Patents by Inventor Vikrant Nandakumar
Vikrant Nandakumar has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 9665576Abstract: A method, system and computer program product for controlling enterprise data on mobile devices. Data on a mobile device is tagged as being associated with either enterprise data or with personal data. Upon identifying the storage location of the tagged data and the identifier of the application that generated the tagged data, the tag, the storage location of the tagged data and the identifier of the application are stored in an index. A mobile agent residing on the mobile device may be directed by a mobile device management server of the enterprise to perform various actions (e.g., deleting, encrypting, backing-up) on the enterprise data using the index. In this manner, the enterprise has the ability to control their applications and data that resides on employees' mobile devices to ensure that such data is not lost or used in a manner that is contrary to the wishes of the employer.Type: GrantFiled: May 14, 2012Date of Patent: May 30, 2017Assignee: International Business Machines CorporationInventors: Shalini Kapoor, Palanivel A. Kodeswaran, Sridhar R. Muppidi, Nataraj Nagaratnam, Vikrant Nandakumar
-
Patent number: 9658944Abstract: A method for generic test automation comprises mapping generic interface commands for objects to be tested to tool-specific interface commands of a test automation tool. An application-specific element map based on an application for test is identified, and the application-specific element map includes label names for the elements of the application-specific element map. Application-specific user actions, which are created based on the generic interface commands and the application-specific element map, are sent to the test automation tool for testing the application.Type: GrantFiled: August 20, 2015Date of Patent: May 23, 2017Assignee: CA, Inc.Inventors: Madhusudhan Ganda, Abhijit Pati, Saorabh Singh, Vikrant Nandakumar
-
Patent number: 9645868Abstract: A wrapped application may be stored in memory of a mobile device. The wrapped application includes application code and an application wrapper, and the application code integrates primary and secondary application modules and a policy monitoring plugin module. Operations of the application code may be executed on a processor of the mobile device using system events and/or API calls. Responsive to executing operations of the primary/secondary application modules of the application code, consumption of a mobile device resource by the secondary application module may be monitored using the policy monitoring plugin module of the application. Responsive to the consumption of the mobile device resource by the secondary application module exceeding a threshold, a notification of the consumption may be transmitted through a wireless communication interface of the mobile device to a third party source of the application code using the policy monitoring plugin module of the application.Type: GrantFiled: June 25, 2015Date of Patent: May 9, 2017Assignee: CA, INC.Inventor: Vikrant Nandakumar
-
Publication number: 20170102976Abstract: An OS API mapping computer operates to identify a set of OS APIs of a first OS version not present in a second OS version. OS APIs of the second OS version are identified that satisfy a defined rule for compatibility with the set of OS APIs of the first OS version not present in the second OS version. An OS APIs replacement list is generated that maps individual ones of the set of OS APIs of the first OS version, to corresponding ones of the OS APIs of the second OS version that satisfy the defined rule. A set is identified of OS APIs of an application that are in the OS APIs replacement list among the set of OS APIs of the first OS version. A plugin is generated based on the OS APIs of the second OS version mapped to the set of application OS APIs.Type: ApplicationFiled: October 8, 2015Publication date: April 13, 2017Applicant: CA, INC.Inventors: Vikrant NANDAKUMAR, Naveen Harry MICHAEL, Madhusudhan GANDA, Hemanth Kumar PINNINTI
-
Publication number: 20170093877Abstract: A policy file and a mapping file are fetched from a policy server responsive to a defined event associated with execution of an application by a mobile device. The policy file contains policy events that define features of the mobile device that the application is allowed to access. The mapping file defines associations between the features of the mobile device and the policy events. The policy file and the mapping file are locally saved in a local memory of the mobile device. A policy evaluation request is received that identifies a feature of the mobile device that the application will invoke. A policy event associated with the feature is identified based on content of the mapping file. The policy event associated with the feature is obtained from the policy file. Whether the application is allowed to invoke the feature is controlled based on evaluating whether the policy event is satisfied.Type: ApplicationFiled: September 29, 2015Publication date: March 30, 2017Applicant: CA, INC.Inventors: MADHUSUDHAN GANDA, VIKRANT NANDAKUMAR
