TIME-BASED ONE-TIME PASSWORD FOR DEVICE IDENTIFICATION ACROSS DIFFERENT APPLICATIONS

    公开(公告)号:US20190306159A1

    公开(公告)日:2019-10-03

    申请号:US15936573

    申请日:2018-03-27

    申请人: CA, Inc.

    IPC分类号: H04L29/06 H04L9/32

    摘要: A method is described for receiving, at a server, an authorization request from a first application stored on a user device, the first application being associated with a third party, wherein the authorization request comprises a time-based one-time password. The method further includes determining whether the time-based one-time password is associated with a time-based one-time password provision previously transmitted to a second application stored on the user device, wherein the second application is associated with an account of a user of the user device. The method further includes authorizing a transaction between the account of the user and the third-party, in response to determining that the time-based one-time password is associated with the time-based one-time password provision.

    ADAPTIVE RISK-BASED PASSWORD SYNCRONIZATION
    52.
    发明申请

    公开(公告)号:US20190306153A1

    公开(公告)日:2019-10-03

    申请号:US15936632

    申请日:2018-03-27

    申请人: CA, Inc.

    IPC分类号: H04L29/06 G06F21/45

    摘要: A computer program product that is configured to be executed by a processor is disclosed. The computer program product is configured to store environmental information for a plurality of authentication transactions attempted by a particular user and receive, via a communications network, a request to perform an authentication transaction for the particular user. The request includes a first one-time password and environmental information corresponding to the requested authentication transaction. A risk assessment is performed by comparing the stored and received environmental information and a window is sized for authenticating the user based on the risk assessment. The window may be one or both of an authentication window and a synchronization window. A post-sizing attempt to authenticate the particular user is performed by comparing the first one-time password with the first range of one-time passwords.

    TRINARY NEURAL NETWORK AND BACK-PROPAGATION METHODOLOGY

    公开(公告)号:US20190303763A1

    公开(公告)日:2019-10-03

    申请号:US15940906

    申请日:2018-03-29

    申请人: CA, Inc.

    IPC分类号: G06N3/08 G06N3/04

    摘要: A trinary neural network includes a plurality of voting neurons arranged in one or more layers. The voting neurons receive plurality of integer input values. The voting neurons determine, based at least in part on a set of voting coefficients, vote counts associated with a plurality of candidate output values, wherein the candidate output values indicate a vote for, a vote against, or an abstention. The voting neurons determine an output based, at least in part, on the vote counts. During a backpropagation stage, a backpropagation matrix is sampled to determine a sampled subset of the backpropagation matrix. For each entry in the sampled subset, a value is determined for a coefficient of a voting neuron associated with the entry in accordance with the entry.

    AUTOMATED CODE HIGHLIGHTING TO IDENTIFY RISK IN SOFTWARE PROGRAMMING

    公开(公告)号:US20190303564A1

    公开(公告)日:2019-10-03

    申请号:US15941164

    申请日:2018-03-30

    申请人: CA, Inc.

    摘要: A cursor is detected within a line of code presented in a source code editor window of a graphical user interface (GUI) of an integrated development environment (IDE), and a particular segment of code within a software program is determined to correspond to the line of code. A level of risk associated with the particular segment of code is determined from data comprising a repository of code changes relating to the particular segment of code, where the level of risk indicates a likelihood that changes to source code of the software program relating to the particular segment of code will jeopardize successful operation of the software program. At least a portion of the line of code is automatically highlighted within the source code editor window based on the level of risk and responsive to the placement of the cursor within the line of code.

    HISTOGRAM SKETCHING FOR TIME-SERIES DATA
    56.
    发明申请

    公开(公告)号:US20190303421A1

    公开(公告)日:2019-10-03

    申请号:US15942690

    申请日:2018-04-02

    申请人: CA, Inc.

