Information security – Monitoring or scanning of software or data including attack... – Vulnerability assessment
Reexamination Certificate
2006-08-22
2006-08-22
Sheikh, Ayaz (Department: 2131)
Information security
Monitoring or scanning of software or data including attack...
Vulnerability assessment
C714S037000, C709S224000, C707S793000, C707S793000
Reexamination Certificate
active
07096502
ABSTRACT:
A method and data processing system assesses the security vulnerability of a network by creating a system object model database representing a network. The system object model database supports the information data requirements of disparate network vulnerability analysis programs. The system object model database is exported to the disparate network vulnerability analysis programs. The network is analyzed with each network vulnerability analysis program to produce data results from each program. Data results are correlated to determine the security posture of the network.
REFERENCES:
patent: 5138321 (1992-08-01), Hammer
patent: 5485409 (1996-01-01), Gupta et al.
patent: 5528516 (1996-06-01), Yemini et al.
patent: 5684957 (1997-11-01), Kondo et al.
patent: 5699403 (1997-12-01), Ronnen
patent: 5745382 (1998-04-01), Vilim et al.
patent: 5751965 (1998-05-01), Mayo et al.
patent: 5787235 (1998-07-01), Smith et al.
patent: 5798939 (1998-08-01), Ochoa et al.
patent: 5812763 (1998-09-01), Teng
patent: 5892903 (1999-04-01), Klaus
patent: 5963653 (1999-10-01), McNary et al.
patent: 6020889 (2000-02-01), Tarbox et al.
patent: 6054987 (2000-04-01), Richardson
patent: 6269447 (2001-07-01), Maloney et al.
patent: 6282546 (2001-08-01), Gleichauf et al.
patent: 6298445 (2001-10-01), Shostack et al.
patent: 6301668 (2001-10-01), Gleichauf et al.
patent: 6324656 (2001-11-01), Gleichauf et al.
patent: 6415321 (2002-07-01), Gleichauf et al.
patent: 6499107 (2002-12-01), Gleichauf et al.
patent: 6883101 (2005-04-01), Fox et al.
patent: 6889168 (2005-05-01), Hartley et al.
patent: 0 961 440 (1999-12-01), None
patent: 99/56195 (1999-11-01), None
patent: WO 99/56195 (1999-11-01), None
Henning et al., “The Network Vulnerability Tool(NVT)—A System Vulnerability Visualization Architecture,” U.S. Government Publication Release Authority, Oct. 18, 1999, pp. 98-111.
Farrell John T.
Fox Kevin L.
Henning Ronda R.
Miller Clifford C.
Abrishamkar Kaveh
Allen Dyer Doppelt Milbrath & Gilchrist, P.A.
Harris Corporation
Sheikh Ayaz
LandOfFree
System and method for assessing the security posture of a... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for assessing the security posture of a..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for assessing the security posture of a... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3619755