-
公开(公告)号:US12273365B2
公开(公告)日:2025-04-08
申请号:US17356164
申请日:2021-06-23
Applicant: MICRO FOCUS LLC
Inventor: Douglas Max Grover , Michael F. Angelo
Abstract: A request to add a new block to a blockchain is received. Data associated with the new block is scanned to identify malware and/or an anomaly. In response to identifying the malware and/or the anomaly in the data associated with the new block, an action is taken. The action includes: rejecting the request to add the new block to the blockchain, or removing the malware/anomaly from the new block and adding the new block to the blockchain. In a second embodiment, a malware event is identified that identifies malware/an anomaly in a block in a blockchain. In response to the malware event, an action is taken. The action includes: consolidating the blockchain, bypassing the block in the blockchain, consolidating the blockchain and bypassing the block in the blockchain, and deleting an encryption key that was used to encrypt the associated data that comprises the malware and/or the anomaly.
-
公开(公告)号:US12255998B2
公开(公告)日:2025-03-18
申请号:US17709061
申请日:2022-03-30
Applicant: MICRO FOCUS LLC
Inventor: Douglas Max Grover , Alexander Hoole , Michael F. Angelo
Abstract: Sensitive information is identified. For example, the sensitive information may be a set of medical records. A request is received to send the sensitive information from a first domain to a second domain. For example, the request may be to send the sensitive information from a first corporation to a second corporation. The sensitive information is encrypted. The encrypted sensitive information comprises an authentication field. The authentication field identifies one or more authentication factors that are required to unencrypt the sensitive information. For example, the authentication field may indicate that a user is required to provide a username/password and a fingerprint scan to access the sensitive information. The encrypted sensitive information is sent to the second domain. The user in the second domain is required to authenticate using the one or more authentication factors to access the sensitive information.
-
公开(公告)号:US12039089B2
公开(公告)日:2024-07-16
申请号:US18141873
申请日:2023-05-01
Applicant: Micro Focus LLC
Inventor: Douglas Max Grover , Michael F. Angelo
CPC classification number: G06F21/64 , G06F21/602 , H04L9/3236 , H04L9/50
Abstract: A copy of a blockchain is stored. The stored copy of the blockchain is copied from a blockchain in a distributed blockchain ledger. An event associated with the blockchain in the distributed ledger is identified. In response identifying the event associated with the blockchain in the distributed ledger, a compromise of the blockchain in the distributed ledger is identified, such as, identifying one or more blocks of the blockchain that have been compromised. In a second embodiment, a request to add a new block to a blockchain is identified. In response identifying the request to add the new block to the blockchain, a consensus vote to add the new block to the blockchain is monitored. A determination is made to determine if the consensus vote is below a threshold. In response to the consensus vote being below the threshold, an audit of the blockchain is completed.
-
公开(公告)号:US11816475B2
公开(公告)日:2023-11-14
申请号:US17371877
申请日:2021-07-09
Applicant: MICRO FOCUS LLC
Inventor: Michael F. Angelo , Douglas Max Grover
CPC classification number: G06F8/71 , G06F8/61 , H04L9/0643 , H04L9/3247 , H04L9/50
Abstract: A request to install a first version of a software application is received. The first version of the software application is stored in a first blockchain in a first distributed blockchain ledger. In response to receiving the request to install the first version of the software application, the first version of the software application is validated by running a hash of the first blockchain. In response to validating the first version of the software application, the first version of the software application is installed from the blockchain to a device. The software application may also be validated after being installed to the device.
-
公开(公告)号:US20230328050A1
公开(公告)日:2023-10-12
申请号:US17716763
申请日:2022-04-08
Applicant: MICRO FOCUS LLC
Inventor: Douglas Max Grover , Michael F. Angelo
IPC: H04L9/40
CPC classification number: H04L63/0428 , H04L63/0838
Abstract: A request is received, by a plurality of nodes that are part of a distributed blockchain ledger, to add a transaction block to a plurality of blockchains in the distributed blockchain ledger. The transaction block comprises a transaction block authentication credential(s). The plurality of nodes that are part of the distributed blockchain ledger determine if the transaction block authentication credential(s) are valid. An indication is received from at least a majority of the plurality of nodes that are part of the distributed blockchain ledger that the transaction block authentication credential(s) are valid. In response to receiving the indication from the at least a majority of the plurality of nodes that are part of the distributed blockchain ledger that the transaction block authentication credential(s) are valid, the transaction block is added to the plurality of blockchains in the distributed blockchain ledger.
