Enabling access to aggregated software security information
First Claim
Patent Images
1. A method for enabling access to security data comprising:
- accessing data associated with software security from a plurality of electronic sources by using a web crawler to retrieve security data from web sites, databases, message boards and online sources;
aggregating said data from said plurality of electronic sources;
identifying attributes associated with said data to enable organization of the data;
assigning a trust rating to the data to identify trusted security data based on the attributes for the data or web sites, databases, message boards and on-line sources from which the security data was retrieved;
enabling access to said aggregated data through a graphical user interface that can be used to analyze said data according to said attributes;
enabling access to a security relationship visualizer to display a graph for security relationships of security elements including a software product, a security researcher and a security domain specific keyword and to allow navigation between related security elements; and
providing a dynamic security snap-shot to show security developments during a defined time window for a security topic.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for enabling access to software security data is provided. The method includes accessing data associated with software vulnerabilities from a plurality of on-line sources. The method further includes aggregating the data from the plurality of on-line sources and identifying attributes associated with the data. The method also includes enabling access to the aggregated data through a graphical user interface that can be used to analyze the data according to the attributes.
85 Citations
20 Claims
-
1. A method for enabling access to security data comprising:
-
accessing data associated with software security from a plurality of electronic sources by using a web crawler to retrieve security data from web sites, databases, message boards and online sources; aggregating said data from said plurality of electronic sources; identifying attributes associated with said data to enable organization of the data; assigning a trust rating to the data to identify trusted security data based on the attributes for the data or web sites, databases, message boards and on-line sources from which the security data was retrieved; enabling access to said aggregated data through a graphical user interface that can be used to analyze said data according to said attributes; enabling access to a security relationship visualizer to display a graph for security relationships of security elements including a software product, a security researcher and a security domain specific keyword and to allow navigation between related security elements; and providing a dynamic security snap-shot to show security developments during a defined time window for a security topic. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. Instructions on a computer-usable memory wherein said instructions when executed cause a computer system to perform a method for enabling access to aggregated software security data, said computer-implemented method comprising:
-
accessing data associated with software security from a plurality of on-line sources; aggregating said data from said plurality of on-line sources; identifying attributes associated with said data; determining a trust level associated with a portion of said data; presenting graphically the trust level associated with the portion of said data; enabling access to said aggregated data through a graphical user interface that can be used to analyze said data according to said attributes; enabling access to a security relationship visualizer to display a graph for security relationships of security elements including a software product, a security researcher and a security domain specific keyword and to allow navigation between related security elements; and providing a dynamic security snap-shot to show security developments and web postings during a defined time window for a security topic. - View Dependent Claims (9, 10, 11, 12, 13)
-
-
14. A system for enabling access to software security data comprising:
-
a software security data collector module for accessing data associated with software security from a plurality of on-line sources; a software security data compiler for aggregating said data from said plurality of on-line sources into a computer memory; a software security data attribute identifier module for identifying attributes associated with said data using a processor; a trust determiner to determine a level of trust for data based on the attributes for the data or an online source location from which the data was obtained using a processor; a graphical user interface for enabling access to said aggregated data using a display device, wherein said graphical user interface can be used to analyze said data according to said attributes a security relationship visualizer to display a graph for security relationships of security elements including a software product, a security researcher and a security domain specific keyword and to allow navigation between related security elements; and a dashboard module to provide a dynamic security snap-shot using a display device and to show security developments during a defined time window for a security topic. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification