Information security analysis system
First Claim
1. A method for analyzing and graphically displaying information from a data communications network, comprising:
- gathering information on the types of code including the language of the code for a plurality of computer programs;
generating a knowledge base of information gathered on the types of computer code;
parsing the information in the generated knowledge base to generate data in selected categories in a readable format;
analyzing the data in selected categories for functional alteration between two or more codes for similar computer programs; and
visualizing the analyzed data for graphical analysis and comparison of two or more computer programs to determine the degree of functional alteration.
9 Assignments
0 Petitions
Accused Products
Abstract
The analysis system is a collection, configuration and integration of software programs that reside on multiple interconnected computer platforms. The software, less computer operating systems, is a combination of sensor, analysis, data conversion, and visualization programs. The hardware platforms consist of several different types of interconnected computers, which share the software programs, data files, and visualization programs via a Local Area Network (LAN). This collection and integration of software and the migration to a single computer platform results in an approach to LAN/WAN monitoring in either a passive and/or active mode. The architecture permits digital data input from external sensors for analysis, display and correlation with data and displays derived from four major software concept groups. These are: Virus Computer Code Detection; Analysis of Computer Source and Executable Code; Dynamic Monitoring of Data Communication Networks; 3-D Visualization and Animation of Data.
194 Citations
21 Claims
-
1. A method for analyzing and graphically displaying information from a data communications network, comprising:
-
gathering information on the types of code including the language of the code for a plurality of computer programs;
generating a knowledge base of information gathered on the types of computer code;
parsing the information in the generated knowledge base to generate data in selected categories in a readable format;
analyzing the data in selected categories for functional alteration between two or more codes for similar computer programs; and
visualizing the analyzed data for graphical analysis and comparison of two or more computer programs to determine the degree of functional alteration. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for analyzing and visualizing a data communications network, comprising:
-
gathering information on types of computer code;
generating a knowledge base of the information gathered on the types of computer code;
parsing the information in the generated knowledge base to generate data in selected categories in readable format;
analyzing the data in the selected categories for functional alteration between two or more similar codes for computer programs; and
visualizing the analyzed data for comparison of two or more similar codes for computer programs to determine the degree of functional alteration. - View Dependent Claims (9, 10, 11, 12, 13, 14, 15)
-
-
16. A method for analyzing and graphically displaying information from a data communications network, comprising:
-
gathering information including structure of the network, operation of the network and network users;
generating a knowledge base of the information gathered and related to the network;
parsing the information in the generated knowledge base to generate data in selected categories in readable format;
analyzing the data in selected categories for preparation of visualizing diagrams; and
displaying the analyzed data for graphical analysis of the gathered information for animation of network traffic and structure. - View Dependent Claims (17)
-
-
18. A method for analyzing and graphically displaying information from a data communications network, comprising:
-
gathering information including traffic on the network to monitor network code;
analyzing the gathered information on network traffic to determine differences occurring within the various codes on the network; and
displaying the analyzed information graphically as a three-dimensional virtual view of the network. - View Dependent Claims (19, 20, 21)
-
Specification