-
公开(公告)号:US11544364B2
公开(公告)日:2023-01-03
申请号:US16794926
申请日:2020-02-19
Applicant: MICRO FOCUS LLC
Inventor: Douglas Grover , Lloyd L. Burch , Michael F. Angelo
Abstract: An apparatus may include a processor that may be caused to access handholding information indicating a hand configuration in which the apparatus is being held and compare the handholding information with previously-stored handholding authentication data of an authentic user. The previously-stored handholding authentication data may represent an authentic configuration in which the apparatus is held by the authentic user. The processor may be caused to determine that the apparatus is being held by the authentic user based on the comparison and cause an authenticated action to occur based on the determination.
-
公开(公告)号:US20220058264A1
公开(公告)日:2022-02-24
申请号:US16995974
申请日:2020-08-18
Applicant: MICRO FOCUS LLC
Inventor: Douglas M. Grover , Duane F. Buss , Michael F. Angelo
Abstract: Embodiments provide for detecting viruses and other malware in executing process threads based on thread patterns. According to one embodiment, detecting previously unknown malware associated with process threads can comprise capturing context information for each thread of a plurality of threads executing on a processor. The context information can define a thread pattern for the thread. The thread pattern for each thread can be compared to stored information defining one or more known patterns for thread execution based on previous execution of one or more threads. A thread pattern variation can be detected when the thread pattern for one or more threads does not match the stored information defining the known thread patterns. A determination can be made as to whether the detected thread pattern variation indicates presence of malware and actions can be performed based on determining the detected thread pattern variation indicates the presence of malware.
-
公开(公告)号:US12250206B2
公开(公告)日:2025-03-11
申请号:US17868576
申请日:2022-07-19
Applicant: MICRO FOCUS LLC
Inventor: Douglas Max Grover , Michael F. Angelo
IPC: H04L9/40
Abstract: A request to authenticate is received. For example, the request to authenticate may be to authenticate to a software application or a device. The request to authenticate is for a first authentication level for a user. The first authentication level is one of a plurality of authentication levels for the user. The request to authenticate is authorized based on a provided one or more authentication factors (e.g., a valid username/password). A plurality of authentication tokens are retrieved. The plurality of authentication tokens are associated with the first authentication level. In addition, each authentication token of the plurality of authentication tokens is associated with an individual application of a plurality of applications. Access to information in the plurality of applications is granted based on the plurality of authentication tokens.
-
公开(公告)号:US20250061194A1
公开(公告)日:2025-02-20
申请号:US18451304
申请日:2023-08-17
Applicant: Micro Focus LLC
Inventor: Douglas Max Grover , Michael F. Angelo
Abstract: A determination is made to see if a user has authenticated to a computer system using a plurality of authentication levels. For example, the user may have had a first session where the user is authenticated at authentication level one and a second session where the user is authenticated at authentication level two. Behavior of the user is separately tracked at each of the plurality of authentication levels to identify separate usage patterns of the user at each of the plurality of authentication levels. Anomalous behavior of the user is identified based on one or more variations from the separate usage patterns of the user at, at least one of the plurality of authentication levels. An action is taken based on identifying the anomalous behavior of the user. For example, the user's account may be locked, or an administrator may be notified.
-
公开(公告)号:US12166769B2
公开(公告)日:2024-12-10
申请号:US18463028
申请日:2023-09-07
Applicant: MICRO FOCUS LLC
Inventor: Douglas Max Grover , Michael F. Angelo
Abstract: Results of an authentication process are received. The authentication process allows for a graded level of authentication using a plurality of authentication types (e.g., a username/password and a fingerprint scan). Encrypted data is then accessed. The encrypted data has been encrypted using a plurality of encryption levels. The data is unencrypted based on the graded level of authentication.
In a second embodiment, a system and method are provided that establish a communication session (e.g., a voice or email communication session). The communication session is between a plurality of users. During the communication session, an indication is received to change an encryption level for the communication session. In response to receiving the indication to change the encryption level for the communication session, an encryption level of the first communication session is dynamically changed from a first level of encryption to a second level of encryption.
-
-
-
-
-
-
-
-
-