×

Methods and systems for multi-tool orchestration

  • US 10,534,912 B1
  • Filed: 10/31/2018
  • Issued: 01/14/2020
  • Est. Priority Date: 10/31/2018
  • Status: Active Grant
First Claim
Patent Images

1. A system for performing code security scan, comprising:

  • a non-transitory computer readable medium storing;

    a plurality of identifiers each identifying a software security analysis tool, the plurality of identifiers comprising;

    a first identifier identifying a first software security analysis tool of a first category for performing Static Application Security Testing (SAST);

    a second identifier identifying a second software security analysis tool of a second category for performing Dynamic Application Security Testing (DAST); and

    a third identifier identifying a third software security analysis tool of a third category for performing Open Source Analysis (OSA); and

    a processor configured to;

    receive code to be scanned;

    select at least two identifiers from the plurality of identifiers, each of the at least two identifiers identifying a software security analysis tool from a different category for execution on the code;

    determine that a license status is expired for a first software security analysis tool of the at least two software security analysis tools;

    generate a license renewal request for the first software security analysis tool;

    send, to a licensor of the first software security analysis tool, the license renewal request;

    receive, from the licensor, a license renewal for the first software security analysis tool;

    update the license status for the first software security analysis tool to a renewed license status;

    analyze the code to be scanned with the at least two software security analysis tools;

    receive a result from each of the at least two software security analysis tools;

    aggregate the result from each of the at least two software security analysis tools; and

    display, in a user interface, the aggregation of the result from each of the at least two software security analysis tools.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×