×

Security vulnerability detection

  • US 10,614,223 B2
  • Filed: 05/28/2015
  • Issued: 04/07/2020
  • Est. Priority Date: 05/28/2015
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • indexing, by a system comprising a hardware processor, a plurality of internet sources comprising third party submitted information, to extract security vulnerabilities based on the third party submitted information;

    generating, by the system, a security vulnerabilities list comprising the security vulnerabilities extracted from the plurality of internet sources, the security vulnerabilities list further identifying software components affected by respective security vulnerabilities in the security vulnerabilities list;

    generating, by the system, a software components list comprising a software component used in an application;

    determining, by the system based on matching the software components identified in the security vulnerabilities list with the software component in the software components list, that a security vulnerability in the security vulnerabilities list affects the software component;

    determining, by the system, a risk score of the security vulnerability;

    generating information for presentation, via a user interface, of the security vulnerability, the risk score, and the software component; and

    adjusting, by the system, the risk score based on a number of security vulnerabilities found for the software component and whether a fix has been provided for each security vulnerability of the number of security vulnerabilities.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×