×

Process vulnerability assessment

  • US 10,445,505 B2
  • Filed: 09/22/2014
  • Issued: 10/15/2019
  • Est. Priority Date: 09/22/2014
  • Status: Active Grant
First Claim
Patent Images

1. A computing device configured to provide security monitoring with reduced interference to user operation, comprising:

  • a network interface configured to communicatively couple the computing device to a server; and

    one or more logic elements, including at least one hardware logic element, comprising a vulnerability assessment engine comprising a shim application to be inserted via operating system hooks to run invisibly to applications running at an application level, the vulnerability assessment engine configured to;

    intercept via the shim application a non-prelaunch runtime operation of an executable object;

    send via the network interface a validation request for the runtime operation in context of the executable object;

    receive a response code for the validation request, the response code comprising a common platform enumeration (CPE)-like string comprising a reputation for the runtime operation; and

    act according to the response code, blocking the runtime operation by the executable object.

View all claims
  • 10 Assignments
Timeline View
Assignment View
    ×
    ×