×

Method and apparatus for security assessment of a computing platform

  • US 8,650,651 B2
  • Filed: 02/08/2008
  • Issued: 02/11/2014
  • Est. Priority Date: 02/08/2008
  • Status: Expired due to Fees
First Claim
Patent Images

1. A system for detecting security vulnerabilities in a computing platform, the computing platform comprising one or more front end components which provide services to other applications or users, and one or more back end components which supply required information to the one or more front end components to fulfill the services, the system comprising:

  • one or more first monitoring modules communicatively linked to the one or more front end components, and operatively configured to monitor the one or more front end components while communicating data with the one or more front end components;

    one or more second monitoring modules communicatively linked to the one or more back end components, and operatively configured to monitor the one or more back end components while the one or more back end components supply required information to the one or more front end components;

    wherein the one or more first monitoring modules is further operatively configured to communicate data of a testing type with the one or more front end components via a communication protocol and monitors activities of the one or more front end components via a protocol other than the communication protocol while communicating the data with the one or more front end components, while the one or more second monitoring modules monitor activities of the one or more back end components responsive to communicating the data;

    wherein information extracted that is associated with the activities of the one or more front end components is combinable with information extracted that is associated with the activities of the one or more back end components to contribute to identification of one or more security vulnerabilities within the computing platform;

    wherein at least one of the one or more first monitoring modules and the one or more second monitoring modules further operatively configured to combine and store all of the information extracted that is associated with the activities of the one or more front end components and all of the information extracted that is associated with the activities of the one or more back end components in an activity log; and

    at least one of the one or more first monitoring modules and the one or more second monitoring modules further operatively configured to change the testing type to suit the activities of at least one of the one or more front end components and the activities of the one or more back end components based on the combined information stored in the activity log.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×