×

Method and systems for controlling access to computing resources based on known security vulnerabilities

  • US 20070143851A1
  • Filed: 06/13/2006
  • Published: 06/21/2007
  • Est. Priority Date: 12/21/2005
  • Status: Abandoned Application
First Claim
Patent Images

1. A method operable on a computer for controlling the operation of a computing system in response to a security vulnerability, comprising:

  • the computing system running software subject to at least one security vulnerability;

    establishing a policy based on the status of the at least one security vulnerability including at least one rule and an analysis method for determining compliance with the rule;

    receiving information relating to the status of the at least one security vulnerability of the software program;

    processing the information relating to the status using the analysis method;

    determining, based on the processing, the compliance of the at least one security vulnerability in relation to the rule; and

    controlling, based on the determining, the operation of the computing system.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×