US20050229256A2 - Automated Computer Vulnerability Resolution System - Google Patents
Automated Computer Vulnerability Resolution System Download PDFInfo
- Publication number
- US20050229256A2 US20050229256A2 US10/335,490 US33549002A US2005229256A2 US 20050229256 A2 US20050229256 A2 US 20050229256A2 US 33549002 A US33549002 A US 33549002A US 2005229256 A2 US2005229256 A2 US 2005229256A2
- Authority
- US
- United States
- Prior art keywords
- remediation
- vulnerabilities
- computer
- client
- signatures
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Definitions
- the invention relates generally to a method and system for resolving security vulnerabilities in computers and, more particularly, to a vulnerability resolution system in which computer security vulnerability information from one or more sources can be aggregated and comprehensive remediation updates can be generated for managed automated distribution to target client computers.
- a method and system are presented which provide for a more automated and managed way to remediate security vulnerabilities on individual computers and computer networks. More particularly, a vulnerability resolution system is provided in which vulnerability information is aggregated, then used to construct, and subsequently update, vulnerability remediation signatures for download.
- the downloaded signatures may then be selectively used to address or resolve vulnerabilities on client machines having security vulnerabilities.
- a method for resolving vulnerabilities in a computer comprises aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address a computer vulnerability; and deploying said remediation signature to a client computer.
- the aggregating of vulnerability information comprises obtaining vulnerability information from at least one security intelligence agent, such as a database of information regarding known computer vulnerabilities or a scanning service which scans a client computer for vulnerabilities and records the vulnerability information.
- the remediation signature typically comprises a sequence of actions to address a corresponding vulnerability.
- the remediation signatures are generally associated with a corresponding computer vulnerability.
- a remediation profile may be constructed for a client computer to address vulnerabilities on that computer, where the profile comprises selected remediation signatures for the client computer corresponding to vulnerabilities on the client computer.
- the remediation signatures may be uploaded to a flash server for remote access or download by client computers or client servers.
- a managed remediation approach is also contemplated which would include wherein selective deployment of remediation signatures, selective resolution of vulnerabilities, scheduled scanning of client computers for vulnerabilities, scheduled deployment of remediation signatures, etc.
- a system for resolving computer vulnerabilities comprises a remediation server capable of coupling to a security intelligence agent having information about computer vulnerabilities in order to aggregate said vulnerability information into a remediation database.
- Various devices may be coupled to the remediation server to complete the system.
- a signature module may be coupled to the remediation server to construct a remediation signature for each vulnerability.
- a flash server may be coupled to the signature module to provide remote access to said remediation signatures.
- a client server may also be included capable of coupling to said flash server to access said remediation signatures.
- a deployment module may be coupled to the client server capable of deploying said remediation signatures to a client computer coupled to said client server.
- the deployment module may also be capable of constructing a remediation profile for a client computer to address vulnerabilities on that computer, wherein the remediation profile typically comprises selected remediation signatures for the client computer corresponding to vulnerabilities on the client computer.
- An input module may also be coupled to the remediation server to handle the interfacing of the remediation server to a security intelligence agent having information about computer vulnerabilities.
- a client module may be coupled to the client server to which handle the interfacing of the client server to the flash server to access said remediation signatures.
- computer-readable media tangibly embodying a program of instructions executable by a computer to perform a process for resolving vulnerabilities in a computer comprises aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address a computer vulnerability; and deploying said remediation signature to a client computer.
- Figure 1 is a block diagram illustrating an embodiment of a vulnerability resolution system in accordance with the present invention.
- FIG. 2 is a block diagram illustrating another embodiment of a vulnerability resolution system in accordance with the present invention.
- Figure 3 is a flow chart illustrating an overview of an embodiment of a computer vulnerability remediation process in accordance with the present invention.
- Figure 4 is a flow chart illustrating an embodiment of an aggregation and construction process for computer vulnerability remediation in accordance with the present invention.
- Figure 5A and 5B are a flow chart illustrating an embodiment of a remediation management process for computer vulnerability remediation in accordance with the present invention.
- Figure 1 illustrates an embodiment of a vulnerability resolution system 10 in accordance with the present invention.
- the system 10 comprises a remediation server 12 coupled to a plurality of intelligence agents 14.
- the remediation server 12 is also coupled to an import module 15, a remediation database 16, and a signature module 18.
- the import module 15, remediation database 16, and signature module 18 are incorporated in the remediation server 12.
- the import module 15, remediation database 16, and signature module 18 may be stored in memory on the remediation server 12. It is also contemplated, however, that the import module 15, remediation database 16, and signature module 18 could be remotely coupled to the remediation server 12.
- a flash server 20 is also coupled to the remediation server 12.
- a client server 22 is coupled to the flash server 20.
- a client module 23 and deployment module 24 are coupled to the client server 22.
- the client module 23 and deployment module 24 are incorporated in the client server 22.
- the client module 23 and deployment module 24 may be stored in memory on the client server 22. It is also contemplated, however, that the client module 23 and deployment module 24 could be remotely coupled to the client server 22.
- a plurality of client computers 26 are coupled to the client server 22.
- the remediation server 12 obtains information relating to computer security vulnerabilities from the intelligence agents 14.
- the import module 15 provides the necessary interface between the remediation server 12 and the various intelligence agents having such information.
- intelligence agents include: ISS Internet Scanner, QualysGuard, Nessus, Eeye, Harris, Retina, Microsoft’s hfNetCheck, and others.
- the vulnerability information may come in many forms from these agents. Two such forms include 1) general information from security intelligence organizations relating to known security vulnerabilities, such as vulnerabilities in widespread software applications like Microsoft Windows; and 2) specific information from scanning services relating to specific vulnerabilities found during a security scan of a client’s computer or computer system 26.
- the remediation server 12 aggregates the vulnerability information obtained, from whatever source, into a remediation database 16. While aggregating the information into the database 16, the remediation server 12 may manipulate the information in many ways. For example, the server 12 may strip unnecessary information out, may sort the information into related vulnerabilities or otherwise, may remove duplicate information, may identify or associate certain related vulnerabilities, etc.
- remediation server 12 uses a signature module 18 to generate remediation signatures for the vulnerabilities.
- a remediation signature is a list of actions taken to address or resolve a vulnerability.
- the remediation signatures include the following types of remediation actions: service management, registry management, security permissions management, account management, policy management, audit management, file management, process management, as well as service pack, hot fix and patch installation. These types of remediation actions are generally known in the computer security industry.
- a remediation signature may address one or more vulnerabilities. For clarity of explanation, however, it will be assumed that in this embodiment each remediation signature addresses a single vulnerability or type of vulnerability.
- the remediation signatures are generated as abstract objects which can be developed and implemented across multiple platforms without the need to change the underlying source code used in the remediation system. This allows for the creation of a remediation signature in the environment of the remediation system which can then be utilized in whatever system or environment the remediation system is operating.
- the process of constructing a remediation signature may be entirely automatic or it may involve some manual intervention, or a combination of both. In fact, some intelligence agents 14 may actually provide or suggest remediations along with the vulnerability information provided.
- a corresponding level of complexity may be required for the remediation signature.
- some vendors provide “patches” or “fixes” or “updates” that address vulnerabilities in their hardware or software via their vendor website.
- a signature may therefore include direction to go to a vendor website and retrieve a patch or an update as one of the actions undertaken to remediate a computer’s vulnerabilities.
- the signature module 18 or remediation server 12 may have the ability to test and approve the constructed signature in order to ensure that it successfully resolves the intended vulnerability and does not have any unintended deleterious effects.
- the remediation signature is assigned or otherwise associated with the corresponding vulnerability in the remediation database 16.
- the remediation database 16 may include the vulnerability information and the corresponding remediation signatures for the vulnerabilities identified.
- the signatures could be stored elsewhere and remotely associated via a pointer or otherwise to their corresponding vulnerabilities.
- Remediation signatures and vulnerability information can be posted to the flash server 20 for dissemination.
- a client server 22 can then download the desired information from the flash server 20.
- a download is typically initiated by a user, such as an IT or computer security personnel.
- the client server 22 may connect to the flash server 20 in many ways including the Internet or a direct dial-up connection.
- the client module 23 provides the necessary interface logic to download the information from the flash server 20.
- a client server 22 will periodically download information from the flash server 20 to check for updated vulnerability and remediation information.
- the client server 22 may also access vendor websites 21, via a global network such as the Internet or otherwise, to obtain additional patches or updates as needed for remediation.
- the client server 22 analyzes and interprets the signatures downloaded from the flash server 20. If a signature specifies a needed update or patch from a vendor website 21, the client server 22 will connect to the website and download the needed information making the patch or update available locally for remediation of any client computers 26 coupled to the client server 22.
- the client server 22 will keep a profile of the client computers 26 coupled thereto.
- the profile of the client computers 26 essentially records or logs the system information relating to the client computers 26.
- the profile contains information regarding remediation performed on the client computer 26.
- the profile might also contain information regarding the formatting of the client computer 26, the software applications and versions running on the computer 26, etc., which might be helpful in managing security issues on the subject computer.
- the client server 22 can track what remediation may be required for each client computer 26.
- the client server 22 can manage the vulnerability resolution process for each client computer 26.
- the client server 22, or security or IT personnel via the server could select which remediation signatures should be deployed to each client computer 26, or which vulnerabilities should or should not be addressed.
- vulnerability resolution can be managed by scheduling the various resolution events. For instance, when and how often the client computers 26 are scanned for vulnerabilities can be scheduled, as well as the timing of the deployment of the remediation signatures to address those vulnerabilities.
- the remediation of vulnerabilities can be more reliably and more cost effectively addressed.
- the remediation can occur in off hours to minimize impact on the productivity of the client computers 26.
- the remediation can be selectively implemented.
- the remediation can be tracked and logged so that remediations are not accidentally overwritten or undone.
- the remediation can be accomplished automatically from the client server 22 as opposed to having to perform or install the remediation manually on each client computer, a virtually impossible task for some large-scale companies.
- Figure 2 is a block diagram providing another illustration of an embodiment of a vulnerability resolution system 30 in accordance with the present invention. More particularly, Figure 2 provides another way to visualize the architecture of a vulnerability system in accordance with the present invention.
- the architecture of this embodiment of the vulnerability system 30 generally comprises an aggregation section 31 and a remediation section 32.
- the aggregation section 31 of the architecture is essentially responsible for obtaining and aggregating the computer security vulnerability information while the remediation section 32 is essentially responsible for constructing remediation signatures for the identified vulnerabilities and deploying those remediations to client computers in a managed and automated manner.
- the aggregation section 31 of the system architecture 30 comprises intelligence agents 34, an import API or interface 36, and an administrator 38.
- the import API 36 provides an interface to the intelligence agents 34.
- the intelligence agents 34 provide information regarding computer security vulnerabilities.
- these intelligence agents 34 may include automated vulnerability assessment tools, security intelligence services, manufacturers of computer hardware or software, etc.
- the administrator 38 obtains this vulnerability information from the intelligence agents 34 via the import API 36.
- the import API 36 typically includes several interfaces or import wizards as required to allow importation of vulnerability assessment data from the variety of intelligence agents available.
- the intelligence agents 34 provide information specifying the necessary interface. Once retrieved, the vulnerability information may be aggregated, sorted, selected or otherwise managed via the administrator 38.
- the remediation section 32 of the system architecture 30 ultimately uses the vulnerability information retrieved by the aggregation section 31 to remediate vulnerabilities on client computers 40.
- the client computers 40 are shown coupled to a client server 42.
- the client server 42 allows for automated and managed deployment of the remediation signatures to the client computers 40.
- the architecture of the remediation section 32 illustrates that the vulnerability information from the aggregation section 31 is conveyed to the client server 42 and client computers 40 via the remediation bus 44, remediation signature 46, and remediation profile 48.
- the remediation signature 46 is essentially a group of actions which can be taken to address or resolve a vulnerability.
- the signature may be provided by the intelligence agents 34 with the vulnerability information or, more typically, it may need to be constructed in response to the vulnerability information received.
- the construction may include some automated creation and/or some manual creation of the appropriate actions to be taken to address the subject vulnerability.
- the remediation profile 48 contemplates a record or log of system information relating to the client computers 40 or client servers 42.
- the profile may contain information regarding the formatting of the client computers 40 or server 42, the software applications and versions running on the computers 40 or servers 42, the remediation signatures already implemented on the computers 40 and servers 42, the remediation history of the computers 40, etc.
- Figure 2 also illustrates that the remediation types or groups 50 in this embodiment include configuration management, backdoor management, service management, account management, and patch management.
- the available remediation groups are coupled to the remediation bus 44. It is contemplated that other remediation types or groups may be included as well.
- FIG. 3 is a flow chart illustrating an overview of an embodiment of a computer vulnerability remediation process in accordance with the present invention.
- the remediation process 60 begins with vulnerability assessment in box 61.
- Vulnerability assessment comprises using automated assessment tools and audit processes, intelligence agents, to verify the existence of known vulnerabilities on a given computer or computer network. This assessment process may also include device discovery; that is, the mapping of network and subnetwork components to be assessed and identifying the devices that will be targeted for vulnerability assessment.
- the vulnerability information is imported or aggregated in the system, typically in a remediation database, and remediation signatures can be constructed to address the identified vulnerabilities. As noted, the remediation signatures are typically associated with the corresponding vulnerabilities in the remediation database.
- the vulnerability information is then reviewed in box 63.
- the review process typically includes analyzing the vulnerability information to prioritize and identify vulnerabilities for remediation, as well as acceptable risks (i.e., where no remediation is required). As indicated in box 64, the remediation can then be scheduled to occur when, where, and how desired. This allows the remediation to occur in off-peak times to reduce interference with normal computer operations, on only the identified target computers, and in the manner desired.
- the remediation signatures are approved for dissemination to the client’s target computers. This contemplates that remediation signatures can be selectively deployed. In addition, signatures designed to address the vulnerabilities identified may be tested and revised before approving the signatures for deployment. Once approved, the remediation signatures and vulnerability information are distributed to the system clients in box 66 for use on the client’s computers.
- remediation can occur as scheduled in box 67.
- remediation undertaken can be reviewed to ensure the remediation was completed successfully via status reports or otherwise.
- remediation events may be logged or otherwise recorded to preserve the remediation information.
- Such information may be included in profiles for the client computers. As noted, such profiles may include information about the target devices such as system configuration, software, and prior remediation actions or a remediation history. Having such information allows for managed remediation of the client computers in the future.
- the embodiment of the remediation process of Figure 3 presents vulnerability assessment, vulnerability remediation, and vulnerability management as contemplated by the present invention.
- FIG. 4 is a flow chart illustrating an embodiment of an aggregation and construction process for computer vulnerability remediation in accordance with the present invention.
- the aggregation and construction process 70 can be viewed as a subprocess of the overall remediation process.
- the process 70 begins in box 71 with the gathering of vulnerability information from intelligence agents.
- these intelligence agents include automated vulnerability assessment tools, security intelligence services, manufacturers of computer hardware or software, etc.
- the vulnerability information retrieved from the intelligence agents is then aggregated in a remediation database as indicated in box 72.
- the vulnerability information is then reviewed and analyzed. This may include sorting the information into related vulnerabilities or otherwise, categorizing or identifying certain related vulnerabilities, prioritizing vulnerabilities, etc.
- a remediation signature resolves or addresses a vulnerability or type of vulnerability.
- a remediation signature is then constructed in box 75.
- a remediation signature is a group of actions which addresses or resolves the subject vulnerability; for instance, modifying registry settings, changing security permissions, installing patches, etc.
- the creation of a remediation signature may be completely automated or may include some manual input as well.
- the remediation signature is tested to see if it effectively resolves or addresses the target vulnerability. If not, the process returns to box 75 and another remediation signature is constructed, then retested in box 76. Once an effective signature has been constructed, the process continues to box 77.
- selected signatures may be approved for distribution to clients. Approved signatures are then uploaded to a flash server making them available for download by clients in box 78. In this way, new and updated remediation signatures which address or resolve identified vulnerabilities are made available for download by clients.
- FIGS 5A and 5B are a flow chart illustrating an embodiment of a remediation management process for computer vulnerability remediation in accordance with the present invention.
- the aggregation and construction process 70 can be viewed as a subprocess of the overall remediation process.
- This embodiment of the remediation management process 80 is typically a software application installed on a client server which is coupled to a plurality of target client computers which may require remediation of security vulnerabilities. Accordingly, the process 80 begins in box 81 by launching the application.
- available remediation signatures and vulnerability information are downloaded, typically from a flash server.
- vulnerability assessment data is imported. Typically, this vulnerability assessment data comes from scanning tools which have scanned or analyzed the target computers for which remediation is being considered.
- the vulnerability assessment data includes information regarding the security vulnerabilities found on the target computers or devices. Based on the vulnerabilities identified on the target computers, the vulnerabilities are then mapped to remediation signatures in box 84. In this embodiment, mapping of the identified vulnerabilities to corresponding remediation signatures occurs by referencing the remediation database information downloaded from the flash server. It is contemplated, however, that this information may have been previously downloaded, remotely accessed, or presently downloaded to make the necessary correlation between vulnerabilities and available signatures.
