Please download the dossier by clicking on the dossier button x
×

Apparatus, methods and computer programs for identifying or managing vulnerabilities within a data processing network

  • US 20050132206A1
  • Filed: 12/12/2003
  • Published: 06/16/2005
  • Est. Priority Date: 12/12/2003
  • Status: Active Grant
First Claim
Patent Images

1. A method for identifying data processing systems within a network having a vulnerability, comprising the steps of:

  • computing a set of hash values derived from and representing a set of resources distributed across a plurality of data processing systems within a network;

    storing, at a first data processing system within the network, the computed set of hash values together with an identification of the respective one of said plurality of data processing systems storing a resource corresponding to each computed hash value;

    in response to an indication that a first resource is associated with a specific vulnerability, comparing at least one hash value representing the first resource with the stored set of hash values to identify matching hash values, and using the identification of matching hash values and the stored identification of respective systems to determine the systems within the plurality of data processing systems storing replicas of the first resource.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×