会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明申请
    • Inventory management-based computer vulnerability resolution system
    • 基于库存管理的计算机漏洞解决系统
    • US20060101517A1
    • 2006-05-11
    • US10975828
    • 2004-10-28
    • Carl BanzhofKevin CookDavid HelffrichRussell Lawson
    • Carl BanzhofKevin CookDavid HelffrichRussell Lawson
    • G06F11/00
    • H04L63/1433G06F21/577
    • A remediation server, downloadable software and an associated method for protecting a computer network from vulnerabilities. Software in the form of at least one network protection module is downloaded to the remediation server for the computer network and executed to protect the computer network from vulnerabilities. Upon execution thereof, the network protection module queries a device inventory for the computer network which is maintained at the remediation server to determine if any devices of a specified device type reside on the computer network. For each such device determined to reside on the computer network, the network protection module subsequently resolves vulnerabilities for the device using a remediation signature associated with the device query.
    • 补救服务器,可下载的软件以及用于保护计算机网络免受漏洞的相关方法。 形式为至少一个网络保护模块的软件被下载到计算机网络的修复服务器,并被执行以保护计算机网络免受漏洞的影响。 一旦执行,网络保护模块查询维护在修复服务器处的计算机网络的设备清单,以确定指定设备类型的任何设备是否驻留在计算机网络上。 对于确定驻留在计算机网络上的每个这样的设备,网络保护模块随后使用与设备查询相关联的修复签名来解析设备的漏洞。
    • 5. 发明申请
    • Automated Computer Vulnerability Resolution System
    • 自动计算机脆弱性分解系统
    • US20050229256A2
    • 2005-10-13
    • US10335490
    • 2002-12-31
    • Carl Banzhof
    • Carl Banzhof
    • G06F21/24G06F21/00G06F21/22H04L29/06H04L9/00
    • G06F21/577H04L63/12H04L63/1433
    • Abstract of the Disclosure A system and process for addressing computer security vulnerabilities. The system and process generally comprise aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address the computer vulnerabilities; and deploying said remediation signature to a client computer. The remediation signature essentially comprises a sequence of actions to address a corresponding vulnerability. A managed automated approach to the process is contemplated in which the system is capable of selective deployment of remediation signatures; selective resolution of vulnerabilities; scheduled deployment of remediation signatures; and scheduled scanning of client computers for vulnerabilities.
    • 披露摘要用于解决计算机安全漏洞的系统和过程。 系统和过程通常包括聚合关于多个计算机漏洞的漏洞信息; 构建所述多个计算机漏洞的修复数据库; 构建修复签名来解决计算机漏洞; 并将所述修复签名部署到客户端计算机。 补救签名基本上包括一系列解决相应漏洞的操作。 考虑到该过程的管理自动化方法,其中系统能够选择性地部署补救签名; 有选择地解决漏洞; 计划部署补救签字; 并计划扫描客户端计算机的漏洞。
    • 6. 发明申请
    • Automated computer vulnerability resolution system
    • 自动化计算机漏洞解决系统
    • US20050091542A1
    • 2005-04-28
    • US11009782
    • 2004-12-10
    • Carl Banzhof
    • Carl Banzhof
    • G06F21/24G06F21/00G06F21/22H04L29/06H04L9/00
    • G06F21/577H04L63/12H04L63/1433
    • A system and process for addressing computer security vulnerabilities. The system and process generally comprise aggregating vulnerability information on a plurality of computer vulnerabilities; constructing a remediation database of said plurality of computer vulnerabilities; constructing a remediation signature to address the computer vulnerabilities; and deploying said remediation signature to a client computer. The remediation signature essentially comprises a sequence of actions to address a corresponding vulnerability. A managed automated approach to the process is contemplated in which the system is capable of selective deployment of remediation signatures; selective resolution of vulnerabilities; scheduled deployment of remediation signatures; and scheduled scanning of client computers for vulnerabilities.
    • 解决计算机安全漏洞的系统和过程。 系统和过程通常包括聚合关于多个计算机漏洞的漏洞信息; 构建所述多个计算机漏洞的修复数据库; 构建修复签名来解决计算机漏洞; 并将所述修复签名部署到客户端计算机。 补救签名基本上包括一系列解决相应漏洞的操作。 考虑到该过程的管理自动化方法,其中系统能够选择性地部署补救签名; 有选择地解决漏洞; 计划部署补救签字; 并计划扫描客户端计算机的漏洞。