- a remediation profile is then generated for each target computer in box 85. As noted, the profile typically includes information regarding the vulnerabilities identified on the target client computer as well as the corresponding signatures to address those vulnerabilities. In box 86, the client user, typically an IT person or other computer security personnel, is given the opportunity to select which vulnerabilities should be remediated.
- the selection is made by reviewing the information regarding vulnerabilities, proposed signatures, and profiles.
- the selection and review may be made for each computer or by vulnerability.
- a particular computer could be selected not to receive any remediation, perhaps because the computer does not pose a significant security risk, the vulnerabilities on the computer are not significant, the processes running on the computer cannot be interrupted for remediation, etc.
- a particular vulnerability could be deselected for all target client computers, such that the vulnerability would not be remediated on any of the target computers, perhaps because the vulnerability dose not pose a sufficient security risk, the remediation signature is deemed too risky, etc.
- the proposed remediation is analyzed to determine which remediation signatures will be required.
- the target client computers that are to receive remediation are notified that a remediation is to occur.
- the notification essentially comprises a message passed to a local remediation application installed on each client computer. Included in the remediation notification may be when the remediation is scheduled to occur. For instance, the remediation can be scheduled to occur at the instance of a particular event, such as a user logging off the machine, logging in, or any other action. In addition, the remediation may be scheduled to occur at a particular time. Thus, using the target client computer’s local clock the remediation can be initiated at the scheduled time. Or alternatively, the remediation could occur as soon as the notification is received at the target client computer. Regardless of the triggering event, when the trigger is met the local remediation is launched in box 90.
- the remediation profile for the client computer is then downloaded in box 91.
- the profile is downloaded from the client server on which the client remediation management process application is running, i.e., the server that sent the notification of the pending remediation initially.
- the profile is then interpreted and the remediation signatures and actions specified in the profile are executed as indicated in box 92.
- the status of the remediation may be reported to the client server and monitored.
- the remediation steps may be prioritized and analyzed to ensure the most efficient sequence of execution as indicated in box 94.
- a reboot may need to be performed for some of the remediation actions to take effect.
- Completion of the remediation on the target client computer is then logged to the client server in box 96.
- box 97 indicates that reports are generated indicative of the effect of the remediation. Whether the remediation was successful or not is determined in box 98. If the remediation is not deemed successful, either because it did not resolve the identified vulnerabilities as evidenced by an additional security scan of the client computer, or because the remediation actions had unintended deleterious effects, etc., then the remediation can be rolled back or undone and the remediation process can be repeated as indicated in box 99. If the remediation is deemed successful, i.e., vulnerabilities resolved and no deleterious effects for example, then the process ends in box 100. In this manner, the new and updated remediation signatures made available to address or resolve identified vulnerabilities can be downloaded and used in an automated and managed remediation deployment to target client computers.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer And Data Communications (AREA)
- Stored Programmes (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- This application claims priority from U.S. Provisional Application serial no. 60/345,689 filed on December 31, 2001.
- Not applicable.
- Not applicable.
- The invention relates generally to a method and system for resolving security vulnerabilities in computers and, more particularly, to a vulnerability resolution system in which computer security vulnerability information from one or more sources can be aggregated and comprehensive remediation updates can be generated for managed automated distribution to target client computers.
- Computers, computer systems, and the applications running thereon are becoming increasingly complex. In addition, with the advent of the Internet and other modern networking technology, computers have become increasingly interconnected and remote accessibility of individual computers and computer networks has become more and more common. In part as a result of this complexity, the number of computer security vulnerabilities that need to be addressed continues to increase. For example, in the year 2000 alone, 650 operating system vulnerabilities were identified, including 126 in the Windows 2000/NT platform and another 46 in the Windows 9x platform. The Computer Security Institute reported 417 vulnerabilities for the year 1999, 1090 vulnerabilities for the year 2000, 2,437 in 2001, and a projected 4000+ vulnerabilities in 2002. Given these trends, it has become increasingly difficult to protect computers from security breaches via these vulnerabilities. Moreover, the task of maintaining security for these computer systems and/or networks has become increasingly burdensome and difficult.
- Currently, organizations typically use vulnerability scanning software or managed security providers to test computers for security weaknesses. These tools generally provide detailed information on the vulnerabilities found in the computing environment, but provide limited means for correcting or resolving the detected vulnerabilities. In order for an organization to remove identified vulnerabilities, it typically must expend a large amount of labor and resources to identify and/or create a remediation for each vulnerability then even more labor to install the vulnerability remediation on the affected computers. Often, this involves visiting each individual computer and manually applying the necessary remediation. In addition, once the remediation is applied, a user can easily remove it, or install additional software that invalidates the remediation, thereby wasting all of the effort expended in performing the remediation.
- In accordance with the present invention, a method and system are presented which provide for a more automated and managed way to remediate security vulnerabilities on individual computers and computer networks. More particularly, a vulnerability resolution system is provided in which vulnerability information is aggregated, then used to construct, and subsequently update, vulnerability remediation signatures for download.
- The downloaded signatures may then be selectively used to address or resolve vulnerabilities on client machines having security vulnerabilities.
- In one embodiment, a method for resolving vulnerabilities in a computer comprises aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address a computer vulnerability; and deploying said remediation signature to a client computer. The aggregating of vulnerability information comprises obtaining vulnerability information from at least one security intelligence agent, such as a database of information regarding known computer vulnerabilities or a scanning service which scans a client computer for vulnerabilities and records the vulnerability information. The remediation signature typically comprises a sequence of actions to address a corresponding vulnerability. The remediation signatures are generally associated with a corresponding computer vulnerability. A remediation profile may be constructed for a client computer to address vulnerabilities on that computer, where the profile comprises selected remediation signatures for the client computer corresponding to vulnerabilities on the client computer. The remediation signatures may be uploaded to a flash server for remote access or download by client computers or client servers. A managed remediation approach is also contemplated which would include wherein selective deployment of remediation signatures, selective resolution of vulnerabilities, scheduled scanning of client computers for vulnerabilities, scheduled deployment of remediation signatures, etc.
- In another embodiment, a system for resolving computer vulnerabilities comprises a remediation server capable of coupling to a security intelligence agent having information about computer vulnerabilities in order to aggregate said vulnerability information into a remediation database. Various devices may be coupled to the remediation server to complete the system. For example, a signature module may be coupled to the remediation server to construct a remediation signature for each vulnerability. A flash server may be coupled to the signature module to provide remote access to said remediation signatures. A client server may also be included capable of coupling to said flash server to access said remediation signatures. A deployment module may be coupled to the client server capable of deploying said remediation signatures to a client computer coupled to said client server. The deployment module may also be capable of constructing a remediation profile for a client computer to address vulnerabilities on that computer, wherein the remediation profile typically comprises selected remediation signatures for the client computer corresponding to vulnerabilities on the client computer. An input module may also be coupled to the remediation server to handle the interfacing of the remediation server to a security intelligence agent having information about computer vulnerabilities. And a client module may be coupled to the client server to which handle the interfacing of the client server to the flash server to access said remediation signatures.
- In another embodiment, computer-readable media tangibly embodying a program of instructions executable by a computer to perform a process for resolving vulnerabilities in a computer comprises aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address a computer vulnerability; and deploying said remediation signature to a client computer.
-
Figure 1 is a block diagram illustrating an embodiment of a vulnerability resolution system in accordance with the present invention. -
Figure 2 is a block diagram illustrating another embodiment of a vulnerability resolution system in accordance with the present invention. -
Figure 3 is a flow chart illustrating an overview of an embodiment of a computer vulnerability remediation process in accordance with the present invention. -
Figure 4 is a flow chart illustrating an embodiment of an aggregation and construction process for computer vulnerability remediation in accordance with the present invention. -
Figure 5A and 5B are a flow chart illustrating an embodiment of a remediation management process for computer vulnerability remediation in accordance with the present invention. - In this disclosure, numerous specific details are set forth to provide a sufficient understanding of the present invention. However, those skilled in the art will appreciate that the present invention may be practiced without such specific details. In other instances, well-known elements have been illustrated in schematic or block diagram form in order not to obscure the present invention in unnecessary detail. Additionally, some details have been omitted inasmuch as such details are not considered necessary to obtain a complete understanding of the present invention, and are considered to be within the understanding of persons of ordinary skill in the relevant art. It is further noted that all functions described herein may be performed in either hardware or software, or a combination thereof, unless indicated otherwise. Certain terms are used throughout the following description and claims to refer to particular system components. As one skilled in the art will appreciate, components may be referred to by different names. This document does not intend to distinguish between components that differ in name, but not function. In the following discussion and in the claims, the terms “including” and “comprising” are used in an open-ended fashion, and thus should be interpreted to mean “including, but not limited to…”. Also, the term “couple” or “couples” is intended to mean either an indirect or direct electrical or communicative connection. Thus, if a first device couples to a second device, that connection may be through a direct connection, or through an indirect connection via other devices and connections. Finally, the terms “remediate” and “remediation” are used to refer generally to addressing or resolving vulnerabilities by reducing or alleviating the security risk presented by the subject vulnerability.
-
Figure 1 illustrates an embodiment of avulnerability resolution system 10 in accordance with the present invention. As shown inFigure 1 , thesystem 10 comprises aremediation server 12 coupled to a plurality ofintelligence agents 14. Theremediation server 12 is also coupled to animport module 15, aremediation database 16, and asignature module 18. In this embodiment, theimport module 15,remediation database 16, andsignature module 18 are incorporated in theremediation server 12. For instance, theimport module 15,remediation database 16, andsignature module 18 may be stored in memory on theremediation server 12. It is also contemplated, however, that theimport module 15,remediation database 16, andsignature module 18 could be remotely coupled to theremediation server 12. - A
flash server 20 is also coupled to theremediation server 12. A client server 22 is coupled to theflash server 20. Aclient module 23 anddeployment module 24 are coupled to the client server 22. In this embodiment, theclient module 23 anddeployment module 24 are incorporated in the client server 22. For instance, theclient module 23 anddeployment module 24 may be stored in memory on the client server 22. It is also contemplated, however, that theclient module 23 anddeployment module 24 could be remotely coupled to the client server 22. And finally, a plurality ofclient computers 26 are coupled to the client server 22. - In the operation of the
system 10, theremediation server 12 obtains information relating to computer security vulnerabilities from theintelligence agents 14. Theimport module 15 provides the necessary interface between theremediation server 12 and the various intelligence agents having such information. Examples of intelligence agents include: ISS Internet Scanner, QualysGuard, Nessus, Eeye, Harris, Retina, Microsoft’s hfNetCheck, and others. The vulnerability information may come in many forms from these agents. Two such forms include 1) general information from security intelligence organizations relating to known security vulnerabilities, such as vulnerabilities in widespread software applications like Microsoft Windows; and 2) specific information from scanning services relating to specific vulnerabilities found during a security scan of a client’s computer orcomputer system 26. Theremediation server 12 aggregates the vulnerability information obtained, from whatever source, into aremediation database 16. While aggregating the information into thedatabase 16, theremediation server 12 may manipulate the information in many ways. For example, theserver 12 may strip unnecessary information out, may sort the information into related vulnerabilities or otherwise, may remove duplicate information, may identify or associate certain related vulnerabilities, etc. - In addition, the
remediation server 12 uses asignature module 18 to generate remediation signatures for the vulnerabilities. Typically, a remediation signature is a list of actions taken to address or resolve a vulnerability. In this embodiment, the remediation signatures include the following types of remediation actions: service management, registry management, security permissions management, account management, policy management, audit management, file management, process management, as well as service pack, hot fix and patch installation. These types of remediation actions are generally known in the computer security industry. - A remediation signature may address one or more vulnerabilities. For clarity of explanation, however, it will be assumed that in this embodiment each remediation signature addresses a single vulnerability or type of vulnerability. In an embodiment of this system, the remediation signatures are generated as abstract objects which can be developed and implemented across multiple platforms without the need to change the underlying source code used in the remediation system. This allows for the creation of a remediation signature in the environment of the remediation system which can then be utilized in whatever system or environment the remediation system is operating. The process of constructing a remediation signature may be entirely automatic or it may involve some manual intervention, or a combination of both. In fact, some
intelligence agents 14 may actually provide or suggest remediations along with the vulnerability information provided. Depending on the level of complexity of the vulnerability, a corresponding level of complexity may be required for the remediation signature. For example, some vendors provide “patches” or “fixes” or “updates” that address vulnerabilities in their hardware or software via their vendor website. A signature may therefore include direction to go to a vendor website and retrieve a patch or an update as one of the actions undertaken to remediate a computer’s vulnerabilities. Given the potential complexity of the signatures, they may not always operate successfully as initially constructed. Accordingly, thesignature module 18 orremediation server 12 may have the ability to test and approve the constructed signature in order to ensure that it successfully resolves the intended vulnerability and does not have any unintended deleterious effects. - Once a remediation signature has been constructed, in this embodiment of the
