Please download the dossier by clicking on the dossier button x
×

System and method for identifying potential security risks in controls

  • US 7,577,941 B2
  • Filed: 05/22/2002
  • Issued: 08/18/2009
  • Est. Priority Date: 05/22/2002
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for tracking and verifying that controls associated with a software program of interest have been tested for security concerns, comprising:

  • extracting as security risk information, information about controls associated with the interested software program to be installed that are installed on a computer system each time after the interested software program having software objects has been installed or updated on the computer system, the controls being a subset of the software objects;

    wherein the extraction of information identifies a list of potential controls based on whether the controls present a security risk when executed;

    wherein the list of potential controls does not include any controls that are associated with a different software program;

    wherein the security risk information includes information associated with the controls of interest, which are identified as controls that pose a potential security risk;

    wherein the identification of a list of potential controls is based on includes installing all components of the interested software program, identifying all executable files, and calling each identified executable file to locate controls hidden in all installed components of the interested software program;

    identifying controls of interest from the list of potential controls;

    storing the security risk information and the identified controls of interest in a database;

    retrieving the security risk information upon request;

    displaying the security risk information, along with additional information and the identified controls of interest, in a browser, the additional information providing a mechanism for tracking and verifying that the identified controls of interest have been tested for security concerns;

    updating the additional information through the browser; and

    updating the security risk information stored in the database based on the additional information updated through the browser.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×