http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2011124907-A1
Outgoing Links
Predicate | Object |
---|---|
assignee | http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_8316339de0b795a5fabef75d2d5d21d7 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_751d8a7533f0c63ff23ba993da82bc06 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_581018927b5019637477afd922dcb300 http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_85b9d1ddb0548df4c95dbcfed4f1bc0c http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_25767f1eb21e40fa8150d8611c49d0f0 |
classificationCPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1433 |
classificationIPCInventive | http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06 |
filingDate | 2011-03-31-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
inventor | http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_d9bbc534dafae07049e3069b9988ebb6 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_aa5ea57d05f2683c057cb9eab5e90ff3 http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_db15ea83fc08d962e0ffdd3f5bfd67fa http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_5d0bc946e4615fa4819b8fdc4677ac00 |
publicationDate | 2011-10-13-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
publicationNumber | WO-2011124907-A1 |
titleOfInvention | Improvements relating to network security |
abstract | A method is disclosed for establishing whether a vulnerability in network security will arise from forming a network communications link between a first nodal network apparatus in the network and a second nodal network apparatus. The method includes providing a first data item classifying a first level of difficulty in breaching measures of data security provided against unauthorised access to data accessible via the first nodal network apparatus. A second data item is provided for classifying a second level of difficulty in breaching measures of data security provided for the second nodal network apparatus against unauthorised access to data accessible via the second nodal network apparatus. It is then determined if the vulnerability will arise according to the first level of difficulty and the second level of difficulty. |
priorityDate | 2010-04-07-04:00^^<http://www.w3.org/2001/XMLSchema#date> |
type | http://data.epo.org/linked-data/def/patent/Publication |
Incoming Links
Total number of triples: 32.