US 12,003,525 B2
Development security operations on the edge of the network
Valerio Formicola, Princeton, NJ (US); and Charif Mahmoudi, Plainsboro, NJ (US)
Assigned to Siemens Aktiengesellschaft, Munich (DE)
Filed by Siemens Aktiengesellschaft, Munich (DE)
Filed on Apr. 1, 2022, as Appl. No. 17/711,427.
Claims priority of provisional application 63/169,983, filed on Apr. 2, 2021.
Prior Publication US 2022/0321594 A1, Oct. 6, 2022
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) 17 Claims
OG exemplary drawing
 
1. A computer-implemented method performed at an edge of a core network, the method comprising:
identifying an application that is connected to the core network;
extracting design attributes associated with one or more specifications of the application;
extracting implementation attributes associated with a code tool of the application;
monitoring the edge of the core network so as to identify monitored attributes associated with the application; and
comparing the design attributes, implementation attributes, and monitored attributes with one another so as determine whether there is an inconsistency between the design attributes, implementation attributes, and monitored attributes.