Method for translating product banners
First Claim
1. A method for detecting vulnerabilities on a computer, the method comprises:
- receiving banner information relating to multiple software products hosted by the computer;
for each software product of the plurality of software products, translating by the computer the banner information into a unique software product identifier using a content of knowledgebase that comprises an attributes schema and translation rules;
wherein each software product of the multiple software products is associated with a single unique software product identifier;
wherein the unique software product identifier comprises a structured set of attributes;
wherein at least one translation rule is a pattern based translation rule that specifices an allowable translation of a pattern of the banner information to a value of an attribute of the single unique software product identifier;
wherein the attributes schema specifies a set of allowable attributes and of allowable values of the attributes; and
detecting vulnerabilities associated with the multiple software products.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for automatically translating a banner information, the method may include receiving by a computer the banner information, wherein the banner information is included in at least one banner and describes an identity of a software product; and translating by the computer the banner information into a unique software product identifier using a content of knowledgebase that comprises an attributes schema and translation rules; wherein each software product is associated with a single unique software product identifier; wherein the unique software product identifier comprises a structured set of attributes; wherein at least one translation rule is a pattern based translation rule; wherein the attributes schema specifies a set of allowable attributes and of allowable values of the attributes.
18 Citations
22 Claims
-
1. A method for detecting vulnerabilities on a computer, the method comprises:
-
receiving banner information relating to multiple software products hosted by the computer; for each software product of the plurality of software products, translating by the computer the banner information into a unique software product identifier using a content of knowledgebase that comprises an attributes schema and translation rules; wherein each software product of the multiple software products is associated with a single unique software product identifier; wherein the unique software product identifier comprises a structured set of attributes; wherein at least one translation rule is a pattern based translation rule that specifices an allowable translation of a pattern of the banner information to a value of an attribute of the single unique software product identifier; wherein the attributes schema specifies a set of allowable attributes and of allowable values of the attributes; and detecting vulnerabilities associated with the multiple software products. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A non-transitory computer readable medium that stores instructions for:
-
receiving banner information relating to multiple software products hosted by the computer; for each software product of the plurality of software products, translating by the computer the banner information into a unique software product identifier using a content of knowledgebase that comprises an attributes schema and translation rules; wherein each software product of the multiple software products is associated with a single unique software product identifier; wherein the unique software product identifier comprises a structured set of attributes; wherein at least one translation rule is a pattern based translation rule that specifices an allowable translation of a pattern of the banner information to a value of an attribute of the single unique software product identifier; wherein the attributes schema specifies a set of allowable attributes and of allowable values of the attributes; and detecting vulnerabilities associated with the multiple software products. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification