Patents Assigned to MICRO FOCUS LLC
-
Patent number: 11599340Abstract: Examples relate to load testing. The examples disclosed herein enable obtaining lines of code that are recorded as an application is executed in a client computing device, the lines of code being recorded in chronological order of the execution; determining whether a dependency on at least one variable exists in individual lines of the lines of code; in response to determining that the dependency exists, storing the dependency in a data storage; identifying, from the lines of code, a line of code including a network call statement that calls a called variable; and eliminating a first subset of the lines of code based on the called variable and dependencies stored in the data storage, wherein a second subset of the lines of code that remain after the elimination comprises user-entered parameter data.Type: GrantFiled: December 23, 2014Date of Patent: March 7, 2023Assignee: MICRO FOCUS LLCInventors: Ohad Assulin, Ilan Shufer, Amit Levin
-
Publication number: 20230063043Abstract: A plurality of different types of resource access events are identified. For example, a resource access event may be an administration event where a user is given certain access rights to view/modify a resource, such as, a database record. A plurality of blocks are generated, where each block is associated with an individual one of the plurality of different types of resource access events. The plurality of blocks are added to a first resource access blockchain. The blockchain can be used to track the various types of resource access events.Type: ApplicationFiled: August 27, 2021Publication date: March 2, 2023Applicant: MICRO FOCUS LLCInventor: Douglas Max Grover
-
Patent number: 11593397Abstract: A poll of a first database is initiated (e.g., a SOT database). The poll of the first database is to identify if any transactions have occurred since a previous poll of the first database. Based on the poll of the first database, information is received that identifies one or more transaction identifiers. A missing transaction identifier is identified based on a contagious list of transaction identifiers. In response to identifying the missing transaction identifier, the missing transaction identifier is stored in a list of missing transaction identifiers for use in a later poll of the first database. By tracking the missing transaction identifier, the process can identify transactions that take longer to commit without introducing lag for transactions that commit quickly.Type: GrantFiled: October 5, 2020Date of Patent: February 28, 2023Assignee: Micro Focus LLCInventors: Vamsi Krishna, Kalyan Koka, Kamal Maheshwari
-
Patent number: 11579993Abstract: A technique includes accessing, by at least one hardware processor, a recorded request and a recorded response associated with an integration test involving a first computer system and a second computer system. The recorded request was previously issued by the first computer system to the second computer system to cause the second computer system to provide the recorded response. The technique includes, in a virtualized integration test involving the second computer system and initiated using the recorded request, comparing, by the hardware processor(s), the recorded response to a request produced by the second computer system in the virtualized integration test. The technique includes identifying, by the hardware processor(s), an action taken by the second computer system as being likely to be associated with a regression based on the comparison.Type: GrantFiled: August 22, 2019Date of Patent: February 14, 2023Assignee: MICRO FOCUS LLCInventors: Ilan Shufer, Salman Yaniv Sayers
-
Publication number: 20230044682Abstract: Method and system to automatically verify the layout of a webpage on various screen sizes. The method includes retrieving screen size data associated with the webpage. The method further includes determining anchor points for the webpage based on the retrieved screen size data. The method also includes rendering the plurality of elements of the webpage based on the retrieved screen size data and the determined anchor points and identifying a respective location of each of the plurality of elements of the webpage to verify the layout of the plurality of elements of the webpage. If an error in the layout of the webpage is detected, a visual and/or audio alert is sent.Type: ApplicationFiled: August 5, 2021Publication date: February 9, 2023Applicant: MICRO FOCUS LLCInventors: Er-Xin Shang, Hua-Ming Zhai, Tezeen Yu
-
Publication number: 20230037382Abstract: A docker image is received. The docker image is for a container. The container contains files that allow for virtualization of applications that run within the container. The docker image is parsed to identify layer files in the docker image. Installed software components (e.g., installed files) and/or hardware components in the layer files are identified. Software application index calls are made to generate information that identifies relationships between the installed software components and/or hardware components. The relationships between the installed software components and/or hardware components are then displayed to a user.Type: ApplicationFiled: August 2, 2021Publication date: February 9, 2023Applicant: MICRO FOCUS LLCInventors: QIUXIA SONG, YI-MING CHEN, ZHONG-YI YANG, YANGYANG ZHAO, LEI XIAO
-
