Patents Assigned to MICRO FOCUS LLC
  • Patent number: 11971793
    Abstract: Current physical resources utilization of a computing system as a whole is monitored. The number of queries concurrently being executed against a database by a database management system (DBMS) running on a computing system is monitored. A query plan for a received query to be executed against the database is generated. The query plan includes operators; the generation of the query plan includes generation of query-based statistics for the received query on a per-operator basis without consideration of the queries concurrently being executed. An estimated execution time of the received query is dynamically predicted using a machine-learning model based on the query-based statistics generated for the received query on the per-operator basis, the current physical resources utilization of the computing system, and the number of queries concurrently being executed. The received query is executed against the database based on the dynamically predicted estimated execution time for the received query.
    Type: Grant
    Filed: March 5, 2019
    Date of Patent: April 30, 2024
    Assignee: Micro Focus LLC
    Inventors: Yuanzhe Bei, Zhihao Zheng
  • Patent number: 11966867
    Abstract: A technique includes displaying, by a computer using a graphical interface, a map of a geographical area, where the map includes political boundaries. The technique includes displaying, by the computer, graphical images on the map representing a plurality of aspects that are associated with the management of a plurality of projects as corresponding geographical features on the map. The technique includes graphically segregating, by the computer, the plurality of projects on the map using the political boundaries; receiving input, via interaction with the displayed map; and changing, by the computer, in response to the interaction, how a given aspect of the plurality of aspects of a given project of the plurality of projects is represented on the map.
    Type: Grant
    Filed: December 13, 2018
    Date of Patent: April 23, 2024
    Assignee: Micro Focus LLC
    Inventors: Hai-Ying Liu, Chen Ding, Jing-Chun Xia
  • Patent number: 11960585
    Abstract: A nonce is sent to a user communication device. Obfuscated biometric data is received from the user communication device. The obfuscated biometric data is generated by an obfuscation process that uses the nonce and first biometric data. The first biometric data is generated from a biometric of a user at the user communication device. For example, the first biometric data may be biometric data from a fingerprint scan. The obfuscation process is reversed by using the first nonce to produce the first biometric data. The first biometric data is compared to known biometric data of the user. In response to the first biometric data being within a threshold of the known biometric data, the user is authenticated.
    Type: Grant
    Filed: November 30, 2021
    Date of Patent: April 16, 2024
    Assignee: Micro Focus LLC
    Inventors: Douglas Max Grover, Michael F Angelo
  • Patent number: 11962609
    Abstract: Examples disclosed herein relate to source entities of security indicators. Some examples disclosed herein enable identifying, in a security information sharing platform, a security indicator that is originated from a source entity where the security indicator comprises an observable. Some examples further enable determining a reliability level of the source entity based on at least one of: security events, sightings of the observable, a first set of user feedback information that is submitted for the security indicator by users of the security information sharing platform, or a second set of user feedback information that is collected from external resources that are external to the security information sharing platform.
    Type: Grant
    Filed: February 12, 2016
    Date of Patent: April 16, 2024
    Assignee: Micro Focus LLC
    Inventors: Tomas Sander, Brian Frederik Hosea Che Hein, Nadav Cohen, Ted Ross
  • Patent number: 11961046
    Abstract: A computing device includes a processor and a medium storing instructions. The instructions are executable by the processor to: in response to a receipt of an electronic request comprising one or more structured data fields and one or more unstructured data fields, identify a set of previous electronic requests using the one or more structured data fields of the received electronic request; train a probabilistic classification model using at least one structured data field of the identified set of previous electronic requests; execute the trained probabilistic classification model using the one or more unstructured data fields of the received electronic request; and automatically select a request handler using an output of the executed probabilistic classification model.
    Type: Grant
    Filed: May 22, 2018
    Date of Patent: April 16, 2024
    Assignee: Micro Focus LLC
    Inventors: Zhu Jing Wu, Xin-Yu Wang, Jin Wang, Chun-Hua Li, Zhen Cui
  • Patent number: 11956275
    Abstract: In some examples, with respect to asymmetric-man-in-the-middle capture based application sharing protocol traffic recordation, a dynamic-link library that alters application programming interface calls with respect to communication between an application sharing protocol client and an application sharing protocol server may be injected into the application sharing protocol client. Based on the injected dynamic-link library, data from the communication between the application sharing protocol client and the application sharing protocol server may be ascertained. Further, based on the ascertained data, a test script may be generated to test operation of an application associated with the communication between the application sharing protocol client and the application sharing protocol server.
