Patents Assigned to CA, Inc.
  • Patent number: 10613897
    Abstract: The disclosed computer-implemented method for creating program-specific execution environments may include (1) identifying a privileged software program to be executed on a client system in a program-specific execution environment, (2) establishing the program-specific execution environment by (a) determining that at least one process executing on the client system is not essential to operation of the privileged software program to be executed on the client system and (b) suspending execution of the non-essential process in response to identifying the non-essential process, and (3) initiating execution of the privileged software program in the program-specific execution environment. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: December 21, 2016
    Date of Patent: April 7, 2020
    Assignee: CA, Inc.
    Inventors: Ernie Wang, Charlotte Chang, Haik Mesropian
  • Patent number: 10616068
    Abstract: Based on a request to identify a networking component, a first application programming interface (API) signature is selected from a plurality of API signatures within a priority list that associates the first API signature with a corresponding first API type, wherein the first API signature includes a first characteristic. A first API implemented by the networking component is tested to determining whether the first API implemented by the networking component exhibits the first characteristic. A determination is made of whether the networking component implements the first API type based on determining that the first API implemented by the networking component exhibits the first characteristic.
    Type: Grant
    Filed: March 23, 2018
    Date of Patent: April 7, 2020
    Assignee: CA, Inc.
    Inventor: Michael Paul Shevenell
  • Patent number: 10614248
    Abstract: A system can be designed that shares transaction data across different organizations while preserving data privacy and anonymizing the source organization. Organizations can enter into an agreement to share transaction data with each other through a trusted data sharing system. The organizations can input user records that include primary and secondary explicit user identifiers into the data sharing system. The data sharing system can correlate explicit user identifiers of a user across organizations via an internal identifier without exposing explicit user identifiers. The data sharing system comprises a data anonymizer agent for each sharing organization. A data anonymizer agent selectively applies anonymization filters to quasi-identifiers in the transaction data based on quasi-identifier type to extend data privacy protection measures to quasi-identifiers without drastically reducing or eradicating the utility of the quasi-identifiers.
    Type: Grant
    Filed: January 31, 2017
    Date of Patent: April 7, 2020
    Assignee: CA, Inc.
    Inventors: James Andrew Perkins, Nicholas D. Thayer, Corey Adam Cohen
  • Publication number: 20200104246
    Abstract: A system can include a hardware processor and a memory communicably coupled to the hardware processor, the memory for storing data. The hardware processor is to identify, by a testing engine, a function call in computer code; identify, from an identifier of the function call, a test case stored in the memory and mapped to the function call, the test case comprising one or more testing scenarios to test the function call; test the computer code using the test case; and provide a report identifying a result of the testing of the computer code.
    Type: Application
    Filed: October 1, 2018
    Publication date: April 2, 2020
    Applicant: CA, Inc.
    Inventor: Bhuvan Bhatt
  • Publication number: 20200104174
    Abstract: Embodiments include receiving a workload object that comprises program identifiers representing programs to be invoked in a particular order by a computing system, extracting the program identifiers from the workload object, and translating the program identifiers into respective predictions related to consumption of a resource by the programs corresponding to the program identifiers. The translating includes providing the program identifiers in the particular order as inputs to an encoder of a trained prediction model and generating, by a decoder of the trained prediction model, the predictions based, at least in part, on the particular order of the program identifiers.
    Type: Application
    Filed: September 30, 2018
    Publication date: April 2, 2020
    Applicant: CA, Inc.
    Inventors: Vitezslav Vit Vlcek, Premysl Zitka, Petr Vilcinsky, Maryna Pavlienova, Martin Strejc
  • Publication number: 20200104824
    Abstract: A system can include a database, a communication interface, a processing circuit, and a memory. The processing circuit can receive a request from a remote user device to set an authentication password for a transaction and receive first encrypted keypoints associated with a first image of a portable object. The processing circuit can decrypt the first encrypted keypoints to generate first keypoints and store the first keypoints as the authentication password. The processing circuit can receive an authentication request from the remote user device to use the authentication password to authenticate the user of the remote device to complete the transaction. The processing circuit can receive second encrypted keypoints associated with a second image of the portable object and can decrypt the second encrypted keypoints to generate second keypoints. The processing circuit can determine whether the second keypoints match the first keypoints and can transmit authorization of the transaction.
