×

Vulnerability-based remediation selection

  • US 8,561,197 B2
  • Filed: 04/22/2010
  • Issued: 10/15/2013
  • Est. Priority Date: 07/23/2004
  • Status: Active Grant
First Claim
Patent Images

1. A host device comprising:

  • at least one processor;

    at least one memory device;

    a network interface device;

    a sensor program held in the at least one memory device and executable by the at least one processor to;

    assess a current state of the host device and identifying a set of vulnerabilities X;

    send information representative of the current state of the host device including a representation of the set of vulnerabilities X to a server via the network interface device;

    receive, via the network interface device, vulnerability remediation information from the server, the vulnerability remediation information including;

    instructions executable by the processor through the sensor program, the instructions including a single remediation to remediate a plurality of vulnerabilities of the set of vulnerabilities X on the host device and a plurality of T_ID fields, wherein the content of a T_ID field denotes an identification (ID) of a technology species (T) present in the host device; and

    for each of the T_ID fields, a plurality of ACT_ID fields, wherein the content of an ACT_ID field denotes an ID of an action (ACT);

    implement the single remediation upon the host device through execution of the instructions of the received remediation information to mitigate the plurality of vulnerabilities present on the host device reassess the current state of the host device following implementation of the single remediation on the host device to identify a set of vulnerabilities Y;

    compare the sets of vulnerabilities X and Y to verify successful remediation of the plurality of vulnerabilities of the set of vulnerabilities X and to identify any further vulnerabilities of the set of vulnerabilities X remediated; and

    send information representative of the reassessed current state of the host device including a representation of any additional vulnerabilities of the set of vulnerabilities X remediated and the set of vulnerabilities Y to the server via the network interface device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×