system 10 the remediation signature is assigned or otherwise associated with the corresponding vulnerability in theremediation database 16. Accordingly, theremediation database 16 may include the vulnerability information and the corresponding remediation signatures for the vulnerabilities identified. Alternatively, it is contemplated that the signatures could be stored elsewhere and remotely associated via a pointer or otherwise to their corresponding vulnerabilities. - Remediation signatures and vulnerability information can be posted to the
flash server 20 for dissemination. Typically, only after the remediation signature has been tested and approved is it released or uploaded to theflash server 20 for dissemination to clients seeking resolution of their computer vulnerabilities. A client server 22 can then download the desired information from theflash server 20. In this embodiment, a download is typically initiated by a user, such as an IT or computer security personnel. The client server 22 may connect to theflash server 20 in many ways including the Internet or a direct dial-up connection. In this embodiment of the system, theclient module 23 provides the necessary interface logic to download the information from theflash server 20. Typically, a client server 22 will periodically download information from theflash server 20 to check for updated vulnerability and remediation information. The client server 22 may also accessvendor websites 21, via a global network such as the Internet or otherwise, to obtain additional patches or updates as needed for remediation. In this embodiment of thesystem 10, the client server 22 analyzes and interprets the signatures downloaded from theflash server 20. If a signature specifies a needed update or patch from avendor website 21, the client server 22 will connect to the website and download the needed information making the patch or update available locally for remediation of anyclient computers 26 coupled to the client server 22. - In this embodiment, it is also contemplated that the client server 22 will keep a profile of the
client computers 26 coupled thereto. The profile of theclient computers 26 essentially records or logs the system information relating to theclient computers 26. Primarily, the profile contains information regarding remediation performed on theclient computer 26. It is contemplated, however, that the profile might also contain information regarding the formatting of theclient computer 26, the software applications and versions running on thecomputer 26, etc., which might be helpful in managing security issues on the subject computer. By comparing the computer profiles with the vulnerability and remediation information downloaded from theflash server 20, the client server 22 can track what remediation may be required for eachclient computer 26. In addition, the client server 22 can manage the vulnerability resolution process for eachclient computer 26. For instance, the client server 22, or security or IT personnel via the server, could select which remediation signatures should be deployed to eachclient computer 26, or which vulnerabilities should or should not be addressed. In addition, vulnerability resolution can be managed by scheduling the various resolution events. For instance, when and how often theclient computers 26 are scanned for vulnerabilities can be scheduled, as well as the timing of the deployment of the remediation signatures to address those vulnerabilities. - By managing the vulnerability resolution, the remediation of vulnerabilities can be more reliably and more cost effectively addressed. In particular, the remediation can occur in off hours to minimize impact on the productivity of the
client computers 26. The remediation can be selectively implemented. The remediation can be tracked and logged so that remediations are not accidentally overwritten or undone. And, the remediation can be accomplished automatically from the client server 22 as opposed to having to perform or install the remediation manually on each client computer, a virtually impossible task for some large-scale companies. -
Figure 2 is a block diagram providing another illustration of an embodiment of avulnerability resolution system 30 in accordance with the present invention. More particularly,Figure 2 provides another way to visualize the architecture of a vulnerability system in accordance with the present invention. As shown inFigure 2 , the architecture of this embodiment of thevulnerability system 30 generally comprises anaggregation section 31 and a remediation section 32. Theaggregation section 31 of the architecture is essentially responsible for obtaining and aggregating the computer security vulnerability information while the remediation section 32 is essentially responsible for constructing remediation signatures for the identified vulnerabilities and deploying those remediations to client computers in a managed and automated manner. - As shown in
Figure 2 , theaggregation section 31 of thesystem architecture 30 comprises intelligence agents 34, an import API or interface 36, and anadministrator 38. The import API 36 provides an interface to the intelligence agents 34. As discussed in reference toFigure 1 above, the intelligence agents 34 provide information regarding computer security vulnerabilities. As noted, these intelligence agents 34 may include automated vulnerability assessment tools, security intelligence services, manufacturers of computer hardware or software, etc. Theadministrator 38 obtains this vulnerability information from the intelligence agents 34 via the import API 36. The import API 36 typically includes several interfaces or import wizards as required to allow importation of vulnerability assessment data from the variety of intelligence agents available. Generally, the intelligence agents 34 provide information specifying the necessary interface. Once retrieved, the vulnerability information may be aggregated, sorted, selected or otherwise managed via theadministrator 38. - The remediation section 32 of the
system architecture 30 ultimately uses the vulnerability information retrieved by theaggregation section 31 to remediate vulnerabilities on client computers 40. The client computers 40 are shown coupled to a client server 42. The client server 42 allows for automated and managed deployment of the remediation signatures to the client computers 40. The architecture of the remediation section 32 illustrates that the vulnerability information from theaggregation section 31 is conveyed to the client server 42 and client computers 40 via the remediation bus 44, remediation signature 46, and remediation profile 48. As discussed above, the remediation signature 46 is essentially a group of actions which can be taken to address or resolve a vulnerability. The signature may be provided by the intelligence agents 34 with the vulnerability information or, more typically, it may need to be constructed in response to the vulnerability information received. The construction may include some automated creation and/or some manual creation of the appropriate actions to be taken to address the subject vulnerability. Also as discussed, the remediation profile 48 contemplates a record or log of system information relating to the client computers 40 or client servers 42. For instance, the profile may contain information regarding the formatting of the client computers 40 or server 42, the software applications and versions running on the computers 40 or servers 42, the remediation signatures already implemented on the computers 40 and servers 42, the remediation history of the computers 40, etc. By comparing the computer profiles with the vulnerability and remediation information obtained, what remediation may be required for each computer 40 or server 42 can be tracked.Figure 2 also illustrates that the remediation types or groups 50 in this embodiment include configuration management, backdoor management, service management, account management, and patch management. The available remediation groups are coupled to the remediation bus 44. It is contemplated that other remediation types or groups may be included as well. -
Figure 3 is a flow chart illustrating an overview of an embodiment of a computer vulnerability remediation process in accordance with the present invention. Theremediation process 60 begins with vulnerability assessment inbox 61. Vulnerability assessment comprises using automated assessment tools and audit processes, intelligence agents, to verify the existence of known vulnerabilities on a given computer or computer network. This assessment process may also include device discovery; that is, the mapping of network and subnetwork components to be assessed and identifying the devices that will be targeted for vulnerability assessment. Inbox 62, the vulnerability information is imported or aggregated in the system, typically in a remediation database, and remediation signatures can be constructed to address the identified vulnerabilities. As noted, the remediation signatures are typically associated with the corresponding vulnerabilities in the remediation database. The vulnerability information is then reviewed inbox 63. The review process typically includes analyzing the vulnerability information to prioritize and identify vulnerabilities for remediation, as well as acceptable risks (i.e., where no remediation is required). As indicated inbox 64, the remediation can then be scheduled to occur when, where, and how desired. This allows the remediation to occur in off-peak times to reduce interference with normal computer operations, on only the identified target computers, and in the manner desired. Inbox 65, the remediation signatures are approved for dissemination to the client’s target computers. This contemplates that remediation signatures can be selectively deployed. In addition, signatures designed to address the vulnerabilities identified may be tested and revised before approving the signatures for deployment. Once approved, the remediation signatures and vulnerability information are distributed to the system clients inbox 66 for use on the client’s computers. Then, remediation can occur as scheduled inbox 67. Finally, the remediation undertaken can be reviewed to ensure the remediation was completed successfully via status reports or otherwise. In addition, remediation events may be logged or otherwise recorded to preserve the remediation information. Such information may be included in profiles for the client computers. As noted, such profiles may include information about the target devices such as system configuration, software, and prior remediation actions or a remediation history. Having such information allows for managed remediation of the client computers in the future. Overall then, the embodiment of the remediation process ofFigure 3 presents vulnerability assessment, vulnerability remediation, and vulnerability management as contemplated by the present invention. -
Figure 4 is a flow chart illustrating an embodiment of an aggregation and construction process for computer vulnerability remediation in accordance with the present invention. Essentially, the aggregation andconstruction process 70 can be viewed as a subprocess of the overall remediation process. Theprocess 70 begins inbox 71 with the gathering of vulnerability information from intelligence agents. As previously noted, these intelligence agents include automated vulnerability assessment tools, security intelligence services, manufacturers of computer hardware or software, etc. The vulnerability information retrieved from the intelligence agents is then aggregated in a remediation database as indicated inbox 72. Inbox 73, the vulnerability information is then reviewed and analyzed. This may include sorting the information into related vulnerabilities or otherwise, categorizing or identifying certain related vulnerabilities, prioritizing vulnerabilities, etc. As indicated inbox 74, vulnerabilities are identified for creation of remediation signatures. A remediation signature resolves or addresses a vulnerability or type of vulnerability. A remediation signature is then constructed inbox 75. As noted, a remediation signature is a group of actions which addresses or resolves the subject vulnerability; for instance, modifying registry settings, changing security permissions, installing patches, etc. The creation of a remediation signature may be completely automated or may include some manual input as well. Inbox 76, the remediation signature is tested to see if it effectively resolves or addresses the target vulnerability. If not, the process returns tobox 75 and another remediation signature is constructed, then retested inbox 76. Once an effective signature has been constructed, the process continues tobox 77. Inbox 77, selected signatures may be approved for distribution to clients. Approved signatures are then uploaded to a flash server making them available for download by clients inbox 78. In this way, new and updated remediation signatures which address or resolve identified vulnerabilities are made available for download by clients. - Figures 5A and 5B are a flow chart illustrating an embodiment of a remediation management process for computer vulnerability remediation in accordance with the present invention. Essentially, the aggregation and
construction process 70 can be viewed as a subprocess of the overall remediation process. This embodiment of theremediation management process 80 is typically a software application installed on a client server which is coupled to a plurality of target client computers which may require remediation of security vulnerabilities. Accordingly, theprocess 80 begins inbox 81 by launching the application. Inbox 82, available remediation signatures and vulnerability information are downloaded, typically from a flash server. Inbox 83, vulnerability assessment data is imported. Typically, this vulnerability assessment data comes from scanning tools which have scanned or analyzed the target computers for which remediation is being considered. The vulnerability assessment data includes information regarding the security vulnerabilities found on the target computers or devices. Based on the vulnerabilities identified on the target computers, the vulnerabilities are then mapped to remediation signatures inbox 84. In this embodiment, mapping of the identified vulnerabilities to corresponding remediation signatures occurs by referencing the remediation database information downloaded from the flash server. It is contemplated, however, that this information may have been previously downloaded, remotely accessed, or presently downloaded to make the necessary correlation between vulnerabilities and available signatures. A remediation profile is then generated for each target computer inbox 85. As noted, the profile typically includes information regarding the vulnerabilities identified on the target client computer as well as the corresponding signatures to address those vulnerabilities. Inbox 86, the client user, typically an IT person or other computer security personnel, is given the opportunity to select which vulnerabilities should be remediated. Generally, the selection is made by reviewing the information regarding vulnerabilities, proposed signatures, and profiles. The selection and review may be made for each computer or by vulnerability. For example, a particular computer could be selected not to receive any remediation, perhaps because the computer does not pose a significant security risk, the vulnerabilities on the computer are not significant, the processes running on the computer cannot be interrupted for remediation, etc. Alternatively, a particular vulnerability could be deselected for all target client computers, such that the vulnerability would not be remediated on any of the target computers, perhaps because the vulnerability dose not pose a sufficient security risk, the remediation signature is deemed too risky, etc. Once the user has selectively managed which vulnerabilities will be remediated, the user can then select which computers will be approved to receive remediation inbox 87. Inbox 88, the proposed remediation is analyzed to determine which remediation signatures will be required. Inbox 89, the target client computers that are to receive remediation are notified that a remediation is to occur. In this embodiment, the notification essentially comprises a message passed to a local remediation application installed on each client computer. Included in the remediation notification may be when the remediation is scheduled to occur. For instance, the remediation can be scheduled to occur at the instance of a particular event, such as a user logging off the machine, logging in, or any other action. In addition, the remediation may be scheduled to occur at a particular time. Thus, using the target client computer’s local clock the remediation can be initiated at the scheduled time. Or alternatively, the remediation could occur as soon as the notification is received at the target client computer. Regardless of the triggering event, when the trigger is met the local remediation is launched inbox 90. - The
