Log in
Enquire now
‌

US Patent 11947679 Systems and methods for managing vulnerability data

OverviewStructured DataIssuesContributors

Contents

Patent abstractTimelineTable: Further ResourcesReferences
Is a
Patent
Patent
1

Patent attributes

Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
1
Patent Number
119476791
Patent Inventor Names
Jessica Colvin1
Samiksha Patel1
Marty Grant, Jr.1
Jean-Francois Legault1
Patrick M. Ward1
David Everett1
Date of Patent
April 2, 2024
1
Patent Application Number
183033171
Date Filed
April 19, 2023
1
Patent Citations
‌
US Patent 10277619 System and methods of identifying system vulnerabilities
1
‌
US Patent 10749890 Systems and methods for improving the ranking and prioritization of attack-related events
1
‌
US Patent 10754958 Vulnerability risk mitigation platform apparatuses, methods and systems
1
‌
US Patent 10771506 Deployment of a security policy based on network topology and device capability
1
‌
US Patent 11201891 Prioritization of remediation actions for addressing vulnerabilities in an enterprise system
1
‌
US Patent 11265330 Systems and methods for improving a security profile of an entity based on peer security profiles
1
‌
US Patent 11277429 Cybersecurity vulnerability classification and remediation based on network utilization
1
‌
US Patent 11503061 Automatic evalution of remediation plans using exploitability risk modeling
1
...
Patent Primary Examiner
‌
Darren B Schwartz
1
CPC Code
‌
G06F 21/604
1
‌
H04L 63/20
1
‌
G06F 21/577
1
‌
G06F 16/215
1
‌
H04L 63/1433
1
Patent abstract

A method for managing vulnerability data may include: (1) ingesting, by a data ingestion engine, vulnerability data from a plurality of sources; (2) normalizing, by a data normalizer module, the vulnerability data into a plurality of data records; (3) generating, by a data processing module, a dynamic risk score for each data record; (4) storing, by a risk record register, a risk record for each data record, wherein the risk record may include the dynamic risk score, a priority level, an identifier for a software application, and a software dependency; (5) selecting, by a control policy selection engine, a control policy based on one of the dynamic risk scores; (6) implementing, by the risk record register, the selected control policy; (7) monitoring, by the risk record register, implementation of the control policy; and (8) updating, by the risk record register, the control policy selection engine based on the monitoring.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 11947679 Systems and methods for managing vulnerability data

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.