SECURITY VULNERABILITIES
Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured fo...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Dasari Rajashekar M C Chandan |
description | Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2017116421A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2017116421A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2017116421A13</originalsourceid><addsrcrecordid>eNrjZJAIdnUODfIMiVQIC_Xxcw1ydPL08QzxdA3mYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBobmhoZmJkaGjobGxKkCAJZLIO8</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SECURITY VULNERABILITIES</title><source>esp@cenet</source><creator>Dasari Rajashekar ; M C Chandan</creator><creatorcontrib>Dasari Rajashekar ; M C Chandan</creatorcontrib><description>Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; PHYSICS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170427&DB=EPODOC&CC=US&NR=2017116421A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170427&DB=EPODOC&CC=US&NR=2017116421A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Dasari Rajashekar</creatorcontrib><creatorcontrib>M C Chandan</creatorcontrib><title>SECURITY VULNERABILITIES</title><description>Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>PHYSICS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZJAIdnUODfIMiVQIC_Xxcw1ydPL08QzxdA3mYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBobmhoZmJkaGjobGxKkCAJZLIO8</recordid><startdate>20170427</startdate><enddate>20170427</enddate><creator>Dasari Rajashekar</creator><creator>M C Chandan</creator><scope>EVB</scope></search><sort><creationdate>20170427</creationdate><title>SECURITY VULNERABILITIES</title><author>Dasari Rajashekar ; M C Chandan</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2017116421A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>PHYSICS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Dasari Rajashekar</creatorcontrib><creatorcontrib>M C Chandan</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Dasari Rajashekar</au><au>M C Chandan</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SECURITY VULNERABILITIES</title><date>2017-04-27</date><risdate>2017</risdate><abstract>Examples of techniques for handling security vulnerabilities are described herein. According to an example, on finding a publication of a security vulnerability alert, alert data corresponding to the security vulnerability alert is extracted. Thereafter, the alert data is parsed into a structured format. Further, an input data file is generated based on the parsed alert data. Based on the input data file, it is determined whether an Information Technology (IT) resource, implemented in a cloud environment, is in a vulnerable state.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US2017116421A1 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY PHYSICS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION |
title | SECURITY VULNERABILITIES |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-02T18%3A41%3A08IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Dasari%20Rajashekar&rft.date=2017-04-27&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2017116421A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |