http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11328058-B2

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_c57b22814280693115e384d0486a1aef
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-033
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F11-3604
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-52
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-562
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F9-44536
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-577
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-566
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-554
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-105
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-563
classificationIPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-52
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F11-36
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-55
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-56
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-57
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F9-445
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-10
filingDate 2019-12-18^^<http://www.w3.org/2001/XMLSchema#date>
grantDate 2022-05-10^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_ccc318c7abee5ee99db4e3e0a9048af7
publicationDate 2022-05-10^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber US-11328058-B2
titleOfInvention Methods and systems for multi-tool orchestration
abstract A system for performing code security scan includes a non-transitory computer readable medium and a processor. The non-transitory computer readable medium stores a plurality of identifiers each identifying a software security analysis tool of one of several categories, including SAST, DAST and OSA tools. The processor receives an identification of code to be scanned. The processor selects at least two identifiers from the plurality of identifiers. The at least two identifiers identify at least two select software security analysis tools for execution on the identified code. The processor receives an execution result from each select software security analysis tool after performing execution on the identified code. The processor aggregates the execution result from each select software security analysis tool. A user interface displays an aggregation of the execution result from each select software security analysis tool.
priorityDate 2018-10-31^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2010218256-A1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-6661547-B2
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2010083240-A1
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419517593
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID123472

Showing number of triples: 1 to 32 of 32.