process 80 continues inFigure 5B . Once the remediation is launched, the remediation profile for the client computer is then downloaded inbox 91. Typically, the profile is downloaded from the client server on which the client remediation management process application is running, i.e., the server that sent the notification of the pending remediation initially. The profile is then interpreted and the remediation signatures and actions specified in the profile are executed as indicated inbox 92. As noted inbox 93, during remediation the status of the remediation may be reported to the client server and monitored. In addition, the remediation steps may be prioritized and analyzed to ensure the most efficient sequence of execution as indicated inbox 94. As noted inbox 95, a reboot may need to be performed for some of the remediation actions to take effect. Completion of the remediation on the target client computer is then logged to the client server inbox 96. Once remediation is completed,box 97 indicates that reports are generated indicative of the effect of the remediation. Whether the remediation was successful or not is determined inbox 98. If the remediation is not deemed successful, either because it did not resolve the identified vulnerabilities as evidenced by an additional security scan of the client computer, or because the remediation actions had unintended deleterious effects, etc., then the remediation can be rolled back or undone and the remediation process can be repeated as indicated inbox 99. If the remediation is deemed successful, i.e., vulnerabilities resolved and no deleterious effects for example, then the process ends inbox 100. In this manner, the new and updated remediation signatures made available to address or resolve identified vulnerabilities can be downloaded and used in an automated and managed remediation deployment to target client computers. - While the present invention has been illustrated and described in terms of particular apparatus and methods of use, it is apparent that equivalent parts may be substituted for those shown and other changes can be made within the scope of the present invention as defined by the appended claims.
- The particular embodiments disclosed herein are illustrative only, as the invention may be modified and practiced in different but equivalent manners apparent to those skilled in the art having the benefit of the teachings herein. Furthermore, no limitations are intended to the details of construction or design herein shown, other than as described in the claims below. It is therefore evident that the particular embodiments disclosed above may be altered or modified and all such variations are considered within the scope and spirit of the invention. Accordingly, the protection sought herein is as set forth in the claims below.
Claims (128)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/335,490 US7000247B2 (en) | 2001-12-31 | 2002-12-31 | Automated computer vulnerability resolution system |
US11/009,782 US7308712B2 (en) | 2001-12-31 | 2004-12-10 | Automated computer vulnerability resolution system |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US34568901P | 2001-12-31 | 2001-12-31 | |
US10/335,490 US7000247B2 (en) | 2001-12-31 | 2002-12-31 | Automated computer vulnerability resolution system |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/009,782 Continuation US7308712B2 (en) | 2001-12-31 | 2004-12-10 | Automated computer vulnerability resolution system |
Publications (3)
Publication Number | Publication Date |
---|---|
US20030126472A1 US20030126472A1 (en) | 2003-07-03 |
US20050229256A2 true US20050229256A2 (en) | 2005-10-13 |
US7000247B2 US7000247B2 (en) | 2006-02-14 |
Family
ID=23356073
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/335,490 Expired - Lifetime US7000247B2 (en) | 2001-12-31 | 2002-12-31 | Automated computer vulnerability resolution system |
US11/009,782 Expired - Fee Related US7308712B2 (en) | 2001-12-31 | 2004-12-10 | Automated computer vulnerability resolution system |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/009,782 Expired - Fee Related US7308712B2 (en) | 2001-12-31 | 2004-12-10 | Automated computer vulnerability resolution system |
Country Status (11)
Country | Link |
---|---|
US (2) | US7000247B2 (en) |
EP (1) | EP1461707A1 (en) |
JP (1) | JP2005532606A (en) |
KR (1) | KR20040069324A (en) |
CN (1) | CN1610887A (en) |
AU (1) | AU2002360844A1 (en) |
BR (1) | BR0215388A (en) |
CA (1) | CA2472268A1 (en) |
MX (1) | MXPA04006473A (en) |
NO (1) | NO20043189L (en) |
WO (1) | WO2003058457A1 (en) |
Cited By (84)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040230835A1 (en) * | 2003-05-17 | 2004-11-18 | Goldfeder Aaron R. | Mechanism for evaluating security risks |
US20060018478A1 (en) * | 2004-07-23 | 2006-01-26 | Diefenderfer Kristopher G | Secure communication protocol |
US20060021051A1 (en) * | 2004-07-23 | 2006-01-26 | D Mello Kurt | Determining technology-appropriate remediation for vulnerability |
US20060053476A1 (en) * | 2004-09-03 | 2006-03-09 | Bezilla Daniel B | Data structure for policy-based remediation selection |
US20060053265A1 (en) * | 2004-09-03 | 2006-03-09 | Durham Roderick H | Centralized data transformation |
US20060053134A1 (en) * | 2004-09-03 | 2006-03-09 | Durham Roderick H | Centralized data transformation |
US20060075140A1 (en) * | 2002-11-27 | 2006-04-06 | Sobel William E | Client compliancy in a NAT environment |
US20060075503A1 (en) * | 2004-09-13 | 2006-04-06 | Achilles Guard, Inc. Dba Critical Watch | Method and system for applying security vulnerability management process to an organization |
US20060080738A1 (en) * | 2004-10-08 | 2006-04-13 | Bezilla Daniel B | Automatic criticality assessment |
US20060101519A1 (en) * | 2004-11-05 | 2006-05-11 | Lasswell Kevin W | Method to provide customized vulnerability information to a plurality of organizations |
US20060130139A1 (en) * | 2002-11-27 | 2006-06-15 | Sobel William E | Client compliancy with self-policing clients |
US20070107043A1 (en) * | 2005-11-09 | 2007-05-10 | Keith Newstadt | Dynamic endpoint compliance policy configuration |
US20080028065A1 (en) * | 2006-07-26 | 2008-01-31 | Nt Objectives, Inc. | Application threat modeling |
US20090328222A1 (en) * | 2008-06-25 | 2009-12-31 | Microsoft Corporation | Mapping between users and machines in an enterprise security assessment sharing system |
US7665119B2 (en) | 2004-09-03 | 2010-02-16 | Secure Elements, Inc. | Policy-based selection of remediation |
US20100199353A1 (en) * | 2004-07-23 | 2010-08-05 | Fortinet, Inc. | Vulnerability-based remediation selection |
US8055682B1 (en) | 2006-06-30 | 2011-11-08 | At&T Intellectual Property Ii, L.P. | Security information repository system and method thereof |
US20120131672A1 (en) * | 2010-11-18 | 2012-05-24 | Comcast Cable Communications, Llc | Secure Notification on Networked Devices |
US8661534B2 (en) | 2007-06-26 | 2014-02-25 | Microsoft Corporation | Security system with compliance checking and remediation |
US8763076B1 (en) | 2006-06-30 | 2014-06-24 | Symantec Corporation | Endpoint management using trust rating data |
US9009827B1 (en) | 2014-02-20 | 2015-04-14 | Palantir Technologies Inc. | Security sharing system |
US9021260B1 (en) | 2014-07-03 | 2015-04-28 | Palantir Technologies Inc. | Malware data item analysis |
US9043894B1 (en) | 2014-11-06 | 2015-05-26 | Palantir Technologies Inc. | Malicious software detection in a computing system |
US9081975B2 (en) | 2012-10-22 | 2015-07-14 | Palantir Technologies, Inc. | Sharing information between nexuses that use different classification schemes for information access control |
US9100428B1 (en) | 2014-01-03 | 2015-08-04 | Palantir Technologies Inc. | System and method for evaluating network threats |
US9135658B2 (en) | 2013-03-15 | 2015-09-15 | Palantir Technologies Inc. | Generating data clusters |
US9338013B2 (en) | 2013-12-30 | 2016-05-10 | Palantir Technologies Inc. | Verifiable redactable audit log |
US9335897B2 (en) | 2013-08-08 | 2016-05-10 | Palantir Technologies Inc. | Long click display of a context menu |
US20160162690A1 (en) | 2014-12-05 | 2016-06-09 | T-Mobile Usa, Inc. | Recombinant threat modeling |
US9367872B1 (en) | 2014-12-22 | 2016-06-14 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures |
US9407652B1 (en) | 2015-06-26 | 2016-08-02 | Palantir Technologies Inc. | Network anomaly detection |
US9419992B2 (en) | 2014-08-13 | 2016-08-16 | Palantir Technologies Inc. | Unwanted tunneling alert system |
US9467455B2 (en) | 2014-12-29 | 2016-10-11 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
US9537880B1 (en) | 2015-08-19 | 2017-01-03 | Palantir Technologies Inc. | Anomalous network monitoring, user behavior detection and database system |
US9648036B2 (en) | 2014-12-29 | 2017-05-09 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
CN107231367A (en) * | 2017-06-21 | 2017-10-03 | 北京奇虎科技有限公司 | Method for automatically notifying, device and the server of signature information |
US9785773B2 (en) | 2014-07-03 | 2017-10-10 | Palantir Technologies Inc. | Malware data item analysis |
US9888039B2 (en) | 2015-12-28 | 2018-02-06 | Palantir Technologies Inc. | Network-based permissioning system |
US9916465B1 (en) | 2015-12-29 | 2018-03-13 | Palantir Technologies Inc. | Systems and methods for automatic and customizable data minimization of electronic data stores |
US20180103044A1 (en) * | 2016-10-10 | 2018-04-12 | Richard E. Malinowski | Anti-malware client |
US9965937B2 (en) | 2013-03-15 | 2018-05-08 | Palantir Technologies Inc. | External malware data item clustering and analysis |
US9998485B2 (en) | 2014-07-03 | 2018-06-12 | Palantir Technologies, Inc. | Network intrusion data item clustering and analysis |
US10044745B1 (en) | 2015-10-12 | 2018-08-07 | Palantir Technologies, Inc. | Systems for computer network security risk assessment including user compromise analysis associated with a network of devices |
US10079832B1 (en) | 2017-10-18 | 2018-09-18 | Palantir Technologies Inc. | Controlling user creation of data resources on a data processing platform |
US10084802B1 (en) | 2016-06-21 | 2018-09-25 | Palantir Technologies Inc. | Supervisory control and data acquisition |
US10102369B2 (en) | 2015-08-19 | 2018-10-16 | Palantir Technologies Inc. | Checkout system executable code monitoring, and user account compromise determination system |
US10162887B2 (en) | 2014-06-30 | 2018-12-25 | Palantir Technologies Inc. | Systems and methods for key phrase characterization of documents |
US10250401B1 (en) | 2017-11-29 | 2019-04-02 | Palantir Technologies Inc. | Systems and methods for providing category-sensitive chat channels |
US10255415B1 (en) | 2018-04-03 | 2019-04-09 | Palantir Technologies Inc. | Controlling access to computer resources |
US10291637B1 (en) | 2016-07-05 | 2019-05-14 | Palantir Technologies Inc. | Network anomaly detection and profiling |
US10311081B2 (en) | 2012-11-05 | 2019-06-04 | Palantir Technologies Inc. | System and method for sharing investigation results |
US10356032B2 (en) | 2013-12-26 | 2019-07-16 | Palantir Technologies Inc. | System and method for detecting confidential information emails |
US10372879B2 (en) | 2014-12-31 | 2019-08-06 | Palantir Technologies Inc. | Medical claims lead summary report generation |
US20190245879A1 (en) * | 2018-02-06 | 2019-08-08 | Bank Of America Corporation | Vulnerability consequence triggering system for application freeze and removal |
US10397229B2 (en) | 2017-10-04 | 2019-08-27 | Palantir Technologies, Inc. | Controlling user creation of data resources on a data processing platform |
US10432469B2 (en) | 2017-06-29 | 2019-10-01 | Palantir Technologies, Inc. | Access controls through node-based effective policy identifiers |
US10484407B2 (en) | 2015-08-06 | 2019-11-19 | Palantir Technologies Inc. | Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications |
US10489391B1 (en) | 2015-08-17 | 2019-11-26 | Palantir Technologies Inc. | Systems and methods for grouping and enriching data items accessed from one or more databases for presentation in a user interface |
US10498711B1 (en) | 2016-05-20 | 2019-12-03 | Palantir Technologies Inc. | Providing a booting key to a remote system |
US10574675B2 (en) | 2014-12-05 | 2020-02-25 | T-Mobile Usa, Inc. | Similarity search for discovering multiple vector attacks |
US10572496B1 (en) | 2014-07-03 | 2020-02-25 | Palantir Technologies Inc. | Distributed workflow system and database with access controls for city resiliency |
US10686796B2 (en) | 2017-12-28 | 2020-06-16 | Palantir Technologies Inc. | Verifying network-based permissioning rights |
US10698927B1 (en) | 2016-08-30 | 2020-06-30 | Palantir Technologies Inc. | Multiple sensor session and log information compression and correlation system |
US10721262B2 (en) | 2016-12-28 | 2020-07-21 | Palantir Technologies Inc. | Resource-centric network cyber attack warning system |
US10728262B1 (en) | 2016-12-21 | 2020-07-28 | Palantir Technologies Inc. | Context-aware network-based malicious activity warning systems |
US10754872B2 (en) | 2016-12-28 | 2020-08-25 | Palantir Technologies Inc. | Automatically executing tasks and configuring access control lists in a data transformation system |
US10761889B1 (en) | 2019-09-18 | 2020-09-01 | Palantir Technologies Inc. | Systems and methods for autoscaling instance groups of computing platforms |
US10812502B2 (en) | 2018-02-06 | 2020-10-20 | Bank Of America Corporation | Network device owner identification and communication triggering system |
US10819731B2 (en) | 2018-02-06 | 2020-10-27 | Bank Of America Corporation | Exception remediation logic rolling platform |
US10868887B2 (en) | 2019-02-08 | 2020-12-15 | Palantir Technologies Inc. | Systems and methods for isolating applications associated with multiple tenants within a computing platform |
US10878051B1 (en) | 2018-03-30 | 2020-12-29 | Palantir Technologies Inc. | Mapping device identifiers |
US10929436B2 (en) | 2014-07-03 | 2021-02-23 | Palantir Technologies Inc. | System and method for news events detection and visualization |
US10949400B2 (en) | 2018-05-09 | 2021-03-16 | Palantir Technologies Inc. | Systems and methods for tamper-resistant activity logging |
US10963465B1 (en) | 2017-08-25 | 2021-03-30 | Palantir Technologies Inc. | Rapid importation of data including temporally tracked object recognition |
US10984427B1 (en) | 2017-09-13 | 2021-04-20 | Palantir Technologies Inc. | Approaches for analyzing entity relationships |
USRE48589E1 (en) | 2010-07-15 | 2021-06-08 | Palantir Technologies Inc. | Sharing and deconflicting data changes in a multimaster database system |
US11093687B2 (en) | 2014-06-30 | 2021-08-17 | Palantir Technologies Inc. | Systems and methods for identifying key phrase clusters within documents |
US11133925B2 (en) | 2017-12-07 | 2021-09-28 | Palantir Technologies Inc. | Selective access to encrypted logs |
US20220012346A1 (en) * | 2013-09-13 | 2022-01-13 | Vmware, Inc. | Risk assessment for managed client devices |
US11244063B2 (en) | 2018-06-11 | 2022-02-08 | Palantir Technologies Inc. | Row-level and column-level policy service |
US11265340B2 (en) | 2018-02-06 | 2022-03-01 | Bank Of America Corporation | Exception remediation acceptable use logic platform |
US20220201027A1 (en) * | 2020-12-18 | 2022-06-23 | The Boeing Company | Systems and methods for context aware cybersecurity |
US11704441B2 (en) | 2019-09-03 | 2023-07-18 | Palantir Technologies Inc. | Charter-based access controls for managing computer resources |
US12141253B2 (en) | 2024-01-18 | 2024-11-12 | Palantir Technologies Inc. | Controlling access to computer resources |
Families Citing this family (236)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US7882555B2 (en) * | 2001-03-16 | 2011-02-01 | Kavado, Inc. | Application layer security method and system |
US7124181B1 (en) | 2001-06-29 | 2006-10-17 | Mcafee, Inc. | System, method and computer program product for improved efficiency in network assessment utilizing variable timeout values |
US6513122B1 (en) | 2001-06-29 | 2003-01-28 | Networks Associates Technology, Inc. | Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities |
US7543056B2 (en) | 2002-01-15 | 2009-06-02 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7664845B2 (en) * | 2002-01-15 | 2010-02-16 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7152105B2 (en) * | 2002-01-15 | 2006-12-19 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7257630B2 (en) * | 2002-01-15 | 2007-08-14 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7243148B2 (en) * | 2002-01-15 | 2007-07-10 | Mcafee, Inc. | System and method for network vulnerability detection and reporting |
US7694128B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for secure communication delivery |
US7870203B2 (en) | 2002-03-08 | 2011-01-11 | Mcafee, Inc. | Methods and systems for exposing messaging reputation to an end user |
US7096498B2 (en) | 2002-03-08 | 2006-08-22 | Cipher Trust, Inc. | Systems and methods for message threat management |
US8132250B2 (en) | 2002-03-08 | 2012-03-06 | Mcafee, Inc. | Message profiling systems and methods |
US6941467B2 (en) * | 2002-03-08 | 2005-09-06 | Ciphertrust, Inc. | Systems and methods for adaptive message interrogation through multiple queues |
US8578480B2 (en) | 2002-03-08 | 2013-11-05 | Mcafee, Inc. | Systems and methods for identifying potentially malicious messages |
US7124438B2 (en) | 2002-03-08 | 2006-10-17 | Ciphertrust, Inc. | Systems and methods for anomaly detection in patterns of monitored communications |
US7693947B2 (en) | 2002-03-08 | 2010-04-06 | Mcafee, Inc. | Systems and methods for graphically displaying messaging traffic |
US20060015942A1 (en) | 2002-03-08 | 2006-01-19 | Ciphertrust, Inc. | Systems and methods for classification of messaging entities |
US7903549B2 (en) | 2002-03-08 | 2011-03-08 | Secure Computing Corporation | Content-based policy compliance systems and methods |
US8561167B2 (en) | 2002-03-08 | 2013-10-15 | Mcafee, Inc. | Web reputation scoring |
US7080141B1 (en) * | 2002-04-12 | 2006-07-18 | Cisco Technology, Inc. | Arrangement for automated fault detection and fault resolution of a network device |
IL149583A0 (en) * | 2002-05-09 | 2003-07-06 | Kavado Israel Ltd | Method for automatic setting and updating of a security policy |
US20040073800A1 (en) * | 2002-05-22 | 2004-04-15 | Paragi Shah | Adaptive intrusion detection system |
US20040064722A1 (en) * | 2002-10-01 | 2004-04-01 | Dinesh Neelay | System and method for propagating patches to address vulnerabilities in computers |
US7188369B2 (en) * | 2002-10-03 | 2007-03-06 | Trend Micro, Inc. | System and method having an antivirus virtual scanning processor with plug-in functionalities |
US9009084B2 (en) | 2002-10-21 | 2015-04-14 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis and network intrusion protection in an industrial environment |
US8909926B2 (en) * | 2002-10-21 | 2014-12-09 | Rockwell Automation Technologies, Inc. | System and methodology providing automation security analysis, validation, and learning in an industrial controller environment |
