Patents Assigned to CA, Inc.
  • Publication number: 20200097603
    Abstract: A processing device obtains a video of navigation through a user interface of an application. The video is divided into a plurality of frames that are based on time units. Each frame of the plurality of frames including a plurality of strings comprising text. A string of the plurality of strings that is in a first frame is determined. A time value that is associated with the first frame is determined. A location of the string that is in the first frame is determined. An untranslated resource bundle is generated and includes a mapping of the string of the plurality of strings to the time value of the first frame of the plurality of frames and to the location of the string of the plurality of strings. The video and the untranslated resource bundle are transmitted to a remote device via a communication interface communicatively coupled to the processing device.
    Type: Application
    Filed: September 24, 2018
    Publication date: March 26, 2020
    Applicant: CA, Inc.
    Inventors: Narsimha Ravi Teja Vangala, Guru Prasadareddy Narapu Reddy, Srikanth Suragala, Sreenivasulu Bandi, Nivedita Aggarwal
  • Patent number: 10599878
    Abstract: Technologies are provided herein and include embodiments for protecting applications and information on a user computing device and include generating a menu of icons including an application icon and a decoy icon that correspond to a mobile application in a mobile device, where the application icon is assigned to a first location in the menu and the decoy icon is assigned to a second location in the menu. The embodiment further includes communicating icon location information to the mobile application, providing the menu of icons for display on a display screen of the mobile device, receiving a first indication of user input to select the decoy icon in the menu of icons, invoking the mobile application based on the decoy icon being selected, and communicating, to the mobile application based on the decoy icon being selected, second location information indicating the second location in the menu of icons.
    Type: Grant
    Filed: November 20, 2017
    Date of Patent: March 24, 2020
    Assignee: CA, Inc.
    Inventors: Mohammed Mujeeb Kaladgi, Ruqiya Nikhat Kaladgi, Yashwant Ramkishan Sawant, Sandeep Banisetti
  • Publication number: 20200089402
    Abstract: A method of operating an electronic device is provided. The method includes displaying a virtual keyboard including a plurality of virtual keys each corresponding to one character of a plurality of characters. The method further includes receiving a first input of one or more characters in a sequential order, and generating one or more predicted sets of characters based on the first input, wherein each predicted set of characters includes a last character of the sequential order and a subsequent character generated by a processing circuit. The method also includes displaying each of the predicted sets of characters in a portion of the touchscreen different from the virtual keyboard. The method further includes displaying one or more new virtual keys that each correspond to one of the predicted sets of characters in the virtual keyboard, wherein each of the new virtual keys has a location based on the first input.
    Type: Application
    Filed: September 17, 2018
    Publication date: March 19, 2020
    Applicant: CA, Inc.
    Inventors: Balram Reddy Kakani, STV Krishna Kanth, Vallinayagam Pitchaimani, Sri Harsha Yayi, Nageswara Rao Yeluri
  • Publication number: 20200090146
    Abstract: A merchant device receives a request message from a user terminal as part of a payment processing transaction with the merchant. The request message contains code data representing optical machine-readable code (OMRC) that has been read by the user terminal. The OMRC is representative of a payment processing account and allows the user terminal to complete the transaction with the merchant by directing the payment processor to transfer funds to the payment processing account associated with the OMRC. The merchant device determines, based on the code data, whether the payment processing account represented by the OMRC is an authorized payment processing account, and wirelessly transmits a response message to the user terminal indicative of whether the user terminal is permitted to use the payment processing account for the transaction.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Applicant: CA, Inc.
    Inventors: Vikrant Nandakumar, Lyju Vadassery, Vijay Shashikant Kulkarni, Deepti Srikant Sharma
  • Publication number: 20200089852
    Abstract: A processor of an electronic device receives a personal identification number (PIN) having a sequence of numeric digits. For each digit of the PIN, a fingerprint scan is received from a fingerprint detector, and is registered as associated with the digit of the PIN. Subsequently, when a fingerprint scan matches the fingerprint scan that was registered for the digit of the PIN, the operations increment the PIN digit counter. In contrast, when the fingerprint scan does not match the fingerprint scan that was registered for the digit of the PIN, but does match the fingerprint scan that was registered for the next one of the PIN digits, the next PIN digit counter is incremented. When a PIN entry completion condition is satisfied, the operations selectively allow electronic access by a user to an application based on determining whether the sequence of PIN digit counters contain values matching the PIN.
