SECURITY VULNERABILITIES

Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured fo...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Dasari Rajashekar, M C Chandan
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Dasari Rajashekar
M C Chandan
description Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2017116421A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2017116421A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2017116421A13</originalsourceid><addsrcrecordid>eNrjZJAIdnUODfIMiVQIC_Xxcw1ydPL08QzxdA3mYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBobmhoZmJkaGjobGxKkCAJZLIO8</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SECURITY VULNERABILITIES</title><source>esp@cenet</source><creator>Dasari Rajashekar ; M C Chandan</creator><creatorcontrib>Dasari Rajashekar ; M C Chandan</creatorcontrib><description>Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20170427&amp;DB=EPODOC&amp;CC=US&amp;NR=2017116421A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20170427&amp;DB=EPODOC&amp;CC=US&amp;NR=2017116421A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Dasari Rajashekar</creatorcontrib><creatorcontrib>M C Chandan</creatorcontrib><title>SECURITY VULNERABILITIES</title><description>Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJAIdnUODfIMiVQIC_Xxcw1ydPL08QzxdA3mYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBobmhoZmJkaGjobGxKkCAJZLIO8</recordid><startdate>20170427</startdate><enddate>20170427</enddate><creator>Dasari Rajashekar</creator><creator>M C Chandan</creator><scope>EVB</scope></search><sort><creationdate>20170427</creationdate><title>SECURITY VULNERABILITIES</title><author>Dasari Rajashekar ; M C Chandan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2017116421A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Dasari Rajashekar</creatorcontrib><creatorcontrib>M C Chandan</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dasari Rajashekar</au><au>M C Chandan</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SECURITY VULNERABILITIES</title><date>2017-04-27</date><risdate>2017</risdate><abstract>Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2017116421A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
PHYSICS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title SECURITY VULNERABILITIES
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T18%3A41%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Dasari%20Rajashekar&rft.date=2017-04-27&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2017116421A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true