US20040107345A1 (en) * | 2002-10-21 | 2004-06-03 | Brandt David D. | System and methodology providing automation security protocols and intrusion detection in an industrial controller environment |
US7353539B2 (en) * | 2002-11-04 | 2008-04-01 | Hewlett-Packard Development Company, L.P. | Signal level propagation mechanism for distribution of a payload to vulnerable systems |
EP1574013B1 (en) * | 2002-12-13 | 2009-06-17 | Computer Associates Think, Inc. | Content management system |
US8561175B2 (en) | 2003-02-14 | 2013-10-15 | Preventsys, Inc. | System and method for automated policy audit and remediation management |
US7627891B2 (en) * | 2003-02-14 | 2009-12-01 | Preventsys, Inc. | Network audit and policy assurance system |
FR2852123A1 (en) * | 2003-03-04 | 2004-09-10 | Paul Saravanane Marechal | Information system implementing and updating procedure, involves automatically generating information system from specifications related to one status, and deploying version on channels to set production related to another status |
WO2004086180A2 (en) * | 2003-03-21 | 2004-10-07 | Computer Associates Think, Inc. | Auditing system and method |
US7496662B1 (en) | 2003-05-12 | 2009-02-24 | Sourcefire, Inc. | Systems and methods for determining characteristics of a network and assessing confidence |
US20070256132A2 (en) * | 2003-07-01 | 2007-11-01 | Securityprofiling, Inc. | Vulnerability and remediation database |
US8266699B2 (en) * | 2003-07-01 | 2012-09-11 | SecurityProfiling Inc. | Multiple-path remediation |
US9350752B2 (en) * | 2003-07-01 | 2016-05-24 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US20070113272A2 (en) | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Real-time vulnerability monitoring |
US9118711B2 (en) * | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US20070118756A2 (en) * | 2003-07-01 | 2007-05-24 | Securityprofiling, Inc. | Policy-protection proxy |
US9118710B2 (en) * | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | System, method, and computer program product for reporting an occurrence in different manners |
US8984644B2 (en) | 2003-07-01 | 2015-03-17 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US9100431B2 (en) * | 2003-07-01 | 2015-08-04 | Securityprofiling, Llc | Computer program product and apparatus for multi-path remediation |
US20150033323A1 (en) * | 2003-07-01 | 2015-01-29 | Securityprofiling, Llc | Virtual patching system, method, and computer program product |
US9118708B2 (en) * | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Multi-path remediation |
US9118709B2 (en) * | 2003-07-01 | 2015-08-25 | Securityprofiling, Llc | Anti-vulnerability system, method, and computer program product |
US20070112941A2 (en) * | 2003-07-01 | 2007-05-17 | Securityprofiling, Inc. | Client capture of vulnerability data |
US7424706B2 (en) * | 2003-07-16 | 2008-09-09 | Microsoft Corporation | Automatic detection and patching of vulnerable files |
US7533413B2 (en) * | 2003-12-05 | 2009-05-12 | Microsoft Corporation | Method and system for processing events |
US7430760B2 (en) * | 2003-12-05 | 2008-09-30 | Microsoft Corporation | Security-related programming interface |
US7661123B2 (en) * | 2003-12-05 | 2010-02-09 | Microsoft Corporation | Security policy update supporting at least one security service provider |
US7647631B2 (en) * | 2003-12-10 | 2010-01-12 | Hewlett-Packard Development Company | Automated user interaction in application assessment |
US20050198530A1 (en) * | 2003-12-12 | 2005-09-08 | Chess David M. | Methods and apparatus for adaptive server reprovisioning under security assault |
US20050138431A1 (en) * | 2003-12-23 | 2005-06-23 | Harrison Jay P. | Network protection software and method |
US8024783B2 (en) | 2004-01-22 | 2011-09-20 | Ryan Riley | Modular agent architecture |
US20050166198A1 (en) * | 2004-01-22 | 2005-07-28 | Autonomic Software, Inc., A California Corporation | Distributed policy driven software delivery |
GB2410647A (en) * | 2004-01-31 | 2005-08-03 | Hewlett Packard Development Co | Identifying and Patching Vulnerabilities in a Network |
US8201257B1 (en) | 2004-03-31 | 2012-06-12 | Mcafee, Inc. | System and method of managing network security risks |
US7519954B1 (en) | 2004-04-08 | 2009-04-14 | Mcafee, Inc. | System and method of operating system identification |
US7698275B2 (en) * | 2004-05-21 | 2010-04-13 | Computer Associates Think, Inc. | System and method for providing remediation management |
US8458793B2 (en) * | 2004-07-13 | 2013-06-04 | International Business Machines Corporation | Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems |
KR100956574B1 (en) | 2004-07-13 | 2010-05-07 | 인터내셔널 비지네스 머신즈 코포레이션 | Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems |
EP1630710B1 (en) * | 2004-07-21 | 2019-11-06 | Microsoft Technology Licensing, LLC | Containment of worms |
US7509676B2 (en) * | 2004-07-30 | 2009-03-24 | Electronic Data Systems Corporation | System and method for restricting access to an enterprise network |
US8146072B2 (en) * | 2004-07-30 | 2012-03-27 | Hewlett-Packard Development Company, L.P. | System and method for updating software on a computer |
US7793338B1 (en) | 2004-10-21 | 2010-09-07 | Mcafee, Inc. | System and method of network endpoint security |
JP4688472B2 (en) * | 2004-11-01 | 2011-05-25 | 株式会社エヌ・ティ・ティ・ドコモ | Terminal control apparatus and terminal control method |
US8635690B2 (en) | 2004-11-05 | 2014-01-21 | Mcafee, Inc. | Reputation based message processing |
US7895650B1 (en) * | 2004-12-15 | 2011-02-22 | Symantec Corporation | File system based risk profile transfer |
US20060185018A1 (en) * | 2005-02-17 | 2006-08-17 | Microsoft Corporation | Systems and methods for shielding an identified vulnerability |
US7278163B2 (en) * | 2005-02-22 | 2007-10-02 | Mcafee, Inc. | Security risk analysis system and method |
US8561190B2 (en) * | 2005-05-16 | 2013-10-15 | Microsoft Corporation | System and method of opportunistically protecting a computer from malware |
US7788723B2 (en) * | 2005-05-17 | 2010-08-31 | Computer Associates Think, Inc. | Method and apparatus for identifying computer vulnerabilities using exploit probes and remote scanning |
US7743421B2 (en) | 2005-05-18 | 2010-06-22 | Alcatel Lucent | Communication network security risk exposure management systems and methods |
US7937480B2 (en) | 2005-06-02 | 2011-05-03 | Mcafee, Inc. | Aggregation of reputation data |
US8095984B2 (en) | 2005-09-22 | 2012-01-10 | Alcatel Lucent | Systems and methods of associating security vulnerabilities and assets |
US8544098B2 (en) * | 2005-09-22 | 2013-09-24 | Alcatel Lucent | Security vulnerability information aggregation |
US8438643B2 (en) * | 2005-09-22 | 2013-05-07 | Alcatel Lucent | Information system service-level security risk analysis |
US20070067845A1 (en) * | 2005-09-22 | 2007-03-22 | Alcatel | Application of cut-sets to network interdependency security risk assessment |
US7733803B2 (en) * | 2005-11-14 | 2010-06-08 | Sourcefire, Inc. | Systems and methods for modifying network map attributes |
US8046833B2 (en) * | 2005-11-14 | 2011-10-25 | Sourcefire, Inc. | Intrusion event correlation with network discovery information |
EP2008188B1 (en) | 2006-03-24 | 2017-05-31 | AVG Netherlands B.V. | Software vulnerability exploitation shield |
US7680880B2 (en) * | 2006-04-25 | 2010-03-16 | Mcafee, Inc. | System and method for protecting a computer network |
US8266701B2 (en) * | 2006-07-12 | 2012-09-11 | Verizon Services Corp. | Systems and methods for measuring cyber based risks in an enterprise organization |
US20080077976A1 (en) * | 2006-09-27 | 2008-03-27 | Rockwell Automation Technologies, Inc. | Cryptographic authentication protocol |
KR100817799B1 (en) * | 2006-10-13 | 2008-03-31 | 한국정보보호진흥원 | System and method for network vulnerability analysis using the multiple heterogeneous scanners |
GB2443459A (en) * | 2006-10-31 | 2008-05-07 | Hewlett Packard Development Co | Data packet incuding computing platform indication |
US8505092B2 (en) | 2007-01-05 | 2013-08-06 | Trend Micro Incorporated | Dynamic provisioning of protection software in a host intrusion prevention system |
US7930747B2 (en) * | 2007-01-08 | 2011-04-19 | Trend Micro Incorporated | Host intrusion prevention server |
US7779156B2 (en) | 2007-01-24 | 2010-08-17 | Mcafee, Inc. | Reputation based load balancing |
US7949716B2 (en) | 2007-01-24 | 2011-05-24 | Mcafee, Inc. | Correlation and analysis of entity attributes |
US8179798B2 (en) | 2007-01-24 | 2012-05-15 | Mcafee, Inc. | Reputation based connection throttling |
US8763114B2 (en) | 2007-01-24 | 2014-06-24 | Mcafee, Inc. | Detecting image spam |
US8214497B2 (en) | 2007-01-24 | 2012-07-03 | Mcafee, Inc. | Multi-dimensional reputation scoring |
US8069352B2 (en) * | 2007-02-28 | 2011-11-29 | Sourcefire, Inc. | Device, system and method for timestamp analysis of segments in a transmission control protocol (TCP) session |
US20080244519A1 (en) * | 2007-03-30 | 2008-10-02 | Microsoft Corporation | Identifying, Correcting and Displaying Application Website and Device Compatibility Issues |
US8533841B2 (en) * | 2007-04-02 | 2013-09-10 | Microsoft Corporation | Deriving remediations from security compliance rules |
US8862752B2 (en) | 2007-04-11 | 2014-10-14 | Mcafee, Inc. | System, method, and computer program product for conditionally preventing the transfer of data based on a location thereof |
US7770203B2 (en) * | 2007-04-17 | 2010-08-03 | International Business Machines Corporation | Method of integrating a security operations policy into a threat management vector |
US8127353B2 (en) * | 2007-04-30 | 2012-02-28 | Sourcefire, Inc. | Real-time user awareness for a computer network |
US8850587B2 (en) * | 2007-05-04 | 2014-09-30 | Wipro Limited | Network security scanner for enterprise protection |
US8793802B2 (en) | 2007-05-22 | 2014-07-29 | Mcafee, Inc. | System, method, and computer program product for preventing data leakage utilizing a map of data |
US9118706B2 (en) * | 2007-06-29 | 2015-08-25 | Verizon Patent And Licensing Inc. | Using imported data from security tools |
US20090038014A1 (en) * | 2007-07-31 | 2009-02-05 | Paul Force | System and method for tracking remediation of security vulnerabilities |
US9064024B2 (en) | 2007-08-21 | 2015-06-23 | Google Inc. | Bundle generation |
US8181173B2 (en) * | 2007-10-12 | 2012-05-15 | International Business Machines Corporation | Determining priority for installing a patch into multiple patch recipients of a network |
US7996896B2 (en) | 2007-10-19 | 2011-08-09 | Trend Micro Incorporated | System for regulating host security configuration |
US8185930B2 (en) | 2007-11-06 | 2012-05-22 | Mcafee, Inc. | Adjusting filter or classification control settings |
US8045458B2 (en) | 2007-11-08 | 2011-10-25 | Mcafee, Inc. | Prioritizing network traffic |
US20090144828A1 (en) * | 2007-12-04 | 2009-06-04 | Microsoft Corporation | Rapid signatures for protecting vulnerable browser configurations |
US8160975B2 (en) | 2008-01-25 | 2012-04-17 | Mcafee, Inc. | Granular support vector machine with random granularity |
US9824372B1 (en) | 2008-02-11 | 2017-11-21 | Google Llc | Associating advertisements with videos |
US8850568B2 (en) * | 2008-03-07 | 2014-09-30 | Qualcomm Incorporated | Method and apparatus for detecting unauthorized access to a computing device and securely communicating information about such unauthorized access |
US8839460B2 (en) * | 2008-03-07 | 2014-09-16 | Qualcomm Incorporated | Method for securely communicating information about the location of a compromised computing device |
US8589503B2 (en) | 2008-04-04 | 2013-11-19 | Mcafee, Inc. | Prioritizing network traffic |
WO2009151502A2 (en) * | 2008-04-08 | 2009-12-17 | Allgress, Inc. | Enterprise information security management software used to prove return on investment of security projects and activities using interactive graphs |
US8474043B2 (en) * | 2008-04-17 | 2013-06-25 | Sourcefire, Inc. | Speed and memory optimization of intrusion detection system (IDS) and intrusion prevention system (IPS) rule processing |
US8286255B2 (en) * | 2008-08-07 | 2012-10-09 | Sophos Plc | Computer file control through file tagging |
US8272055B2 (en) * | 2008-10-08 | 2012-09-18 | Sourcefire, Inc. | Target-based SMB and DCE/RPC processing for an intrusion detection system or intrusion prevention system |
US8060936B2 (en) | 2008-10-21 | 2011-11-15 | Lookout, Inc. | Security status and information display system |
US8347386B2 (en) | 2008-10-21 | 2013-01-01 | Lookout, Inc. | System and method for server-coupled malware prevention |
US8533844B2 (en) | 2008-10-21 | 2013-09-10 | Lookout, Inc. | System and method for security data collection and analysis |
US9781148B2 (en) | 2008-10-21 | 2017-10-03 | Lookout, Inc. | Methods and systems for sharing risk responses between collections of mobile communications devices |
US9043919B2 (en) | 2008-10-21 | 2015-05-26 | Lookout, Inc. | Crawling multiple markets and correlating |
US8051480B2 (en) | 2008-10-21 | 2011-11-01 | Lookout, Inc. | System and method for monitoring and analyzing multiple interfaces and multiple protocols |
US8984628B2 (en) | 2008-10-21 | 2015-03-17 | Lookout, Inc. | System and method for adverse mobile application identification |
US9235704B2 (en) | 2008-10-21 | 2016-01-12 | Lookout, Inc. | System and method for a scanning API |
US9367680B2 (en) | 2008-10-21 | 2016-06-14 | Lookout, Inc. | System and method for mobile communication device application advisement |
US8108933B2 (en) | 2008-10-21 | 2012-01-31 | Lookout, Inc. | System and method for attack and malware prevention |
US8087067B2 (en) | 2008-10-21 | 2011-12-27 | Lookout, Inc. | Secure mobile platform system |
US8707439B2 (en) * | 2008-12-19 | 2014-04-22 | Microsoft Corporation | Selecting security offerings |
US8448245B2 (en) * | 2009-01-17 | 2013-05-21 | Stopthehacker.com, Jaal LLC | Automated identification of phishing, phony and malicious web sites |
US8467768B2 (en) | 2009-02-17 | 2013-06-18 | Lookout, Inc. | System and method for remotely securing or recovering a mobile device |
US8855601B2 (en) | 2009-02-17 | 2014-10-07 | Lookout, Inc. | System and method for remotely-initiated audio communication |
US9042876B2 (en) | 2009-02-17 | 2015-05-26 | Lookout, Inc. | System and method for uploading location information based on device movement |
US8538815B2 (en) | 2009-02-17 | 2013-09-17 | Lookout, Inc. | System and method for mobile device replacement |
US9955352B2 (en) | 2009-02-17 | 2018-04-24 | Lookout, Inc. | Methods and systems for addressing mobile communications devices that are lost or stolen but not yet reported as such |
JP5559306B2 (en) | 2009-04-24 | 2014-07-23 | アルグレス・インコーポレイテッド | Enterprise information security management software for predictive modeling using interactive graphs |
US8397301B2 (en) | 2009-11-18 | 2013-03-12 | Lookout, Inc. | System and method for identifying and assessing vulnerabilities on a mobile communication device |
US9152708B1 (en) | 2009-12-14 | 2015-10-06 | Google Inc. | Target-video specific co-watched video clusters |
CN101964780B (en) * | 2010-01-28 | 2012-11-28 | 北京邮电大学 | Method and system for analyzing vulnerability of IP multimedia subsystem network |
US9532222B2 (en) | 2010-03-03 | 2016-12-27 | Duo Security, Inc. | System and method of notifying mobile devices to complete transactions after additional agent verification |
US9544143B2 (en) | 2010-03-03 | 2017-01-10 | Duo Security, Inc. | System and method of notifying mobile devices to complete transactions |
US9544328B1 (en) * | 2010-03-31 | 2017-01-10 | Trend Micro Incorporated | Methods and apparatus for providing mitigations to particular computers |
JP5809238B2 (en) | 2010-04-16 | 2015-11-10 | シスコ テクノロジー,インコーポレイテッド | System and method for near real-time network attack detection, and system and method for integrated detection by detection routing |
US8621638B2 (en) | 2010-05-14 | 2013-12-31 | Mcafee, Inc. | Systems and methods for classification of messaging entities |
US8433790B2 (en) | 2010-06-11 | 2013-04-30 | Sourcefire, Inc. | System and method for assigning network blocks to sensors |
US8671182B2 (en) | 2010-06-22 | 2014-03-11 | Sourcefire, Inc. | System and method for resolving operating system or service identity conflicts |
US8646086B2 (en) | 2010-11-22 | 2014-02-04 | International Business Machines Corporation | Image vulnerability repair in a networked computing environment |
US8510820B2 (en) | 2010-12-02 | 2013-08-13 | Duo Security, Inc. | System and method for embedded authentication |
US9282085B2 (en) | 2010-12-20 | 2016-03-08 | Duo Security, Inc. | System and method for digital user authentication |
US8601034B2 (en) | 2011-03-11 | 2013-12-03 | Sourcefire, Inc. | System and method for real time data awareness |
BR112013030660A2 (en) * | 2011-05-31 | 2016-12-06 | Hewlett Packard Development Co | system, method and non-transient media read by computer |
US9501650B2 (en) | 2011-05-31 | 2016-11-22 | Hewlett Packard Enterprise Development Lp | Application security testing |
US8738765B2 (en) | 2011-06-14 | 2014-05-27 | Lookout, Inc. | Mobile device DNS optimization |
US8788881B2 (en) | 2011-08-17 | 2014-07-22 | Lookout, Inc. | System and method for mobile device push communications |
US8892885B2 (en) | 2011-08-31 | 2014-11-18 | Duo Security, Inc. | System and method for delivering a challenge response in an authentication protocol |
US9467463B2 (en) | 2011-09-02 | 2016-10-11 | Duo Security, Inc. | System and method for assessing vulnerability of a mobile device |
US8763077B2 (en) | 2011-10-07 | 2014-06-24 | Duo Security, Inc. | System and method for enforcing a policy for an authenticator device |
US9027141B2 (en) * | 2012-04-12 | 2015-05-05 | Netflix, Inc. | Method and system for improving security and reliability in a networked application environment |
US9407443B2 (en) | 2012-06-05 | 2016-08-02 | Lookout, Inc. | Component analysis of software applications on computing devices |
US9589129B2 (en) | 2012-06-05 | 2017-03-07 | Lookout, Inc. | Determining source of side-loaded software |
US8655307B1 (en) | 2012-10-26 | 2014-02-18 | Lookout, Inc. | System and method for developing, updating, and using user device behavioral context models to modify user, device, and application state, settings and behavior for enhanced user security |
US20140137190A1 (en) * | 2012-11-09 | 2014-05-15 | Rapid7, Inc. | Methods and systems for passively detecting security levels in client devices |