    IPC分类号: G06F17/18 G06F17/30

    摘要: The developed histogram sketching technology transforms a time-series dataset having d dimensions and a number of time instants (S) in the time-series dataset into different numbers of histogram registers per dataset dimension for each variable for which value distribution is to be tracked. The histogram sketching technology selects the numbers of histogram registers per dataset dimension based on the Chinese Remainder Theorem. The numbers of histogram registers per dataset dimension are co-prime numbers that are each near a dth root of S and the product of these co-prime numbers is greater than S. Thus, the S time slices are being compressed into different numbers of histogram registers that allow for reconstruction of a time slice based on the Chinese Remainder Theorem.

    APPARATUS AND METHOD FOR VERSIONING, PACKAGING, MIGRATING AND COMPARING ARTIFACTS OF PACKAGED AND ENTERPRISE APPLICATIONS USING VIRTUAL FILE SYSTEMS

    公开(公告)号:US20190303138A1

    公开(公告)日:2019-10-03

    申请号:US15940218

    申请日:2018-03-29

    申请人: CA, Inc.

    IPC分类号: G06F8/71 G06F17/30

    摘要: Provided is a process of providing logical access between software development tools and stored content that is otherwise inaccessible to the software development tools, the process including: mounting a virtual file system to an underlying file system configured to store content on a mount point, wherein: the underlying file system configured to store content is accessible via the mount point, the underlying file system configured to store content has access to data modified by third party software; mapping, with one or more processors, the data to a plurality of files or a plurality of folders accessible with the virtual file system; and logically associating, with one or more processors, the files or folders with the data such that modification of the data in the underlying file system causes modification of at least one of the files or one of the folders accessible with the virtual file system.

    AUTOMATED SOURCE CODE SAMPLE ADAPTATION
    58.
    发明申请

    公开(公告)号:US20190303115A1

    公开(公告)日:2019-10-03

    申请号:US15941329

    申请日:2018-03-30

    申请人: CA, Inc.

    摘要: A current context is determined for use of a software development tool by a user during a particular time. The current context includes attributes of a particular software coding project, and the software development tool is used to edit the particular software coding project during the particular time. A webpage is identified for presentation in a web browser and a segment of sample source code is detected within content of the webpage. Values are determined in the segment of sample source code corresponding to the attributes of the particular software coding project. The values in the segment of sample source code are autonomously replaced with project-specific values to cause a project-specific version of the segment of sample source code to be presented in the webpage during a session corresponding to the particular time, the project-specific values based on the attributes of the particular software coding project.

    VIRTUAL REALITY INTEGRATED DEVELOPMENT ENVIRONMENT

    公开(公告)号:US20190303110A1

    公开(公告)日:2019-10-03

    申请号:US15940960

    申请日:2018-03-29

    申请人: CA, Inc.

    发明人: Susan L. Brude

    摘要: In one embodiment, source code associated with a computing application is accessed, and based on an analysis of the source code, an application architecture associated with the computing application is identified, and a three-dimensional representation of the application architecture is generated. Moreover, a user perspective within a virtual reality system is identified based on an input from the virtual reality system. A virtual development environment for the computing application is generated and is further caused to be displayed by the virtual reality system, wherein the virtual development environment comprises a three-dimensional rendering of the computing application, and wherein the three-dimensional rendering is based on the three-dimensional representation of the application architecture and the user perspective within the virtual reality system.

    ENCRYPTED RECORDINGS OF MEETINGS BETWEEN INDIVIDUALS

    公开(公告)号:US20190294804A1

    公开(公告)日:2019-09-26

    申请号:US15934736

    申请日:2018-03-23

    申请人: CA, Inc.

    IPC分类号: G06F21/60

    摘要: Techniques are disclosed relating to a computer system receiving recordings of meetings between individuals, encrypting the recording, storing the encrypted recording, and determining whether to decrypt the encrypted recording based on decryption information indicative of ones of the individuals have assented to the decryption of the encrypted recording and a cryptographic policy. The computer system may also perform semantic analysis of the audio of the meeting to identify decision statements made at the meeting and factor statements made at the meeting upon which the decision statement is based. The computer system may also store meeting metadata associated with the meeting that is indicative of the decision statement and factor statements. Subsequent to the meeting, the computer system may reevaluate one or more factor statements, determine encrypted recordings corresponding to the reevaluated factor statements, and output an identification of the decision statements associated with the determined encrypted recordings.