Invention Grant
US08458793B2 Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems 有权
方法,计算机程序产品和数据结构,用于入侵检测,入侵响应和目标计算机系统中的漏洞补救

Methods, computer program products and data structures for intrusion detection, intrusion response and vulnerability remediation across target computer systems
Abstract:
Computer security threat management information is generated by receiving a notification of a security threat and/or a notification of a test that detects intrusion of a computer security threat. A computer-actionable TMV is generated from the notification that was received. The TMV includes a computer-readable field that provides identification of at least one system type that is effected by the computer security threat, a computer-readable field that provides identification of a release level for a system type, and a computer-readable field that provides identification of the test that detects intrusion of the computer security threat for a system type and a release level, a computer-readable field that provides identification of a method to reverse the intrusion exploit of the computer security threat for a system type and a release level, and a computer-readable field that provides identification of a method to remediate the vulnerability subject to exploit of the computer security threat for a system type and a release level. The TMV is transmitted to target systems for processing by the target systems.
Information query
Patent Agency Ranking
0/0