SYSTEM AND METHOD FOR RESOLVING VULNERABILITIES IN A COMPUTER NETWORK
First Claim
Patent Images
1. A method for resolving vulnerabilities on a computer network comprising a plurality of nodes, the method comprising:
- collating vulnerability results from a plurality of the nodes;
determining a plurality of nodes with a common vulnerability;
retrieving an executable fix for the common vulnerability; and
multicasting the executable fix to a plurality of the nodes with the common vulnerability.
2 Assignments
0 Petitions
Accused Products
Abstract
In a computer network, a remedy server may be provided that controls vulnerability scans of the computer nodes. The remedy server determines a security level of a computer node and dispatches an agent to the node with a scan matching the security level. The agent executes the scan and reports the scan results to the remedy server. The remedy server collates scan results from a plurality of the network computers and determines which computers have a common vulnerability. A fix for the vulnerability, such as an executable patch file, is retrieved and multicast to those relevant computers.
-
Citations
20 Claims
-
1. A method for resolving vulnerabilities on a computer network comprising a plurality of nodes, the method comprising:
-
collating vulnerability results from a plurality of the nodes; determining a plurality of nodes with a common vulnerability; retrieving an executable fix for the common vulnerability; and multicasting the executable fix to a plurality of the nodes with the common vulnerability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer network comprising:
-
a plurality of computer nodes; and a remedy server configured to; determine a scan for a computer node; provide the scan to the computer node; receive a scan result from the computer node that indicates vulnerabilities exhibited by the respective computer node; determine one or more vulnerabilities of the plurality of the computer nodes from a plurality of scan results; retrieve one or more fixes for the one or more vulnerabilities of the plurality of computer nodes; and provide the one or more fixes to the plurality of computer nodes. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
-
18. A computer-readable medium comprising computer-executable instructions for execution by at least one processor, that, when executed, cause the at least one processor to:
-
receive a plurality of scan results that indicate one or more vulnerabilities on a plurality of computers of a computer network; generate a vulnerability table that associates a vulnerability with one or more of the plurality of computers that exhibit the vulnerability; and store the vulnerability table in a memory. - View Dependent Claims (19, 20)
-
Specification