Rapid application security threat analysis

Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S023000

Reexamination Certificate

active

09927427

ABSTRACT:
The following subject matter provides for modeling an application's potential security threats at a logical component level early in the design phase of the application. Specifically, in a computer system, multiple model components are defined to represent respective logical elements of the application. Each model component includes a corresponding set of security threats that could potentially be of import not only to the component but also to the application as a whole in its physical implementation. The model components are interconnected to form a logical model of the application. One or more potential security threats are then analyzed in terms of the model components in the logical model.

REFERENCES:
patent: 5031089 (1991-07-01), Liu et al.
patent: 5220621 (1993-06-01), Saitoh
patent: 5430810 (1995-07-01), Saeki
patent: 5475817 (1995-12-01), Waldo et al.
patent: 5748958 (1998-05-01), Badovinatz et al.
patent: 5768271 (1998-06-01), Seid et al.
patent: 5801970 (1998-09-01), Rowland et al.
patent: 5826015 (1998-10-01), Schmidt
patent: 5845277 (1998-12-01), Pfeil et al.
patent: 5872914 (1999-02-01), Walker, Jr. et al.
patent: 5895499 (1999-04-01), Chu
patent: 5948055 (1999-09-01), Pulsipher et al.
patent: 5960371 (1999-09-01), Saito et al.
patent: 5968126 (1999-10-01), Ekstrom et al.
patent: 6047325 (2000-04-01), Jain et al.
patent: 6070243 (2000-05-01), See et al.
patent: 6075776 (2000-06-01), Tanimoto et al.
patent: 6085238 (2000-07-01), Yuasa et al.
patent: 6108699 (2000-08-01), Moiin
patent: 6108702 (2000-08-01), Wood
patent: 6111993 (2000-08-01), Matsunaga
patent: 6115393 (2000-09-01), Engel et al.
patent: 6125447 (2000-09-01), Gong
patent: 6141749 (2000-10-01), Coss et al.
patent: 6151688 (2000-11-01), Wipfel et al.
patent: 6178529 (2001-01-01), Short et al.
patent: 6192401 (2001-02-01), Modiri et al.
patent: 6208345 (2001-03-01), Sheard et al.
patent: 6212559 (2001-04-01), Bixler et al.
patent: 6230312 (2001-05-01), Hunt
patent: 6259448 (2001-07-01), McNally et al.
patent: 6263089 (2001-07-01), Otsuka et al.
patent: 6266707 (2001-07-01), Boden et al.
patent: 6311144 (2001-10-01), Abu El Ata
patent: 6324571 (2001-11-01), Hacherl
patent: 6336171 (2002-01-01), Coskrey, IV
patent: 6338112 (2002-01-01), Wipfel et al.
patent: 6353898 (2002-03-01), Wipfel et al.
patent: 6360265 (2002-03-01), Falck et al.
patent: 6366578 (2002-04-01), Johnson
patent: 6370573 (2002-04-01), Bowman-Amuah
patent: 6389464 (2002-05-01), Krishnamurthy et al.
patent: 6393456 (2002-05-01), Ambler et al.
patent: 6393474 (2002-05-01), Eichert et al.
patent: 6427163 (2002-07-01), Arendt et al.
patent: 6449641 (2002-09-01), Moiin et al.
patent: 6466932 (2002-10-01), Dennis et al.
patent: 6466978 (2002-10-01), Mukherjee et al.
patent: 6466984 (2002-10-01), Naveh et al.
patent: 6470332 (2002-10-01), Weschler
patent: 6480955 (2002-11-01), DeKoning et al.
patent: 6484261 (2002-11-01), Wiegel
patent: 6487622 (2002-11-01), Coskrey, IV et al.
patent: 6493715 (2002-12-01), Funk et al.
patent: 6496187 (2002-12-01), Deering et al.
patent: 6510154 (2003-01-01), Mayes et al.
patent: 6510509 (2003-01-01), Chopra et al.
patent: 6519615 (2003-02-01), Wollrath et al.
patent: 6529953 (2003-03-01), Van Renesse
patent: 6549516 (2003-04-01), Albert et al.
patent: 6564261 (2003-05-01), Gudjonsson et al.
patent: 6570875 (2003-05-01), Hegde
patent: 6584499 (2003-06-01), Jantz et al.
patent: 6587876 (2003-07-01), Mahon et al.