-
Publication number: 20170085591Abstract: A mobile device fetches a policy definition library from a policy server responsive to occurrence of a defined event associated with an application package. The policy definition library contains policies defining resources of the mobile device that the application package is permitted to access. The mobile device executes the wrapped application package containing application executable code and application wrapper executable code that is called by each execution of an agnostic wrapper function residing at each of a plurality of locations in the application executable code. Responsive to execution of the agnostic wrapper function at any of the plurality of locations in the application executable code, the mobile device executes the application wrapper executable code to control whether access by the application executable code is granted to resources of the mobile device based on the policies contained in the policy definition library.Type: ApplicationFiled: September 23, 2015Publication date: March 23, 2017Applicant: CA, INC.Inventors: Madhusudhan Ganda, Vikrant Nandakumar, Vardhineedi Satyanarayana Murthy, Hemanth Kumar Pinninti
-
Patent number: 9596231Abstract: Systems and methods for generating secure passwords, personal identification numbers (PINs), and other user credentials using touch-aware devices are described. In some cases, an end user of a computing device may use a touch-sensitive interface (e.g., a touchscreen) to indirectly enter user credentials for accessing protected information or a protected computing resource using the computing device. The end user may indirectly enter the user credentials by entering information that is different from the actual user credentials. In one example, the touch-sensitive interface may display a plurality of numbers and paths connecting the plurality of numbers and the end user of the computing device may select a sequence of numbers of the plurality of numbers using a touch gesture. The computing device may generate a user credential different from the sequence of numbers using the sequence of numbers selected by the end user.Type: GrantFiled: August 21, 2015Date of Patent: March 14, 2017Assignee: CA, INC.Inventors: Vikrant Nandakumar, Naveen Harry Michael, Hemanth Pinninti, Vardhineedi Satyanarayana Murthy
-
Publication number: 20170060653Abstract: A method includes performing operations on a processor of an application analysis computer. The operations include receiving state performance metrics reported by user terminals via a data network. Each of the state performance metrics indicating a measurement of performance of one of a plurality of operational states of an application processed by one of the user terminals. The operations further include determining when one of the state performance metrics reported by one of the user terminals violates a rule for acceptable operational state performance of the application, and communicating a response message to the one of the user terminals responsive to the determination that the one of the state performance metrics violates the rule. Related operations by a user terminal are disclosed.Type: ApplicationFiled: August 25, 2015Publication date: March 2, 2017Applicant: CA, INC.Inventors: Vikrant NANDAKUMAR, Madhusudhan GANDA, Hemanth Kumar PINNINTI, Naveen Harry MICHAEL
-
Publication number: 20170060654Abstract: A method includes performing operations on a processor of an application analysis computer. The operations include receiving reports from user terminals containing identifiers for operational states of an application being processed by the user terminals and containing state performance metrics. Each of the state performance metrics indicates a measurement of performance for a corresponding identified one of the operational states of the application being processed by one of the user terminals. The operations further include, for each of the operational states of the application identified in the reports, generating a rule for acceptable performance of the operational state of the application based on the state performance metrics of the operational state reported by the user terminals. The operations further include storing in a repository the rules associated with identifiers for corresponding ones of the operational states of the application. Related operations by a user terminal are disclosed.Type: ApplicationFiled: August 25, 2015Publication date: March 2, 2017Applicant: CA, INC.Inventors: VIKRANT NANDAKUMAR, MADHUSUDHAN GANDA, HEMANTH KUMAR PINNINTI, NAVEEN HARRY MICHAEL
-