Patent number: 11573889Abstract: An image of a graphical user interface is captured. For example, a screen shot of a browser display is captured. Text syntax is executed that contains one or more parameters for identifying a graphical object. For example, the text syntax may identify a rectangle that contains the text “OK” where the text is red. Based on the text syntax, a graphical object is identified in the image of the graphical user interface. Information is returned that identifies how to access the graphical object in the graphical user interface. For example, coordinates of the graphical object are identified. This information can then be used in a test script using existing programming languages to test the graphical user interface. For example, the coordinates may be used to click on the OK button.Type: GrantFiled: November 10, 2020Date of Patent: February 7, 2023Assignee: Micro Focus LLCInventors: Er-Xin Shang, Hua-Ming Zhai, Yun-Sheng Liu, Tezeen Yu
-
Publication number: 20230034790Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor cause the processor to receive a first IP address using a type of a discovery process for discovery of network configuration information. The processor may determine whether the first IP address is a private IP address or a public IP address. The processor may determine a second attribute of the first IP address, which may include information on a routing domain for the first IP address based on the type of the discovery process used for discovery of the network configuration information. The processor may merge the first IP address with a second IP address based on the second attribute of the first IP address, in which the second IP address may be replaced with the first IP address.Type: ApplicationFiled: July 20, 2021Publication date: February 2, 2023Applicant: MICRO FOCUS LLCInventors: Yiming CHEN, Qiuxia SONG, Liping SUN
-
Publication number: 20230034257Abstract: According to examples, an apparatus may include a processor and a memory on which are stored machine-readable instructions that when executed by the processor cause the processor to receive parameters for a partition range for a partition key associated with a table. The table may have a vertical table structure. The processor may generate an index of vertical table columns based on the received parameters for the partition range. The generated index may be a physical store for data from the table and may have a subset of rows of the table correlating to the partition range. The processor may receive a query having a predicate associated with the partition key associated with the table and, based on a determination that the predicate included in the received query is within a partition range for the generated index, the processor may execute the query using the generated index.Type: ApplicationFiled: July 28, 2021Publication date: February 2, 2023Applicant: MICRO FOCUS LLCInventors: Yuanzhe BEI, Pan YE
-
Patent number: 11568054Abstract: A login macro to automatically log into a web application running on a server computing device is generated from a provided username, a provided password, and a provided network address of the web application. The login macro can be generated regardless of whether the web application is logged into at a starting web page at the provided network address or at a sign-in web page navigable from the starting web page. After the login macro has been generated, that usage the login macro successfully results in logging into the web application running on the server computing device can be verified.Type: GrantFiled: June 11, 2019Date of Patent: January 31, 2023Assignee: MICRO FOCUS LLCInventors: Thomas Christopher Swedlund, Constantine Adarchenko
-
Patent number: 11569999Abstract: A first network device nonce is computed. The first network device nonce is based on a first network device secret. A Change Token Table message (CTTM) is sent to a second network device. The CTTM comprises the first network device nonce. A Change Token Table Ack Message (CTTAM) with a second network device nonce is received from the second network device. A new token for a tokenization table is computed based on the first network device secret, the second network device nonce, a prime number, and a key derivation function. The new token for the tokenization table is also computed by the second network device based on a second network device secret, the first network device nonce, the prime number, and the key derivation function.Type: GrantFiled: July 9, 2021Date of Patent: January 31, 2023Assignee: Micro Focus LLCInventors: Douglas Max Grover, Vamsi Krishna
-
Patent number: 11567859Abstract: Embodiments of the disclosure provide systems and methods for executing a functional test on an application. According to one embodiment, a method for running a functional test on an application can comprise executing the function test on the application. The functional test can comprise a plurality of steps. The plurality of steps can comprise a set of related steps having one or more relationships between each other and a set of one or more independent steps having no relationships to other steps in the plurality of steps. The one or more relationships between the set of related steps can be deduced and an indication of the deduced one or more relationships between the set of related steps can be saved. The functional test can then be replayed on the application based on the saved indication of the deduced one or more relationships between the set of related steps.Type: GrantFiled: March 18, 2021Date of Patent: January 31, 2023Assignee: Micro Focus LLCInventors: Hua-Ming Zhai, Er-Xin Shang, Kai Zhou
-
