Predicate |
Object |
assignee |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_c57b22814280693115e384d0486a1aef |
classificationCPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-033 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F11-3604 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-52 |
classificationCPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-562 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-44536 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-577 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-566 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-554 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-105 http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-563 |
classificationIPCAdditional |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-52 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-36 |
classificationIPCInventive |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-55 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-56 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-57 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-445 http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-10 |
filingDate |
2019-12-18^^<http://www.w3.org/2001/XMLSchema#date> |
grantDate |
2022-05-10^^<http://www.w3.org/2001/XMLSchema#date> |
inventor |
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_ccc318c7abee5ee99db4e3e0a9048af7 |
publicationDate |
2022-05-10^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber |
US-11328058-B2 |
titleOfInvention |
Methods and systems for multi-tool orchestration |
abstract |
A system for performing code security scan includes a non-transitory computer readable medium and a processor. The non-transitory computer readable medium stores a plurality of identifiers each identifying a software security analysis tool of one of several categories, including SAST, DAST and OSA tools. The processor receives an identification of code to be scanned. The processor selects at least two identifiers from the plurality of identifiers. The at least two identifiers identify at least two select software security analysis tools for execution on the identified code. The processor receives an execution result from each select software security analysis tool after performing execution on the identified code. The processor aggregates the execution result from each select software security analysis tool. A user interface displays an aggregation of the execution result from each select software security analysis tool. |
priorityDate |
2018-10-31^^<http://www.w3.org/2001/XMLSchema#date> |
type |
http://data.epo.org/linked-data/def/patent/Publication |