System and method for tracking suspicion across application boundaries
A method, computer program product, and computer system for receiving, from a first and second application by a computing device, shapes of artifacts and components of the first and second application. The shapes of the artifacts and components of the first and second application are conformed to a...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Danford Patrick J Funkhouser Christian Grotjohn David K Ramaswamy Vishwanath Baumbach Marc A DeCandio George P |
description | A method, computer program product, and computer system for receiving, from a first and second application by a computing device, shapes of artifacts and components of the first and second application. The shapes of the artifacts and components of the first and second application are conformed to a standard format. One or more changes to the shapes of the artifacts and components of the first and second application are tracked. One or more suspicious relationships across the first and second application are displayed based upon, at least in part, the one or more changes to the shapes of the artifacts and components of the first and second application. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9626182B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9626182B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9626182B23</originalsourceid><addsrcrecordid>eNqNyjEKwkAQQNFtLCR6h7mARVYI2ioG-2gdxt2JLkl2hp1J4e1F8ABWHx5_7drurUYzYI4wk704wsAFrGAYU36CLiopJM6AobAqoMiUAtqXHrzkiCWRbtxqwElp-2vloL3cztcdCfekgoEyWX_vjo1v6oM_-f0fywcNNTP-</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>System and method for tracking suspicion across application boundaries</title><source>esp@cenet</source><creator>Danford Patrick J ; Funkhouser Christian ; Grotjohn David K ; Ramaswamy Vishwanath ; Baumbach Marc A ; DeCandio George P</creator><creatorcontrib>Danford Patrick J ; Funkhouser Christian ; Grotjohn David K ; Ramaswamy Vishwanath ; Baumbach Marc A ; DeCandio George P</creatorcontrib><description>A method, computer program product, and computer system for receiving, from a first and second application by a computing device, shapes of artifacts and components of the first and second application. The shapes of the artifacts and components of the first and second application are conformed to a standard format. One or more changes to the shapes of the artifacts and components of the first and second application are tracked. One or more suspicious relationships across the first and second application are displayed based upon, at least in part, the one or more changes to the shapes of the artifacts and components of the first and second application.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170418&DB=EPODOC&CC=US&NR=9626182B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,780,885,25564,76547</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20170418&DB=EPODOC&CC=US&NR=9626182B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Danford Patrick J</creatorcontrib><creatorcontrib>Funkhouser Christian</creatorcontrib><creatorcontrib>Grotjohn David K</creatorcontrib><creatorcontrib>Ramaswamy Vishwanath</creatorcontrib><creatorcontrib>Baumbach Marc A</creatorcontrib><creatorcontrib>DeCandio George P</creatorcontrib><title>System and method for tracking suspicion across application boundaries</title><description>A method, computer program product, and computer system for receiving, from a first and second application by a computing device, shapes of artifacts and components of the first and second application. The shapes of the artifacts and components of the first and second application are conformed to a standard format. One or more changes to the shapes of the artifacts and components of the first and second application are tracked. One or more suspicious relationships across the first and second application are displayed based upon, at least in part, the one or more changes to the shapes of the artifacts and components of the first and second application.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNqNyjEKwkAQQNFtLCR6h7mARVYI2ioG-2gdxt2JLkl2hp1J4e1F8ABWHx5_7drurUYzYI4wk704wsAFrGAYU36CLiopJM6AobAqoMiUAtqXHrzkiCWRbtxqwElp-2vloL3cztcdCfekgoEyWX_vjo1v6oM_-f0fywcNNTP-</recordid><startdate>20170418</startdate><enddate>20170418</enddate><creator>Danford Patrick J</creator><creator>Funkhouser Christian</creator><creator>Grotjohn David K</creator><creator>Ramaswamy Vishwanath</creator><creator>Baumbach Marc A</creator><creator>DeCandio George P</creator><scope>EVB</scope></search><sort><creationdate>20170418</creationdate><title>System and method for tracking suspicion across application boundaries</title><author>Danford Patrick J ; Funkhouser Christian ; Grotjohn David K ; Ramaswamy Vishwanath ; Baumbach Marc A ; DeCandio George P</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9626182B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>Danford Patrick J</creatorcontrib><creatorcontrib>Funkhouser Christian</creatorcontrib><creatorcontrib>Grotjohn David K</creatorcontrib><creatorcontrib>Ramaswamy Vishwanath</creatorcontrib><creatorcontrib>Baumbach Marc A</creatorcontrib><creatorcontrib>DeCandio George P</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Danford Patrick J</au><au>Funkhouser Christian</au><au>Grotjohn David K</au><au>Ramaswamy Vishwanath</au><au>Baumbach Marc A</au><au>DeCandio George P</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>System and method for tracking suspicion across application boundaries</title><date>2017-04-18</date><risdate>2017</risdate><abstract>A method, computer program product, and computer system for receiving, from a first and second application by a computing device, shapes of artifacts and components of the first and second application. The shapes of the artifacts and components of the first and second application are conformed to a standard format. One or more changes to the shapes of the artifacts and components of the first and second application are tracked. One or more suspicious relationships across the first and second application are displayed based upon, at least in part, the one or more changes to the shapes of the artifacts and components of the first and second application.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US9626182B2 |
source | esp@cenet |
subjects | CALCULATING COMPUTING COUNTING ELECTRIC DIGITAL DATA PROCESSING PHYSICS |
title | System and method for tracking suspicion across application boundaries |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-25T05%3A50%3A01IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Danford%20Patrick%20J&rft.date=2017-04-18&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9626182B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |