Patents Assigned to MICRO FOCUS LLC
  • Patent number: 11599340
    Abstract: Examples relate to load testing. The examples disclosed herein enable obtaining lines of code that are recorded as an application is executed in a client computing device, the lines of code being recorded in chronological order of the execution; determining whether a dependency on at least one variable exists in individual lines of the lines of code; in response to determining that the dependency exists, storing the dependency in a data storage; identifying, from the lines of code, a line of code including a network call statement that calls a called variable; and eliminating a first subset of the lines of code based on the called variable and dependencies stored in the data storage, wherein a second subset of the lines of code that remain after the elimination comprises user-entered parameter data.
    Type: Grant
    Filed: December 23, 2014
    Date of Patent: March 7, 2023
    Assignee: MICRO FOCUS LLC
    Inventors: Ohad Assulin, Ilan Shufer, Amit Levin
  • Publication number: 20230063043
    Abstract: A plurality of different types of resource access events are identified. For example, a resource access event may be an administration event where a user is given certain access rights to view/modify a resource, such as, a database record. A plurality of blocks are generated, where each block is associated with an individual one of the plurality of different types of resource access events. The plurality of blocks are added to a first resource access blockchain. The blockchain can be used to track the various types of resource access events.
    Type: Application
    Filed: August 27, 2021
    Publication date: March 2, 2023
    Applicant: MICRO FOCUS LLC
    Inventor: Douglas Max Grover
  • Patent number: 11593397
    Abstract: A poll of a first database is initiated (e.g., a SOT database). The poll of the first database is to identify if any transactions have occurred since a previous poll of the first database. Based on the poll of the first database, information is received that identifies one or more transaction identifiers. A missing transaction identifier is identified based on a contagious list of transaction identifiers. In response to identifying the missing transaction identifier, the missing transaction identifier is stored in a list of missing transaction identifiers for use in a later poll of the first database. By tracking the missing transaction identifier, the process can identify transactions that take longer to commit without introducing lag for transactions that commit quickly.
    Type: Grant
    Filed: October 5, 2020
    Date of Patent: February 28, 2023
    Assignee: Micro Focus LLC
    Inventors: Vamsi Krishna, Kalyan Koka, Kamal Maheshwari
  • Patent number: 11579993
    Abstract: A technique includes accessing, by at least one hardware processor, a recorded request and a recorded response associated with an integration test involving a first computer system and a second computer system. The recorded request was previously issued by the first computer system to the second computer system to cause the second computer system to provide the recorded response. The technique includes, in a virtualized integration test involving the second computer system and initiated using the recorded request, comparing, by the hardware processor(s), the recorded response to a request produced by the second computer system in the virtualized integration test. The technique includes identifying, by the hardware processor(s), an action taken by the second computer system as being likely to be associated with a regression based on the comparison.
    Type: Grant
    Filed: August 22, 2019
    Date of Patent: February 14, 2023
    Assignee: MICRO FOCUS LLC
    Inventors: Ilan Shufer, Salman Yaniv Sayers
  • Publication number: 20230044682
    Abstract: Method and system to automatically verify the layout of a webpage on various screen sizes. The method includes retrieving screen size data associated with the webpage. The method further includes determining anchor points for the webpage based on the retrieved screen size data. The method also includes rendering the plurality of elements of the webpage based on the retrieved screen size data and the determined anchor points and identifying a respective location of each of the plurality of elements of the webpage to verify the layout of the plurality of elements of the webpage. If an error in the layout of the webpage is detected, a visual and/or audio alert is sent.
    Type: Application
    Filed: August 5, 2021
    Publication date: February 9, 2023
    Applicant: MICRO FOCUS LLC
    Inventors: Er-Xin Shang, Hua-Ming Zhai, Tezeen Yu
  • Publication number: 20230037382
    Abstract: A docker image is received. The docker image is for a container. The container contains files that allow for virtualization of applications that run within the container. The docker image is parsed to identify layer files in the docker image. Installed software components (e.g., installed files) and/or hardware components in the layer files are identified. Software application index calls are made to generate information that identifies relationships between the installed software components and/or hardware components. The relationships between the installed software components and/or hardware components are then displayed to a user.
