×

Method of identifying software vulnerabilities on a computer system

  • US 8,230,497 B2
  • Filed: 11/04/2002
  • Issued: 07/24/2012
  • Est. Priority Date: 11/04/2002
  • Status: Active Grant
First Claim
Patent Images

1. A computer program stored on a non-transitory computer usable medium, the computer program comprising computer-readable instructions arranged to operate under the control of a processing means so as to identify a software vulnerability on a computer system, the computer program performing the steps of:

  • selecting one or more computer systems to be scanned for a software vulnerability;

    applying an interrogation program to software stored on the computer system, the interrogation program being capable of exploiting a known software vulnerability if it is present in the software to which the interrogation program is applied; and

    in the event that the software vulnerability is exploited by the interrogation program, operating the interrogation program to generate a set of management information from which can be derived at least an identification of the computer system on which the software vulnerability was exploited, the computer program being capable of sending the generated set of management information over a computer network,wherein the interrogation program is further arranged to remediate the known software vulnerability in response to it being identified.

View all claims
  • 5 Assignments
Timeline View
Assignment View
    ×
    ×