Automated Computer Vulnerability Resolution System

a vulnerability resolution and automatic technology, applied in the field of automatic computer vulnerability resolution system, can solve the problems of increasing burden on the maintenance team of increasing the burden of maintaining security for these computer systems and/or networks, and increasing the complexity of the computer system and the application running thereon

Inactive Publication Date: 2005-10-13
MCAFEE LLC
View PDF55 Cites 157 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Computers, computer systems, and the applications running thereon are becoming increasingly complex.
Given these trends, it has become increasingly difficult to protect computers from security breaches via these vulnerabilities.
Moreover, the task of maintaining security for these computer systems and / or networks has become increasingly burdensome and difficult.
These tools generally provide detailed information on the vulnerabilities found in the computing environment, but provide limited means for correcting or resolving the detected vulnerabilities.
In order for an organization to remove identified vulnerabilities, it typically must expend a large amount of labor and resources to identify and / or create a remediation for each vulnerability then even more labor to install the vulnerability remediation on the affected computers.
In addition, once the remediation is applied, a user can easily remove it, or install additional software that invalidates the remediation, thereby wasting all of the effort expended in performing the remediation.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automated Computer Vulnerability Resolution System
  • Automated Computer Vulnerability Resolution System
  • Automated Computer Vulnerability Resolution System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

CROSS-REFERENCE TO RELATED APPLICATIONS

[0001] This application claims priority from U.S. Provisional Application serial no. 60 / 345,689 filed on December 31, 2001.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

[0002] Not applicable.

REFERENCE TO A MICROFICHE APPENDIX

[0003] Not applicable.

FIELD OF THE INVENTION

[0004] The invention relates generally to a method and system for resolving security vulnerabilities in computers and, more particularly, to a vulnerability resolution system in which computer security vulnerability information from one or more sources can be aggregated and comprehensive remediation updates can be generated for managed automated distribution to target client computers.

BACKGROUND OF THE INVENTION

[0005] Computers, computer systems, and the applications running thereon are becoming increasingly complex. In addition, with the advent of the Internet and other modern networking technology, computers have become increasingly interconnected and remote ac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Abstract of the Disclosure A system and process for addressing computer security vulnerabilities. The system and process generally comprise aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address the computer vulnerabilities; and deploying said remediation signature to a client computer. The remediation signature essentially comprises a sequence of actions to address a corresponding vulnerability. A managed automated approach to the process is contemplated in which the system is capable of selective deployment of remediation signatures; selective resolution of vulnerabilities; scheduled deployment of remediation signatures; and scheduled scanning of client computers for vulnerabilities.

Description

Detailed Description of the InventionCROSS-REFERENCE TO RELATED APPLICATIONS[0001] This application claims priority from U.S. Provisional Application serial no. 60 / 345,689 filed on December 31, 2001.STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT[0002] Not applicable.REFERENCE TO A MICROFICHE APPENDIX[0003] Not applicable.FIELD OF THE INVENTION[0004] The invention relates generally to a method and system for resolving security vulnerabilities in computers and, more particularly, to a vulnerability resolution system in which computer security vulnerability information from one or more sources can be aggregated and comprehensive remediation updates can be generated for managed automated distribution to target client computers.BACKGROUND OF THE INVENTION[0005] Computers, computer systems, and the applications running thereon are becoming increasingly complex. In addition, with the advent of the Internet and other modern networking technology, computers have become incr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F21/60G06F21/12H04L29/06
CPCG06F21/577H04L63/1433H04L63/12G06F12/14H04L9/00
Inventor BANZHOF, CARL E.
Owner MCAFEE LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products