    Type: Application
    Filed: September 27, 2018
    Publication date: April 2, 2020
    Applicant: CA, Inc.
    Inventors: Lyju Vadassery, Vijay Shashikant Kulkarni, Vikrant Nandakumar, Meera Viswanathan
  • Publication number: 20200104046
    Abstract: An embodiment includes identifying a first location in memory containing first data rows copied from a second location in the memory containing second data rows retrieved from one or more objects in a data repository, selecting a portion of the first data rows to be scanned. The portion of the first data rows correspond to a first object of the one or more objects. The embodiment further includes performing a scan of the portion of the first data rows, calculating a probability that the first object contains sensitive data based, at least in part, on one or more instances of sensitive data identified during the scan, and marking the first object in the data repository with a sensitive data indicator. The sensitive data indicator is based, at least in part, on the probability that the first object contains sensitive data.
    Type: Application
    Filed: October 2, 2018
    Publication date: April 2, 2020
    Applicant: CA, Inc.
    Inventors: Robin Hopper, Victor Muntes
  • Publication number: 20200106468
    Abstract: A user equipment includes at least one transmitter, a processor, and a memory. The transmitter transmits RF communication signals through at least one antenna. The processor executes program code in the memory to perform operations. The operations include identifying occurrences of a user being proximately located to the at least one antenna during transmissions. The operations determine duration of the transmissions while the user continues to be identified as being proximately located to the at least one antenna, and generate a cumulative RF exposure metric based on the determined durations of the transmissions. The operations responsively initiate a RF exposure remedial action responsive to the cumulative RF exposure metric satisfying a defined rule. The user terminal may thereby operate to avoid unnecessary RF radiation exposure to a user when that exposure would reach an excessive level.
    Type: Application
    Filed: September 28, 2018
    Publication date: April 2, 2020
    Applicant: CA, Inc.
    Inventor: Tapan Sahoo
  • Patent number: 10607005
    Abstract: The disclosed computer-implemented method for labeling automatically generated reports may include (i) identifying incident reports that describe incidents that each involve at least one computing system and that comprise automatically collected information about the incidents and a manually analyzed subset of incident reports that comprise manually generated information, (ii) assigning at least one label to at least one incident report in the manually analyzed subset based on applying a machine learning model to the manually generated information, (iii) deriving, from the automatically collected information, a set of features that describe incident reports, (iv) propagating at least one label from a labeled incident report to an incident report that is not in the manually analyzed subset and that comprises similar features with the labeled incident report, and (v) performing an action related to the label on the incident report. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: June 20, 2017
    Date of Patent: March 31, 2020
    Assignee: CA, Inc.
    Inventors: Shuning Wu, Wangyan Feng, Ningwei Liu, Kevin Roundy
  • Patent number: 10609011
    Abstract: A method includes generating, using a processor, a private key-public key pair. The private key-public key pair may include a private key and a public key. The method also includes generating a request for a public key certificate. The request may include the public key. The method further includes sending the request for the public key certificate to a Certificate Authority (CA) and receiving the public key certificate from the CA. The public key certificate may be signed by the CA. The method also includes using the public key certificate received from the CA and transmitting the public key certificate received from the CA to a plurality of distribution addresses. The plurality of distribution addresses belong to a plurality of third parties.
    Type: Grant
    Filed: March 25, 2016
    Date of Patent: March 31, 2020
    Assignee: CA, Inc.
