Processing

Please wait...

Settings

Settings

Goto Application

1. WO2019089389 - SYSTEMS AND METHODS FOR PRIORITIZING SOFTWARE VULNERABILITIES FOR PATCHING

Publication Number WO/2019/089389
Publication Date 09.05.2019
International Application No. PCT/US2018/057812
International Filing Date 26.10.2018
IPC
G06F 11/00 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
11Error detection; Error correction; Monitoring
G06F 12/16 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
12Accessing, addressing or allocating within memory systems or architectures
16Protection against loss of memory contents
G06F 12/14 2006.01
GPHYSICS
06COMPUTING; CALCULATING OR COUNTING
FELECTRIC DIGITAL DATA PROCESSING
12Accessing, addressing or allocating within memory systems or architectures
14Protection against unauthorised use of memory
CPC
G06F 11/00
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
11Error detection; Error correction; Monitoring
G06F 11/008
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
11Error detection; Error correction; Monitoring
008Reliability or availability analysis
G06F 12/16
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
12Accessing, addressing or allocating within memory systems or architectures
16Protection against loss of memory contents
G06F 21/552
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
55Detecting local intrusion or implementing counter-measures
552involving long-term monitoring or reporting
G06F 21/577
GPHYSICS
06COMPUTING; CALCULATING; COUNTING
FELECTRIC DIGITAL DATA PROCESSING
21Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
577Assessing vulnerabilities and evaluating computer system security
Applicants
  • ARIZONA BOARD OF REGENTS ON BEHALF OF ARIZONA STATE UNIVERSITY [US]/[US] (AE, AG, AL, AM, AO, AT, AU, AZ, BA, BB, BE, BF, BG, BH, BJ, BN, BR, BW, BY, BZ, CA, CF, CG, CH, CI, CL, CM, CN, CO, CR, CU, CY, CZ, DE, DJ, DK, DM, DO, DZ, EC, EE, EG, ES, FI, FR, GA, GB, GD, GE, GH, GM, GN, GQ, GR, GT, GW, HN, HR, HU, ID, IE, IL, IN, IR, IS, IT, JO, JP, KE, KG, KH, KM, KN, KP, KR, KW, KZ, LA, LC, LK, LR, LS, LT, LU, LV, LY, MA, MC, MD, ME, MG, MK, ML, MN, MR, MT, MW, MX, MY, MZ, NA, NE, NG, NI, NL, NO, NZ, OM, PA, PE, PG, PH, PL, PT, QA, RO, RS, RU, RW, SA, SC, SD, SE, SG, SI, SK, SL, SM, SN, ST, SV, SY, SZ, TD, TG, TH, TJ, TM, TN, TR, TT, TZ, UA, UG, UZ, VC, VN, ZA, ZM, ZW)
  • SHAKARIAN, Paulo [US]/[US] (US)
  • ALMUKAYNIZI, Mohammed [SA]/[US] (US)
  • SHAKARIAN, Jana [US]/[US] (US)
  • NUNES, Eric [IN]/[US] (US)
  • DHARAIYA, Krishna [IN]/[US] (US)
  • SENGUTTUVAN, Manoj Balasubramaniam [IN]/[US] (US)
  • GRIMM, Alexander [US]/[US] (US)
Inventors
  • SHAKARIAN, Paulo
  • ALMUKAYNIZI, Mohammed
  • SHAKARIAN, Jana
  • NUNES, Eric
  • DHARAIYA, Krishna
  • SENGUTTUVAN, Manoj Balasubramaniam
  • GRIMM, Alexander
Agents
  • BAI, Ari
  • FONTES, Timothy
Priority Data
62/581,12303.11.2017US
Publication Language English (EN)
Filing Language English (EN)
Designated States
Title
(EN) SYSTEMS AND METHODS FOR PRIORITIZING SOFTWARE VULNERABILITIES FOR PATCHING
(FR) SYSTÈMES ET PROCÉDÉS D'ATTRIBUTION DE PRIORITÉ À DES VULNÉRABILITÉS LOGICIELLES À DES FINS DE CORRECTION
Abstract
(EN)
Various embodiments for predicting which software vulnerabilities will be exploited by malicious hackers and hence prioritized by patching are disclosed.
(FR)
L'invention selon divers modes de réalisation concerne une prédiction permettant de prédire les vulnérabilités logicielles qui seront exploitées par des pirates malveillants et qui feront, par conséquent, l'objet d'une attribution de priorité par une correction.
Also published as
EP2018873277
Latest bibliographic data on file with the International Bureau