US9208215B2 (en) | 2012-12-27 | 2015-12-08 | Lookout, Inc. | User classification based on data gathered from a computing device |
US9374369B2 (en) | 2012-12-28 | 2016-06-21 | Lookout, Inc. | Multi-factor authentication and comprehensive login system for client-server networks |
US8855599B2 (en) | 2012-12-31 | 2014-10-07 | Lookout, Inc. | Method and apparatus for auxiliary communications with mobile communications device |
US9424409B2 (en) | 2013-01-10 | 2016-08-23 | Lookout, Inc. | Method and system for protecting privacy and enhancing security on an electronic device |
US9607156B2 (en) * | 2013-02-22 | 2017-03-28 | Duo Security, Inc. | System and method for patching a device through exploitation |
US9443073B2 (en) | 2013-08-08 | 2016-09-13 | Duo Security, Inc. | System and method for verifying status of an authentication device |
US8893230B2 (en) | 2013-02-22 | 2014-11-18 | Duo Security, Inc. | System and method for proxying federated authentication protocols |
US9338156B2 (en) | 2013-02-22 | 2016-05-10 | Duo Security, Inc. | System and method for integrating two-factor authentication in a device |
US9953169B2 (en) | 2013-02-28 | 2018-04-24 | Entit Software Llc | Modify execution of application under test so user is power user |
US9405915B2 (en) * | 2013-03-14 | 2016-08-02 | Whitehat Security, Inc. | Techniques for correlating vulnerabilities across an evolving codebase |
WO2014182738A1 (en) | 2013-05-06 | 2014-11-13 | Staples, Inc. | It vulnerability management system |
US9053310B2 (en) | 2013-08-08 | 2015-06-09 | Duo Security, Inc. | System and method for verifying status of an authentication device through a biometric profile |
US9092302B2 (en) | 2013-09-10 | 2015-07-28 | Duo Security, Inc. | System and method for determining component version compatibility across a device ecosystem |
US9608814B2 (en) | 2013-09-10 | 2017-03-28 | Duo Security, Inc. | System and method for centralized key distribution |
US9642008B2 (en) | 2013-10-25 | 2017-05-02 | Lookout, Inc. | System and method for creating and assigning a policy for a mobile communications device based on personal data |
US9774448B2 (en) | 2013-10-30 | 2017-09-26 | Duo Security, Inc. | System and methods for opportunistic cryptographic key management on an electronic device |
US10223530B2 (en) * | 2013-11-13 | 2019-03-05 | Proofpoint, Inc. | System and method of protecting client computers |
US9753796B2 (en) | 2013-12-06 | 2017-09-05 | Lookout, Inc. | Distributed monitoring, evaluation, and response for multiple devices |
US10122747B2 (en) | 2013-12-06 | 2018-11-06 | Lookout, Inc. | Response generation after distributed monitoring and evaluation of multiple devices |
US8966639B1 (en) | 2014-02-14 | 2015-02-24 | Risk I/O, Inc. | Internet breach correlation |
US8984643B1 (en) * | 2014-02-14 | 2015-03-17 | Risk I/O, Inc. | Ordered computer vulnerability remediation reporting |
US9762590B2 (en) | 2014-04-17 | 2017-09-12 | Duo Security, Inc. | System and method for an integrity focused authentication service |
US9503467B2 (en) | 2014-05-22 | 2016-11-22 | Accenture Global Services Limited | Network anomaly detection |
KR20160002058A (en) * | 2014-06-30 | 2016-01-07 | 한국전자통신연구원 | Modbus Communication Pattern Learning Based Abnormal Traffic Detection Apparatus and Method |
US9979719B2 (en) | 2015-01-06 | 2018-05-22 | Duo Security, Inc. | System and method for converting one-time passcodes to app-based authentication |
US9594913B2 (en) * | 2015-01-28 | 2017-03-14 | Wal-Mart Stores, Inc. | System, method, and non-transitory computer-readable storage media for analyzing software application modules and provide actionable intelligence on remediation efforts |
US20160234243A1 (en) * | 2015-02-06 | 2016-08-11 | Honeywell International Inc. | Technique for using infrastructure monitoring software to collect cyber-security risk data |
US10075475B2 (en) | 2015-02-06 | 2018-09-11 | Honeywell International Inc. | Apparatus and method for dynamic customization of cyber-security risk item rules |
US10075474B2 (en) | 2015-02-06 | 2018-09-11 | Honeywell International Inc. | Notification subsystem for generating consolidated, filtered, and relevant security risk-based notifications |
US10021119B2 (en) | 2015-02-06 | 2018-07-10 | Honeywell International Inc. | Apparatus and method for automatic handling of cyber-security risk events |
US10021125B2 (en) | 2015-02-06 | 2018-07-10 | Honeywell International Inc. | Infrastructure monitoring tool for collecting industrial process control and automation system risk data |
US10298608B2 (en) | 2015-02-11 | 2019-05-21 | Honeywell International Inc. | Apparatus and method for tying cyber-security risk analysis to common risk methodologies and risk levels |
CN104614624A (en) * | 2015-02-13 | 2015-05-13 | 东南大学 | Power system vulnerability detecting method based on power communication interaction |
US9641341B2 (en) | 2015-03-31 | 2017-05-02 | Duo Security, Inc. | Method for distributed trust authentication |
US10091222B1 (en) * | 2015-03-31 | 2018-10-02 | Juniper Networks, Inc. | Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs |
CA2982463C (en) | 2015-05-01 | 2019-03-05 | Lookout, Inc. | Determining source of side-loaded software |
US10089095B2 (en) | 2015-05-06 | 2018-10-02 | Mcafee, Llc | Alerting the presence of bundled software during an installation |
US9800604B2 (en) | 2015-05-06 | 2017-10-24 | Honeywell International Inc. | Apparatus and method for assigning cyber-security risk consequences in industrial process control environments |
EP3304336B1 (en) | 2015-06-01 | 2019-10-09 | Duo Security, Inc. | Method for enforcing endpoint health standards |
US9774579B2 (en) | 2015-07-27 | 2017-09-26 | Duo Security, Inc. | Method for key rotation |
US9979743B2 (en) | 2015-08-13 | 2018-05-22 | Accenture Global Services Limited | Computer asset vulnerabilities |
US9886582B2 (en) | 2015-08-31 | 2018-02-06 | Accenture Global Sevices Limited | Contextualization of threat data |
US10691808B2 (en) * | 2015-12-10 | 2020-06-23 | Sap Se | Vulnerability analysis of software components |
US9860267B2 (en) * | 2016-03-18 | 2018-01-02 | AO Kaspersky Lab | Method and system of eliminating vulnerabilities of smart devices |
US10484416B2 (en) | 2016-03-18 | 2019-11-19 | AO Kaspersky Lab | System and method for repairing vulnerabilities of objects connected to a data network |
US10084812B2 (en) | 2016-03-18 | 2018-09-25 | AO Kaspersky Lab | Method and system of repairing vulnerabilities of smart devices |
RU2636700C1 (en) * | 2016-03-18 | 2017-11-27 | Акционерное общество "Лаборатория Касперского" | Method for eliminating vulnerabilities of devices having access to internet |
US20180270265A1 (en) * | 2016-05-13 | 2018-09-20 | Ola Sage | System and Method For Assessing Network Security Risks |
US10498605B2 (en) * | 2016-06-02 | 2019-12-03 | Zscaler, Inc. | Cloud based systems and methods for determining and visualizing security risks of companies, users, and groups |
GB201617620D0 (en) * | 2016-10-18 | 2016-11-30 | Cybernetica As | Composite digital signatures |
JPWO2018179628A1 (en) | 2017-03-28 | 2020-01-16 | 日本電気株式会社 | Signature generation apparatus, signature generation method, and non-transitory computer-readable medium storing program |
US10218697B2 (en) | 2017-06-09 | 2019-02-26 | Lookout, Inc. | Use of device risk evaluation to manage access to services |
US10540496B2 (en) * | 2017-09-29 | 2020-01-21 | International Business Machines Corporation | Dynamic re-composition of patch groups using stream clustering |
US20190124106A1 (en) * | 2017-10-19 | 2019-04-25 | T-Mobile Usa, Inc. | Efficient security threat remediation |
US10412113B2 (en) | 2017-12-08 | 2019-09-10 | Duo Security, Inc. | Systems and methods for intelligently configuring computer security |
US10862915B2 (en) | 2018-02-06 | 2020-12-08 | Bank Of America Corporation | Exception remediation logic routing and suppression platform |
US10749889B2 (en) * | 2018-05-07 | 2020-08-18 | Servicenow, Inc. | Rule-based remediation of vulnerabilities in a managed network |
US11030322B2 (en) | 2018-10-24 | 2021-06-08 | International Business Machines Corporation | Recommending the most relevant and urgent vulnerabilities within a security management system |
US11374958B2 (en) * | 2018-10-31 | 2022-06-28 | International Business Machines Corporation | Security protection rule prediction and enforcement |
US11277429B2 (en) | 2018-11-20 | 2022-03-15 | Saudi Arabian Oil Company | Cybersecurity vulnerability classification and remediation based on network utilization |
US11658962B2 (en) | 2018-12-07 | 2023-05-23 | Cisco Technology, Inc. | Systems and methods of push-based verification of a transaction |
US11290491B2 (en) * | 2019-03-14 | 2022-03-29 | Oracle International Corporation | Methods, systems, and computer readable media for utilizing a security service engine to assess security vulnerabilities on a security gateway element |
US11290495B2 (en) * | 2019-06-20 | 2022-03-29 | Servicenow, Inc. | Solution management systems and methods for addressing cybersecurity vulnerabilities |
SG11202001961VA (en) * | 2019-06-27 | 2020-04-29 | Alibaba Group Holding Ltd | Managing cybersecurity vulnerabilities using blockchain networks |
US11218503B2 (en) | 2019-07-19 | 2022-01-04 | Jpmorgan Chase Bank, N.A. | System and method for implementing a vulnerability management module |
CN113672929A (en) * | 2020-05-14 | 2021-11-19 | 阿波罗智联(北京)科技有限公司 | Vulnerability characteristic obtaining method and device and electronic equipment |
US11363041B2 (en) | 2020-05-15 | 2022-06-14 | International Business Machines Corporation | Protecting computer assets from malicious attacks |
US11176024B1 (en) | 2020-09-23 | 2021-11-16 | International Business Machines Corporation | Software patch application and testing optimization |
US11695796B1 (en) * | 2020-12-10 | 2023-07-04 | Amazon Technologies, Inc. | Device vulnerability detection during device handshake |
US20220222350A1 (en) * | 2021-01-08 | 2022-07-14 | Capital One Services, Llc | Vulnerability dashboard and automated remediation |
CN115174379A (en) * | 2022-07-27 | 2022-10-11 | 西安热工研究院有限公司 | Vulnerability repair method and device of industrial control network and storage medium |
Citations (54)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4954941A (en) * | 1988-08-31 | 1990-09-04 | Bell Communications Research, Inc. | Method and apparatus for program updating |
US4999806A (en) * | 1987-09-04 | 1991-03-12 | Fred Chernow | Software distribution system |
US5581764A (en) * | 1993-04-30 | 1996-12-03 | Novadigm, Inc. | Distributed computer network including hierarchical resource information structure and related method of distributing resources |
US5649187A (en) * | 1989-04-28 | 1997-07-15 | Softel, Inc. | Method and apparatus for remotely controlling and monitoring the use of computer software |
US5699275A (en) * | 1995-04-12 | 1997-12-16 | Highwaymaster Communications, Inc. | System and method for remote patching of operating code located in a mobile unit |
US5742829A (en) * | 1995-03-10 | 1998-04-21 | Microsoft Corporation | Automatic software installation on heterogeneous networked client computer systems |
US5764913A (en) * | 1996-04-05 | 1998-06-09 | Microsoft Corporation | Computer network status monitoring system |
US5771347A (en) * | 1994-05-20 | 1998-06-23 | International Business Machines Corp. | Apparatus and method to allow a user a trial period before licensing a software program product |
US5799002A (en) * | 1996-07-02 | 1998-08-25 | Microsoft Corporation | Adaptive bandwidth throttling for network services |
US5805897A (en) * | 1992-07-31 | 1998-09-08 | International Business Machines Corporation | System and method for remote software configuration and distribution |
US5809329A (en) * | 1994-05-27 | 1998-09-15 | Microsoft Corporation | System for managing the configuration of a computer system |
US5852812A (en) * | 1995-08-23 | 1998-12-22 | Microsoft Corporation | Billing system for a network |
US5854794A (en) * | 1996-12-16 | 1998-12-29 | Ag Communication Systems Corporation | Digital transmission framing system |
US5860012A (en) * | 1993-09-30 | 1999-01-12 | Intel Corporation | Installation of application software through a network from a source computer system on to a target computer system |
US5919247A (en) * | 1996-07-24 | 1999-07-06 | Marimba, Inc. | Method for the distribution of code and data updates |
US5933646A (en) * | 1996-05-10 | 1999-08-03 | Apple Computer, Inc. | Software manager for administration of a computer operating system |
US5933826A (en) * | 1997-03-21 | 1999-08-03 | Novell, Inc. | Method and apparatus for securing and storing executable content |
US5974454A (en) * | 1997-11-14 | 1999-10-26 | Microsoft Corporation | Method and system for installing and updating program module components |
US5991802A (en) * | 1996-11-27 | 1999-11-23 | Microsoft Corporation | Method and system for invoking methods of objects over the internet |
US6016499A (en) * | 1997-07-21 | 2000-01-18 | Novell, Inc. | System and method for accessing a directory services respository |
US6029247A (en) * | 1996-12-09 | 2000-02-22 | Novell, Inc. | Method and apparatus for transmitting secured data |
US6052710A (en) * | 1996-06-28 | 2000-04-18 | Microsoft Corporation | System and method for making function calls over a distributed network |
US6061740A (en) * | 1996-12-09 | 2000-05-09 | Novell, Inc. | Method and apparatus for heterogeneous network management |
US6073214A (en) * | 1995-11-27 | 2000-06-06 | Microsoft Corporation | Method and system for identifying and obtaining computer software from a remote computer |
US6078945A (en) * | 1995-06-21 | 2000-06-20 | Tao Group Limited | Operating system for use with computer networks incorporating two or more data processors linked together for parallel processing and incorporating improved dynamic load-sharing techniques |
US6094679A (en) * | 1998-01-16 | 2000-07-25 | Microsoft Corporation | Distribution of software in a computer network environment |
US6108649A (en) * | 1998-03-03 | 2000-08-22 | Novell, Inc. | Method and system for supplanting a first name base with a second name base |
US6138157A (en) * | 1998-10-12 | 2000-10-24 | Freshwater Software, Inc. | Method and apparatus for testing web sites |
US6151708A (en) * | 1997-12-19 | 2000-11-21 | Microsoft Corporation | Determining program update availability via set intersection over a sub-optical pathway |
US6151643A (en) * | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
US6157618A (en) * | 1999-01-26 | 2000-12-05 | Microsoft Corporation | Distributed internet user experience monitoring system |
US6202207B1 (en) * | 1998-01-28 | 2001-03-13 | International Business Machines Corporation | Method and a mechanism for synchronized updating of interoperating software |
US6219675B1 (en) * | 1997-06-05 | 2001-04-17 | Microsoft Corporation | Distribution of a centralized database |
US6243766B1 (en) * | 1998-06-08 | 2001-06-05 | Microsoft Corporation | Method and system for updating software with smaller patch files |
US6256668B1 (en) * | 1996-04-18 | 2001-07-03 | Microsoft Corporation | Method for identifying and obtaining computer software from a network computer using a tag |
US6263362B1 (en) * | 1998-09-01 | 2001-07-17 | Bigfix, Inc. | Inspector for computed relevance messaging |
US6269456B1 (en) * | 1997-12-31 | 2001-07-31 | Network Associates, Inc. | Method and system for providing automated updating and upgrading of antivirus applications using a computer network |
US6272677B1 (en) * | 1998-08-28 | 2001-08-07 | International Business Machines Corporation | Method and system for automatic detection and distribution of code version updates |
US6279113B1 (en) * | 1998-03-16 | 2001-08-21 | Internet Tools, Inc. | Dynamic signature inspection-based network intrusion detection |
US6279156B1 (en) * | 1999-01-26 | 2001-08-21 | Dell Usa, L.P. | Method of installing software on and/or testing a computer system |
US6282709B1 (en) * | 1997-11-12 | 2001-08-28 | Philips Electronics North America Corporation | Software update manager |
US6282712B1 (en) * | 1995-03-10 | 2001-08-28 | Microsoft Corporation | Automatic software installation on heterogeneous networked computer systems |
US6281790B1 (en) * | 1999-09-01 | 2001-08-28 | Net Talon Security Systems, Inc. | Method and apparatus for remotely monitoring a site |
US6282175B1 (en) * | 1998-04-23 | 2001-08-28 | Hewlett-Packard Company | Method for tracking configuration changes in networks of computer systems through historical monitoring of configuration status of devices on the network. |
US6298445B1 (en) * | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US6307841B1 (en) * | 1995-08-16 | 2001-10-23 | Telstra Corporation Limited | Network analysis system |
US20020026591A1 (en) * | 1998-06-15 | 2002-02-28 | Hartley Bruce V. | Method and apparatus for assessing the security of a computer system |
US20020087882A1 (en) * | 2000-03-16 | 2002-07-04 | Bruce Schneier | Mehtod and system for dynamic network intrusion monitoring detection and response |
US20020100036A1 (en) * | 2000-09-22 | 2002-07-25 | Patchlink.Com Corporation | Non-invasive automatic offsite patch fingerprinting and updating system and method |
US20030135749A1 (en) * | 2001-10-31 | 2003-07-17 | Gales George S. | System and method of defining the security vulnerabilities of a computer system |
US20040003266A1 (en) * | 2000-09-22 | 2004-01-01 | Patchlink Corporation | Non-invasive automatic offsite patch fingerprinting and updating system and method |
US6721713B1 (en) * | 1999-05-27 | 2004-04-13 | Andersen Consulting Llp | Business alliance identification in a web architecture framework |
US6766458B1 (en) * | 2000-10-03 | 2004-07-20 | Networks Associates Technology, Inc. | Testing a computer system |
US6859793B1 (en) * | 2002-12-19 | 2005-02-22 | Networks Associates Technology, Inc. | Software license reporting and control system and method |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH09214493A (en) * | 1996-02-08 | 1997-08-15 | Hitachi Ltd | Network system |
US5960170A (en) * | 1997-03-18 | 1999-09-28 | Trend Micro, Inc. | Event triggered iterative virus detection |
JPH11194929A (en) * | 1997-12-26 | 1999-07-21 | Nec Corp | Client-side program management method in client-server system |
US6324656B1 (en) * | 1998-06-30 | 2001-11-27 | Cisco Technology, Inc. | System and method for rules-driven multi-phase network vulnerability assessment |