    Inventor: Joann Jayne Kent
  • Patent number: 10609030
    Abstract: The disclosed computer-implemented method for identifying untrusted devices in peer-to-peer communication may include (i) collecting first communication protocol MAC addresses and second communication protocol MAC addresses, (ii) determining which of the first communication protocol MAC addresses corresponds to which of the second communication protocol MAC addresses, and (iii) storing correlations between the first communication protocol MAC addresses and the second communication protocol MAC addresses. A correlation between a first communication protocol MAC address and a second communication protocol MAC address may indicate a single device having both addresses. The method may also include (i) detecting a communication on the second communication protocol, (ii) determining whether the detected communication is from an untrusted device, and (iii) performing a security action when the detected communication is from the untrusted device.
    Type: Grant
    Filed: September 28, 2017
    Date of Patent: March 31, 2020
    Assignee: CA, Inc.
    Inventors: Keith Newstadt, Ilya Sokolov
  • Patent number: 10609523
    Abstract: A method includes performing operations as follows on a processor: receiving a notification associated with an application, the application being accessible via a mobile device, determining an importance of the notification based on a plurality of factors that provide context for a reason for the notification, comparing the importance of the notification with an importance threshold, performing one of queuing the notification without generating an alert on the mobile device and generating the alert on the mobile device based on the comparing of the importance of the notification with the importance threshold.
    Type: Grant
    Filed: February 12, 2015
    Date of Patent: March 31, 2020
    Assignee: CA, Inc.
    Inventors: Neil Boyette, Vikas Krishna
  • Patent number: 10609037
    Abstract: Provided is a process of authenticating a user, the process including: receiving an authentication request sent by a first computing device; receiving an observed profile of the second computing device; accessing a known profile of the second computing device; determining that the known profile corresponds to the observed profile; sending an authentication credential to either the second computing device or the first computing device; receiving the authentication credential from either the first computing device or the second computing device; and in response to receiving the authentication credential and the determination that the known profile corresponds to the observed profile, determining that the user is authenticated.
    Type: Grant
    Filed: March 28, 2017
    Date of Patent: March 31, 2020
    Assignee: CA, Inc.
    Inventors: Jerry Jackson, Charley Chell, Jeff Frantz
  • Patent number: 10606799
    Abstract: A method of transferring data between a first computer language layer and a second computer language layer is described. According to the method, a first data bridge structure in a first data format is received from a first set of computer code using a first computer language layer. The first data format is used by the first set of computer code using the first computer language layer. In the method, the first data bridge structure is transformed from the first data format to a second data format, the second data format being a format used by a second set of computer code using a second computer language layer. The first data bridge structure in the second data format is transmitted to the second set of computer code using the second computer language layer.
    Type: Grant
    Filed: July 6, 2017
    Date of Patent: March 31, 2020
    Assignee: CA, Inc.
    Inventors: Frederic Duminy, Jammie Pringle, Terry W. Chaisson, Dean Harrington
  • Patent number: 10606844
    Abstract: Techniques are disclosed for identifying legitimate files using a hash-based cloud reputation using parts of a file to generate a hash value for reputation score lookup. A reputation service receives a request for a reputation score associated with a file. The request specifies a hash value for the file. The hash value is generated based on one or more parts of the file. The service identifies one of a plurality of file clusters that includes one or more files that matches to the specified hash value. The service determines a reputation score for the file based on the identified file cluster. The reputation score indicates a rating of the file based on a distribution of the file in a user base. The service returns the reputation score in response to the request.
    Type: Grant
    Filed: December 4, 2015
    Date of Patent: March 31, 2020
    Assignee: CA, Inc.
    Inventors: Kishor Kumar, Shayak Tarafdar
  • Patent number: 10607017
    Abstract: A method includes receiving a security profile comprising user-defined rules for processing sensitive data, and identifying a plurality of sensitive data components in a data file according to the security profile. The method further includes generating a respective format-preserving token for each of the identified plurality of sensitive data components. The method additionally includes generating a corresponding token key for each of the respective-format preserving tokens, and replacing each of the plurality of sensitive data components in the data file with the respective format-preserving token. Further, the method includes cryptographically camouflaging each of the token keys using a first password and storing each of the cryptographically camouflaged token keys.
