The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
A system and method for social based resource collaboration with optional anonymization of users for application security scanners powered by a security intelligence forum or database is disclosed.
English (United States)
This text was extracted from a PDF file.
This is the abbreviated version, containing approximately
61% of the total text.
Page 01 of 2
Social Based Resource/Collaboration System With Optional Anonymization of Users for Application Security Scanners Powered by a Security Intelligence Forum/Database
Disclosed is a system and method for social based resource collaboration with optional anonymization of users for application security scanners powered by a security intelligence forum or database. In application source code vulnerability scanning the users are usually presented with an issue along with the remediation / how-to-fix information regarding the vulnerability. However, such material is very static and not in context to the actual problem.
For example, in some embodiments, the user are provided with a Common Vulnerabilities and Exposures (CVE ) #, a static definition (text), and/or a link. A lot of customers face
Many attacks on the web involve the following areas:
Cross Site Request Forgery
SQL Injections, and Cross Site Scripting
The disclosed system and method creates a secure channel for security analysts and developers to collaborate anonymously on similar problems against the source code analysis tool itself. See Figure 1 for a visual representation of the disclosed system an method.
Figure 1 includes the following:
1 Various companies scan their applications using the disclosed technology.
2 When the application scanning is complete, and the security analyst and/or developer decides to investigate specific issues, the user is not only presented