Patents by Inventor Alexander Michael Hoole

Alexander Michael Hoole has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11055416
    Abstract: In some examples, a method may include detecting a vulnerability in an application during execution on a first computing device. The method may include triggering a breakpoint based on the detecting, thereby pausing the execution of the application before execution of a portion of code that exploits the vulnerability. The method may include communicating a message indicating occurrence of the breakpoint. The method may include receiving a connection request from a second computing device in response to the message. The method may include resuming execution of the application from the breakpoint subject to a signal from the second computing device.
    Type: Grant
    Filed: October 24, 2017
    Date of Patent: July 6, 2021
    Assignee: Micro Focus LLC
    Inventors: Alexander Michael Hoole, Ming Sum Sam Ng
  • Publication number: 20190121985
    Abstract: In some examples, a method may include detecting a vulnerability in an application during execution on a first computing device. The method may include triggering a breakpoint based on the detecting, thereby pausing the execution of the application before execution of a portion of code that exploits the vulnerability. The method may include communicating a message indicating occurrence of the breakpoint. The method may include receiving a connection request from a second computing device in response to the message. The method may include resuming execution of the application from the breakpoint subject to a signal from the second computing device.
    Type: Application
    Filed: October 24, 2017
    Publication date: April 25, 2019
    Inventors: Alexander Michael HOOLE, Ming Sum Sam NG
  • Publication number: 20180239904
    Abstract: A technique includes receiving data representing issues identified in a security scan of an application and features associated with the issues. The technique includes processing the data in a processor-based machine to selectively assign classifiers to the security issues based at least in part on the features. The technique includes using the assigned classifiers to classify the issues.
    Type: Application
    Filed: August 12, 2015
    Publication date: August 23, 2018
    Inventors: Emil Kiner, Guy Wiener, Alexander Michael Hoole, Michael Jason Schmit, Yekaterina Tsipenyuk O'Neil, Dylan B. Thomas, Daniel Haviv Trauner