×

Vulnerability-based remediation selection

  • US 9,349,013 B2
  • Filed: 08/16/2013
  • Issued: 05/24/2016
  • Est. Priority Date: 07/23/2004
  • Status: Active Grant
First Claim
Patent Images

1. A host device comprising:

  • at least one processor;

    at least one memory device;

    a network interface device;

    a sensor program stored in the at least one memory device and executed by the at least one processor to;

    automatically assess a current state of the host device to identify a plurality of T_ID fields that each denote an identification (ID) of a technology species (T) present in the host device;

    automatically send information representative of the current state of the host device to a server via the network interface device including the identified plurality of T_ID fields;

    automatically receive, via the network interface device, vulnerability remediation information from the server, the vulnerability remediation information including;

    instructions executable by the processor though the sensor program, the instructions including at least one remediation for at least one vulnerability of the host device and at least a subset of the plurality of identified T_ID fields, the at least oneremediation determined by the server at least in part by AND operations comprising a first list of remediation identifications (R IDs) identified using a vulnerability identification (V ID) of the at least one vulnerability as a database index for a list of R_IDs ANDed second list of R_IDs identified using technology genus (T GEN) as an index wherein the T_GEN is determined from at least one of theT_ID fields, and further ANDed against a third R_IDs identified using the V_ID of the at least one vulnerability as an index; and

    for each of the T_ID fields of the subset of the plurality of the identified T_ID fields, a plurality of ACT_ID fields, wherein the content of an ACT_ID field denotes an ID of an action (ACT); and

    automatically implement the at least one remediation upon the host device through execution of the instructions of the received remediation information to mitigate the at least one vulnerability of the host device.

View all claims
  • 0 Assignments
Timeline View
Assignment View
    ×
    ×