System and method for tracking suspicion across application boundaries
A method, computer program product, and computer system for receiving, from a first and second application by a computing device, shapes of artifacts and components of the first and second application. The shapes of the artifacts and components of the first and second application are conformed to a...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A method, computer program product, and computer system for receiving, from a first and second application by a computing device, shapes of artifacts and components of the first and second application. The shapes of the artifacts and components of the first and second application are conformed to a standard format. One or more changes to the shapes of the artifacts and components of the first and second application are tracked. One or more suspicious relationships across the first and second application are displayed based upon, at least in part, the one or more changes to the shapes of the artifacts and components of the first and second application. |
---|