http://rdf.ncbi.nlm.nih.gov/pubchem/patent/WO-2011124907-A1

Outgoing Links

Predicate Object
assignee http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_8316339de0b795a5fabef75d2d5d21d7
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_751d8a7533f0c63ff23ba993da82bc06
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_581018927b5019637477afd922dcb300
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_85b9d1ddb0548df4c95dbcfed4f1bc0c
http://rdf.ncbi.nlm.nih.gov/pubchem/patentassignee/MD5_25767f1eb21e40fa8150d8611c49d0f0
classificationCPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentcpc/H04L63-1433
classificationIPCInventive http://rdf.ncbi.nlm.nih.gov/pubchem/patentipc/H04L29-06
filingDate 2011-03-31-04:00^^<http://www.w3.org/2001/XMLSchema#date>
inventor http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_d9bbc534dafae07049e3069b9988ebb6
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_aa5ea57d05f2683c057cb9eab5e90ff3
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_db15ea83fc08d962e0ffdd3f5bfd67fa
http://rdf.ncbi.nlm.nih.gov/pubchem/patentinventor/MD5_5d0bc946e4615fa4819b8fdc4677ac00
publicationDate 2011-10-13-04:00^^<http://www.w3.org/2001/XMLSchema#date>
publicationNumber WO-2011124907-A1
titleOfInvention Improvements relating to network security
abstract A method is disclosed for establishing whether a vulnerability in network security will arise from forming a network communications link between a first nodal network apparatus in the network and a second nodal network apparatus. The method includes providing a first data item classifying a first level of difficulty in breaching measures of data security provided against unauthorised access to data accessible via the first nodal network apparatus. A second data item is provided for classifying a second level of difficulty in breaching measures of data security provided for the second nodal network apparatus against unauthorised access to data accessible via the second nodal network apparatus. It is then determined if the vulnerability will arise according to the first level of difficulty and the second level of difficulty.
priorityDate 2010-04-07-04:00^^<http://www.w3.org/2001/XMLSchema#date>
type http://data.epo.org/linked-data/def/patent/Publication

Incoming Links

Predicate Subject
isDiscussedBy http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID127692548
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID7296
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID127374542
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID127938588
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID322927547
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID127357963
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID127373295
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID14263
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID245348577
http://rdf.ncbi.nlm.nih.gov/pubchem/compound/CID17148
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID244658333
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID129134854
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID245802860
http://rdf.ncbi.nlm.nih.gov/pubchem/substance/SID245699983

Total number of triples: 32.