会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Device and method for remediating vulnerabilities
    • 修复漏洞的设备和方法
    • US09256746B2
    • 2016-02-09
    • US13716038
    • 2012-12-14
    • VMware, Inc.
    • Michael Ira TobackDavid FergusonMaria del Carmen Hernandez-VillavicencioWenfeng LiuMonty Ijzerman
    • G06F21/57
    • G06F21/577G06F21/57
    • Exemplary methods, apparatuses, and systems receive data describing a first software component used by a software product and vulnerability data describing a vulnerability in the first software component. A vulnerability score is calculated for the software product based upon the vulnerability data for the first software component. The vulnerability score is recalculated for the software product based upon receiving an updated status of the vulnerability in the first software component from bug tracking software, a waiver of the vulnerability of a software component, the addition of another software component, or another update to the software product or component(s). The task of remediation of the vulnerability in the first software component can be assigned to a user and tracked. A user interface is provided to enable users to monitor the vulnerabilities of software products or components.
    • 示例性方法,装置和系统接收描述由软件产品使用的第一软件组件的数据和描述第一软件组件中的漏洞的漏洞数据。 基于第一个软件组件的漏洞数据计算软件产品的漏洞得分。 基于从错误跟踪软件接收到第一软件组件中的漏洞的更新状态,软件组件的漏洞的豁免,另外的软件组件的添加或另一个更新到 软件产品或组件。 可以将修复第一个软件组件中的漏洞的任务分配给用户并进行跟踪。 提供了一个用户界面,使用户能够监视软件产品或组件的漏洞。
    • 3. 发明公开
    • FLOW TRACING FOR HETEROGENEOUS NETWORKS
    • US20240031268A1
    • 2024-01-25
    • US17898351
    • 2022-08-29
    • VMware, Inc.
    • Ran GuWenfeng LiuDonghai HanJianjun ShenZhengsheng Zhou
    • H04L43/10H04L45/64
    • H04L43/10H04L45/64
    • Some embodiments of the invention provide a method for performing data traffic monitoring for a system that includes a set of heterogeneous networks that includes at least an overlay first network layer that is built on top of an underlay second network layer. The method is performed at a federation controller for the system. The method directs (1) a first set of components in the overlay first network layer to perform a first trace operation to trace a packet exchanged between two machines and passing through network components defined in the overlay first network layer and underlay second network layer and (2) a second set of components in the underlay second network layer to perform a second trace operation to trace the packet. The method receives, from the first and second sets of components, first and second sets of trace data collected during the first and second trace operations. The collected trace data includes correlation data for correlating the first and second sets of data. The method uses the correlation data to correlate the first and second sets of trace data to generate a final trace report identifying a complete path traversed by the packet through the overlay first network layer and underlay second network layer.