会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 5. 发明申请
    • VISUAL WORKFLOW MODEL
    • 视觉工作流模型
    • WO2017197319A1
    • 2017-11-16
    • PCT/US2017/032496
    • 2017-05-12
    • SERVICENOW, INC.
    • LAETHAM, JaredTHOMPSON, Frances DeniseNELSON, Harry ThomasSARBORA, Russell SamuelGREER, Benjamin Nicklaus
    • G06F9/44
    • Workflows 407 can be refactored using a visual workflow model, such as within a virtual programming environment. A selection of a group of activities in an existing workflow 407 can be received. The group of activities can be duplicated into a new workflow 407. Thereafter, the group of activities can be parsed to identify at least one input variable used by the activities of the group and at least one output variable resulting from those activities. The input variables and output variables are then duplicated as inputs and outputs to the new workflow 407. The previously selected group of activities can be replaced in the existing workflow 407 with an activity based on the new workflow 407. The input variables and output variables are then mapped to the respective inputs and outputs of that activity.
    • 可以使用可视工作流模型来重构工作流407,例如在虚拟编程环境内。 可以接收对现有工作流程407中的一组活动的选择。 该组活动可以被复制到新的工作流程407.此后,可以解析该组活动以识别组的活动使用的至少一个输入变量以及从这些活动得到的至少一个输出变量。 输入变量和输出变量然后被复制作为输入并输出到新工作流程407.先前选择的一组活动可以在现有工作流程407中用基于新工作流程407的活动替换。输入变量和输出变量是 然后映射到该活动的相应输入和输出。
    • 6. 发明申请
    • METHOD AND APPARATUS FOR REDUCING SECURITY RISK IN A NETWORKED COMPUTER SYSTEM ARCHITECTURE
    • 用于降低联网计算机系统体系结构中的安全风险的方法和设备
    • WO2017180611A1
    • 2017-10-19
    • PCT/US2017/026989
    • 2017-04-11
    • SERVICENOW, INC.
    • TAMIR, GioraHENDERSON, LisaBERNAL, JoseBOYLE, Bryan
    • H04L29/06G06F21/57
    • An apparatus and associated method are provided for reducing a security risk in a networked computer system architecture. The method comprises receiving at a security computer external vulnerability data from an external source regarding vulnerabilities associated with an attack vector for configuration item (CI) data related to a (CI) device, of the networked computer system. The security computer accesses a configuration management database (CMDB) and the CI data related to the physical device is read. Trust zone data associated with the CI device is determined utilizing the CMDB, and the security computer performs a vulnerability calculation for the CI device utilizing the external vulnerability data and associated trust zone data. This is also done for a second CI device. The vulnerability calculations for both are compared and this comparison serves as a basis for prioritizing an action to be taken on the CI device or associated other network components.
    • 提供了一种用于降低联网的计算机系统体系结构中的安全风险的设备和相关联的方法。 该方法包括在安全计算机处从外部源接收关于与针对联网计算机系统的(CI)设备的配置项目(CI)数据的攻击向量相关联的漏洞的外部漏洞数据。 安全计算机访问配置管理数据库(CMDB),读取与物理设备相关的CI数据。 利用CMDB确定与CI设备相关的信任区数据,并且安全计算机利用外部漏洞数据和相关的信任区数据为CI设备执行漏洞计算。 这也适用于第二个CI设备。 比较两者的漏洞计算结果,并将此比较作为优先处理CI设备或相关其他网络组件的操作的基础。