The software records security-relevant information according to an alternate name of the affected entity, instead of the canonical name.