US6347375B1 (en) * | 1998-07-08 | 2002-02-12 | Ontrack Data International, Inc | Apparatus and method for remote virus diagnosis and repair |
US6751661B1 (en) * | 2000-06-22 | 2004-06-15 | Applied Systems Intelligence, Inc. | Method and system for providing intelligent network management |
-
2002
- 2002-12-31 CN CNA028265742A patent/CN1610887A/en active Pending
- 2002-12-31 WO PCT/US2002/041819 patent/WO2003058457A1/en not_active Application Discontinuation
- 2002-12-31 JP JP2003558701A patent/JP2005532606A/en active Pending
- 2002-12-31 KR KR10-2004-7008944A patent/KR20040069324A/en not_active Application Discontinuation
- 2002-12-31 BR BR0215388-2A patent/BR0215388A/en not_active IP Right Cessation
- 2002-12-31 US US10/335,490 patent/US7000247B2/en not_active Expired - Lifetime
- 2002-12-31 EP EP02796133A patent/EP1461707A1/en not_active Withdrawn
- 2002-12-31 AU AU2002360844A patent/AU2002360844A1/en not_active Abandoned
- 2002-12-31 MX MXPA04006473A patent/MXPA04006473A/en unknown
- 2002-12-31 CA CA002472268A patent/CA2472268A1/en not_active Abandoned
-
2004
- 2004-07-27 NO NO20043189A patent/NO20043189L/en not_active Application Discontinuation
- 2004-12-10 US US11/009,782 patent/US7308712B2/en not_active Expired - Fee Related
Patent Citations (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4999806A (en) * | 1987-09-04 | 1991-03-12 | Fred Chernow | Software distribution system |
US4954941A (en) * | 1988-08-31 | 1990-09-04 | Bell Communications Research, Inc. | Method and apparatus for program updating |
US5649187A (en) * | 1989-04-28 | 1997-07-15 | Softel, Inc. | Method and apparatus for remotely controlling and monitoring the use of computer software |
US5805897A (en) * | 1992-07-31 | 1998-09-08 | International Business Machines Corporation | System and method for remote software configuration and distribution |
US5581764A (en) * | 1993-04-30 | 1996-12-03 | Novadigm, Inc. | Distributed computer network including hierarchical resource information structure and related method of distributing resources |
US5860012A (en) * | 1993-09-30 | 1999-01-12 | Intel Corporation | Installation of application software through a network from a source computer system on to a target computer system |
US5771347A (en) * | 1994-05-20 | 1998-06-23 | International Business Machines Corp. | Apparatus and method to allow a user a trial period before licensing a software program product |
US5809329A (en) * | 1994-05-27 | 1998-09-15 | Microsoft Corporation | System for managing the configuration of a computer system |
US5742829A (en) * | 1995-03-10 | 1998-04-21 | Microsoft Corporation | Automatic software installation on heterogeneous networked client computer systems |
US6282712B1 (en) * | 1995-03-10 | 2001-08-28 | Microsoft Corporation | Automatic software installation on heterogeneous networked computer systems |
US5699275A (en) * | 1995-04-12 | 1997-12-16 | Highwaymaster Communications, Inc. | System and method for remote patching of operating code located in a mobile unit |
US6078945A (en) * | 1995-06-21 | 2000-06-20 | Tao Group Limited | Operating system for use with computer networks incorporating two or more data processors linked together for parallel processing and incorporating improved dynamic load-sharing techniques |
US6307841B1 (en) * | 1995-08-16 | 2001-10-23 | Telstra Corporation Limited | Network analysis system |
US5852812A (en) * | 1995-08-23 | 1998-12-22 | Microsoft Corporation | Billing system for a network |
US6073214A (en) * | 1995-11-27 | 2000-06-06 | Microsoft Corporation | Method and system for identifying and obtaining computer software from a remote computer |
US5764913A (en) * | 1996-04-05 | 1998-06-09 | Microsoft Corporation | Computer network status monitoring system |
US6256668B1 (en) * | 1996-04-18 | 2001-07-03 | Microsoft Corporation | Method for identifying and obtaining computer software from a network computer using a tag |
US5933646A (en) * | 1996-05-10 | 1999-08-03 | Apple Computer, Inc. | Software manager for administration of a computer operating system |
US6151643A (en) * | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
US6052710A (en) * | 1996-06-28 | 2000-04-18 | Microsoft Corporation | System and method for making function calls over a distributed network |
US5799002A (en) * | 1996-07-02 | 1998-08-25 | Microsoft Corporation | Adaptive bandwidth throttling for network services |
US5919247A (en) * | 1996-07-24 | 1999-07-06 | Marimba, Inc. | Method for the distribution of code and data updates |
US5991802A (en) * | 1996-11-27 | 1999-11-23 | Microsoft Corporation | Method and system for invoking methods of objects over the internet |
US6061740A (en) * | 1996-12-09 | 2000-05-09 | Novell, Inc. | Method and apparatus for heterogeneous network management |
US6029247A (en) * | 1996-12-09 | 2000-02-22 | Novell, Inc. | Method and apparatus for transmitting secured data |
US5854794A (en) * | 1996-12-16 | 1998-12-29 | Ag Communication Systems Corporation | Digital transmission framing system |
US5933826A (en) * | 1997-03-21 | 1999-08-03 | Novell, Inc. | Method and apparatus for securing and storing executable content |
US6219675B1 (en) * | 1997-06-05 | 2001-04-17 | Microsoft Corporation | Distribution of a centralized database |
US6016499A (en) * | 1997-07-21 | 2000-01-18 | Novell, Inc. | System and method for accessing a directory services respository |
US6282709B1 (en) * | 1997-11-12 | 2001-08-28 | Philips Electronics North America Corporation | Software update manager |
US5974454A (en) * | 1997-11-14 | 1999-10-26 | Microsoft Corporation | Method and system for installing and updating program module components |
US6151708A (en) * | 1997-12-19 | 2000-11-21 | Microsoft Corporation | Determining program update availability via set intersection over a sub-optical pathway |
US6269456B1 (en) * | 1997-12-31 | 2001-07-31 | Network Associates, Inc. | Method and system for providing automated updating and upgrading of antivirus applications using a computer network |
US6094679A (en) * | 1998-01-16 | 2000-07-25 | Microsoft Corporation | Distribution of software in a computer network environment |
US6202207B1 (en) * | 1998-01-28 | 2001-03-13 | International Business Machines Corporation | Method and a mechanism for synchronized updating of interoperating software |
US6108649A (en) * | 1998-03-03 | 2000-08-22 | Novell, Inc. | Method and system for supplanting a first name base with a second name base |
US6279113B1 (en) * | 1998-03-16 | 2001-08-21 | Internet Tools, Inc. | Dynamic signature inspection-based network intrusion detection |
US6282175B1 (en) * | 1998-04-23 | 2001-08-28 | Hewlett-Packard Company | Method for tracking configuration changes in networks of computer systems through historical monitoring of configuration status of devices on the network. |
US6298445B1 (en) * | 1998-04-30 | 2001-10-02 | Netect, Ltd. | Computer security |
US6243766B1 (en) * | 1998-06-08 | 2001-06-05 | Microsoft Corporation | Method and system for updating software with smaller patch files |
US20020026591A1 (en) * | 1998-06-15 | 2002-02-28 | Hartley Bruce V. | Method and apparatus for assessing the security of a computer system |
US6272677B1 (en) * | 1998-08-28 | 2001-08-07 | International Business Machines Corporation | Method and system for automatic detection and distribution of code version updates |
US6263362B1 (en) * | 1998-09-01 | 2001-07-17 | Bigfix, Inc. | Inspector for computed relevance messaging |
US6138157A (en) * | 1998-10-12 | 2000-10-24 | Freshwater Software, Inc. | Method and apparatus for testing web sites |
US6279156B1 (en) * | 1999-01-26 | 2001-08-21 | Dell Usa, L.P. | Method of installing software on and/or testing a computer system |
US6157618A (en) * | 1999-01-26 | 2000-12-05 | Microsoft Corporation | Distributed internet user experience monitoring system |
US6721713B1 (en) * | 1999-05-27 | 2004-04-13 | Andersen Consulting Llp | Business alliance identification in a web architecture framework |
US6281790B1 (en) * | 1999-09-01 | 2001-08-28 | Net Talon Security Systems, Inc. | Method and apparatus for remotely monitoring a site |
US20020087882A1 (en) * | 2000-03-16 | 2002-07-04 | Bruce Schneier | Mehtod and system for dynamic network intrusion monitoring detection and response |
US20020100036A1 (en) * | 2000-09-22 | 2002-07-25 | Patchlink.Com Corporation | Non-invasive automatic offsite patch fingerprinting and updating system and method |
US20040003266A1 (en) * | 2000-09-22 | 2004-01-01 | Patchlink Corporation | Non-invasive automatic offsite patch fingerprinting and updating system and method |
US6766458B1 (en) * | 2000-10-03 | 2004-07-20 | Networks Associates Technology, Inc. | Testing a computer system |
US20030135749A1 (en) * | 2001-10-31 | 2003-07-17 | Gales George S. | System and method of defining the security vulnerabilities of a computer system |
US6859793B1 (en) * | 2002-12-19 | 2005-02-22 | Networks Associates Technology, Inc. | Software license reporting and control system and method |
US6862581B1 (en) * | 2002-12-19 | 2005-03-01 | Networks Associates Technology, Inc. | Patch distribution system, method and computer program product |
Cited By (163)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060075140A1 (en) * | 2002-11-27 | 2006-04-06 | Sobel William E | Client compliancy in a NAT environment |
US7827607B2 (en) * | 2002-11-27 | 2010-11-02 | Symantec Corporation | Enhanced client compliancy using database of security sensor data |
US7836501B2 (en) * | 2002-11-27 | 2010-11-16 | Symantec Corporation | Client compliancy with self-policing clients |
US20060130139A1 (en) * | 2002-11-27 | 2006-06-15 | Sobel William E | Client compliancy with self-policing clients |
US7694343B2 (en) * | 2002-11-27 | 2010-04-06 | Symantec Corporation | Client compliancy in a NAT environment |
US8156558B2 (en) * | 2003-05-17 | 2012-04-10 | Microsoft Corporation | Mechanism for evaluating security risks |
US20040230835A1 (en) * | 2003-05-17 | 2004-11-18 | Goldfeder Aaron R. | Mechanism for evaluating security risks |
US8561197B2 (en) | 2004-07-23 | 2013-10-15 | Fortinet, Inc. | Vulnerability-based remediation selection |
US8171555B2 (en) * | 2004-07-23 | 2012-05-01 | Fortinet, Inc. | Determining technology-appropriate remediation for vulnerability |
US8635702B2 (en) | 2004-07-23 | 2014-01-21 | Fortinet, Inc. | Determining technology-appropriate remediation for vulnerability |
US9349013B2 (en) | 2004-07-23 | 2016-05-24 | Fortinet, Inc. | Vulnerability-based remediation selection |
US20060021051A1 (en) * | 2004-07-23 | 2006-01-26 | D Mello Kurt | Determining technology-appropriate remediation for vulnerability |
US20060018478A1 (en) * | 2004-07-23 | 2006-01-26 | Diefenderfer Kristopher G | Secure communication protocol |
US20100199353A1 (en) * | 2004-07-23 | 2010-08-05 | Fortinet, Inc. | Vulnerability-based remediation selection |
US8341691B2 (en) | 2004-09-03 | 2012-12-25 | Colorado Remediation Technologies, Llc | Policy based selection of remediation |
US20060053265A1 (en) * | 2004-09-03 | 2006-03-09 | Durham Roderick H | Centralized data transformation |
US7665119B2 (en) | 2004-09-03 | 2010-02-16 | Secure Elements, Inc. | Policy-based selection of remediation |
US7703137B2 (en) | 2004-09-03 | 2010-04-20 | Fortinet, Inc. | Centralized data transformation |
US7761920B2 (en) | 2004-09-03 | 2010-07-20 | Fortinet, Inc. | Data structure for policy-based remediation selection |
US20060053476A1 (en) * | 2004-09-03 | 2006-03-09 | Bezilla Daniel B | Data structure for policy-based remediation selection |
US9392024B2 (en) | 2004-09-03 | 2016-07-12 | Fortinet, Inc. | Policy-based selection of remediation |
US20100257585A1 (en) * | 2004-09-03 | 2010-10-07 | Fortinet, Inc. | Data structure for policy-based remediation selection |
US9602550B2 (en) | 2004-09-03 | 2017-03-21 | Fortinet, Inc. | Policy-based selection of remediation |
US7672948B2 (en) * | 2004-09-03 | 2010-03-02 | Fortinet, Inc. | Centralized data transformation |
US8001600B2 (en) | 2004-09-03 | 2011-08-16 | Fortinet, Inc. | Centralized data transformation |
US8561134B2 (en) | 2004-09-03 | 2013-10-15 | Colorado Remediation Technologies, Llc | Policy-based selection of remediation |
US20060053134A1 (en) * | 2004-09-03 | 2006-03-09 | Durham Roderick H | Centralized data transformation |
US9154523B2 (en) | 2004-09-03 | 2015-10-06 | Fortinet, Inc. | Policy-based selection of remediation |
US8336103B2 (en) | 2004-09-03 | 2012-12-18 | Fortinet, Inc. | Data structure for policy-based remediation selection |
US20060075503A1 (en) * | 2004-09-13 | 2006-04-06 | Achilles Guard, Inc. Dba Critical Watch | Method and system for applying security vulnerability management process to an organization |
US20060080738A1 (en) * | 2004-10-08 | 2006-04-13 | Bezilla Daniel B | Automatic criticality assessment |
US20060101519A1 (en) * | 2004-11-05 | 2006-05-11 | Lasswell Kevin W | Method to provide customized vulnerability information to a plurality of organizations |
US20070107043A1 (en) * | 2005-11-09 | 2007-05-10 | Keith Newstadt | Dynamic endpoint compliance policy configuration |
US7805752B2 (en) | 2005-11-09 | 2010-09-28 | Symantec Corporation | Dynamic endpoint compliance policy configuration |
US8055682B1 (en) | 2006-06-30 | 2011-11-08 | At&T Intellectual Property Ii, L.P. | Security information repository system and method thereof |
US8763076B1 (en) | 2006-06-30 | 2014-06-24 | Symantec Corporation | Endpoint management using trust rating data |
US20080028065A1 (en) * | 2006-07-26 | 2008-01-31 | Nt Objectives, Inc. | Application threat modeling |
US8661534B2 (en) | 2007-06-26 | 2014-02-25 | Microsoft Corporation | Security system with compliance checking and remediation |
US8689335B2 (en) * | 2008-06-25 | 2014-04-01 | Microsoft Corporation | Mapping between users and machines in an enterprise security assessment sharing system |
US20090328222A1 (en) * | 2008-06-25 | 2009-12-31 | Microsoft Corporation | Mapping between users and machines in an enterprise security assessment sharing system |
USRE48589E1 (en) | 2010-07-15 | 2021-06-08 | Palantir Technologies Inc. | Sharing and deconflicting data changes in a multimaster database system |
US20120131672A1 (en) * | 2010-11-18 | 2012-05-24 | Comcast Cable Communications, Llc | Secure Notification on Networked Devices |
US11706250B2 (en) | 2010-11-18 | 2023-07-18 | Comcast Cable Communications, Llc | Secure notification on networked devices |
US10218738B2 (en) | 2010-11-18 | 2019-02-26 | Comcast Cable Communications, Llc | Secure notification of networked devices |
US8839433B2 (en) * | 2010-11-18 | 2014-09-16 | Comcast Cable Communications, Llc | Secure notification on networked devices |
US10841334B2 (en) * | 2010-11-18 | 2020-11-17 | Comcast Cable Communications, Llc | Secure notification on networked devices |
US10891312B2 (en) | 2012-10-22 | 2021-01-12 | Palantir Technologies Inc. | Sharing information between nexuses that use different classification schemes for information access control |
US9836523B2 (en) | 2012-10-22 | 2017-12-05 | Palantir Technologies Inc. | Sharing information between nexuses that use different classification schemes for information access control |
US9081975B2 (en) | 2012-10-22 | 2015-07-14 | Palantir Technologies, Inc. | Sharing information between nexuses that use different classification schemes for information access control |
US10846300B2 (en) | 2012-11-05 | 2020-11-24 | Palantir Technologies Inc. | System and method for sharing investigation results |
US10311081B2 (en) | 2012-11-05 | 2019-06-04 | Palantir Technologies Inc. | System and method for sharing investigation results |
US9965937B2 (en) | 2013-03-15 | 2018-05-08 | Palantir Technologies Inc. | External malware data item clustering and analysis |
US10264014B2 (en) | 2013-03-15 | 2019-04-16 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive investigation based on automatic clustering of related data in various data structures |
US9135658B2 (en) | 2013-03-15 | 2015-09-15 | Palantir Technologies Inc. | Generating data clusters |
US10216801B2 (en) | 2013-03-15 | 2019-02-26 | Palantir Technologies Inc. | Generating data clusters |
US9335897B2 (en) | 2013-08-08 | 2016-05-10 | Palantir Technologies Inc. | Long click display of a context menu |
US10976892B2 (en) | 2013-08-08 | 2021-04-13 | Palantir Technologies Inc. | Long click display of a context menu |
US12124586B2 (en) * | 2013-09-13 | 2024-10-22 | Omnissa, Llc | Risk assessment for managed client devices |
US20220012346A1 (en) * | 2013-09-13 | 2022-01-13 | Vmware, Inc. | Risk assessment for managed client devices |
US10356032B2 (en) | 2013-12-26 | 2019-07-16 | Palantir Technologies Inc. | System and method for detecting confidential information emails |
US10027473B2 (en) | 2013-12-30 | 2018-07-17 | Palantir Technologies Inc. | Verifiable redactable audit log |
US9338013B2 (en) | 2013-12-30 | 2016-05-10 | Palantir Technologies Inc. | Verifiable redactable audit log |
US11032065B2 (en) | 2013-12-30 | 2021-06-08 | Palantir Technologies Inc. | Verifiable redactable audit log |
US10805321B2 (en) | 2014-01-03 | 2020-10-13 | Palantir Technologies Inc. | System and method for evaluating network threats and usage |
US9100428B1 (en) | 2014-01-03 | 2015-08-04 | Palantir Technologies Inc. | System and method for evaluating network threats |
US10230746B2 (en) | 2014-01-03 | 2019-03-12 | Palantir Technologies Inc. | System and method for evaluating network threats and usage |
US9923925B2 (en) | 2014-02-20 | 2018-03-20 | Palantir Technologies Inc. | Cyber security sharing and identification system |
US9009827B1 (en) | 2014-02-20 | 2015-04-14 | Palantir Technologies Inc. | Security sharing system |
US10873603B2 (en) | 2014-02-20 | 2020-12-22 | Palantir Technologies Inc. | Cyber security sharing and identification system |
US11341178B2 (en) | 2014-06-30 | 2022-05-24 | Palantir Technologies Inc. | Systems and methods for key phrase characterization of documents |
US10162887B2 (en) | 2014-06-30 | 2018-12-25 | Palantir Technologies Inc. | Systems and methods for key phrase characterization of documents |
US11093687B2 (en) | 2014-06-30 | 2021-08-17 | Palantir Technologies Inc. | Systems and methods for identifying key phrase clusters within documents |
US9998485B2 (en) | 2014-07-03 | 2018-06-12 | Palantir Technologies, Inc. | Network intrusion data item clustering and analysis |