    Type: Grant
    Filed: October 11, 2018
    Date of Patent: April 9, 2024
    Assignee: Micro Focus LLC
    Inventors: Yang Luo, Jian Zhang, Qian-Ru Zhai, Zhenbin Lin
  • Patent number: 11954074
    Abstract: A synchronization structure that indicates changes to files that are to be synchronized is created. The synchronization structure is stored as a series of synchronization blocks. A first synchronization message is received from a communication device. The first synchronization message includes a next block number. A second synchronization message is sent to the communication device. The second synchronization message comprises one or more synchronization blocks that are identified based on the next block number. A third synchronization message is received from the communication device. The third synchronization message requests a number of files to be synchronized. The number of files to be synchronized are sent to the communication device.
    Type: Grant
    Filed: April 28, 2022
    Date of Patent: April 9, 2024
    Assignee: Micro Focus LLC
    Inventors: Vamsi Krishna, Keshavan Santhanam
  • Publication number: 20240111846
    Abstract: An indication of a user being authenticated is received. For example, the user authenticates with a valid username/password. In response to receiving the indication of the user being authenticated, a watermark is associated with the user. The watermark is sent to a communication device of the user. For example, the watermark is sent to the user's personal computer. The communication device of the user embeds the watermark into a communication. For example, the watermark may be embedded into a communication session with a web server. The watermark is sent to a routing device on a network (e.g., a router and/or firewall). The routing device uses the watermark embedded in the communication to determine how to route the communication on the network.
    Type: Application
    Filed: September 29, 2022
    Publication date: April 4, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: DOUGLAS MAX GROVER, MICHAEL F. ANGELO
  • Publication number: 20240106631
    Abstract: A first node in a distributed blockchain ledger validates all remaining nodes in the distributed blockchain ledger to secure the distributed blockchain ledger. The remaining nodes in the distributed blockchain ledger can be validated in various ways. For example, an encrypted package can be exchanged to obtain a unique session key for each of the remaining nodes in the distributed blockchain ledger. Another alternative is to receive split-key fragments from all the nodes in the distributed blockchain ledger. The received split-key fragments are used to generate a common key for validating all the remaining nodes in the distributed blockchain ledger.
    Type: Application
    Filed: September 27, 2022
    Publication date: March 28, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: DOUGLAS MAX GROVER, Michael F. Angelo
  • Publication number: 20240103997
    Abstract: An input regarding security characteristics of a project is received. For example, a security characteristic of a project may be insecure storage of data related to confidentiality. The project is scanned for one or more security requirements based on the received security characteristics. A list of security requirements is built for the project based on the received first input. A machine learning process is used to identify addition of one or more security requirements and/or removal of one or more security requirements from the list of security requirements. A first security vulnerability scan is run using the list of security requirements with the one or more additional security requirements and/or the removed one or more security requirements. Results for the first security vulnerability scan are generated and displayed to a user.
    Type: Application
    Filed: September 22, 2022
    Publication date: March 28, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: ALEXANDER HOOLE, PETER THOMAS BLAY
  • Patent number: 11941020
    Abstract: A query is converted into a structured query tokenization. One or more query results visualizations for the query are determined by applying a supervised machine learning model to the structured query tokenization into which the query has been converted. Query results of the query are displayed using the determined query results visualizations.
    Type: Grant
    Filed: February 26, 2021
    Date of Patent: March 26, 2024
    Assignee: Micro Focus LLC
    Inventor: Tamir Mitelman
  • Patent number: 11936699
    Abstract: An event is identified. The event is associated with device content (e.g., one or more files) and a network location (e.g., a branch location of a corporation). One or more rules are retrieved. The one or more rules are associated with the device content, the network location, and a number of communication devices at the network location. A number of shards (e.g., erasure encoding shards) are determined based on the rules. The number of shards are generated. The number of shards are sent to a plurality of communication devices at the network location according to the rules. The plurality of communication devices at the network location are equal to or less than the number of communication devices at the network location.
    Type: Grant
    Filed: June 3, 2022
    Date of Patent: March 19, 2024
    Assignee: Micro Focus LLC
    Inventor: Vamsi Krishna
  • Publication number: 20240086522
    Abstract: Thread information generated by one or more computing systems is captured. A thread pattern is identified from the captured thread information. The thread pattern is compared to a learned thread pattern. An anomaly is identified in the thread pattern based on a variance from the learned thread pattern. In response to identifying the anomaly in the thread pattern, an action is taken based on the anomalous thread pattern. For example, a user may be notified. The thread patterns may be extended to compare between operating systems, hypervisors, containers, and/or virtual machines.
    Type: Application
    Filed: September 9, 2022
    Publication date: March 14, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: Douglas Max Grover, MICHAEL F. ANGELO, MARTIN FRASER ARLITT
  • Publication number: 20240089265
    Abstract: A multi-factor authentication request of a user is received. For example, the multi-factor authentication request may include a valid username/password and a valid fingerprint scan. A first authentication factor of the multi-factor authentication request is an access authentication factor (e.g., the valid username/password) and a second authentication factor (e.g., the valid fingerprint scan) of the multi-factor authentication request is one of: a time-only authentication factor; a multi-session authentication factor; and a location-only authentication factor. The user is authenticated based on the first authentication factor and the second authentication factor. Access is granted to one or more resources according to one or more rules associated with the first authentication factor and second authentication factor.