Patent number: 11563754Abstract: A service receives, from client computing devices of client networks, information regarding incoming network traffic addressed to dark Internet Protocol (IP) address spaces the of client networks. The service can predict a cyber attack based on the information received from the client computing devices of the client networks. The server computing device notifies the client computing device of each client network affected by the predicted cyber attack.Type: GrantFiled: February 25, 2019Date of Patent: January 24, 2023Assignee: MICRO FOCUS LLCInventors: Pratyusa K. Manadhata, Martin Arlitt
-
Patent number: 11562008Abstract: Examples herein involve detection of entities in unstructured data. Terms are extracted from unstructured data. Entities scores for the terms are calculated using information from a name probability source, a known entity database, and historical context information. The entity scores indicate a probability that the respective terms refer to entities. The presence of detected entities are indicated based on the entity scores.Type: GrantFiled: October 25, 2016Date of Patent: January 24, 2023Assignee: MICRO FOCUS LLCInventor: Samuel Roy Carter
-
Patent number: 11561678Abstract: An image of a user interface of a device is captured. A graphical object is identified in the image of the user interface. For example, a menu item or a text object is identified in the image of the user interface. An Artificial Intelligence (AI) process is used to determine a confidence score for the graphical object; the confidence score identifies a confidence of how likely a type of the graphical object can be identified. In response to the first confidence score not meeting a threshold, a zoomed in image of the graphical object is taken or a zoomed-out image of the graphical object is taken. The zoomed in image or the zoomed-out image is used to increase the confidence score to better identify the type of the graphical object.Type: GrantFiled: October 28, 2021Date of Patent: January 24, 2023Assignee: Micro Focus LLCInventors: Er-Xin Shang, Shuhui Fu, Yun Yuan
-
Patent number: 11563566Abstract: According to an example, key splitting may include utilizing a masked version of a master key that is masked by using a mask.Type: GrantFiled: October 27, 2014Date of Patent: January 24, 2023Assignee: Micro Focus LLCInventors: Stuart Haber, Liqun Chen
-
Publication number: 20230019728Abstract: A first network device nonce is computed. The first network device nonce is based on a first network device secret. A Change Token Table message (CTTM) is sent to a second network device. The CTTM comprises the first network device nonce. A Change Token Table Ack Message (CTTAM) with a second network device nonce is received from the second network device. A new token for a tokenization table is computed based on the first network device secret, the second network device nonce, a prime number, and a key derivation function. The new token for the tokenization table is also computed by the second network device based on a second network device secret, the first network device nonce, the prime number, and the key derivation function.Type: ApplicationFiled: July 9, 2021Publication date: January 19, 2023Applicant: MICRO FOCUS LLCInventors: Douglas Max Grover, VAMSI KRISHNA
-
Publication number: 20230012577Abstract: A first message is received from a first communication device. The first message comprises an authentication token. For example, the authentication token may be a username/password. A determination is made if the first message also comprises a valid temporary password. The temporary password is used to prevent a Denial-of-Service (DOS) attack. In response to the first message comprising the valid temporary password, a determination is made if the authentication token is valid. In response to the authentication token being valid, the first message is responded to in a normal manner. If the first message does not contain the temporary password, the first message is handled based on a DOS message handling process.Type: ApplicationFiled: July 15, 2021Publication date: January 19, 2023Applicant: MICRO FOCUS LLCInventor: VAMSI KRISHNA
-
Publication number: 20230009023Abstract: A request to install a first version of a software application is received. The first version of the software application is stored in a first blockchain in a first distributed blockchain ledger. In response to receiving the request to install the first version of the software application, the first version of the software application is validated by running a hash of the first blockchain. In response to validating the first version of the software application, the first version of the software application is installed from the blockchain to a device. The software application may also be validated after being installed to the device.Type: ApplicationFiled: July 9, 2021Publication date: January 12, 2023Applicant: MICRO FOCUS LLCInventors: Michael F. Angelo, Douglas Max Grover
-
Patent number: 11550688Abstract: Back end calls triggered by a user interaction with a client user interface may be identified. The user interaction may be correlated with a logic flow, and the logic flow may be associated with the back end calls. A supervised learning model may be trained using a labeled data set comprising the back end calls and their associated logic flow. Rules may be derived from the supervised learning model for classifying other back end calls. The rules may be outputted to a classifier that utilizes the rules to associate the other back end calls with the logic flow.Type: GrantFiled: October 29, 2015Date of Patent: January 10, 2023Assignee: MICRO FOCUS LLCInventor: Christopher Byrd