patent: 6598173 (2003-07-01), Sheikh et al.
patent: 6601101 (2003-07-01), Lee et al.
patent: 6606708 (2003-08-01), Devine et al.
patent: 6609148 (2003-08-01), Salo et al.
patent: 6609213 (2003-08-01), Nguyen et al.
patent: 6615256 (2003-09-01), van Ingen et al.
patent: 6631141 (2003-10-01), Kumar et al.
patent: 6651101 (2003-11-01), Gai et al.
patent: 6675308 (2004-01-01), Thomsen
patent: 6681262 (2004-01-01), Rimmer
patent: 6684335 (2004-01-01), Epstein, III et al.
patent: 6691168 (2004-02-01), Bal et al.
patent: 6694436 (2004-02-01), Audebert
patent: 6717949 (2004-04-01), Boden et al.
patent: 6718379 (2004-04-01), Krishna et al.
patent: 6728885 (2004-04-01), Taylor et al.
patent: 6748447 (2004-06-01), Basani et al.
patent: 6754716 (2004-06-01), Sharma et al.
patent: 6769008 (2004-07-01), Kumar et al.
patent: 6801528 (2004-10-01), Nassar
patent: 6801937 (2004-10-01), Novaes et al.
patent: 6804783 (2004-10-01), Wesinger et al.
patent: 6820121 (2004-11-01), Callis et al.
patent: 6856591 (2005-02-01), Ma et al.
patent: 6862613 (2005-03-01), Kumar et al.
patent: 6904458 (2005-06-01), Bishop et al.
patent: 6907395 (2005-06-01), Hunt et al.
patent: 6957186 (2005-10-01), Guheen et al.
patent: 7027412 (2006-04-01), Miyamoto et al.
patent: 7054943 (2006-05-01), Goldszmidt et al.
patent: 2001/0019554 (2001-09-01), Nomura et al.
patent: 2002/0069369 (2002-06-01), Tremain
patent: 2002/0095524 (2002-07-01), Sanghvi et al.
patent: 2002/0194369 (2002-12-01), Rawlings et al.
patent: 2003/0041139 (2003-02-01), Beadles et al.
patent: 2003/0056063 (2003-03-01), Hochmuth et al.
patent: 2003/0120763 (2003-06-01), Voilpano
patent: 2003/0126230 (2003-07-01), Donatelli et al.
patent: 2003/0154404 (2003-08-01), Beadles et al.
patent: 2003/0206548 (2003-11-01), Bannai et al.
patent: 2004/0054791 (2004-03-01), Chakraborty et al.
patent: 2004/0073443 (2004-04-01), Gabrick et al.
patent: 2004/0078787 (2004-04-01), Borek et al.
patent: 2005/0193103 (2005-09-01), Drabik
patent: 0962861 (1999-12-01), None
patent: 1063815 (2000-12-01), None
patent: WO9963439 (1999-12-01), None
Nestor, “Security Modelling Using Hierarchical State Machines”, IEEE 1991, pp. 110-119.
Shi et al., “An effective Model for Composition of Secure Systems,”, The Journal of Systems and Software, 1998, pp. 233-244.
Nerurkar, “Security Analysis & Design”, Dr. Dobt's Journal, Nov. 2000, pp. 50-56.
Howard et al., “Designing Secure Web-Based Applications for Microsoft Windows 2000”, 2000.
Liu et al., “Visualization in Network Topology Optimization”, ACM, 1992, pp. 131-138.
Li et al., “Hardware Design of a 2-D Motion Estimation System Based on the Hough Transform” IEEE 1998 16 pages.
Smith, et al., “Distributed Management of Future Global Multi-Service Networks” British Telecommunications EngineeringLondon GB v. 13 part 3 Oct. 1, 1994 pp. 221-226.
Somers, “Hybrid: Unifying Centralised and Distributed Network Management using Intelligent Agents” IEEE Network Operations and Management Symposium Kyoto Apr. 15-19, 1996. pp. 34-43.
Webster's Seventh New Collegiate Dictionary. G. C. Merriam Co. Copyright 1971 pp. 438 and 767.
Svend Frolund & Pankah Garg, “Design-Time Simulation of a Large-Scale, Distrubuted object System” ACM 1998, pp. 374-400.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Rapid application security threat analysis does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Rapid application security threat analysis, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Rapid application security threat analysis will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3747747

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.