System and method for vulnerability remediation verification
First Claim
Patent Images
1. A system, comprising:
- a vulnerability remediation verification sub-system executed by a processor, the vulnerability remediation verification system to determine whether a vulnerability identified in a computer has been eliminated, and comprising;
a remediation scheduler to;
determine, based on the vulnerability identified in the computer, operations to be performed to eliminate the vulnerability; and
schedule performance of the operations by remediation processors; and
;
a reconciliation engine to determine;
whether the operations have been successfully performed; and
whether the operations have been performed by authorized remediation processors;
a vulnerability monitor to;
generate a vulnerability token that includes information that;
specifies the location of the vulnerability;
specifies the vulnerability; and
specifies the time by which remediation is to completed;
wherein the remediation scheduler is further to;
generate a remediation token that is separate from the vulnerability token, the remediation token comprising information provided by the reconciliation engine.
2 Assignments
0 Petitions
Accused Products
Abstract
In remediating a computer vulnerability, operations to be performed to correct the vulnerability are identified. Remediation processors are scheduled to perform the operations. Whether the vulnerability has been corrected is determined by: determining whether the operations have been performed successfully; and determining whether the operations have been performed by authorized remediation processors.
63 Citations
16 Claims
-
1. A system, comprising:
a vulnerability remediation verification sub-system executed by a processor, the vulnerability remediation verification system to determine whether a vulnerability identified in a computer has been eliminated, and comprising; a remediation scheduler to; determine, based on the vulnerability identified in the computer, operations to be performed to eliminate the vulnerability; and schedule performance of the operations by remediation processors; and
;a reconciliation engine to determine; whether the operations have been successfully performed; and whether the operations have been performed by authorized remediation processors; a vulnerability monitor to; generate a vulnerability token that includes information that; specifies the location of the vulnerability; specifies the vulnerability; and specifies the time by which remediation is to completed; wherein the remediation scheduler is further to;
generate a remediation token that is separate from the vulnerability token, the remediation token comprising information provided by the reconciliation engine.- View Dependent Claims (2, 3, 4, 5)
-
6. A method, comprising:
-
identifying, by a processor, a vulnerability in a computer; identifying, based on the vulnerability, operations to be performed to correct the vulnerability; identifying a time by which remediation of the vulnerability is to be completed; generating a vulnerability token that includes information that; specifies a location of the vulnerability; specifies the vulnerability; specifies the time by which remediation of the vulnerability is to be completed; scheduling performance of the operations by remediation processors; determining whether the vulnerability has been corrected by; determining whether the operations have been performed successfully; and determining whether the operations have been performed by authorized remediation processors; and generating a remediation token that is separate from the vulnerability token, the remediation token comprising; a field for recording each action performed by an authorized remediation processor. - View Dependent Claims (7, 8, 9, 10, 11)
-
-
12. A non-transitory computer-readable medium encoded with instructions that when executed cause a processor to:
-
select, based on a vulnerability identified in a computer, operations to be performed to remediate the vulnerability; schedule performance of the operations by remediation logic; and determine whether the vulnerability has been remediated by; determining whether the operations have been performed successfully; and determining whether the operations have been performed by an authorized remediation process; and track progress towards completion of remediation based on completion of each of the operations, wherein the remediation logic comprises vulnerability token parsing logic and remediation success determination logic. - View Dependent Claims (13, 14, 15, 16)
-
Specification