Computer security vulnerability assessment

    公开(公告)号:US10554681B2

    公开(公告)日:2020-02-04

    申请号:US16174139

    申请日:2018-10-29

    申请人: OPSWAT, Inc.

    IPC分类号: H04L29/06 G06F21/57 G06F16/21

    摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

    Computer security vulnerability assessment

    公开(公告)号:US11165811B2

    公开(公告)日:2021-11-02

    申请号:US16780674

    申请日:2020-02-03

    申请人: OPSWAT, Inc.

    IPC分类号: H04L29/06 G06F21/57 G06F16/21

    摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

    Computer security vulnerability assessment

    公开(公告)号:US09749349B1

    公开(公告)日:2017-08-29

    申请号:US15275123

    申请日:2016-09-23

    申请人: OPSWAT, Inc.

    IPC分类号: H04L29/06 G06F17/30 G06F21/57

    摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

    COMPUTER SECURITY VULNERABILITY ASSESSMENT
    4.
    发明申请

    公开(公告)号:US20200177620A1

    公开(公告)日:2020-06-04

    申请号:US16780674

    申请日:2020-02-03

    申请人: OPSWAT, Inc.

    IPC分类号: H04L29/06 G06F16/21 G06F21/57

    摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

    Computer security vulnerability assessment

    公开(公告)号:US10116683B2

    公开(公告)日:2018-10-30

    申请号:US15664670

    申请日:2017-07-31

    申请人: OPSWAT, Inc.

    IPC分类号: H04L29/06 G06F17/30 G06F21/57

    摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

    COMPUTER SECURITY VULNERABILITY ASSESSMENT
    6.
    发明申请

    公开(公告)号:US20190075129A1

    公开(公告)日:2019-03-07

    申请号:US16174139

    申请日:2018-10-29

    申请人: OPSWAT, Inc.

    IPC分类号: H04L29/06 G06F17/30 G06F21/57

    摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.

    COMPUTER SECURITY VULNERABILITY ASSESSMENT
    7.
    发明申请

    公开(公告)号:US20180091543A1

    公开(公告)日:2018-03-29

    申请号:US15664670

    申请日:2017-07-31

    申请人: OPSWAT, Inc.

    IPC分类号: H04L29/06 G06F17/30 G06F21/57

    摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.