Patents by Inventor Martin Fraser Arlitt

Martin Fraser Arlitt has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240144075
    Abstract: One or more iterations are performed. Each iteration includes calculating, for each of a number of data points that each have a label probability distribution, a label quality measure based on the label probability distribution of the data point. Each iteration includes updating the label probability distribution of each of at least one of the data points using either or both of a classification technique and a constrained clustering technique based on the data points and the label quality measure of each data point.
    Type: Application
    Filed: October 28, 2022
    Publication date: May 2, 2024
    Inventors: Manish Marwah, Hari Manassery Koduvely, Mahsa Khosravi, Maria Pospelova, Martin Fraser Arlitt
  • Publication number: 20240086522
    Abstract: Thread information generated by one or more computing systems is captured. A thread pattern is identified from the captured thread information. The thread pattern is compared to a learned thread pattern. An anomaly is identified in the thread pattern based on a variance from the learned thread pattern. In response to identifying the anomaly in the thread pattern, an action is taken based on the anomalous thread pattern. For example, a user may be notified. The thread patterns may be extended to compare between operating systems, hypervisors, containers, and/or virtual machines.
    Type: Application
    Filed: September 9, 2022
    Publication date: March 14, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: Douglas Max Grover, MICHAEL F. ANGELO, MARTIN FRASER ARLITT
  • Publication number: 20240007279
    Abstract: A secondary fragment of an encryption key is received. The secondary fragment is associated with an authentication process of a user. The secondary fragment is one of a plurality of secondary fragments of the encryption key. The user is authenticated (e.g., by validating a username/password). The encryption key is regenerated using the secondary fragment and a primary fragment of the encryption key. In response to regenerating the encryption key using the secondary fragment and the primary fragment, and authenticating the user: access is granted, to the user, by unencrypting an encrypted data record using the regenerated encryption key.
    Type: Application
    Filed: June 29, 2022
    Publication date: January 4, 2024
    Applicant: MICRO FOCUS LLC
    Inventors: DOUGLAS MAX GROVER, MICHAEL F. ANGELO, MARTIN FRASER ARLITT
  • Publication number: 20230353586
    Abstract: For each item represented within log events that have a power law-oriented distribution, first and second metrics for the item are computed based on the log events which pertain to the item. The items are organized over bins according to the first metric. The bins correspond to different ranges of the first metric. For each bin, the items in the bin are ordered according to the second metric. A plot of the bins over which the items have been organized according to the first metric, is graphically displayed, which includes displaying, for each bin, the items in the bin as have been ordered according to the second metric.
    Type: Application
    Filed: April 28, 2022
    Publication date: November 2, 2023
    Inventors: Martin Fraser Arlitt, Manish Marwah, Mark Kendall Vaszary
  • Publication number: 20230171268
    Abstract: A security rule associated with an application is identified. This may be done continuously and verified using machine learning models to ensure that the environment characterized by the data has not changed. For example, a security rule may be which ports are open/closed on a firewall. In response to identifying the security rule associated with the application, a security test based on the security rule is generated. For example, the security test may be to test all the ports on the firewall to see which ports are open/closed. The security test against the application is executed to determine if the security rule has been implemented properly by the application.
    Type: Application
    Filed: November 30, 2021
    Publication date: June 1, 2023
    Applicant: MICRO FOCUS LLC
    Inventors: Manish Marwah, Martin Fraser Arlitt
  • Patent number: 7571069
    Abstract: A method for providing data assurance includes receiving selected input data to perform data assurance thereon, and receiving selected parameters for the data assurance. Data assurance modules are provided that translate the input data and the parameters and that derive a workflow for the data assurance based on the translated input data and the parameters. The workflow is executed to provide the data assurance on the input data.
    Type: Grant
    Filed: December 22, 2006
    Date of Patent: August 4, 2009
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Keith Istyan Farkas, Sandro Rafaeli, Martin Fraser Arlitt, Subramoniam N. Iyer, Amit Singh Rathore
  • Patent number: 7188174
    Abstract: A system and method to provide admission control of resources for applications in resource utility environments. Admission control is used to efficiently allocate access to resources with a certain level of assurance based on statistical behavior of resource demands of applications.
    Type: Grant
    Filed: December 30, 2002
    Date of Patent: March 6, 2007
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Jerome Alexander Rolia, Xiaoyun Zhu, Martin Fraser Arlitt, Artur Andrzejak
  • Patent number: 7170745
    Abstract: A rack has a frame for supporting one or more electronic components. The frame includes a front side and a rear side. An angled panel is positioned on at least one of the front side and the rear side. The angled panel extends for a substantial portion of the frame and is configured to vary airflow through the rack.
    Type: Grant
    Filed: April 30, 2003
    Date of Patent: January 30, 2007
    Assignee: Hewlett-Packard Development Company, L.P.
    Inventors: Cullen Edwin Bash, Martin Fraser Arlitt, Ratnesh K. Sharma
  • Publication number: 20040236817
    Abstract: Systems and methods may be disclosed for allocating computer systems to execute requests from a first and second stream of requests, the allocation based at least in part on a variance of the first and second stream of requests.
    Type: Application
    Filed: May 19, 2003
    Publication date: November 25, 2004
    Inventors: Bernardo Huberman, Jerome Alexander Rolia, Xiaoyun Zhu, Martin Fraser Arlitt
  • Publication number: 20040218355
    Abstract: A rack has a frame for supporting one or more electronic components. The frame includes a front side and a rear side. An angled panel is positioned on at least one of the front side and the rear side.
    Type: Application
    Filed: April 30, 2003
    Publication date: November 4, 2004
    Inventors: Cullen Edwin Bash, Martin Fraser Arlitt, Ratnesh K. Sharma
  • Publication number: 20040128384
    Abstract: A system and method to provide admission control of resources for applications in resource utility environments. Admission control is used to efficiently allocate access to resources with a certain level of assurance based on statistical behavior of resource demands of applications.
    Type: Application
    Filed: December 30, 2002
    Publication date: July 1, 2004
    Inventors: Jerome Alexander Rolia, Xiaoyun Zhu, Martin Fraser Arlitt, Artur Andrzejak