Patents Assigned to MICRO FOCUS LLC
  • Patent number: 12293146
    Abstract: Documents are often generated using a customer communication management (CCM) application that utilizes rules to select and/or modify certain fragments of a document. By analyzing the rules and content that produced a certain fragment, a second CCM application may be automatically provided with the rules, such as when the first set of rules are not available for porting to a second system. Accordingly, a server may access a rule comprising a condition, a document fragment, and a rule identifier. A server may generate a first document to comprise visible content and hidden content. Generating the first document may comprise evaluating the rule and, when the rule is true, including the document fragment as a portion of the visible content and including the rule identifier as a portion of hidden content. A server may provide the first document to a destination.
    Type: Grant
    Filed: June 1, 2023
    Date of Patent: May 6, 2025
    Assignee: Micro Focus LLC
    Inventors: Paritosh Tomar, Amit Narang, Anthony John Wiley
  • Publication number: 20250138906
    Abstract: In multi-threaded or multi-processor computing systems, a deadlock may occur when two or more processes or threads are unable to proceed because they are each waiting for a resource that the other holds. As a result, progress is halted because conflicting entities are stuck in a circular dependency, and none can release the resources they hold to let the others continue. Systems and methods are provided wherein a resource reservation is carried out in two steps. The first step causes query nodes to add an identifier to a queue and, upon a request and the identifier being in a first position, a non-sharable resource is reserved. As a result, non-sharable resources are reserved in order and when needed, thereby preventing deadlocks.
    Type: Application
    Filed: November 1, 2023
    Publication date: May 1, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: Alexander Kalinin, Thao Nguyen Pham, Yuanzhe Bei
  • Publication number: 20250124086
    Abstract: A system includes a processor and a memory. When executed by the processor, the processor is caused to receive a document including at least one of structured data, semi-structured data, and unstructured data, analyze the metadata in the structured format to generate features enhancing the metadata in the structured format, produce classification data for the document based on the features enhancing the metadata in the structured format and the content in the unstructured format, automatically classify the document based on the classification data and store the classification data in a database structure. The classification data is used to effectively search for the document. The structured data includes metadata about the document in a structured format, the semi-structured data includes content of the document in an unstructured format and metadata about the document in the structured format and the unstructured data includes the content of the document in the unstructured format.
    Type: Application
    Filed: October 13, 2023
    Publication date: April 17, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: Sean Blanchflower, Chris Smith
  • Publication number: 20250124335
    Abstract: A training corpus for training a similarity algorithm is retrieved. For example, the training corpus may be source code of a software application. The similarity algorithm is trained using the training corpus. A network is crawled to identify data. For example, the Internet may be randomly crawled to identify source code. The data is run through the similarity algorithm to determine a likely match between the training corpus and the identified data on the network. In response to determining the likely match between the training corpus and the identified data on the network, an action is taken. For example, the action may be to identify a particular website as containing illegally copied source code of the software application.
    Type: Application
    Filed: October 12, 2023
    Publication date: April 17, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: DOUGLAS MAX GROVER, MICHAEL F. ANGELO
  • Publication number: 20250117200
    Abstract: Systems and methods are disclosed to develop and use a tool to enable an application package to be instrumented with automatic real user monitoring (RUM) without accessing the original source code. A package, such as Android application bundle (AAB) or Android package kit (APK), is imported and decoded and a generated source code file and/or manifest is obtained. Instrumentation is then added at a location corresponding to a code signature in the generated source code file (e.g., an operation to be instrumented before and/or after the operation). The generated source code file is then compiled and packaged into an APK and/or AAB file. The resulting application package is available for downloading, installation, and use on user devices with the instrumentation having been automatically added and without access to the original source code.
    Type: Application
    Filed: October 10, 2023
    Publication date: April 10, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: Yu-Dan Lin, Bing Zhang, Hao Liu, Jin-Hong Zhang
  • Patent number: 12271495
    Abstract: A plurality of different types of resource access events are identified. For example, a resource access event may be an administration event where a user is given certain access rights to view/modify a resource, such as, a database record. A plurality of blocks are generated, where each block is associated with an individual one of the plurality of different types of resource access events. The plurality of blocks are added to a first resource access blockchain. The blockchain can be used to track the various types of resource access events.
    Type: Grant
    Filed: August 27, 2021
    Date of Patent: April 8, 2025
    Assignee: Micro Focus LLC
    Inventor: Douglas Max Grover
  • Patent number: 12273365
    Abstract: A request to add a new block to a blockchain is received. Data associated with the new block is scanned to identify malware and/or an anomaly. In response to identifying the malware and/or the anomaly in the data associated with the new block, an action is taken. The action includes: rejecting the request to add the new block to the blockchain, or removing the malware/anomaly from the new block and adding the new block to the blockchain. In a second embodiment, a malware event is identified that identifies malware/an anomaly in a block in a blockchain. In response to the malware event, an action is taken. The action includes: consolidating the blockchain, bypassing the block in the blockchain, consolidating the blockchain and bypassing the block in the blockchain, and deleting an encryption key that was used to encrypt the associated data that comprises the malware and/or the anomaly.
