http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2020285742-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_7b1962bdeafe58e2f312c308fe511c31
classificationCPCAdditional http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F2221-033
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-64
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-577
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-563
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-554
http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/G06F21-54
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-54
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-56
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-57
http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/G06F21-55
filingDate 2019-03-04^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_aa6127471a455ecb9da304bd77bb4609
publicationDate 2020-09-10^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber US-2020285742-A1
titleOfInvention Rule-based system and method for detecting and identifying tampering in security analysis of source code
abstract A system, a method, and a computer program are provided for analyzing a security scanning analysis for source code in a computing resource to detect an alteration event in the security scanning analysis. The method includes receiving, by an alteration event processor, the security scanning analysis for the computing resource, parsing data, by the alteration event processor, from a plurality of fields in the security scanning analysis, analyzing the parsed data, by the alteration event processor, to detect whether the security scanning analysis includes an alteration event. determining, by the alteration event processor, that the security scanning analysis includes the alteration event, and linking, by the alteration event processor, the alteration event with the computing resource before the computing resource is made available to a client device in a network.
isCitedBy http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11271961-B1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11070582-B1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11757907-B1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-11283824-B1
http://rdf.ncbi.nlm.nih.gov/pubchem/patent/US-2022050902-A1
priorityDate 2019-03-04^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID415828206
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID419587554
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID10238
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID130881

Showing number of triples: 1 to 28 of 28.