Publication number: 20170054703Abstract: Systems and methods for generating secure passwords, personal identification numbers (PINs), and other user credentials using touch-aware devices are described. In some cases, an end user of a computing device may use a touch-sensitive interface (e.g., a touchscreen) to indirectly enter user credentials for accessing protected information or a protected computing resource using the computing device. The end user may indirectly enter the user credentials by entering information that is different from the actual user credentials. In one example, the touch-sensitive interface may display a plurality of numbers and paths connecting the plurality of numbers and the end user of the computing device may select a sequence of numbers of the plurality of numbers using a touch gesture. The computing device may generate a user credential different from the sequence of numbers using the sequence of numbers selected by the end user.Type: ApplicationFiled: August 21, 2015Publication date: February 23, 2017Applicant: CA, INC.Inventors: Vikrant Nandakumar, Naveen Harry Michael, Hemanth Pinninti, Vardhineedi Satyanarayana Murthy
-
Publication number: 20170052884Abstract: A method for testing RESTful web service applications comprises identifying a test case including application-specific interfaces for an application under test. At runtime, the application-specific interfaces are translated to generic REST interfaces and resources using a mapping file, a generic REST library, and reflection. The translated interfaces are then used to test the application.Type: ApplicationFiled: August 20, 2015Publication date: February 23, 2017Inventors: Madhusudhan Ganda, Narendra Dhulipalla, Abhijit Pati, Vikrant Nandakumar
-
Publication number: 20170052877Abstract: A method for generic test automation comprises mapping generic interface commands for objects to be tested to tool-specific interface commands of a test automation tool. An application-specific element map based on an application for test is identified, and the application-specific element map includes label names for the elements of the application-specific element map. Application-specific user actions, which are created based on the generic interface commands and the application-specific element map, are sent to the test automation tool for testing the application.Type: ApplicationFiled: August 20, 2015Publication date: February 23, 2017Inventors: Madhusudhan Ganda, Abhijit Pati, Saorabh Singh, Vikrant Nandakumar
-
Patent number: 9575876Abstract: Identifying performance issues in an application under test (AUT). The AUT executes on a system under test (SUT) in a test environment, and uses one or more context parameters of the SUT and/or the test environment. A rule engine identifies performance antipatterns in trace data generated by the AUT when executing a set of test suites, based on a set of performance antipattern definition rules, each performance antipattern associated with one or more context parameters. One or more performance test suites are identified that cause the AUT to use at least one of the one or more context parameters associated with the identified antipatterns. The list of identified performance test suites is ranked, based on respective priority values associated with each identified antipattern.Type: GrantFiled: June 13, 2014Date of Patent: February 21, 2017Assignee: International Business Machines CorporationInventors: Vijay Ekambaram, Vikrant Nandakumar, Nitendra Rajput
-
Publication number: 20170046700Abstract: A method includes performing operations as follows on a processor; providing an event anomaly rule that defines a condition for requiring authorization for processing the event, receiving an event notification for a user from a first data processing system, receiving an availability notification from a mobile device associated with the user, and sending the event notification to the mobile device associated with the user when the event satisfies the condition of the event anomaly rule at a time based on the availability notification.Type: ApplicationFiled: August 10, 2015Publication date: February 16, 2017Applicant: CA, Inc.Inventors: VIKRANT NANDAKUMAR, Naveen Harry Michael, Hemanth Kumar Pinninti
-
Publication number: 20170046253Abstract: A method for testing an application that invokes an application programming interface (API) comprises identifying signatures for APIs. A package associated with the API is identified in the application under test, and a package name of the API is identified in the signatures. During runtime of the application under test, request and response objects (or other objects) for the identified package are created using the package name and reflection. The created request object is then used to invoke the API to test the application under test and the response object is used to evaluate the response with expected response.Type: ApplicationFiled: August 13, 2015Publication date: February 16, 2017Inventors: Madhusudhan Ganda, Vikrant Nandakumar, Tapan Sahoo
-