US9785773B2 (en) | 2014-07-03 | 2017-10-10 | Palantir Technologies Inc. | Malware data item analysis |
US10572496B1 (en) | 2014-07-03 | 2020-02-25 | Palantir Technologies Inc. | Distributed workflow system and database with access controls for city resiliency |
US10798116B2 (en) | 2014-07-03 | 2020-10-06 | Palantir Technologies Inc. | External malware data item clustering and analysis |
US9021260B1 (en) | 2014-07-03 | 2015-04-28 | Palantir Technologies Inc. | Malware data item analysis |
US10929436B2 (en) | 2014-07-03 | 2021-02-23 | Palantir Technologies Inc. | System and method for news events detection and visualization |
US10609046B2 (en) | 2014-08-13 | 2020-03-31 | Palantir Technologies Inc. | Unwanted tunneling alert system |
US9930055B2 (en) | 2014-08-13 | 2018-03-27 | Palantir Technologies Inc. | Unwanted tunneling alert system |
US9419992B2 (en) | 2014-08-13 | 2016-08-16 | Palantir Technologies Inc. | Unwanted tunneling alert system |
US10135863B2 (en) | 2014-11-06 | 2018-11-20 | Palantir Technologies Inc. | Malicious software detection in a computing system |
US10728277B2 (en) | 2014-11-06 | 2020-07-28 | Palantir Technologies Inc. | Malicious software detection in a computing system |
US9043894B1 (en) | 2014-11-06 | 2015-05-26 | Palantir Technologies Inc. | Malicious software detection in a computing system |
US9558352B1 (en) | 2014-11-06 | 2017-01-31 | Palantir Technologies Inc. | Malicious software detection in a computing system |
US20160162690A1 (en) | 2014-12-05 | 2016-06-09 | T-Mobile Usa, Inc. | Recombinant threat modeling |
US10574675B2 (en) | 2014-12-05 | 2020-02-25 | T-Mobile Usa, Inc. | Similarity search for discovering multiple vector attacks |
US10216938B2 (en) | 2014-12-05 | 2019-02-26 | T-Mobile Usa, Inc. | Recombinant threat modeling |
CN107251038A (en) * | 2014-12-05 | 2017-10-13 | T移动美国公司 | Recombinate Threat moulding |
EP3216193A4 (en) * | 2014-12-05 | 2018-07-11 | T-Mobile USA, Inc. | Recombinant threat modeling |
US9589299B2 (en) | 2014-12-22 | 2017-03-07 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures |
US9367872B1 (en) | 2014-12-22 | 2016-06-14 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures |
US10447712B2 (en) | 2014-12-22 | 2019-10-15 | Palantir Technologies Inc. | Systems and user interfaces for dynamic and interactive investigation of bad actor behavior based on automatic clustering of related data in various data structures |
US9985983B2 (en) | 2014-12-29 | 2018-05-29 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
US9882925B2 (en) | 2014-12-29 | 2018-01-30 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
US9467455B2 (en) | 2014-12-29 | 2016-10-11 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
US10721263B2 (en) | 2014-12-29 | 2020-07-21 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
US10462175B2 (en) | 2014-12-29 | 2019-10-29 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
US9648036B2 (en) | 2014-12-29 | 2017-05-09 | Palantir Technologies Inc. | Systems for network risk assessment including processing of user access rights associated with a network of devices |
US10372879B2 (en) | 2014-12-31 | 2019-08-06 | Palantir Technologies Inc. | Medical claims lead summary report generation |
US11030581B2 (en) | 2014-12-31 | 2021-06-08 | Palantir Technologies Inc. | Medical claims lead summary report generation |
US10735448B2 (en) | 2015-06-26 | 2020-08-04 | Palantir Technologies Inc. | Network anomaly detection |
US10075464B2 (en) | 2015-06-26 | 2018-09-11 | Palantir Technologies Inc. | Network anomaly detection |
US9407652B1 (en) | 2015-06-26 | 2016-08-02 | Palantir Technologies Inc. | Network anomaly detection |
US9628500B1 (en) | 2015-06-26 | 2017-04-18 | Palantir Technologies Inc. | Network anomaly detection |
US10484407B2 (en) | 2015-08-06 | 2019-11-19 | Palantir Technologies Inc. | Systems, methods, user interfaces, and computer-readable media for investigating potential malicious communications |
US10489391B1 (en) | 2015-08-17 | 2019-11-26 | Palantir Technologies Inc. | Systems and methods for grouping and enriching data items accessed from one or more databases for presentation in a user interface |
US10102369B2 (en) | 2015-08-19 | 2018-10-16 | Palantir Technologies Inc. | Checkout system executable code monitoring, and user account compromise determination system |
US9537880B1 (en) | 2015-08-19 | 2017-01-03 | Palantir Technologies Inc. | Anomalous network monitoring, user behavior detection and database system |
US10922404B2 (en) | 2015-08-19 | 2021-02-16 | Palantir Technologies Inc. | Checkout system executable code monitoring, and user account compromise determination system |
US11470102B2 (en) | 2015-08-19 | 2022-10-11 | Palantir Technologies Inc. | Anomalous network monitoring, user behavior detection and database system |
US10129282B2 (en) | 2015-08-19 | 2018-11-13 | Palantir Technologies Inc. | Anomalous network monitoring, user behavior detection and database system |
US11089043B2 (en) | 2015-10-12 | 2021-08-10 | Palantir Technologies Inc. | Systems for computer network security risk assessment including user compromise analysis associated with a network of devices |
US11956267B2 (en) | 2015-10-12 | 2024-04-09 | Palantir Technologies Inc. | Systems for computer network security risk assessment including user compromise analysis associated with a network of devices |
US10044745B1 (en) | 2015-10-12 | 2018-08-07 | Palantir Technologies, Inc. | Systems for computer network security risk assessment including user compromise analysis associated with a network of devices |
US9888039B2 (en) | 2015-12-28 | 2018-02-06 | Palantir Technologies Inc. | Network-based permissioning system |
US10362064B1 (en) | 2015-12-28 | 2019-07-23 | Palantir Technologies Inc. | Network-based permissioning system |
US9916465B1 (en) | 2015-12-29 | 2018-03-13 | Palantir Technologies Inc. | Systems and methods for automatic and customizable data minimization of electronic data stores |
US10657273B2 (en) | 2015-12-29 | 2020-05-19 | Palantir Technologies Inc. | Systems and methods for automatic and customizable data minimization of electronic data stores |
US10498711B1 (en) | 2016-05-20 | 2019-12-03 | Palantir Technologies Inc. | Providing a booting key to a remote system |
US10904232B2 (en) | 2016-05-20 | 2021-01-26 | Palantir Technologies Inc. | Providing a booting key to a remote system |
US10084802B1 (en) | 2016-06-21 | 2018-09-25 | Palantir Technologies Inc. | Supervisory control and data acquisition |
US10291637B1 (en) | 2016-07-05 | 2019-05-14 | Palantir Technologies Inc. | Network anomaly detection and profiling |
US11218499B2 (en) | 2016-07-05 | 2022-01-04 | Palantir Technologies Inc. | Network anomaly detection and profiling |
US10698927B1 (en) | 2016-08-30 | 2020-06-30 | Palantir Technologies Inc. | Multiple sensor session and log information compression and correlation system |
US20180103044A1 (en) * | 2016-10-10 | 2018-04-12 | Richard E. Malinowski | Anti-malware client |
US10728262B1 (en) | 2016-12-21 | 2020-07-28 | Palantir Technologies Inc. | Context-aware network-based malicious activity warning systems |
US10721262B2 (en) | 2016-12-28 | 2020-07-21 | Palantir Technologies Inc. | Resource-centric network cyber attack warning system |
US10754872B2 (en) | 2016-12-28 | 2020-08-25 | Palantir Technologies Inc. | Automatically executing tasks and configuring access control lists in a data transformation system |
CN107231367A (en) * | 2017-06-21 | 2017-10-03 | 北京奇虎科技有限公司 | Method for automatically notifying, device and the server of signature information |
US10432469B2 (en) | 2017-06-29 | 2019-10-01 | Palantir Technologies, Inc. | Access controls through node-based effective policy identifiers |
US10963465B1 (en) | 2017-08-25 | 2021-03-30 | Palantir Technologies Inc. | Rapid importation of data including temporally tracked object recognition |
US10984427B1 (en) | 2017-09-13 | 2021-04-20 | Palantir Technologies Inc. | Approaches for analyzing entity relationships |
US12086815B2 (en) | 2017-09-13 | 2024-09-10 | Palantir Technologies Inc. | Approaches for analyzing entity relationships |
US11663613B2 (en) | 2017-09-13 | 2023-05-30 | Palantir Technologies Inc. | Approaches for analyzing entity relationships |
US10397229B2 (en) | 2017-10-04 | 2019-08-27 | Palantir Technologies, Inc. | Controlling user creation of data resources on a data processing platform |
US10735429B2 (en) | 2017-10-04 | 2020-08-04 | Palantir Technologies Inc. | Controlling user creation of data resources on a data processing platform |
US10079832B1 (en) | 2017-10-18 | 2018-09-18 | Palantir Technologies Inc. | Controlling user creation of data resources on a data processing platform |
US10250401B1 (en) | 2017-11-29 | 2019-04-02 | Palantir Technologies Inc. | Systems and methods for providing category-sensitive chat channels |
US11133925B2 (en) | 2017-12-07 | 2021-09-28 | Palantir Technologies Inc. | Selective access to encrypted logs |
US10686796B2 (en) | 2017-12-28 | 2020-06-16 | Palantir Technologies Inc. | Verifying network-based permissioning rights |
US11089042B2 (en) * | 2018-02-06 | 2021-08-10 | Bank Of America Corporation | Vulnerability consequence triggering system for application freeze and removal |
US20190245879A1 (en) * | 2018-02-06 | 2019-08-08 | Bank Of America Corporation | Vulnerability consequence triggering system for application freeze and removal |
US10819731B2 (en) | 2018-02-06 | 2020-10-27 | Bank Of America Corporation | Exception remediation logic rolling platform |
US11265340B2 (en) | 2018-02-06 | 2022-03-01 | Bank Of America Corporation | Exception remediation acceptable use logic platform |
US10812502B2 (en) | 2018-02-06 | 2020-10-20 | Bank Of America Corporation | Network device owner identification and communication triggering system |
US10878051B1 (en) | 2018-03-30 | 2020-12-29 | Palantir Technologies Inc. | Mapping device identifiers |
US10255415B1 (en) | 2018-04-03 | 2019-04-09 | Palantir Technologies Inc. | Controlling access to computer resources |
US10860698B2 (en) | 2018-04-03 | 2020-12-08 | Palantir Technologies Inc. | Controlling access to computer resources |
US11914687B2 (en) | 2018-04-03 | 2024-02-27 | Palantir Technologies Inc. | Controlling access to computer resources |
US11593317B2 (en) | 2018-05-09 | 2023-02-28 | Palantir Technologies Inc. | Systems and methods for tamper-resistant activity logging |
US10949400B2 (en) | 2018-05-09 | 2021-03-16 | Palantir Technologies Inc. | Systems and methods for tamper-resistant activity logging |
US11244063B2 (en) | 2018-06-11 | 2022-02-08 | Palantir Technologies Inc. | Row-level and column-level policy service |
US11683394B2 (en) | 2019-02-08 | 2023-06-20 | Palantir Technologies Inc. | Systems and methods for isolating applications associated with multiple tenants within a computing platform |
US10868887B2 (en) | 2019-02-08 | 2020-12-15 | Palantir Technologies Inc. | Systems and methods for isolating applications associated with multiple tenants within a computing platform |
US11943319B2 (en) | 2019-02-08 | 2024-03-26 | Palantir Technologies Inc. | Systems and methods for isolating applications associated with multiple tenants within a computing platform |
US12039087B2 (en) | 2019-09-03 | 2024-07-16 | Palantir Technologies Inc. | Charter-based access controls for managing computer resources |
US11704441B2 (en) | 2019-09-03 | 2023-07-18 | Palantir Technologies Inc. | Charter-based access controls for managing computer resources |
US10761889B1 (en) | 2019-09-18 | 2020-09-01 | Palantir Technologies Inc. | Systems and methods for autoscaling instance groups of computing platforms |
US11567801B2 (en) | 2019-09-18 | 2023-01-31 | Palantir Technologies Inc. | Systems and methods for autoscaling instance groups of computing platforms |
US12034753B2 (en) * | 2020-12-18 | 2024-07-09 | The Boeing Company | Systems and methods for context aware cybersecurity |
US20220201027A1 (en) * | 2020-12-18 | 2022-06-23 | The Boeing Company | Systems and methods for context aware cybersecurity |
US12141253B2 (en) | 2024-01-18 | 2024-11-12 | Palantir Technologies Inc. | Controlling access to computer resources |
Also Published As
Publication number | Publication date |
---|---|
CA2472268A1 (en) | 2003-07-17 |
MXPA04006473A (en) | 2004-10-04 |
US7000247B2 (en) | 2006-02-14 |
EP1461707A1 (en) | 2004-09-29 |
AU2002360844A1 (en) | 2003-07-24 |
NO20043189L (en) | 2004-07-26 |
BR0215388A (en) | 2004-12-07 |
CN1610887A (en) | 2005-04-27 |
WO2003058457A1 (en) | 2003-07-17 |
JP2005532606A (en) | 2005-10-27 |
KR20040069324A (en) | 2004-08-05 |
US7308712B2 (en) | 2007-12-11 |
US20050091542A1 (en) | 2005-04-28 |
US20030126472A1 (en) | 2003-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7000247B2 (en) | Automated computer vulnerability resolution system | |
US7278163B2 (en) | Security risk analysis system and method | |
US6023586A (en) | Integrity verifying and correcting software | |
US7937697B2 (en) | Method, system and computer program for distributing software patches | |
US20060101517A1 (en) | Inventory management-based computer vulnerability resolution system | |
US7437764B1 (en) | Vulnerability assessment of disk images | |
US8650055B2 (en) | IT asset management system | |
US20020174422A1 (en) | Software distribution system | |
US20060080656A1 (en) | Methods and instructions for patch management | |
US20020147974A1 (en) | Networked installation system for deploying systems management platforms | |
US20040210653A1 (en) | Method and system for patch management | |
US20070198525A1 (en) | Computer system with update-based quarantine | |
US20210326196A1 (en) | A remediation system to prevent incompatible program module installation in an information processing system | |
KR20060045811A (en) | Efficient patching | |
Mell et al. | Creating a patch and vulnerability management program | |
US20150033323A1 (en) | Virtual patching system, method, and computer program product | |
US20090319576A1 (en) | Extensible task execution techniques for network management | |
US20050076325A1 (en) | Automatic software update of nodes in a network data processing system | |
US7454791B1 (en) | Method and system for checking the security on a distributed computing environment | |
CN116915516B (en) | Software cross-cloud delivery method, transfer server, target cloud and storage medium | |
Tom et al. | Recommended practice for patch management of control systems | |
Souppaya et al. | Guide to enterprise patch management planning | |
Dempsey et al. | Automation support for security control assessments | |
WO2000075782A1 (en) | Security system | |
US6975955B1 (en) | Method and system for managing manufacturing test stations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: CITADEL SECURITY SOFTWARE, INC., TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BANZHOF, CARL E.;REEL/FRAME:013643/0923 Effective date: 20021231 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: MCAFEE SECURITY LLC,TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CITADEL SECURITY SOFTWARE, INC.;REEL/FRAME:018668/0179 Effective date: 20061204 Owner name: MCAFEE SECURITY LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:CITADEL SECURITY SOFTWARE, INC.;REEL/FRAME:018668/0179 Effective date: 20061204 |
|
AS | Assignment |
Owner name: MCAFEE, INC., A DELAWARE CORPORATION,CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MCAFEE SECURITY, LLC, A DELAWARE LIMITED LIABILITY COMPANY;REEL/FRAME:018923/0152 Effective date: 20070222 Owner name: MCAFEE, INC., A DELAWARE CORPORATION, CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MCAFEE SECURITY, LLC, A DELAWARE LIMITED LIABILITY COMPANY;REEL/FRAME:018923/0152 Effective date: 20070222 |
|
B1 | Reexamination certificate first reexamination |
Free format text: THE PATENTABILITY OF CLAIMS 13-25 IS CONFIRMED. CLAIMS 1, 3, 6, 10, 26, 30-32, 35, 38 AND 41 ARE DETERMINED TO BE PATENTABLE AS AMENDED. CLAIMS 2, 4, 5, 7-9, 11, 12, 27-29, 33, 34, 36, 37, 39, 40 AND 42-44, DEPENDENT ON AN AMENDED CLAIM, ARE DETERMINED TO BE PATENTABLE. |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER NO LONGER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: STOL); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
RR | Request for reexamination filed |
Effective date: 20060302 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 8 |
|
FEPP | Fee payment procedure |
Free format text: PAYER NUMBER DE-ASSIGNED (ORIGINAL EVENT CODE: RMPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
FPAY | Fee payment |
Year of fee payment: 12 |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: CHANGE OF NAME AND ENTITY CONVERSION;ASSIGNOR:MCAFEE, INC.;REEL/FRAME:043665/0918 Effective date: 20161220 |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045056/0676 Effective date: 20170929 Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:045055/0786 Effective date: 20170929 |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., MARYLAND Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045056 FRAME 0676. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:054206/0593 Effective date: 20170929 Owner name: JPMORGAN CHASE BANK, N.A., NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE REMOVE PATENT 6336186 PREVIOUSLY RECORDED ON REEL 045055 FRAME 786. ASSIGNOR(S) HEREBY CONFIRMS THE SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:055854/0047 Effective date: 20170929 |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045055/0786;ASSIGNOR:JPMORGAN CHASE BANK, N.A., AS COLLATERAL AGENT;REEL/FRAME:054238/0001 Effective date: 20201026 |
|
AS | Assignment |
Owner name: MCAFEE, LLC, CALIFORNIA Free format text: RELEASE OF INTELLECTUAL PROPERTY COLLATERAL - REEL/FRAME 045056/0676;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:059354/0213 Effective date: 20220301 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT AND COLLATERAL AGENT, NEW YORK Free format text: SECURITY INTEREST;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:059354/0335 Effective date: 20220301 |
|
AS | Assignment |
Owner name: JPMORGAN CHASE BANK, N.A., AS ADMINISTRATIVE AGENT, NEW YORK Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE THE PATENT TITLES AND REMOVE DUPLICATES IN THE SCHEDULE PREVIOUSLY RECORDED AT REEL: 059354 FRAME: 0335. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT;ASSIGNOR:MCAFEE, LLC;REEL/FRAME:060792/0307 Effective date: 20220301 |