a configurable user interface comprises receiving, by a server computer, a request for information to be rendered in a user interface; and in response to the request, sending, by the server computer, the information to be rendered and an identifier related to one of a plurality of user interface components. Also, in response to the request, the server computer sends a registry of the plurality of user interface components, wherein the registry comprises a respective entry for each of the plurality of user interface components. More particularly, the respective entry for a particular one of the plurality of user interface components comprises: a) a location of a configuration associated with the particular one user interface component; and b) a plurality of attributes and corresponding attribute values associated with the particular one user interface component.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: August 20, 2019
    Assignee: CA, Inc.
    Inventors: Howard A. Abrams, Stanislav Mitranic
  • Patent number: 10389596
    Abstract: Provided is a process including: obtaining, with one or more processors, network-traffic data describing a graph of network traffic among a plurality of hosts of one or more distributed applications executing on a plurality of computing devices between which the network traffic is sent; inferring, with one or more processors, a topology of a first distributed application among the one or more distributed applications based on the network-traffic data; causing, with one or more processors, a visual representation of the topology to be presented in a graphical user interface.
    Type: Grant
    Filed: March 30, 2017
    Date of Patent: August 20, 2019
    Assignee: CA, Inc.
    Inventors: Scott Strobel, Ryan Clemens, William Hunt, Jester Goldman
  • Patent number: 10387217
    Abstract: Provided is a process, including: obtaining a task tree; traversing the task tree to obtain an unordered set of tasks and an ordered list of tasks; adding the unordered set of tasks to at least some of a plurality of queues of tasks; adding the ordered list of tasks to at least some of the plurality of queues of tasks; and receiving a first task request from a first worker process in a concurrent processing application and, in response to the first task request: accessing a first queue from among the plurality of queues, determining that the first queue is not locked, accessing a first task in the first queue in response to the first task being a next task in the first queue, determining that the first task is a member of a sequence of tasks specified by the ordered list and, in response, locking the first queue, and assigning the first task to the first worker process.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: August 20, 2019
    Assignee: CA, Inc.
    Inventors: Mubdiu Reza Chowdhury, Greg Coonrod, Avaneesh Srivastav, Bilal M. Bhatti
  • Patent number: 10387144
    Abstract: A method for determining logging statement coverage of code. According to the inventive embodiments of this disclosure, a method is used for determining logging statement coverage of code, the method including the step of determining a plurality of code paths through the code file that may be traversed during execution of a program, identifying a plurality of branches in the code paths that do not contain a logging statement; and calculating, as a percentage of the plurality of code paths through the code file that may be traversed during execution of percentage code paths that have not been traversed the plurality of branches through the code file that do not contain a logging statement.
    Type: Grant
    Filed: November 19, 2015
    Date of Patent: August 20, 2019
    Assignee: CA, Inc.
    Inventor: Dayne Howard Medlyn
  • Patent number: 10380377
    Abstract: In accordance with the teachings of the present disclosure, a method is provided for reducing the chances of shoulder surfing. The method may include determining an approximate angle of orientation of a mobile device and selecting one of first or second input key layouts, based upon the approximate angle of orientation. The first input key layout may be a standard layout of alphanumeric characters and the second input key layout may be a disordered layout of the alphanumeric characters. The method may also include displaying the selected one of the first or second input key layouts at a graphical user interface of the mobile device and receiving an input of sensitive information at the graphical user interface.
    Type: Grant
    Filed: March 31, 2016
    Date of Patent: August 13, 2019
    Assignee: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Jameel Ahmed Kaladgi, Yashwant Ramkishan Sawant
  • Patent number: 10378893
    Abstract: Determining the physical location of wirelessly connected devices within a network can provide a number of security benefits. However, manually determining and configuring the physical location of each device within a system can be burdensome. To ease this burden, devices within a network are equipped with a location detection sensor that is capable of automatically determining a device's location in relation to other devices within the network. A location detection sensor (“sensor”) may include a light source, a light direction sensor, a rangefinder, and a radio or wireless network interface. Two location detection sensors can perform a location detection process to determine their relative locations to each other, such as the distance between them. As more sensors are added to a network, a sensor management system uses the relative locations determined by the sensors to map the sensors to a physical space layout.
    Type: Grant
    Filed: July 29, 2016
    Date of Patent: August 13, 2019
    Assignee: CA, Inc.
    Inventor: Serguei Mankovskii
  • Patent number: 10382431
    Abstract: Identifying a communication source includes receiving a message from a client computer requesting access to a computer-based resource; and receiving, a network signature from the client computer, wherein the network-related signature comprises a value representing how many routing devices are on a network path between the client computer and a predetermined computer. Also included is determining whether the vector of values matches a vector of stored values, each stored value potentially corresponding to a respective one of the values in the vector of values; and limiting access to the computer-based resource based at least in part on the vector of values not matching the vector of stored values.
    Type: Grant
    Filed: March 3, 2017
    Date of Patent: August 13, 2019
    Assignee: CA, Inc.
