×

Electronic vulnerability and reliability assessment

  • US 7,735,142 B2
  • Filed: 06/25/2007
  • Issued: 06/08/2010
  • Est. Priority Date: 06/30/2003
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for providing vulnerability information regarding a system, comprising:

  • a database populated with descriptive system information about the system;

    a database structure configured as a hierarchical plurality of database pages, at least a portion of the hierarchical plurality of database pages including a page index, a data section and a selector section, wherein the data section is configured to include information regarding vulnerability of an element of the system and the selector section is configured to include keywords associated with at least one page index of a further, related database page of the hierarchical plurality of database pages;

    a rule processor module configured to provide rules for cycling through the hierarchical plurality of database pages of the database structure to obtain a database page of the hierarchical plurality of database pages having at least one keyword that matches keywords provided by user input, wherein the at least one page index associated with the at least one keyword of the obtained database page is associated with a further, related database page to be obtained while cycling through the hierarchical plurality of database pages;

    an input parser/filter module operatively coupled to the rule processor module, the input parser/filter module configured to receive policy or profile input from a user'"'"'s processing device and to convert the input into data usable by the rule processor module, wherein the data usable by the rule processor comprises at least the keywords provided by the user input;

    a state accumulator module operatively coupled to the rule processor module, the state accumulator module configured to store intermediate vulnerability status and result information; and

    a vulnerability accumulator module operatively coupled to the rule processor module, the vulnerability accumulator module configured to store the information regarding vulnerability of an element of the system accumulated from the data section of each of the hierarchical plurality of database pages accessed while cycling through the hierarchical plurality of database pages.

View all claims
  • 8 Assignments
Timeline View
Assignment View
    ×
    ×