×

System and method for identifying network security threats and assessing network security

  • US 10,395,040 B2
  • Filed: 07/18/2017
  • Issued: 08/27/2019
  • Est. Priority Date: 07/18/2016
  • Status: Active Grant
First Claim
Patent Images

1. A method for security assessment of a computer network, the method comprising:

  • transmitting a first executable program code from a security assessor that controls one or more security assessment computers on a network to a first end device on the network, the first executable program code for acting as an agent on the first end device, and the first executable program code configured to be executed by a browser application of the first end device,wherein the first executable program code is configured to collect software and/or hardware attribute information regarding the first end device and transmit the same to at least a first security assessment computer of the one or more security assessment computers,wherein the first executable program code is configured to collect vulnerability information of the first end device, andwherein the vulnerability information of the first end device is received by at least the first security assessment computer;

    transmitting a second executable program code from the security assessor to the first end device, the second executable program code for acting as an agent on the first end device, and the second executable program code configured to be executed by the browser application of the first end device,wherein the second executable program code is selected based on the vulnerability information of the first end device received by at least the first security assessment computer, andwherein the second executable program code is configured to be used to perform a security assessment using the first end device;

    displaying results of the security assessment;

    selecting an artifact from the displayed results; and

    automatically querying a third party security database based on the selected artifact for security information related to the artifact.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×