CONTROL OF WEB CONTENT TAGGING
    2.
    发明申请
    CONTROL OF WEB CONTENT TAGGING 审中-公开
    WEB内容标签控制

    公开(公告)号:US20160371283A1

    公开(公告)日:2016-12-22

    申请号:US15250708

    申请日:2016-08-29

    Abstract: The integrity of an existing tag set associated with a web module is protected by reviewing user-generated proposed additions to the tag set to determine whether the proposed addition is appropriate. An initial test is made to determine whether a proposed addition is trivial; e.g., includes strings of the same character. If the proposed addition is not found to be trivial, it is assessed to determine its relatedness to the existing tag set. The proposed addition is made a part of the tag set only if it is found to be sufficiently related to the existing tag set.

    Abstract translation: 与web模块相关联的现有标签集的完整性通过检查用户生成的对标签集的建议添加来确定是否适合所提出的添加来保护。 进行初步测试以确定拟议的加法是否微不足道; 例如包括相同字符的字符串。 如果没有发现提出的添加是微不足道的,则评估其确定与现有标签集的相关性。 只有当发现与现有标签集有足够的关联时,才将该提出的添加部分作为标签集的一部分。

    Control of web content tagging
    4.
    发明授权

    公开(公告)号:US10540382B2

    公开(公告)日:2020-01-21

    申请号:US15250708

    申请日:2016-08-29

    Abstract: The integrity of an existing tag set associated with a web module is protected by reviewing user-generated proposed additions to the tag set to determine whether the proposed addition is appropriate. An initial test is made to determine whether a proposed addition is trivial; e.g., includes strings of the same character. If the proposed addition is not found to be trivial, it is assessed to determine its relatedness to the existing tag set. The proposed addition is made a part of the tag set only if it is found to be sufficiently related to the existing tag set.

    Determining and managing application vulnerabilities

    公开(公告)号:US10552616B2

    公开(公告)日:2020-02-04

    申请号:US15440643

    申请日:2017-02-23

    Abstract: A method includes retrieving application files of an enterprise application store. Each application file corresponds to an application provided by the enterprise application store. The method also includes scanning each retrieved application file. The scanning includes identifying vulnerable application program interfaces that are used by each retrieved application file. The method also includes assigning a vulnerability index to each application, based on the scanning of each application's corresponding application file.

Patent Agency Ranking