    Type: Grant
    Filed: January 4, 2017
    Date of Patent: March 31, 2020
    Assignee: CA, INC.
    Inventors: Sharath L. Kumar, Mohammed Mujeeb Kaladgi, Rajendra Pachouri, Mahesh Malatesh Chitragar
  • Publication number: 20200098339
    Abstract: A method of performing operations on a processor of an electronic device includes obtaining motion data from a sensor that characterizes motion of the electronic device. The operations filter the motion data to identify a component of the motion caused by Parkinson's disease. The operations determine direction and distance for panning displayed information to at least partially compensate for the identified component of the motion. The operations tracking in real-time a phase of sensed motion. The operations control panning of information that is displayed on a display device responsive to the determined direction and distance and responsive to the phase of the sensed motion.
    Type: Application
    Filed: September 20, 2018
    Publication date: March 26, 2020
    Applicant: CA, Inc.
    Inventors: Vikrant Nandakumar, Lyju Vadassery, Vijay Shashikant Kulkarni, Madhusudhan Ganda
  • Publication number: 20200097582
    Abstract: In one embodiment, a query history is accessed, wherein the query history comprises information associated with one or more past queries for data stored on a plurality of removable storage mediums. A machine learning model is trained for query prediction based on the query history. A future query is predicted based on the machine learning model, wherein the future query comprises an indication of a first dataset that is predicted to be queried at a future point in time, wherein the first dataset comprises a subset of the data stored on the plurality of removable storage mediums. A first removable storage medium containing the first dataset is identified, wherein the first removable storage medium is identified from the plurality of removable storage mediums. A storage drive is configured for access to the first removable storage medium at the future point in time.
    Type: Application
    Filed: September 26, 2018
    Publication date: March 26, 2020
    Applicant: CA, Inc.
    Inventor: Vlastimil Jedek
  • Publication number: 20200097350
    Abstract: A method and computing system to recommend potential root causes of failure of an operation of a computer system is provided. An indication of a failed operation is received. A number of change orders (CO) that change one or more configuration items (CIs) that are associated with the operation from a baseline state to the current state of operation is determined. A root cause analysis (RCA) graph is displayed for a selected CO and has a plurality of CIs and connections therebetween in a first display area and a change order timeline in a second display area. Any of the number of CIs that were changed are highlighted. A potential cause listing in a third display area provides a list of highlighted CIs and a percentage indication by each highlighted CI that represents a calculated percentage that the CI is a potential cause of the failed operation.
    Type: Application
    Filed: September 25, 2018
    Publication date: March 26, 2020
    Applicant: CA, Inc.
    Inventors: Vallinayagam Pitchaimani, Praveen Chavali, Sunil Meher, Siva Datla
  • Publication number: 20200097603
    Abstract: A processing device obtains a video of navigation through a user interface of an application. The video is divided into a plurality of frames that are based on time units. Each frame of the plurality of frames including a plurality of strings comprising text. A string of the plurality of strings that is in a first frame is determined. A time value that is associated with the first frame is determined. A location of the string that is in the first frame is determined. An untranslated resource bundle is generated and includes a mapping of the string of the plurality of strings to the time value of the first frame of the plurality of frames and to the location of the string of the plurality of strings. The video and the untranslated resource bundle are transmitted to a remote device via a communication interface communicatively coupled to the processing device.
    Type: Application
    Filed: September 24, 2018
    Publication date: March 26, 2020
    Applicant: CA, Inc.
    Inventors: Narsimha Ravi Teja Vangala, Guru Prasadareddy Narapu Reddy, Srikanth Suragala, Sreenivasulu Bandi, Nivedita Aggarwal