SYSTEMS AND METHODS FOR MANAGING VULNERABILITY DATA

A method for managing vulnerability data may include: (1) ingesting, by a data ingestion engine, vulnerability data from a plurality of sources; (2) normalizing, by a data normalizer module, the vulnerability data into a plurality of data records; (3) generating, by a data processing module, a dynam...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: GRANT, JR., Marty, WARD, Patrick M, COLVIN, Jessica, LEGAULT, Jean-Francois, EVERETT, David, PATEL, Samiksha
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator GRANT, JR., Marty
WARD, Patrick M
COLVIN, Jessica
LEGAULT, Jean-Francois
EVERETT, David
PATEL, Samiksha
description A method for managing vulnerability data may include: (1) ingesting, by a data ingestion engine, vulnerability data from a plurality of sources; (2) normalizing, by a data normalizer module, the vulnerability data into a plurality of data records; (3) generating, by a data processing module, a dynamic risk score for each data record; (4) storing, by a risk record register, a risk record for each data record, wherein the risk record may include the dynamic risk score, a priority level, an identifier for a software application, and a software dependency; (5) selecting, by a control policy selection engine, a control policy based on one of the dynamic risk scores; (6) implementing, by the risk record register, the selected control policy; (7) monitoring, by the risk record register, implementation of the control policy; and (8) updating, by the risk record register, the control policy selection engine based on the monitoring.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2023252164A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2023252164A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2023252164A13</originalsourceid><addsrcrecordid>eNrjZDAOjgwOcfUNVnD0c1HwdQ3x8HcJVnDzD1LwdfRzdPf0c1cIC_Xxcw1ydPL08QyJVHBxDHHkYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkbGRqZGhmYmjobGxKkCAETUKBA</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>SYSTEMS AND METHODS FOR MANAGING VULNERABILITY DATA</title><source>esp@cenet</source><creator>GRANT, JR., Marty ; WARD, Patrick M ; COLVIN, Jessica ; LEGAULT, Jean-Francois ; EVERETT, David ; PATEL, Samiksha</creator><creatorcontrib>GRANT, JR., Marty ; WARD, Patrick M ; COLVIN, Jessica ; LEGAULT, Jean-Francois ; EVERETT, David ; PATEL, Samiksha</creatorcontrib><description>A method for managing vulnerability data may include: (1) ingesting, by a data ingestion engine, vulnerability data from a plurality of sources; (2) normalizing, by a data normalizer module, the vulnerability data into a plurality of data records; (3) generating, by a data processing module, a dynamic risk score for each data record; (4) storing, by a risk record register, a risk record for each data record, wherein the risk record may include the dynamic risk score, a priority level, an identifier for a software application, and a software dependency; (5) selecting, by a control policy selection engine, a control policy based on one of the dynamic risk scores; (6) implementing, by the risk record register, the selected control policy; (7) monitoring, by the risk record register, implementation of the control policy; and (8) updating, by the risk record register, the control policy selection engine based on the monitoring.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; ELECTRIC DIGITAL DATA PROCESSING ; PHYSICS</subject><creationdate>2023</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230810&amp;DB=EPODOC&amp;CC=US&amp;NR=2023252164A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20230810&amp;DB=EPODOC&amp;CC=US&amp;NR=2023252164A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>GRANT, JR., Marty</creatorcontrib><creatorcontrib>WARD, Patrick M</creatorcontrib><creatorcontrib>COLVIN, Jessica</creatorcontrib><creatorcontrib>LEGAULT, Jean-Francois</creatorcontrib><creatorcontrib>EVERETT, David</creatorcontrib><creatorcontrib>PATEL, Samiksha</creatorcontrib><title>SYSTEMS AND METHODS FOR MANAGING VULNERABILITY DATA</title><description>A method for managing vulnerability data may include: (1) ingesting, by a data ingestion engine, vulnerability data from a plurality of sources; (2) normalizing, by a data normalizer module, the vulnerability data into a plurality of data records; (3) generating, by a data processing module, a dynamic risk score for each data record; (4) storing, by a risk record register, a risk record for each data record, wherein the risk record may include the dynamic risk score, a priority level, an identifier for a software application, and a software dependency; (5) selecting, by a control policy selection engine, a control policy based on one of the dynamic risk scores; (6) implementing, by the risk record register, the selected control policy; (7) monitoring, by the risk record register, implementation of the control policy; and (8) updating, by the risk record register, the control policy selection engine based on the monitoring.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>PHYSICS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2023</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDAOjgwOcfUNVnD0c1HwdQ3x8HcJVnDzD1LwdfRzdPf0c1cIC_Xxcw1ydPL08QyJVHBxDHHkYWBNS8wpTuWF0twMym6uIc4euqkF-fGpxQWJyal5qSXxocFGBkbGRqZGhmYmjobGxKkCAETUKBA</recordid><startdate>20230810</startdate><enddate>20230810</enddate><creator>GRANT, JR., Marty</creator><creator>WARD, Patrick M</creator><creator>COLVIN, Jessica</creator><creator>LEGAULT, Jean-Francois</creator><creator>EVERETT, David</creator><creator>PATEL, Samiksha</creator><scope>EVB</scope></search><sort><creationdate>20230810</creationdate><title>SYSTEMS AND METHODS FOR MANAGING VULNERABILITY DATA</title><author>GRANT, JR., Marty ; WARD, Patrick M ; COLVIN, Jessica ; LEGAULT, Jean-Francois ; EVERETT, David ; PATEL, Samiksha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2023252164A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2023</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>PHYSICS</topic><toplevel>online_resources</toplevel><creatorcontrib>GRANT, JR., Marty</creatorcontrib><creatorcontrib>WARD, Patrick M</creatorcontrib><creatorcontrib>COLVIN, Jessica</creatorcontrib><creatorcontrib>LEGAULT, Jean-Francois</creatorcontrib><creatorcontrib>EVERETT, David</creatorcontrib><creatorcontrib>PATEL, Samiksha</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>GRANT, JR., Marty</au><au>WARD, Patrick M</au><au>COLVIN, Jessica</au><au>LEGAULT, Jean-Francois</au><au>EVERETT, David</au><au>PATEL, Samiksha</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>SYSTEMS AND METHODS FOR MANAGING VULNERABILITY DATA</title><date>2023-08-10</date><risdate>2023</risdate><abstract>A method for managing vulnerability data may include: (1) ingesting, by a data ingestion engine, vulnerability data from a plurality of sources; (2) normalizing, by a data normalizer module, the vulnerability data into a plurality of data records; (3) generating, by a data processing module, a dynamic risk score for each data record; (4) storing, by a risk record register, a risk record for each data record, wherein the risk record may include the dynamic risk score, a priority level, an identifier for a software application, and a software dependency; (5) selecting, by a control policy selection engine, a control policy based on one of the dynamic risk scores; (6) implementing, by the risk record register, the selected control policy; (7) monitoring, by the risk record register, implementation of the control policy; and (8) updating, by the risk record register, the control policy selection engine based on the monitoring.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2023252164A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
ELECTRIC DIGITAL DATA PROCESSING
PHYSICS
title SYSTEMS AND METHODS FOR MANAGING VULNERABILITY DATA
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T18%3A11%3A12IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=GRANT,%20JR.,%20Marty&rft.date=2023-08-10&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2023252164A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true