    Type: Application
    Filed: August 2, 2021
    Publication date: February 9, 2023
    Applicant: MICRO FOCUS LLC
    Inventors: QIUXIA SONG, YI-MING CHEN, ZHONG-YI YANG, YANGYANG ZHAO, LEI XIAO
  • Patent number: 11573889
    Abstract: An image of a graphical user interface is captured. For example, a screen shot of a browser display is captured. Text syntax is executed that contains one or more parameters for identifying a graphical object. For example, the text syntax may identify a rectangle that contains the text “OK” where the text is red. Based on the text syntax, a graphical object is identified in the image of the graphical user interface. Information is returned that identifies how to access the graphical object in the graphical user interface. For example, coordinates of the graphical object are identified. This information can then be used in a test script using existing programming languages to test the graphical user interface. For example, the coordinates may be used to click on the OK button.
    Type: Grant
    Filed: November 10, 2020
    Date of Patent: February 7, 2023
    Assignee: Micro Focus LLC
    Inventors: Er-Xin Shang, Hua-Ming Zhai, Yun-Sheng Liu, Tezeen Yu
  • Publication number: 20230034790
    Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor cause the processor to receive a first IP address using a type of a discovery process for discovery of network configuration information. The processor may determine whether the first IP address is a private IP address or a public IP address. The processor may determine a second attribute of the first IP address, which may include information on a routing domain for the first IP address based on the type of the discovery process used for discovery of the network configuration information. The processor may merge the first IP address with a second IP address based on the second attribute of the first IP address, in which the second IP address may be replaced with the first IP address.
    Type: Application
    Filed: July 20, 2021
    Publication date: February 2, 2023
    Applicant: MICRO FOCUS LLC
    Inventors: Yiming CHEN, Qiuxia SONG, Liping SUN
  • Publication number: 20230034257
    Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor cause the processor to receive parameters for a partition range for a partition key associated with a table. The table may have a vertical table structure. The processor may generate an index of vertical table columns based on the received parameters for the partition range. The generated index may be a physical store for data from the table and may have a subset of rows of the table correlating to the partition range. The processor may receive a query having a predicate associated with the partition key associated with the table and, based on a determination that the predicate included in the received query is within a partition range for the generated index, the processor may execute the query using the generated index.
    Type: Application
    Filed: July 28, 2021
    Publication date: February 2, 2023
    Applicant: MICRO FOCUS LLC
    Inventors: Yuanzhe BEI, Pan YE
  • Patent number: 11568054
    Abstract: A login macro to automatically log into a web application running on a server computing device is generated from a provided username, a provided password, and a provided network address of the web application. The login macro can be generated regardless of whether the web application is logged into at a starting web page at the provided network address or at a sign-in web page navigable from the starting web page. After the login macro has been generated, that usage the login macro successfully results in logging into the web application running on the server computing device can be verified.
    Type: Grant
    Filed: June 11, 2019
    Date of Patent: January 31, 2023
    Assignee: MICRO FOCUS LLC
    Inventors: Thomas Christopher Swedlund, Constantine Adarchenko
  • Patent number: 11569999
    Abstract: A first network device nonce is computed. The first network device nonce is based on a first network device secret. A Change Token Table message (CTTM) is sent to a second network device. The CTTM comprises the first network device nonce. A Change Token Table Ack Message (CTTAM) with a second network device nonce is received from the second network device. A new token for a tokenization table is computed based on the first network device secret, the second network device nonce, a prime number, and a key derivation function. The new token for the tokenization table is also computed by the second network device based on a second network device secret, the first network device nonce, the prime number, and the key derivation function.
    Type: Grant
    Filed: July 9, 2021
    Date of Patent: January 31, 2023
    Assignee: Micro Focus LLC
    Inventors: Douglas Max Grover, Vamsi Krishna
  • Patent number: 11567859
    Abstract: Embodiments of the disclosure provide systems and methods for executing a functional test on an application. According to one embodiment, a method for running a functional test on an application can comprise executing the function test on the application. The functional test can comprise a plurality of steps. The plurality of steps can comprise a set of related steps having one or more relationships between each other and a set of one or more independent steps having no relationships to other steps in the plurality of steps. The one or more relationships between the set of related steps can be deduced and an indication of the deduced one or more relationships between the set of related steps can be saved. The functional test can then be replayed on the application based on the saved indication of the deduced one or more relationships between the set of related steps.
    Type: Grant
    Filed: March 18, 2021
    Date of Patent: January 31, 2023
    Assignee: Micro Focus LLC
    Inventors: Hua-Ming Zhai, Er-Xin Shang, Kai Zhou
  • Patent number: 11563754
    Abstract: A service receives, from client computing devices of client networks, information regarding incoming network traffic addressed to dark Internet Protocol (IP) address spaces the of client networks. The service can predict a cyber attack based on the information received from the client computing devices of the client networks. The server computing device notifies the client computing device of each client network affected by the predicted cyber attack.
