×

Systems and methods for automated threat model generation from third party diagram files

DC
  • US 10,713,366 B2
  • Filed: 08/15/2019
  • Issued: 07/14/2020
  • Est. Priority Date: 05/17/2017
  • Status: Active Grant
First Claim
Patent Images

1. A threat modeling method, comprising:

  • providing one or more databases, the one or more databases comprising;

    a plurality of threat model components stored therein; and

    a plurality of threats stored therein, wherein each of the threats is associated with at least one of the threat model components through the one or more databases;

    providing one or more mapping files communicatively coupled with the one or more databases, the one or more mapping files correlating the threat model components with visual diagram components of a third party software application (hereinafter “

    third party diagram components”

    ); and

    in response to receiving one or more user inputs, using one or more user interfaces displayed on one or more computing devices communicatively coupled with the one or more databases;

    using the one or more computing devices, reading a data file generated by the third party software application, the data file comprising a subset of the third party diagram components, the data file defining one or more relationships between the subset of third party diagram components;

    determining using the one or more computing devices, for the subset of third party diagram components, correlated threat model components as defined in the one or more mapping files;

    displaying on the one or more user interfaces a relational diagram of one of a system, an application, and a process, using visual representations of the threat model components correlated with the subset of third party diagram components, the relational diagram defining a threat model; and

    generating, using the one or more computing devices, and displaying, on the one or more user interfaces, a threat report displaying each threat that is associated through the one or more databases with one of the threat model components included in the threat model.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×