Identifying data associated with security issue attributes
First Claim
1. A method for identifying data related to a software security issue comprising:
- determining one or more attributes associated with a software security issue of a software product, said software security issue including a vulnerability of said software product;
aggregating software security data from a plurality of on-line sources;
analyzing said aggregated software security data for said one or more attributes;
associating a first portion of said aggregated data with said software security issue, using at least one processor, based on matching said one or more attributes with contents of said first portion of said aggregated data based on said analyzing;
identifying a seed document from said first portion of said aggregated data based on the seed document being received from a data store provided by a vendor of the software product; and
determining a similarity between said seed document and one or more other documents included in a second portion of said aggregated data.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for identifying data related to a software security issue is provided. The method includes accessing a software security issue and determining one or more attributes associated with the software security issue. The method also includes accessing aggregated software security data retrieved from a plurality of on-line sources and searching the aggregated software security data for the attributes associated with the security issue. The method further includes associating a portion of the aggregated data with the security issue based on matching the attributes associated with the security issue with contents of the portion of the aggregated data.
-
Citations
20 Claims
-
1. A method for identifying data related to a software security issue comprising:
-
determining one or more attributes associated with a software security issue of a software product, said software security issue including a vulnerability of said software product; aggregating software security data from a plurality of on-line sources; analyzing said aggregated software security data for said one or more attributes; associating a first portion of said aggregated data with said software security issue, using at least one processor, based on matching said one or more attributes with contents of said first portion of said aggregated data based on said analyzing; identifying a seed document from said first portion of said aggregated data based on the seed document being received from a data store provided by a vendor of the software product; and determining a similarity between said seed document and one or more other documents included in a second portion of said aggregated data. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer storage device having instructions which when executed cause a computer system to perform steps comprising:
-
determining one or more attributes associated with a software security issue of a software product, said software security issue including a vulnerability of said software product; analyzing aggregated software security data, which is aggregated from a plurality of on-line sources, for said one or more attributes; associating a first portion of said aggregated data with said software security issue based on matching said one or more attributes with contents of said first portion of said aggregated data based on said analyzing; identifying a seed document from said first portion of said aggregated data based on the seed document being received from a data store provided by a vendor of the software product; and determining a similarity between said seed document and one or more other documents included in a second portion of said aggregated data. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A system for identifying data associated with a software security issue comprising:
-
one or more processors; an attribute determiner module, implemented using at least one of the one or more processors, for determining one or more attributes associated with said software security issue of a software product, said software security issue including a vulnerability of said software product; a data accessor module, implemented using at least one of the one or more processors, for accessing aggregated software security data that is aggregated from a plurality of on-line sources; a search module, implemented using at least one of the one or more processors, for analyzing said aggregated software security data for said one or more attributes; and an associator module, implemented using at least one of the one or more processors, that associates a portion of said aggregated data with said software security issue based on matching said one or more attributes with contents of said portion of said aggregated data, that identifies a seed document from said portion of said aggregated data based on the seed document being received from a data store provided by a vendor of the software product, and that determines a similarity between said seed document and one or more other documents included in another portion of said aggregated data. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20)
-
Specification