    Type: Grant
    Filed: June 23, 2021
    Date of Patent: April 8, 2025
    Assignee: Micro Focus LLC
    Inventors: Douglas Max Grover, Michael F. Angelo
  • Patent number: 12271731
    Abstract: A request to install a first version of a software application is received. The first version of the software application is stored in a first blockchain in a first distributed blockchain ledger. In response to receiving the request to install the first version of the software application, the first version of the software application is validated by running a hash of the first blockchain. In response to validating the first version of the software application, the first version of the software application is installed from the blockchain to a device. The software application may also be validated after being installed to the device.
    Type: Grant
    Filed: October 5, 2023
    Date of Patent: April 8, 2025
    Assignee: Micro Focus LLC
    Inventors: Michael F. Angelo, Douglas Max Grover
  • Patent number: 12267204
    Abstract: A device, system, and method are provided. In one example, a method for polling for server events is described that includes storing, on a server, a list of events. The method also includes polling, by a client, the server for the list of events. The method includes receiving the list of events stored on the server. The method further includes broadcasting each event in the list of events received to an associated component; and requesting, by each component that receives at least one associated event, component related event data for each associated event.
    Type: Grant
    Filed: July 31, 2023
    Date of Patent: April 1, 2025
    Assignee: Micro Focus LLC
    Inventors: Nurit Guthrie, Itzik Kabessa
  • Publication number: 20250103726
    Abstract: A current software tool is identified. The current software tool is used to manage and/or create a current corresponding software. For example, the current software tool may be a compiler and the current corresponding software may be a binary executable. A current mapping is generated between code provided to the current software tool and the current corresponding software using a first Artificial Intelligence (AI) algorithm. A comparison between the current mapping and a learned mapping is made to determine if the current software tool is manipulating the current corresponding software in an abnormal way. The learned mapping is based on historical code input into historical software tools and corresponding historical code output from the historical software tools. In response to determining that the current software tool is manipulating the current corresponding software in an abnormal way, the current software tool is identified as being compromised or likely compromised.
    Type: Application
    Filed: September 27, 2023
    Publication date: March 27, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: Neeraj Kumar Vijay, Michael F. Angelo, Douglas Max Grover
  • Publication number: 20250106247
    Abstract: A security orchestration, automation, and response (SOAR) playbook is often selected to address an incident, such as a fault or attack (e.g., malware, a phishing attack, etc.) on a computer system or component. However, when the incident is new, manual resolution is often utilized to address the incident. By utilizing a neural network trained to identify similarities in a new incident, the neural network can select a SOAR playbook and optionally automatically deploy the playbook to address the incident.
    Type: Application
    Filed: September 26, 2023
    Publication date: March 27, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: Manohar Chamaraju, Vasudevan Gajjala, Sanjay Bhat, Umesh KH
  • Patent number: 12260239
    Abstract: A monitoring utility program into a software container in which a containerized virtual machine application is running. The monitoring utility program is to monitor the containerized virtual machine application running within the software container. Monitoring information regarding the containerized virtual machine application is periodically pulled from the monitoring utility program.
    Type: Grant
    Filed: March 29, 2019
    Date of Patent: March 25, 2025
    Assignee: Micro Focus LLC
    Inventors: Jin-Feng Gao, Guozhu Cao, Xiaomei Qiu
  • Patent number: 12259983
    Abstract: Testing software applications often requires a balancing of thoroughness versus the time and computing resources available to perform such tests. Certain data handling operations may potentially expose data to unauthorized parties. However, not all data is equal; some data requires a greater degree of protection than other data, which may be based on a security context (e.g., rule, law, policy, etc.). By generating rules determined by a particular context, extraneous tests on data outside of the context, may be omitted. Unnecessary tests may be omitted and the results of each analysis process correlated to identify actual vulnerabilities and omit false positives, such as vulnerabilities to data that does not require the same degree of care to avoid unauthorized exposure.
    Type: Grant
    Filed: March 23, 2022
    Date of Patent: March 25, 2025
    Assignee: Micro Focus LLC
    Inventors: Alexander Hoole, Ali ElKortobi, Reiner Kappenberger, Domingo Juan Rivera
  • Publication number: 20250094609
    Abstract: Testing software applications often requires a balancing of thoroughness versus the time and computing resources available to perform such tests. Certain data handling operations may potentially expose data to unauthorized parties. However, not all data is equal; some data requires a greater degree of protection than other data, which may be based on a security context (e.g., rule, law, policy, etc.). By generating rules determined by a particular context, extraneous tests on data outside of the context, may be omitted. Unnecessary tests may be omitted and the results of each analysis process correlated to identify actual vulnerabilities and omit false positives, such as vulnerabilities to data that does not require the same degree of care to avoid unauthorized exposure.
