SYSTEM AND METHOD FOR VULNERABILITY REMEDIATION VERIFICATION
First Claim
Patent Images
1. A system, comprising:
- a vulnerability remediation verification sub-system executed by a processor, the vulnerability remediation verification system to determine whether a vulnerability identified in a computer has been eliminated, and comprising;
a remediation scheduler to;
determine, based on the vulnerability identified in the computer, operations to be performed to eliminate the vulnerability; and
schedule performance of the operations by remediation processors; and
;
a reconciliation engine to determine;
whether the operations have been successfully performed; and
whether the operations have been performed by authorized remediation processors.
2 Assignments
0 Petitions
Accused Products
Abstract
In remediating a computer vulnerability, operations to be performed to correct the vulnerability are identified. Remediation processors are scheduled to perform the operations. Whether the vulnerability has been corrected is determined by: determining whether the operations have been performed successfully; and determining whether the operations have been performed by authorized remediation processors.
-
Citations
15 Claims
-
1. A system, comprising:
a vulnerability remediation verification sub-system executed by a processor, the vulnerability remediation verification system to determine whether a vulnerability identified in a computer has been eliminated, and comprising; a remediation scheduler to; determine, based on the vulnerability identified in the computer, operations to be performed to eliminate the vulnerability; and schedule performance of the operations by remediation processors; and
;a reconciliation engine to determine; whether the operations have been successfully performed; and whether the operations have been performed by authorized remediation processors. - View Dependent Claims (2, 3, 4, 5)
-
6. A method, comprising:
-
identifying, by a processor, a vulnerability in a computer; identifying, based on the vulnerability, operations to be performed to correct the vulnerability; identifying a time by which remediation of the vulnerability is to be completed; and generating a vulnerability token that includes information that; specifies a location of the vulnerability; specifies the vulnerability; specifies the time by which remediation of the vulnerability is to be completed; scheduling performance of the operations by remediation processors; and determining whether the vulnerability has been corrected by; determining whether the operations have been performed successfully; and determining whether the operations have been performed by authorized remediation processors. - View Dependent Claims (7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium encoded with instructions that when executed cause a processor to:
-
select, based on a vulnerability identified in a computer, operations to be performed to remediate the vulnerability; schedule performance of the operations by remediation logic; and determine whether the vulnerability has been remediated by; determining whether the operations have been performed successfully; and determining whether the operations have been performed by an authorized remediation process; and track progress towards completion of remediation based on completion of each of the operations. - View Dependent Claims (12, 13, 14, 15)
-
Specification