Patents Assigned to MICRO FOCUS LLC
-
Publication number: 20230325306Abstract: Testing software applications is routinely limited by time or testing iterations rather than exhaustively testing ever possible permutation of inputs or execution paths. By configuring a testing device to only perform relevant tests, the test results are more meaningful (e.g., few false-positives) and relevant to the application. Additional effects include reduced processing times and storage requirements. As described herein, source code is analyzed to determine elements that indicate a particular environment for the source code's corresponding machine code. When the source code indicates that a particular environment is not a candidate for execution of the machine code, tests associated with that particular environment are excluded. The testing device is then configured to perform those tests, either statically or dynamically, that are relevant for those environments that actually apply.Type: ApplicationFiled: April 8, 2022Publication date: October 12, 2023Applicant: MICRO FOCUS LLCInventors: Alexander Hoole, James Wesley Rabon, Peter Thomas Blay
-
Publication number: 20230328084Abstract: Embodiments of the present disclosure provide a system for generating risk scores in near real-time. The system includes a processor and a memory coupled with and readable by the processor and storing therein a set of instructions. When executed by the processor, the processor is caused to generate risk scores in near real-time by receiving near real-time application events associated with an application in near real-time and identifying anomalies from the near real-time application events. The processor is further caused to generate risk scores in near real-time by generating an intermediate near real-time risk score for the identified anomalies and combining the intermediate near real-time risk score with a batch risk score generated from a batch process executed prior to receiving the near real-time application events to generate a near real-time risk score.Type: ApplicationFiled: April 12, 2022Publication date: October 12, 2023Applicant: MICRO FOCUS LLCInventors: Asad Narayanan, Josh Christopher Tyler Mahonin, Venkatesh HariRama Subbu, Maria Pospelova, Hari Manassery Koduvely
-
Publication number: 20230328050Abstract: A request is received, by a plurality of nodes that are part of a distributed blockchain ledger, to add a transaction block to a plurality of blockchains in the distributed blockchain ledger. The transaction block comprises a transaction block authentication credential(s). The plurality of nodes that are part of the distributed blockchain ledger determine if the transaction block authentication credential(s) are valid. An indication is received from at least a majority of the plurality of nodes that are part of the distributed blockchain ledger that the transaction block authentication credential(s) are valid. In response to receiving the indication from the at least a majority of the plurality of nodes that are part of the distributed blockchain ledger that the transaction block authentication credential(s) are valid, the transaction block is added to the plurality of blockchains in the distributed blockchain ledger.Type: ApplicationFiled: April 8, 2022Publication date: October 12, 2023Applicant: MICRO FOCUS LLCInventors: Douglas Max Grover, Michael F. Angelo
-
Publication number: 20230315714Abstract: A sub-archive is initiated. The sub-archive saves changes that have occurred since a previous final archive. Changes to an operational database (i.e., the operational database that is being archived) are allowed during the first sub-archive. A final archive is initiated in series after the sub-archive has completed. The final archive does not allow changes to the operational database when the final archive is active. In one embodiment, the sub-archive may comprise a plurality of sub-archives that depend on an amount of outstanding changes that exist in the operational database.Type: ApplicationFiled: June 8, 2023Publication date: October 5, 2023Applicant: MICRO FOCUS LLCInventors: Daniel S. Sanders, Peeyush Paliwal, Polina Alber
-
Patent number: 11775656Abstract: Secure multi-party information retrieval is disclosed. One example is a system including a query processor to request secure retrieval of candidate terms similar to a query term. A collection of information processors, where a given information processor receives the request and generates a random permutation. A plurality of data processors, where a given data processor generates clusters of a plurality of terms in a given dataset, where the clusters are based on similarity scores for pairs of terms, and selects a representative term from each cluster. The given information processor determines similarity scores between a secured query term received from the query processor and secured representative terms received from the given data processor, where the secured terms are based on the permutation, and the given data processor filters, without knowledge of the query term, the candidate terms of the plurality of terms based on the determined similarity scores.Type: GrantFiled: May 1, 2015Date of Patent: October 3, 2023Assignee: Micro Focus LLCInventors: Mehran Kafai, Hongwei Shang, April Slayden Mitchell
-
Publication number: 20230306122Abstract: Testing software applications often requires a balancing of thoroughness versus the time and computing resources available to perform such tests. Certain data handling operations may potentially expose data to unauthorized parties. However, not all data is equal; some data requires a greater degree of protection than other data, which may be based on a security context (e.g., rule, law, policy, etc.). By generating rules determined by a particular context, extraneous tests on data outside of the context, may be omitted. Unnecessary tests may be omitted and the results of each analysis process correlated to identify actual vulnerabilities and omit false positives, such as vulnerabilities to data that does not require the same degree of care to avoid unauthorized exposure.Type: ApplicationFiled: March 23, 2022Publication date: September 28, 2023Applicant: MICRO FOCUS LLCInventors: Alexander Hoole, Ali ElKortobi, Reiner Kappenberger, Domingo Juan Rivera
-