    Inventors: Himanshu Ashiya, Atmaram Shetye, Roshan Mathews
  • Patent number: 10379707
    Abstract: A method, system and computer program product for providing a configurable user interface comprises receiving, by a server computer, a request for information to be rendered in a user interface; and in response to the request, sending, by the server computer, the information to be rendered and an identifier related to one of a plurality of user interface components. Also, in response to the request, the server computer sends a registry of the plurality of user interface components, wherein the registry comprises a respective entry for each of the plurality of user interface components. More particularly, the respective entry for a particular one of the plurality of user interface components comprises: a) a location of a configuration associated with the particular one user interface component; and b) a plurality of attributes and corresponding attribute values associated with the particular one user interface component.
    Type: Grant
    Filed: March 30, 2015
    Date of Patent: August 13, 2019
    Assignee: CA, Inc.
    Inventors: Howard A. Abrams, Stanislav Mitranic
  • Patent number: 10379844
    Abstract: To ensure that probe configuration information is accurate, UI templates are validated against probe configuration files. A UI template validation system retrieves a template which indicates configuration information for a particular probe type and retrieves a configuration file for the probe type. The configuration file indicates a set of key-value pairs for various settings that can be implemented by the probe. For example, a configuration file may include a key “probe_timeout” which indicates that the probe has a configurable setting for a timeout period. The system validates the configuration information in the template by ensuring that each key indicated in the template matches a key in the probe configuration file. Additionally, the system also ensures that any default values paired with keys in the configuration file are accurately indicated in the template.
    Type: Grant
    Filed: March 29, 2017
    Date of Patent: August 13, 2019
    Assignee: CA, Inc.
    Inventors: Anthony Dewayne Scott, Jake John Paul Boeckerman
  • Publication number: 20190243751
    Abstract: Systems, methods and computer program products for performing software regression testing are provided. A sitemap comprising a hierarchy of nodes is displayed on a display, each node representing a block of source code for a program. An indication of a user selection of a plurality of nodes in the hierarchy is received. Responsive to receiving the indication, a lowest node of the nodes that is located at a lowest level of the hierarchy is determined and identified as a user selected node. A list of test cases to test the source code represented by the user selected node is displayed. Responsive to receiving an indication of a selection of one of the test cases in the list of test cases displayed, a message having an indication to execute the one of the test cases in the list of test cases displayed is transmitted, to a server device via a network.
    Type: Application
    Filed: February 2, 2018
    Publication date: August 8, 2019
    Applicant: CA, Inc.
    Inventors: Madhusudhan Ganda, Kiran Kumar, Sumit Gupta, Pradeep Kumar Kanagaraj, Swapnel Shrivastava, Narendra Dhulipalla, Ramanuja Charyulu
  • Patent number: 10372542
    Abstract: If an event management system or component within an event management system fails, events generated by systems and applications monitored by the event management system may not be processed or analyzed. As a result, the performance and health of the systems and applications may be unknown. To reduce the impact of a failure, an event management system can include at least two event managers: a primary event manager and one or more standby event managers. The standby event managers are configured to handle event processing tasks upon a failure of the primary event manager. To be prepared for a failure of the primary event manager, the standby event manager receives state data and copies of events. After determining that the primary event manager has failed, the standby event manager can begin processing events.
    Type: Grant
    Filed: September 28, 2015
    Date of Patent: August 6, 2019
    Assignee: CA, Inc.
    Inventor: Richard Bennett Whitner
  • Patent number: 10375001
    Abstract: A computing device, such as a network server or user terminal, automatically performs one or more predefined actions on inbound email messages responsive to receiving the inbound email messages. However, rather than base the performance of the actions on information manually provided to an email application by the user, the computing device retrieves event-related information stored in one or more calendar applications communicatively connected to the email application. The computing device then utilizes that information to perform the predefined actions. One example of such an action is automatically generating and sending an autoreply email message to the sender of the inbound email message.
    Type: Grant
    Filed: January 15, 2018
    Date of Patent: August 6, 2019
    Assignee: CA, Inc.
    Inventors: Pavel Zlatnik, Daniel Samek, Hana Doubkova
  • Patent number: 10372202
    Abstract: A computing device has a camera and tracks the movement of a user's eye as the user looks at a display monitor. Upon detecting that a user is unable to locate the position of a cursor on the display monitor, the computing device displays the cursor at a conspicuous location on the display monitor so that the user is likely to find the cursor. The location at which the cursor is conspicuously displayed is selected by the computing device based on an analysis of the user's eye movements.
    Type: Grant
    Filed: January 20, 2014
    Date of Patent: August 6, 2019
    Assignee: CA, Inc.
    Inventors: Steven L. Greenspan, Robert Biddle, Judith M. Brown
  • Patent number: 10372482
    Abstract: A topology-based transversal analysis service has been created that correlates topologies of different domains of a distributed application and creates cross-domain “stories” for the different types of transactions provided by the distributed application. A “story” for a transaction type associates an event(s) with a node in an execution path of the transaction type. This provides context to the event(s) with respect to the transaction type (“transaction contextualization”) and their potential business impact. The story is a journal of previously detected events and/or information based on previously detected events. The events have been detected over multiple instances of a transaction type and the journal is contextualized within an aggregate of execution paths of the multiple instances of the transaction type. The story can be considered a computed, ongoing narrative around application and infrastructure performance events, and the narrative grows as more performance-related events are detected.