    Type: Grant
    Filed: February 25, 2019
    Date of Patent: January 24, 2023
    Assignee: MICRO FOCUS LLC
    Inventors: Pratyusa K. Manadhata, Martin Arlitt
  • Patent number: 11562008
    Abstract: Examples herein involve detection of entities in unstructured data. Terms are extracted from unstructured data. Entities scores for the terms are calculated using information from a name probability source, a known entity database, and historical context information. The entity scores indicate a probability that the respective terms refer to entities. The presence of detected entities are indicated based on the entity scores.
    Type: Grant
    Filed: October 25, 2016
    Date of Patent: January 24, 2023
    Assignee: MICRO FOCUS LLC
    Inventor: Samuel Roy Carter
  • Patent number: 11561678
    Abstract: An image of a user interface of a device is captured. A graphical object is identified in the image of the user interface. For example, a menu item or a text object is identified in the image of the user interface. An Artificial Intelligence (AI) process is used to determine a confidence score for the graphical object; the confidence score identifies a confidence of how likely a type of the graphical object can be identified. In response to the first confidence score not meeting a threshold, a zoomed in image of the graphical object is taken or a zoomed-out image of the graphical object is taken. The zoomed in image or the zoomed-out image is used to increase the confidence score to better identify the type of the graphical object.
    Type: Grant
    Filed: October 28, 2021
    Date of Patent: January 24, 2023
    Assignee: Micro Focus LLC
    Inventors: Er-Xin Shang, Shuhui Fu, Yun Yuan
  • Patent number: 11563566
    Abstract: According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.
    Type: Grant
    Filed: October 27, 2014
    Date of Patent: January 24, 2023
    Assignee: Micro Focus LLC
    Inventors: Stuart Haber, Liqun Chen
  • Publication number: 20230019728
    Abstract: A first network device nonce is computed. The first network device nonce is based on a first network device secret. A Change Token Table message (CTTM) is sent to a second network device. The CTTM comprises the first network device nonce. A Change Token Table Ack Message (CTTAM) with a second network device nonce is received from the second network device. A new token for a tokenization table is computed based on the first network device secret, the second network device nonce, a prime number, and a key derivation function. The new token for the tokenization table is also computed by the second network device based on a second network device secret, the first network device nonce, the prime number, and the key derivation function.
    Type: Application
    Filed: July 9, 2021
    Publication date: January 19, 2023
    Applicant: MICRO FOCUS LLC
    Inventors: Douglas Max Grover, VAMSI KRISHNA
  • Publication number: 20230012577
    Abstract: A first message is received from a first communication device. The first message comprises an authentication token. For example, the authentication token may be a username/password. A determination is made if the first message also comprises a valid temporary password. The temporary password is used to prevent a Denial-of-Service (DOS) attack. In response to the first message comprising the valid temporary password, a determination is made if the authentication token is valid. In response to the authentication token being valid, the first message is responded to in a normal manner. If the first message does not contain the temporary password, the first message is handled based on a DOS message handling process.
    Type: Application
    Filed: July 15, 2021
    Publication date: January 19, 2023
    Applicant: MICRO FOCUS LLC
    Inventor: VAMSI KRISHNA
  • Publication number: 20230009023
    Abstract: A request to install a first version of a software application is received. The first version of the software application is stored in a first blockchain in a first distributed blockchain ledger. In response to receiving the request to install the first version of the software application, the first version of the software application is validated by running a hash of the first blockchain. In response to validating the first version of the software application, the first version of the software application is installed from the blockchain to a device. The software application may also be validated after being installed to the device.
    Type: Application
    Filed: July 9, 2021
    Publication date: January 12, 2023
    Applicant: MICRO FOCUS LLC
    Inventors: Michael F. Angelo, Douglas Max Grover
  • Patent number: 11550688
    Abstract: Back end calls triggered by a user interaction with a client user interface may be identified. The user interaction may be correlated with a logic flow, and the logic flow may be associated with the back end calls. A supervised learning model may be trained using a labeled data set comprising the back end calls and their associated logic flow. Rules may be derived from the supervised learning model for classifying other back end calls. The rules may be outputted to a classifier that utilizes the rules to associate the other back end calls with the logic flow.
    Type: Grant
    Filed: October 29, 2015
    Date of Patent: January 10, 2023
    Assignee: MICRO FOCUS LLC
    Inventor: Christopher Byrd