    Type: Application
    Filed: September 18, 2018
    Publication date: March 19, 2020
    Applicant: CA, Inc.
    Inventors: Sharath Bagivalu Manjappa, Anil Joseph, Sharath Kumar, Stephen Prasad
  • Patent number: 10592693
    Abstract: According to another embodiment of the disclosure, a method includes determining a first original identifier. The original identifier uniquely identifies a first original identity. The method also includes sending a request to a cooperative synthetic identity manager to create a first cooperative synthetic identity case for the first original identity. The method further includes receiving, from the cooperative synthetic identity manager, a first case identifier that uniquely identifies the first cooperative synthetic identity case. The method also includes requesting, from a first data entity, first cooperative synthetic identity information for the first original identity. The first cooperative synthetic identity information request comprises the first case identifier and the first original identifier. The method also includes receiving, from the first data entity, the first cooperative synthetic identity information.
    Type: Grant
    Filed: January 12, 2017
    Date of Patent: March 17, 2020
    Assignee: CA, Inc.
    Inventors: Diane Norris, Debra Danielson, Carol Piccus, Karen Sleeth, Stephen Tyler
  • Patent number: 10592566
    Abstract: A method includes performing operations as follows on a processor of an edge device of a first network: providing a data filter rule in the edge device, the first network being under the authority of a first entity, receiving data from a thing in the first network, communicating the data toward an information processor via a second network when the data satisfies a condition of the data filter rule permitting communication of the data outside of the first network, the second network being under the authority of a second entity, and communicating the data toward a storage processor on the first network when the data does not satisfy the condition of the data filter rule permitting communication of the data outside of the first network. The first and second entities are different entities.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: March 17, 2020
    Assignee: CA, Inc.
    Inventor: Vikas Krishna
  • Patent number: 10594736
    Abstract: Method, product and device for selective traffic blockage. In one embodiment, in response to a detection that a computing device cannot connect to a predetermined server, the blockage policy is applied to an outgoing packet, whereby selectively blocking outgoing packets when the computing device has limited connectivity to the predetermined server. In another embodiment, in response to an attempt to transmit a packet, invoking a local Virtual Private Network (VPN) service that is configured to apply a blockage policy, wherein the local VPN service provides an Application Programming Interface (API) of a VPN service. As a result, selective blockage is implemented using the local VPN service.
    Type: Grant
    Filed: June 22, 2018
    Date of Patent: March 17, 2020
    Assignee: CA, Inc.
    Inventors: Yair Amit, Shahar Areli, Daniel Kandel, Elisha Eshed, Roy Iarchy, Adi Sharabani
  • Patent number: 10592662
    Abstract: The disclosed computer-implemented method for altering time data may include (i) identifying an untrusted executable that is capable of making queries to an operating system of the computing device, (ii) intercepting a request by the untrusted executable to query a system clock of the operating system of the computing device for a current time, (iii) calculating an offset value for the current time that is within a predetermined margin of the current time, and (iv) providing, in response to the request, the untrusted executable with the offset value for the current time instead of the current time. Various other methods, systems, and computer-readable media are also disclosed.
    Type: Grant
    Filed: September 13, 2017
    Date of Patent: March 17, 2020
    Assignee: CA, Inc.
    Inventor: William E. Sobel
  • Patent number: 10592378
    Abstract: A customer-facing overhead management tool reduces the task of feature configuration to adjusting a scale representing relative feature availability. Features are configured by adjusting a graphical control element presented on a graphical user interface to activate or deactivate features based on relative weights and priorities associated with the features. Weights and priorities are stored within a configuration file underlying the control element and indicate an approximate order in which features will be deactivated upon “dialing down” the available features. The control element facilitates application resource management for the customer, as the customer may configure features to reduce overhead without knowledge of the underlying feature priorities and weights or relative overhead each feature incurs when activated. Customers may override the automatic feature adjustment by manually activating features which have been deactivated following a lowering of the value on the control element.
    Type: Grant
    Filed: October 4, 2018
    Date of Patent: March 17, 2020
    Assignee: CA, Inc.
