US 12,462,042 B2
Using threat intelligence to manage software fixes
Michael F. Angelo, Houston, TX (US); Alexander Michael Hoole, Vancouver BC (CA); and Douglas Max Grover, Rigby, ID (US)
Assigned to Micro Focus LLC, Austin, TX (US)
Filed by Michael F. Angelo, Houston, TX (US); Alexander Michael Hoole, Vancouver BC (CA); and Douglas Max Grover, Rigby, ID (US)
Filed on Dec. 8, 2023, as Appl. No. 18/533,849.
Prior Publication US 2025/0190577 A1, Jun. 12, 2025
Int. Cl. G06F 21/57 (2013.01); G06F 16/951 (2019.01)
CPC G06F 21/577 (2013.01) [G06F 16/951 (2019.01)] 17 Claims
OG exemplary drawing
 
1. A system comprising:
a microprocessor; and
a computer readable medium, coupled with the microprocessor and comprising microprocessor readable and executable instructions that, when executed by the microprocessor, cause the microprocessor to:
get a defect in code of a software program;
get an initial ranking for the defect in the code of the software program;
crawl one or more network websites to identify information associated with the defect in the code of the software program, wherein the information associated with the defect in the code of the software program comprises first source code to attack the defect;
analyze the information associated with the defect in the code of the software program;
in response to analyzing the information associated with the defect in the code of the software program, create a second ranking for the defect in the code of the software program;
generate for display, in a graphical user interface, the defect in the code of the software program and the second ranking:
retrieve the first source code to attack the defect;
analyze the first source code to attack the defect using a machine learning algorithm; and
generate, by the machine learning algorithm, second source code to mitigate the first source code to attack the defect.