Patents by Inventor Alexander Hoole
Alexander Hoole has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240103997Abstract: An input regarding security characteristics of a project is received. For example, a security characteristic of a project may be insecure storage of data related to confidentiality. The project is scanned for one or more security requirements based on the received security characteristics. A list of security requirements is built for the project based on the received first input. A machine learning process is used to identify addition of one or more security requirements and/or removal of one or more security requirements from the list of security requirements. A first security vulnerability scan is run using the list of security requirements with the one or more additional security requirements and/or the removed one or more security requirements. Results for the first security vulnerability scan are generated and displayed to a user.Type: ApplicationFiled: September 22, 2022Publication date: March 28, 2024Applicant: MICRO FOCUS LLCInventors: ALEXANDER HOOLE, PETER THOMAS BLAY
-
Publication number: 20230333843Abstract: A primary blockchain for a software application is created that comprises a first block associated with a software component of the software application. An event is received that is associated with the software component. In response to receiving the event, a component blockchain is created that is associated with the software component. The component blockchain comprises a second block associated with the event. The component blockchain links to the primary blockchain. This provides a structure for managing supply chains of software components. As new software components are received, the new software components can be managed and tracked for quality/security.Type: ApplicationFiled: June 22, 2023Publication date: October 19, 2023Inventors: Michael F. Angelo, Alexander Hoole
-
Publication number: 20230325306Abstract: Testing software applications is routinely limited by time or testing iterations rather than exhaustively testing ever possible permutation of inputs or execution paths. By configuring a testing device to only perform relevant tests, the test results are more meaningful (e.g., few false-positives) and relevant to the application. Additional effects include reduced processing times and storage requirements. As described herein, source code is analyzed to determine elements that indicate a particular environment for the source code's corresponding machine code. When the source code indicates that a particular environment is not a candidate for execution of the machine code, tests associated with that particular environment are excluded. The testing device is then configured to perform those tests, either statically or dynamically, that are relevant for those environments that actually apply.Type: ApplicationFiled: April 8, 2022Publication date: October 12, 2023Applicant: MICRO FOCUS LLCInventors: Alexander Hoole, James Wesley Rabon, Peter Thomas Blay
-
Publication number: 20230306122Abstract: Testing software applications often requires a balancing of thoroughness versus the time and computing resources available to perform such tests. Certain data handling operations may potentially expose data to unauthorized parties. However, not all data is equal; some data requires a greater degree of protection than other data, which may be based on a security context (e.g., rule, law, policy, etc.). By generating rules determined by a particular context, extraneous tests on data outside of the context, may be omitted. Unnecessary tests may be omitted and the results of each analysis process correlated to identify actual vulnerabilities and omit false positives, such as vulnerabilities to data that does not require the same degree of care to avoid unauthorized exposure.Type: ApplicationFiled: March 23, 2022Publication date: September 28, 2023Applicant: MICRO FOCUS LLCInventors: Alexander Hoole, Ali ElKortobi, Reiner Kappenberger, Domingo Juan Rivera
-
Publication number: 20230273996Abstract: A software build environment is scanned for one or more potentially malicious code paths. In response to scanning the software build environment for the one or more potentially malicious code paths, one or more potentially malicious code paths are identified. The identified one or more potentially malicious code paths comprise at least one of: a typo squat code path, a dependency confusion code path, and a brandjack code path. In response to identifying the one or more potentially malicious code paths a microprocessor does at least one of: generate a notification identifying the one or more potentially malicious code paths, automatically change and/or remove the one or more potentially malicious code paths and deny the start of a build process.Type: ApplicationFiled: February 25, 2022Publication date: August 31, 2023Applicant: MICRO FOCUS LLCInventors: Alexander Hoole, Michael F. Angelo
-
Patent number: 11726773Abstract: A primary blockchain for a software application is created that comprises a first block associated with a software component of the software application. An event is received that is associated with the software component. In response to receiving the event, a component blockchain is created that is associated with the software component. The component blockchain comprises a second block associated with the event. The component blockchain links to the primary blockchain. This provides a structure for managing supply chains of software components. As new software components are received, the new software components can be managed and tracked for quality/security.Type: GrantFiled: May 19, 2021Date of Patent: August 15, 2023Assignee: Micro Focus LLCInventors: Michael F. Angelo, Alexander Hoole
-
Patent number: 11695793Abstract: A method includes: identifying, by a runtime instrumentation agent of a web server, a plurality of attack surfaces of a web application executed on the web server; generating, by the runtime instrumentation agent, a plurality of hash values, where each hash value is generated based on one of the plurality of attack surfaces; and transmitting, by the runtime instrumentation agent, the plurality of hash values to an attack server external to the web server, where the attack server is to determine whether to scan each attack surface based on the plurality of hash values.Type: GrantFiled: October 31, 2017Date of Patent: July 4, 2023Assignee: MICRO FOCUS LLCInventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal, Gerald E. Sullivan, II, Alexander Hoole
-
Publication number: 20230143395Abstract: Sensitive information is identified. For example, the sensitive information may be a set of medical records. A request is received to send the sensitive information from a first domain to a second domain. For example, the request may be to send the sensitive information from a first corporation to a second corporation. The sensitive information is encrypted. The encrypted sensitive information comprises an authentication field. The authentication field identifies one or more authentication factors that are required to unencrypt the sensitive information. For example, the authentication field may indicate that a user is required to provide a username/password and a fingerprint scan to access the sensitive information. The encrypted sensitive information is sent to the second domain. The user in the second domain is required to authenticate using the one or more authentication factors to access the sensitive information.Type: ApplicationFiled: March 30, 2022Publication date: May 11, 2023Applicant: MICRO FOCUS LLCInventors: DOUGLAS MAX GROVER, ALEXANDER HOOLE, MICHAEL F. ANGELO
-
Publication number: 20220374229Abstract: A primary blockchain for a software application is created that comprises a first block associated with a software component of the software application. An event is received that is associated with the software component. In response to receiving the event, a component blockchain is created that is associated with the software component. The component blockchain comprises a second block associated with the event. The component blockchain links to the primary blockchain. This provides a structure for managing supply chains of software components. As new software components are received, the new software components can be managed and tracked for quality/security.Type: ApplicationFiled: May 19, 2021Publication date: November 24, 2022Applicant: MICRO FOCUS LLCInventors: Michael F. Angelo, Alexander Hoole
-
Publication number: 20190132348Abstract: A method includes: identifying, by a runtime instrumentation agent of a web server, a plurality of attack surfaces of a web application executed on the web server; generating, by the runtime instrumentation agent, a plurality of hash values, where each hash value is generated based on one of the plurality of attack surfaces; and transmitting, by the runtime instrumentation agent, the plurality of hash values to an attack server external to the web server, where the attack server is to determine whether to scan each attack surface based on the plurality of hash values.Type: ApplicationFiled: October 31, 2017Publication date: May 2, 2019Inventors: Ming Sum Sam Ng, Sasi Siddharth Muthurajan, Nidhi Govindram Kejriwal, Gerald E. Sullivan, II, Alexander Hoole