    Inventor: Martin Tali
  • Patent number: 10594732
    Abstract: Method, product and device for selective traffic blockage. In one embodiment, in response to a detection that a computing device cannot connect to a predetermined server, the blockage policy is applied to an outgoing packet, whereby selectively blocking outgoing packets when the computing device has limited connectivity to the predetermined server. In another embodiment, in response to an attempt to transmit a packet, invoking a local Virtual Private Network (VPN) service that is configured to apply a blockage policy, wherein the local VPN service provides an Application Programming Interface (API) of a VPN service. As a result, selective blockage is implemented using the local VPN service.
    Type: Grant
    Filed: November 8, 2016
    Date of Patent: March 17, 2020
    Assignee: CA, Inc.
    Inventors: Yair Amit, Shahar Areli, Daniel Kandel, Elisha Eshed, Roy Iarchy, Adi Sharabani
  • Publication number: 20200082164
    Abstract: Method by a computer of a computing system having a plurality of camera sensors and a camera sensor control system is provided. A gesture input event is identified that is detected by a camera sensor of the camera sensors. Each camera sensor routes video captured by the camera sensor to a data storage system. The first gesture input event is identified as corresponding to a defined attention-based gesture performed by a user. A time the first gesture input event was identified is determined. Video stored in the data storage system is fetched using the time that is determined as a pointer. An indication of the first gesture input event and the video that is fetched is transmitted towards an emergency call center (ECC). A trigger word or sound may be detected, and an indication of the trigger word or sound may be transmitted towards the ECC.
    Type: Application
    Filed: September 6, 2018
    Publication date: March 12, 2020
    Applicant: CA, Inc.
    Inventors: Lyju Vadassery, Vijay Shashikant Kulkarni, Vikrant Nandakumar, Adila Parveen Hafeezulla, Subhashini Bysani, Sri Venkata Vijaya Lakshmi Tholeti
  • Patent number: 10587639
    Abstract: Systems and methods may include receiving performance data of components in a system. The performance data may include data for parameters for each of the components. The systems and methods may include determining aggregate data for each group of similar components of the components. The aggregate data for each group of similar components may include a group characteristic for each of the parameters. The systems and methods may include, for each group of similar components, determining whether the data for each of the parameters for each component is consistent with the group characteristic for the respective parameter. The systems and methods may include, for each component of the respective group determining that the component is anomalous in response to determining that the data for a parameter for the component is not consistent with the group characteristic for the parameter.
    Type: Grant
    Filed: March 10, 2015
    Date of Patent: March 10, 2020
    Assignee: CA, Inc.
    Inventors: Debra J. Danielson, Steven L. Greenspan, James D. Reno, Prashant Parikh
  • Patent number: 10587644
    Abstract: A method of monitoring tasks for reducing security risks in a computer system comprising a plurality of computers executing a plurality of applications is provided. The method based on a set of login information, displays a set of risks for a set of applications that execute on the plurality of computers and an identification of a person in a hierarchy supervised by the logged-in person assigned to mitigate each risk. The method also displays the current status of each assigned mitigation.
    Type: Grant
    Filed: December 8, 2017
    Date of Patent: March 10, 2020
    Assignee: CA, Inc.
    Inventors: Ryan G. Stolte, Firas S. Rifai, Humphrey Christian, Joseph Anthony DeRobertis, Shmuel Yehonatan Green
  • Patent number: 10587299
    Abstract: A user equipment includes at least one transmitter, a processor, and a memory. The transmitter transmits RF communication signals through at least one antenna. The processor executes program code in the memory to perform operations. The operations include identifying occurrences of a user being proximately located to the at least one antenna during transmissions. The operations determine duration of the transmissions while the user continues to be identified as being proximately located to the at least one antenna, and generate a cumulative RF exposure metric based on the determined durations of the transmissions. The operations responsively initiate a RF exposure remedial action responsive to the cumulative RF exposure metric satisfying a defined rule. The user terminal may thereby operate to avoid unnecessary RF radiation exposure to a user when that exposure would reach an excessive level.
    Type: Grant
    Filed: September 28, 2018
    Date of Patent: March 10, 2020
    Assignee: CA, Inc.
    Inventor: Tapan Sahoo
  • Patent number: 10586040
    Abstract: A method for determining sandbox configurations for malware analysis is described. In one embodiment, the method may include receiving a plurality of files, extracting at least one element from at least one file from the plurality of files, identifying one or more properties associated with an endpoint, determining a correlation between the at least one extracted element and the one or more properties of the endpoint, and determining one or more sandbox configurations based at least in part on the determined correlation. In some cases, the endpoint is related to at least one of the plurality of files.