    Type: Application
    Filed: September 13, 2022
    Publication date: March 14, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: Douglas Max Grover, MICHAEL F. ANGELO
  • Publication number: 20240070289
    Abstract: Software is commonly built from a package of software packages, such as open-source packages. A package may require a number of interdependent packages, any one of which may have a security vulnerability. However, the dependencies between packages are often version specific and merely upgrading a package to the newest, or newest non-vulnerable, version may break a dependency and cause the software to be unbuildable (e.g., fail to compile or link) or, if built, faulty. By mapping dependencies to non-vulnerable versions a graphical representation may be built having one or more root-to-leaf paths identifying all the required packages by compatible version but exclude any vulnerable versions. The package may then be built to ensure the resulting software is both internally compatible between packages and absent known security vulnerabilities.
    Type: Application
    Filed: August 25, 2022
    Publication date: February 29, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: Emil Wareus, Viktor Pettersson, Carl Ternby
  • Patent number: 11916788
    Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor cause the processor to receive a first IP address using a type of a discovery process for discovery of network configuration information. The processor may determine whether the first IP address is a private IP address or a public IP address. The processor may determine a second attribute of the first IP address, which may include information on a routing domain for the first IP address based on the type of the discovery process used for discovery of the network configuration information. The processor may merge the first IP address with a second IP address based on the second attribute of the first IP address, in which the second IP address may be replaced with the first IP address.
    Type: Grant
    Filed: July 20, 2021
    Date of Patent: February 27, 2024
    Assignee: Micro Focus LLC
    Inventors: Yiming Chen, Qiuxia Song, Liping Sun
  • Patent number: 11907941
    Abstract: In some examples, a system renders, in a user interface, data fields of an interface code, the interface code to input or output the data fields in a transaction, and receives a selection, made in the user interface, of a first data field from among the data fields of the interface code. The system modifies the interface code by adding an indicator associated with the first data field, the indicator specifying anonymization of the first data field during the transaction that uses the first data field, the modifying of the interface code producing a modified interface code.
    Type: Grant
    Filed: January 4, 2018
    Date of Patent: February 20, 2024
    Assignee: Micro Focus LLC
    Inventor: Sushil Nair
  • Publication number: 20240045561
    Abstract: An area of a graphical user interface that potentially comprises an actionable graphical object is identified. An actional graphical object is an object that generates an event when clicked on. For example, an actional graphical object may be a button, a menu, a menu item, a check box, a text field, a text area, a tab, and/or the like. A cursor movement is generated in the area of the graphical user interface (e.g., using a grid). The cursor movement uses a scanning process to a detect a change in a cursor type (e.g., from an arrow cursor to a link cursor). In response to detecting the change in the cursor type, the actionable graphical object is identified in the area of the graphical interface. The actionable graphical object may then be integrated into a testing process to validate the graphical user interface.
    Type: Application
    Filed: August 4, 2022
    Publication date: February 8, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: GAOYANG ZHOU, PENG-JI YIN, CHENGZHE XU
  • Patent number: 11892943
    Abstract: Embodiments of the disclosure provide systems and methods for managing a lifecycle of a software application. According to one embodiment, software application lifecycle management can comprise receiving a specification for an application. The specification can comprise an executable script defining a plurality of features for the application and a plurality of scenarios. Each scenario representing a test for one or more features of the application and each feature comprising one or more user stories. A test entity can be created for and corresponding to each scenario in the specification and each scenario can be marked with a test identifier linking the created test entity to the corresponding scenario in the script. Results of execution of one or more scenarios of the plurality of scenarios can be received and reported on a per-feature and per-scenario basis.
    Type: Grant
    Filed: March 3, 2021
    Date of Patent: February 6, 2024
    Assignee: Micro Focus LLC
    Inventors: Sharon Vardi, Yael Peisachov, Yuval Koren
  • Publication number: 20240039943
    Abstract: A request to add a new block to a blockchain is received. Data associated with the new block is scanned to identify malware and/or an anomaly. In response to identifying the malware and/or the anomaly in the data associated with the new block, an action is taken. The action includes: rejecting the request to add the new block to the blockchain, or removing the malware/anomaly from the new block and adding the new block to the blockchain. In a second embodiment, a malware event is identified that identifies malware/an anomaly in a block in a blockchain. In response to the malware event, an action is taken. The action includes: consolidating the blockchain, bypassing the block in the blockchain, consolidating the blockchain and bypassing the block in the blockchain, and deleting an encryption key that was used to encrypt the associated data that comprises the malware and/or the anomaly.
    Type: Application
    Filed: October 11, 2023
    Publication date: February 1, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: Douglas Max Grover, Michael F. Angelo