Identifying data associated with security issue attributes
First Claim
1. A method for identifying data related to a software security issue comprising:
- accessing a software security issue;
determining one or more attributes associated with said software security issue;
accessing aggregated software security data retrieved from a plurality of on-line sources;
analyzing said aggregated software security data for said attributes associated with said security issue; and
associating a first portion of said aggregated data with said security issue based on matching said attributes associated with said security issue with contents of said first portion of said aggregated data based on said analyzing.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for identifying data related to a software security issue is provided. The method includes accessing a software security issue and determining one or more attributes associated with the software security issue. The method also includes accessing aggregated software security data retrieved from a plurality of on-line sources and searching the aggregated software security data for the attributes associated with the security issue. The method further includes associating a portion of the aggregated data with the security issue based on matching the attributes associated with the security issue with contents of the portion of the aggregated data.
101 Citations
19 Claims
-
1. A method for identifying data related to a software security issue comprising:
-
accessing a software security issue; determining one or more attributes associated with said software security issue; accessing aggregated software security data retrieved from a plurality of on-line sources; analyzing said aggregated software security data for said attributes associated with said security issue; and associating a first portion of said aggregated data with said security issue based on matching said attributes associated with said security issue with contents of said first portion of said aggregated data based on said analyzing. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. Instructions on a computer-usable medium wherein said instructions when executed cause a computer system to perform a method for identifying data associated with a software security issue, said computer-implemented method comprising:
-
accessing a software security issue; determining one or more attributes associated with said software security issue; accessing aggregated software security data retrieved from a plurality of on-line sources; analyzing said aggregated software security data for said attributes associated with said security issue; and associating a first portion of said aggregated data with said security issue based on matching said attributes associated with said security issue with contents of said first portion of said aggregated data based on said analyzing. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A system for identifying data associated with a software security issue comprising:
-
an issue accessor module for accessing a software security issue; an attribute determiner module for determining one or more attributes associated with said software security issue; a data accessor module accessing aggregated software security data retrieved from a plurality of on-line sources; a search module for analyzing said aggregated software security data for said attributes associated with said security issue; and an associator module for associating a portion of said aggregated data with said security issue based on matching said attributes associated with said security issue with contents of said portion of said aggregated data. - View Dependent Claims (14, 15, 16, 18, 19)
-
-
17. The system of claim 17 wherein said weight value is used to determine if said portion of said aggregated data is associated with said security issue.
Specification