    Type: Grant
    Filed: September 28, 2017
    Date of Patent: August 6, 2019
    Assignee: CA, Inc.
    Inventors: Erhan Giral, Tomas Kolda
  • Patent number: 10366418
    Abstract: Methods include obtaining client data corresponding to a client. Methods further include determining one or more areas of interest of the client using the client data. Methods further include obtaining location data corresponding to the client. The location data comprises a geographic location of the client and a current direction of movement of the client. Methods further include determining one or more potential locations of the client using the location data. Methods further include receiving a plurality of commercial messages from a central control center, each of the plurality of commercial messages associated with a plurality of tags. Methods further include identifying a relevant commercial message from the plurality of commercial messages, such that the relevant commercial message is associated with a tag corresponding to at least one of the one or more areas of interest and a tag corresponding to at least one of the one or more potential locations.
    Type: Grant
    Filed: May 30, 2013
    Date of Patent: July 30, 2019
    Assignee: CA, Inc.
    Inventors: Steven M Isenberg, Irena Shaigorodsky, Alvin Dale Black
  • Patent number: 10359947
    Abstract: A method includes creating, by one or more computing devices, a first pool of memory resources from a plurality of memory resources in a cluster. The first pool comprises memory resources that (1) have been allocated to a respective guest virtual machine that is not currently being used and (2) that have been marked as unused by the respective guest virtual machine. The method also includes invoking, by the one or more computing devices, a number of operations on the memory resources in the first pool, wherein the number of operations is designed to signal a memory resource manager to reclaim the allocated memory resources that have been marked as unused from the first pool into an unallocated pool of memory resources in the cluster.
    Type: Grant
    Filed: July 25, 2017
    Date of Patent: July 23, 2019
    Assignee: CA, Inc.
    Inventors: Ashish Kumar Singh, Sarvani Kuchibhotla, Vasudev Ippili, Pradeep Kumar Das
  • Patent number: 10360558
    Abstract: A method for two factor authentication is described. The method comprises sending an activation code stored on a mobile device to a server for verification. An encrypted secret key generated by the server using the activation code is received. The secret key is decrypted using the activation code stored on the mobile device. The mobile device encrypts the secret key using a predetermined PIN. As a result of a user inputting the predetermined PIN, the secret key is decrypted, the mobile device generates a first token using the secret key and transmits the first token to the server to authenticate the user. After receiving authentication from the server, the information on the mobile device is synced with the server.
    Type: Grant
    Filed: March 17, 2015
    Date of Patent: July 23, 2019
    Assignee: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Mahesh Malatesh Chitragar, Vishwanatha Salian
  • Patent number: 10361943
    Abstract: A method may provide performance management for a data communication network including a plurality of network elements. The method may include defining a cluster of the network elements for a performance metric, and defining one of the network elements of the cluster as a proxy network element for the cluster. A proxy baseline of the performance metric for the cluster may be calculated based on performance metric data for the proxy network element, and the performance metric for each of the network elements of the cluster may be monitored using the proxy baseline of the performance metric. Related systems and computer program products are also discussed.
    Type: Grant
    Filed: February 6, 2017
    Date of Patent: July 23, 2019
    Assignee: CA, Inc.
    Inventor: David Cosgrove
  • Patent number: 10354060
    Abstract: A method for receiving a first access request from a client computer is described. The method comprises, in response to receiving the first access request, generating a query string comprising a predetermined number of characters, designating, via a unique indicator, a first randomized subset of the predetermined number of characters, wherein the first randomized subset comprises a plurality of the predetermined number of characters, and requesting a first predefined response comprising the first randomized subset of the predetermined number of characters. The method further comprises receiving a first client input from the client computer, determining whether the first client input matches the first predefined response, and accepting the first access request if the first client input matches the first predefined response.
    Type: Grant
    Filed: September 3, 2015
    Date of Patent: July 16, 2019
    Assignee: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Jameel Ahmed Kaladgi
  • Patent number: 10354197
    Abstract: A method includes reading a plurality of historical data from a storage. The method also includes generating, using a processor, a candidate pattern list. The method also includes determining, using the points stored in the candidate pattern list, whether at least one maximal clique exists in the candidate pattern list, each maximal clique indicating a known significant pattern. The method further includes, in response to determining that at least one maximal clique exists in the candidate pattern list, for each of the at least one maximal cliques, determining a signature of the maximal clique and storing the signature of the maximal clique and an identifier identifying the known significant pattern to a library in the storage. The method further includes determining causal relationships between the identified significant patterns and storing in the library.
    Type: Grant
    Filed: November 13, 2015
    Date of Patent: July 16, 2019
    Assignee: CA, Inc.
    Inventor: Vidarshana Wijethilaka Bandara