Docoh
Loading...

MFGP Micro Focus International

APP
Utility
Determinations of Whether Events Are Anomalous
2 Dec 21
According to examples, an apparatus may include a memory on which is stored instructions that when executed by a processor, cause the processor to cluster a set of data points into a hierarchy of a plurality of clusters, in which each level of the hierarchy includes a different number of the plurality of clusters.
Arshad JAVEED
Filed: 26 May 20
GRANT
Utility
Application-aware virtual machine backup
30 Nov 21
A method relates to backing up a VM.
Veeresh Mallappa Anami, Sunil Turakani
Filed: 7 Nov 18
GRANT
Utility
Displaying real-time security events
30 Nov 21
A system and method for displaying a number of real-time security events comprises a number of client devices and an administrator device communicatively coupled to the client devices.
Anurag Singla, Adam Brody
Filed: 28 Jan 13
GRANT
Utility
Training a security scan classifier to learn an issue preference of a human auditor
30 Nov 21
A technique includes receiving data representing an output of a security scan of an application and an audit of the security scan by a human auditor.
Michael Jason Schmitt, Guy Wiener, Emil Kiner, Tomer Priel
Filed: 12 Aug 15
GRANT
Utility
Scanning information technology (IT) components for compliance
30 Nov 21
Examples disclosed herein relate to scanning an IT component for compliance.
Sachin Johar
Filed: 5 May 17
GRANT
Utility
Enhanced intelligence for a security information sharing platform
23 Nov 21
Examples disclosed herein relate to providing enhanced threat intelligence on a security information sharing platform.
Tamir Mitelman, Meytal Maor, Ofer Bachner, Amir Kibbar
Filed: 7 Sep 16
GRANT
Utility
Automated remediation of information technology events
23 Nov 21
A computing device includes a processor and a medium storing instructions.
Frank Nitsch, Stefan Bergstein
Filed: 21 Dec 18
GRANT
Utility
Identifying representative entities in clusters for it management
16 Nov 21
According to examples, an apparatus may include a memory on which is stored instructions that when executed by a processor, cause the processor to extract, from network traffic data, a connectivity matrix that identifies connectivity data between entities and group the entities into a plurality of clusters based on the extracted connectivity matrix.
Manish Marwah, Martin Arlitt
Filed: 16 Jul 20
APP
Utility
Page Navigation with Tree Menu
11 Nov 21
A computing device includes a processor and a machine-readable storage medium storing instructions.
Li ZHANG, Bing ZHANG, Da-Long SUN, Rong-Feng CHEN
Filed: 5 Oct 18
APP
Utility
Error Detection In Text String Within Displayed Layout
11 Nov 21
The color of a character of a text string within a layout is changed, and the layout is displayed.
Yi-Qun Ren, Kai Hu, Le Peng
Filed: 8 May 20
APP
Utility
Asymmetric-man-in-the-middle Capture Based Application Sharing Protocol Traffic Recordation
11 Nov 21
In some examples, with respect to asymmetric-man-in-the-middle capture based application sharing protocol traffic recordation, a dynamic-link library that alters application programming interface calls with respect to communication between an application sharing protocol client and an application sharing protocol server may be injected into the application sharing protocol client.
Yang LUO, Jian ZHANG, Qian-Ru ZHAI, Zhenbin LIN
Filed: 11 Oct 18
APP
Utility
Intent and Context-aware Dialogue Based Virtual Assistance
11 Nov 21
In some examples, with respect to intent and context-aware dialogue based virtual assistance, an intent of an inquiry may be determined using an intent classification model.
Jin WANG, Hao HUANG, Ting-Kun LI, Nai-Long WEN, Zhen CUI, David BARON
Filed: 28 Sep 18
APP
Utility
Automated Testing of Program Code Under Development
4 Nov 21
Automated test failures that result from automated testing of program code under development are windows to include just the automated test failures occurring for a first time and that are due to automated test code defects or program code defects.
Sigal Ishay, Ilan Shufer, Sharon Lin
Filed: 1 May 20
GRANT
Utility
Topology based management of second day operations
26 Oct 21
In one implementation, a method for topology based management of second day operations can include identifying a cloud service operating on a second system, discovering, via a first system, an existing realized topology of the second system as an inferred realized topology for the first system, wherein the existing realized topology is provisioned by the second system, defining a management process to be performed within the cloud service, via the first system, upon the instantiation of the inferred realized topology by the first system, and executing the management process utilizing the first system.
Stephane H. Maes
Filed: 30 Sep 14
GRANT
Utility
Anomaly detection based on higher-order anomaly score
19 Oct 21
First-order anomaly scores are received from related anomaly detectors.
Manish Marwah, Martin Arlitt, Maria Pospelova, Stephan Jou
Filed: 24 Jul 20
GRANT
Utility
Structured data archival with reduced downtime
19 Oct 21
Structured data archival with reduced downtime is disclosed.
Danny Oberoi, Jaspreet Singh, Ibha Gandhi
Filed: 8 Apr 16
GRANT
Utility
Encoding abelian variety-based ciphertext with metadata
12 Oct 21
A technique includes encrypting plaintext to provide a set of projective coordinates that represents a point of an abelian variety curve and represents ciphertext.
Luther Martin, Timothy Roake, Cheryl He
Filed: 31 Oct 17
GRANT
Utility
Statistical property preserving pseudonymization
5 Oct 21
A technique includes accessing data representing a plurality of values; and determining a pseudonym value for a given value of the plurality of values.
Timothy Roake, Luther Martin
Filed: 20 Mar 18
GRANT
Utility
Fulfilling a request based on catalog aggregation and orchestrated execution of an end-to-end process
21 Sep 21
Catalogs that describe respective offerings for fulfillment by respective applications, are aggregated to form an aggregate catalog.
Stephane Herman Maes, Lars Rossen, Woong Joseph Kim, Keith Kuchler, Jan Vana, Ankit Ashok Desai, Christopher William Johnson, Michael Yang, Roy Ritthaler
Filed: 8 Dec 14
GRANT
Utility
Formatting semi-structured data in a database
21 Sep 21
In some examples, formatting semi-structured data in a database includes obtaining semi-structured data in a column store database, assigning the semi-structured data to a semi-structured column with a key and value format, and formatting the semi-structured data with an optimal search format.
Benjamin M. Vandiver, Adam Benjamin Seering, Matthew Steven Fuller
Filed: 7 Feb 13
Patents are sorted by USPTO publication date, most recent first