Automated computer vulnerability resolution system
First Claim
1. A method for resolving vulnerabilities in a computer, comprising:
- aggregating vulnerability information on a plurality of computer vulnerabilities; and
constructing a remediation database of said plurality of computer vulnerabilities.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and process for addressing computer security vulnerabilities. The system and process generally comprise aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address the computer vulnerabilities; and deploying said remediation signature to a client computer. The remediation signature essentially comprises a sequence of actions to address a corresponding vulnerability. A managed automated approach to the process is contemplated in which the system is capable of selective deployment of remediation signatures; selective resolution of vulnerabilities; scheduled deployment of remediation signatures; and scheduled scanning of client computers for vulnerabilities.
350 Citations
47 Claims
-
1. A method for resolving vulnerabilities in a computer, comprising:
-
aggregating vulnerability information on a plurality of computer vulnerabilities; and
constructing a remediation database of said plurality of computer vulnerabilities. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. A system for resolving computer vulnerabilities;
- comprising;
a remediation server capable of coupling to a security intelligence agent having information about computer vulnerabilities in order to aggregate said vulnerability information into a remediation database. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
- comprising;
-
45. Computer-readable media tangibly embodying a program of instructions executable by a computer to perform a process for resolving vulnerabilities in a computer, comprising:
-
aggregating vulnerability information on a plurality of computer vulnerabilities; and
constructing a remediation database of said plurality of computer vulnerabilities. - View Dependent Claims (46, 47)
-
Specification