Publication number: 20170039448Abstract: A machine-executable process comprises receiving a request to take a screenshot of a display and receiving page source information of the display. The page source information is compared to stored page source information of displays that have had a screenshot taken to determine whether a screenshot of the display has already been taken. If a screenshot has not already been taken of the display, then a screenshot is taken and the page source information of the display is added to the stored page source information.Type: ApplicationFiled: August 3, 2015Publication date: February 9, 2017Inventors: Madhusudhan Ganda, Mohammad G. Bhasha, Saorabh Singh, Abhijit Pati, Vikrant Nandakumar
-
Publication number: 20170041344Abstract: A method includes receiving a notice of a policy violation of an enterprise usage policy by a managed application on a user device wherein the managed application is managed by a mobile application management module on the user device, retrieving the enterprise usage policy from a policy database. The method further includes determining a modification precedence of the active condition and the active restriction, selecting one of the active condition and the active restriction for modification in response to the modification precedence, modifying the selected one of the active condition and the active restriction in response to the notice of the policy violation to provide a modified enterprise usage policy, and transmitting the modified enterprise usage policy to the user device.Type: ApplicationFiled: August 4, 2015Publication date: February 9, 2017Applicant: CA, Inc.Inventors: VIKRANT NANDAKUMAR, NAVEEN HARRY MICHAEL, HEMANTH KUMAR PINNINTI
-
Publication number: 20170039130Abstract: A method on a processor of an application wrapper computer includes, for each of a plurality of features of an application program in an application package, associating a wrapper component with the feature, identifying a location of the feature in the application program, and identifying from a portion of the application program at the location whether the feature will have an operational error during execution responsive to a request from the feature for access to a resource of a user device being blocked by the wrapper component. For each of the plurality of features, the method further responds to an operational error being identified by identifying content of an acceptable response to the request to avoid the operational error, and modifying the wrapper component to provide the content of the acceptable response to the request when the wrapper component is blocking the request from accessing the resource.Type: ApplicationFiled: August 4, 2015Publication date: February 9, 2017Applicant: CA, INC.Inventors: VIKRANT NANDAKUMAR, MADHUSUDHAN GANDA, VARDHINEEDI SATYANARAYANA MURTHY, HEMANTH KUMAR PINNINTI
-
Patent number: 9565579Abstract: A method for monitoring software application performance and one or more device states affecting a software application on a periodic basis on a mobile device. The method includes one or more computer processors identifying a software application on a mobile device. The method further includes the one or more computer processors identifying a plurality of sampling plans and one or more respective triggers within the plurality of sampling plans that are respectively associated with the software application and are stored on the mobile device. The method further includes the one or more computer processors determining a first value associated with the one or more respective triggers. The method further includes the one or more computer processors selecting a first sampling plan from the plurality of sampling plans for the software application based, at least in part, on the value associated with the one or more respective triggers.Type: GrantFiled: April 15, 2015Date of Patent: February 7, 2017Assignee: International Business Machines CorporationInventors: Vijay Ekambaram, Ashish K. Mathur, Vikrant Nandakumar, Vivek Sharma
-
Patent number: 9563422Abstract: A method, system, and computer program product for evaluating compliance of a user interface design are provided in the illustrative embodiments. A hierarchy of elements of a user interface is received from a first application executing in a client data processing system. A second application presents the user interface including a set of user interface elements at the client data processing system. A compliance rule is selected from a set of compliance rules. An evaluation is made whether an attribute associated with a user interface element meets a condition specified in the compliance rule. Responsive to the evaluating being negative, the user interface element is reported as being non-compliant with the compliance rule.Type: GrantFiled: January 8, 2014Date of Patent: February 7, 2017Assignee: INTERNATIONAL BUSINESS MACHINES CORPORATIONInventors: Brian J. Cragun, Vikrant Nandakumar, Nitendra Rajput, Puthukode G. Ramachandran, Vivek Sharma, Shunguo Yan