    Type: Grant
    Filed: March 24, 2017
    Date of Patent: March 10, 2020
    Assignee: CA, Inc.
    Inventors: Lars Haukli, Felix Leder, Kevin Roundy
  • Patent number: 10585796
    Abstract: Aspects of an application program's execution which might be subject to non-determinism are performed in a deterministic manner while the application program's execution is being recorded in a virtual machine environment so that the application program's behavior, when played back in that virtual machine environment, will duplicate the behavior that the application program exhibited when originally executed and recorded. Techniques disclosed herein take advantage of the recognition that only minimal data needs to be recorded in relation to the execution of deterministic operations, which actually can be repeated “verbatim” during replay, and that more highly detailed data should be recorded only in relation to non-deterministic operations, so that those non-deterministic operations can be deterministically simulated (rather than attempting to re-execute those operations under circumstances where the outcome of the re-execution might differ) based on the detailed data during replay.
    Type: Grant
    Filed: February 15, 2017
    Date of Patent: March 10, 2020
    Assignee: CA, Inc.
    Inventors: Jeffrey Daudel, Suman Cherukuri, Humberto Yeverino, Dickey Singh, Arpad Jakab, Marvin Justice, Jonathan Lindo
  • Publication number: 20200074442
    Abstract: A transaction authorization server receives an optical machine-readable code (OMRC) request message from a merchant terminal, which includes a transaction reference number, a transaction time, a transaction amount, and a merchant identifier associated with the merchant terminal. OMRC information is generated based on a combination of the transaction reference number and the transaction time. An OMRC response message is generated containing the OMRC information and sent toward the merchant terminal. The OMRC information is stored in a data structure with an association to the merchant identifier. An OMRC verification message is received from a user terminal, and is selectively validated based on the OMRC information that was stored. When validated, the server sends to the user terminal an OMRC validation message containing an indication that the decoded OMRC information is valid, the transaction amount, and the merchant identifier.
    Type: Application
    Filed: August 30, 2018
    Publication date: March 5, 2020
    Applicant: CA, Inc.
    Inventors: Vijay Shashikant Kulkarni, Lyju Vadassery, Vikrant Nandakumar, Harmeet Singh Gujral
  • Publication number: 20200074104
    Abstract: A method performed by a database processing computer is provided. The method includes identifying a plurality of sensitivity levels associated with a plurality of data values stored in a database, and determining which of the plurality of sensitivity levels are associated with which of the plurality of data values. The method further includes generating a sensitivity-density data structure based on which of the plurality of sensitivity levels are associated with which of the plurality of data values. In this regard, the sensitivity-density data structure indicates density of sensitive data that is stored in the database for each of the plurality of sensitivity levels. In embodiments disclosed herein, the method also includes determining whether to perform a remedial action associated with controlling access by client devices to at least one of the plurality of data values based on whether the sensitivity-density data structure satisfies a defined rule.
    Type: Application
    Filed: August 28, 2018
    Publication date: March 5, 2020
    Applicant: CA, Inc.
    Inventors: Michael Sommerville, Andrew Carter
  • Publication number: 20200073679
    Abstract: Methods and visual analysis (VA) engines for dynamically modifying layout of user-selectable elements of a graphical user interface (GUI) of an application. An VA engine of a hardware computer determines a usage pattern of a plurality of user-selectable elements of a GUI of an application. The VA engine determines a number of user-selectable elements relative to a total number of the plurality of user-selectable elements that are selected more frequently than other user-selectable elements based on the usage patterns. The VA engine selects a visual aesthetic pattern from among a set of visual aesthetic patterns based on the number of user-selectable elements. The VA engine dynamically modifies layout, during runtime of the application, of the user-selectable elements of the GUI based on the visual aesthetic pattern that was selected. The VA engine displays the graphical user interface with the modified layout of the user-selectable elements of the graphical user interface.
    Type: Application
    Filed: August 28, 2018
    Publication date: March 5, 2020
    Applicant: CA, Inc.
    Inventors: Vallinayagam Pitchaimani, Sri Harsha Yayi, STV Krishna Kanth, Balram Reddy Kakani, Nageswara Rao Yeluri