Publication number: 20230308285Abstract: A request to retroactively add one or more of an encryption level, an encryption type, a security level, and an authentication level to an existing blockchain is received. An authentication/encryption block is added to the existing blockchain. The authentication/encryption block comprises the one or more of the encryption level, the encryption type, the security level, and the authentication level. Based on the added authentication/encryption block in the existing blockchain, the one or more of the encryption level, the encryption type, the security level, and the authentication level are retroactively applied to at least a portion of blockchain data in the existing blockchain. In one embodiment, a data structure is used in place of the authentication/encryption block.Type: ApplicationFiled: March 25, 2022Publication date: September 28, 2023Applicant: MICRO FOCUS LLCInventors: DOUGLAS MAX GROVER, MICHAEL F. ANGELO
-
Patent number: 11768767Abstract: A query for opaque objects stored within a data store and not currently cached within a cache is received from an application. The query to the data store is passed to the data store, and a handle to memory location is received from the data store at which the data store has temporarily stored a message including the opaque objects. The opaque objects are added to the cache by treating the memory location as a cache entry for the opaque objects. Cache metadata for the cache entry is generated, and along with the handle is stored within a metadata cache entry of a metadata cache structure separate from the message. The handle and the cache metadata can be returned to the application, where the cache metadata can be returned as an opaque context of the cache entry.Type: GrantFiled: October 29, 2021Date of Patent: September 26, 2023Assignee: MICRO FOCUS LLCInventor: Michael Wojcik
-
Patent number: 11769067Abstract: According to examples, an apparatus may include a processor that may generate a migration assessment for resources of a computer system. In particular, the apparatus may logically divide topological information to facilitate identification of a resource, components used by the resource, and dependencies. The system further enables users to specify user-defined migration parameters that specify the migration. For instance, the parameters may specify a cost associated with the migration of the component, a license model of the component, a security requirement of the component, a performance of the component, a customization of the component, or requirement of the component. Migration assessments and decisions may be stored to train machine-learned models. For instance, the model may assess whether a parameter will be satisfied by using a certain cloud service and whether substitutes have sufficiently satisfied dependencies based on observed migration assessments and actual migrations.Type: GrantFiled: August 5, 2022Date of Patent: September 26, 2023Assignee: Micro Focus LLCInventors: Adarsh Suparna, Hemant Kumar C H, Pramod Annachira Vitala
-
Publication number: 20230297393Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor, may cause the processor to receive information regarding a performance characteristic of an application during predetermined time periods. The processor may calculate a rate of change in the performance characteristic over the predetermined time periods. Based on a determination that the performance characteristic of the application has changed over the predetermined time periods, the processor may tune values of a set of parameters for the application based on the calculated rate of change in the performance characteristic.Type: ApplicationFiled: May 24, 2023Publication date: September 21, 2023Applicant: MICRO FOCUS LLCInventor: Harish Kumar Somisetty
-
Publication number: 20230289275Abstract: Software applications may be installed on a variety of platforms and/or process a variety of data or data in a variety of structures. As a result, optimizing a system to maximize performance often depends on a specific utilization and the specific data being processed. Systems and methods are provided herein to compare the performance of one processing logic, often a live or production environment to a test environment that varies the performance parameters. The variations may be provided by a machine learning algorithm, such as neural network, and produce an improved set of parameters that may then be applied to the production environment.Type: ApplicationFiled: March 11, 2022Publication date: September 14, 2023Applicant: MICRO FOCUS LLCInventors: Yong-Chuang Du, Xiaoqin Zhang, Enhui Xin
-
Publication number: 20230283603Abstract: A request to authenticate a user is received. A random authentication pattern is generated. For example, the random authentication pattern may be for the user to provide a series of biometric scans and/or gesture scans. Instructions for the random authentication pattern are sent to a communication device (e.g., to a smartphone or smartwatch). A generated authentication pattern is received from the communication device. The generated authentication pattern is compared to a stored set of biometric scans and/or gestures scans that are based on the random authentication pattern. The user is authenticated based on the generated authentication pattern meeting a threshold by comparing the generated authentication pattern to the stored set of biometric scans and/or gestures scans.Type: ApplicationFiled: March 4, 2022Publication date: September 7, 2023Applicant: Micro Focus LLCInventors: Douglas Max Grover, Michael F. Angelo
-
Publication number: 20230274020Abstract: A request to create a blockchain is received. In response to receiving the request to create a blockchain, an authentication/encryption block is added to the blockchain. For example, the authentication/encryption block may be part of a genesis block of the blockchain. The authentication/encryption block comprises metadata that indicates at least one of: 1) an encryption level for blockchain data that will be part of the blockchain, 2) an encryption type for the blockchain data that will be part the blockchain, 3) an authentication level required to access the blockchain data that will be part of the blockchain, and a security level for the blockchain data that will be part of the blockchain. The metadata is used to define encryption and/or authentication requirements for accessing the blockchain data.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Applicant: MICRO FOCUS LLCInventor: Douglas Max Grover
-