    Type: Application
    Filed: December 5, 2024
    Publication date: March 20, 2025
    Applicant: Micro Focus LLC
    Inventors: Alexander Hoole, Ali ElKortobi, Reiner Kappenberger, Domingo Juan Rivera
  • Patent number: 12255998
    Abstract: Sensitive information is identified. For example, the sensitive information may be a set of medical records. A request is received to send the sensitive information from a first domain to a second domain. For example, the request may be to send the sensitive information from a first corporation to a second corporation. The sensitive information is encrypted. The encrypted sensitive information comprises an authentication field. The authentication field identifies one or more authentication factors that are required to unencrypt the sensitive information. For example, the authentication field may indicate that a user is required to provide a username/password and a fingerprint scan to access the sensitive information. The encrypted sensitive information is sent to the second domain. The user in the second domain is required to authenticate using the one or more authentication factors to access the sensitive information.
    Type: Grant
    Filed: March 30, 2022
    Date of Patent: March 18, 2025
    Assignee: Micro Focus LLC
    Inventors: Douglas Max Grover, Alexander Hoole, Michael F. Angelo
  • Publication number: 20250085992
    Abstract: Containerized platforms like Kubernetes, OpenShift, EKS (Elastic Kubernetes Service), etc., containerize and orchestrate applications. There are mature solutions for discovering and modeling applications running in physical and virtualized machines, and for containerized platforms, there are solutions for discovering and modeling infrastructure like namespaces, controllers, and pods. While beneficial, such models are incomplete. Accordingly, systems and methods are provided herein for discovering applications and modeling resources utilized for the applications or product suites. As a result, version mismatches or unplanned changes may be detected and corrected.
    Type: Application
    Filed: September 12, 2023
    Publication date: March 13, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: Lei Xiao, Die Liu, Jun-Wu Pan, Yi Gong
  • Patent number: 12250206
    Abstract: A request to authenticate is received. For example, the request to authenticate may be to authenticate to a software application or a device. The request to authenticate is for a first authentication level for a user. The first authentication level is one of a plurality of authentication levels for the user. The request to authenticate is authorized based on a provided one or more authentication factors (e.g., a valid username/password). A plurality of authentication tokens are retrieved. The plurality of authentication tokens are associated with the first authentication level. In addition, each authentication token of the plurality of authentication tokens is associated with an individual application of a plurality of applications. Access to information in the plurality of applications is granted based on the plurality of authentication tokens.
    Type: Grant
    Filed: July 19, 2022
    Date of Patent: March 11, 2025
    Assignee: Micro Focus LLC
    Inventors: Douglas Max Grover, Michael F. Angelo
  • Publication number: 20250080365
    Abstract: A first device transmits a request message to a proxy device to forward to a second device. The request message includes a public key. The second device transmits a response message to the proxy device to forward to the first device. The response message includes a cryptographic nonce and is encrypted with the public key. The first device decrypts the response message, and generates a session key based on the nonce and a pre-shared password. The first device generates a session key and transmits a challenge response encrypted with the session key to the proxy device to forward to the second device. The second device generates the session key and decrypts the challenge response with the session key. Upon the second device confirming the challenge response such that a secure session is established, the first and second devices communicate with one another over the secure session.
    Type: Application
    Filed: August 29, 2023
    Publication date: March 6, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: Vamsi Krishna, Daniel L. Christensen
  • Publication number: 20250080985
    Abstract: Data of a plurality of channels of a spread-spectrum network are received. For example, the data of the plurality of channels of the spread-spectrum network may be captured by a spread-spectrum router (e.g., a WiFi router). The data of the plurality of channels of the spread-spectrum network is analyzed to identify an anomalous cross-channel pattern across the plurality of channels of the spread-spectrum network. For example, the attack may be a sequential attack across each of the channels of the spread-spectrum network. In response to identifying the anomalous cross-channel pattern across the plurality of channels of the spread-spectrum network, an action is taken to protect the spread-spectrum network. For example, the action may be to notify an administrator of the spread-spectrum network that a potential attack is occurring on the spread-spectrum network or to block access to the spread-spectrum router.
    Type: Application
    Filed: August 28, 2023
    Publication date: March 6, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: Michael F. Angelo, Douglas Max Grover
  • Publication number: 20250061032
    Abstract: Method and system to improve keyboard input in an automated test environment. The method includes determining a keyboard layout. The method also includes receiving an input, wherein the input comprises a plurality of characters. The method further includes processing the input to determine an input delay between each character of the plurality of characters and entering each character of the plurality of characters with the determined input delay between each character.
    Type: Application
    Filed: August 16, 2023
    Publication date: February 20, 2025
    Applicant: MICRO FOCUS LLC
    Inventors: Gaoyang Zhou, ChengZhe Xu, Yuxiang Zhang