Publication number: 20230273996Abstract: A software build environment is scanned for one or more potentially malicious code paths. In response to scanning the software build environment for the one or more potentially malicious code paths, one or more potentially malicious code paths are identified. The identified one or more potentially malicious code paths comprise at least one of: a typo squat code path, a dependency confusion code path, and a brandjack code path. In response to identifying the one or more potentially malicious code paths a microprocessor does at least one of: generate a notification identifying the one or more potentially malicious code paths, automatically change and/or remove the one or more potentially malicious code paths and deny the start of a build process.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Applicant: MICRO FOCUS LLCInventors: Alexander Hoole, Michael F. Angelo
-
Publication number: 20230275763Abstract: An event is identified. For example, the event is that the an original blockchain has reached a threshold number of blocks. In response to identifying the event: the original blockchain is completed and a second blockchain is created. The second blockchain comprises a first consolidation genesis block. The first consolidation genesis block comprises a complete hash of the original blockchain and a first consolidation pointer that points to the original blockchain. This allows the blockchain to be divided into smaller pieces that can be verified using less processing resources. In addition, this allows for more efficient searching of blockchains.Type: ApplicationFiled: May 19, 2021Publication date: August 31, 2023Applicant: MICRO FOCUS LLCInventor: MICHAEL F. ANGELO
-
Publication number: 20230274033Abstract: A copy of a blockchain is stored. The stored copy of the blockchain is copied from a blockchain in a distributed blockchain ledger. An event associated with the blockchain in the distributed ledger is identified. In response identifying the event associated with the blockchain in the distributed ledger, a compromise of the blockchain in the distributed ledger is identified, such as, identifying one or more blocks of the blockchain that have been compromised. In a second embodiment, a request to add a new block to a blockchain is identified. In response identifying the request to add the new block to the blockchain, a consensus vote to add the new block to the blockchain is monitored. A determination is made to determine if the consensus vote is below a threshold. In response to the consensus vote being below the threshold, an audit of the blockchain is completed.Type: ApplicationFiled: May 1, 2023Publication date: August 31, 2023Applicant: Micro Focus LLCInventors: Douglas Max Grover, Michael F. Angelo
-
Publication number: 20230267234Abstract: A copy of a blockchain is stored. The stored copy of the blockchain is copied from a blockchain in a distributed blockchain ledger. An event associated with the blockchain in the distributed ledger is identified. In response identifying the event associated with the blockchain in the distributed ledger, a compromise of the blockchain in the distributed ledger is identified, such as, identifying one or more blocks of the blockchain that have been compromised. In a second embodiment, a request to add a new block to a blockchain is identified. In response identifying the request to add the new block to the blockchain, a consensus vote to add the new block to the blockchain is monitored. A determination is made to determine if the consensus vote is below a threshold. In response to the consensus vote being below the threshold, an audit of the blockchain is completed.Type: ApplicationFiled: May 1, 2023Publication date: August 24, 2023Applicant: Micro Focus LLCInventors: Douglas Max Grover, Michael F. Angelo
-
Publication number: 20230259347Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor cause the processor to create a container in a container runtime environment. The container may include a plurality of generic functions for installation of an application on a computing device. The processor may receive configuration information correlated to the installation of the application. The configuration information may be correlated to a function among the plurality of generic functions. The processor may generate an input for the correlated function based on the configuration information. The correlated function may execute at the computing device based on the generated input. Based on results of an execution of the correlated function at the computing device, the processor may output a log of the correlated function.Type: ApplicationFiled: February 11, 2022Publication date: August 17, 2023Applicant: MICRO FOCUS LLCInventor: Markus Rainer VON DER HEIDEN
-
Patent number: 11726972Abstract: A non-transitory machine-readable storage medium stores instructions that upon execution cause a processor to, in response to initiation of a data indexing for a search concept, retrieve content of a first data source via a data connector, the retrieved content including a reference to a second data source. The instructions further cause the processor to, in response to a determination that the retrieved content of the first data source is relevant to the search concept: index the retrieved content of the first data source; retrieve content of the second data source based on the reference; and determine whether the retrieved content of the second data source is relevant to the search concept.Type: GrantFiled: March 29, 2018Date of Patent: August 15, 2023Assignee: Micro Focus LLCInventors: David Humphrey, Samuel James Jeffrey, Phillip Greenwood
-
Patent number: 11726773Abstract: A primary blockchain for a software application is created that comprises a first block associated with a software component of the software application. An event is received that is associated with the software component. In response to receiving the event, a component blockchain is created that is associated with the software component. The component blockchain comprises a second block associated with the event. The component blockchain links to the primary blockchain. This provides a structure for managing supply chains of software components. As new software components are received, the new software components can be managed and tracked for quality/security.Type: GrantFiled: May 19, 2021Date of Patent: August 15, 2023Assignee: Micro Focus LLCInventors: Michael F. Angelo, Alexander Hoole