-
公开(公告)号:US10554681B2
公开(公告)日:2020-02-04
申请号:US16174139
申请日:2018-10-29
申请人: OPSWAT, Inc.
发明人: Benjamin Czarny , Jianpeng Mo , Ali Rezafard , David Matthew Patt
摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.
-
公开(公告)号:US11165811B2
公开(公告)日:2021-11-02
申请号:US16780674
申请日:2020-02-03
申请人: OPSWAT, Inc.
发明人: Benjamin Czarny , Jianpeng Mo , Ali Rezafard , David Matthew Patt
摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.
-
公开(公告)号:US09749349B1
公开(公告)日:2017-08-29
申请号:US15275123
申请日:2016-09-23
申请人: OPSWAT, Inc.
发明人: Benjamin Czarny , Jianpeng Mo , Ali Rezafard , David Matthew Patt
CPC分类号: H04L63/1433 , G06F17/30289 , G06F21/577 , H04L63/1425
摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.
-
公开(公告)号:US20200177620A1
公开(公告)日:2020-06-04
申请号:US16780674
申请日:2020-02-03
申请人: OPSWAT, Inc.
发明人: Benjamin Czarny , Jianpeng Mo , Ali Rezafard , David Matthew Patt
摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.
-
公开(公告)号:US10116683B2
公开(公告)日:2018-10-30
申请号:US15664670
申请日:2017-07-31
申请人: OPSWAT, Inc.
发明人: Benjamin Czarny , Jianpeng Mo , Ali Rezafard , David Matthew Patt
摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.
-
公开(公告)号:US20190075129A1
公开(公告)日:2019-03-07
申请号:US16174139
申请日:2018-10-29
申请人: OPSWAT, Inc.
发明人: Benjamin Czarny , Jianpeng Mo , Ali Rezafard , David Matthew Patt
CPC分类号: H04L63/1433 , G06F16/21 , G06F21/577 , H04L63/1425 , H05K999/99
摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.
-
公开(公告)号:US20180091543A1
公开(公告)日:2018-03-29
申请号:US15664670
申请日:2017-07-31
申请人: OPSWAT, Inc.
发明人: Benjamin Czarny , Jianpeng Mo , Ali Rezafard , David Matthew Patt
CPC分类号: H04L63/1433 , G06F17/30289 , G06F21/577 , H04L63/1425
摘要: Computer security vulnerability assessment is performed with product binary data and product vulnerability data that correspond with product identification data. A correspondence between the product binary data and the product vulnerability data is determined, and a binaries-to-vulnerabilities database is generated. The binaries-to-vulnerabilities database is used to scan binary data from a target device to find matches with the product binary data. A known security vulnerability of the target device is determined based on the scanning and the correspondence between the product binary data and the vulnerability data. In some embodiments, the target device is powered off and used as an external storage device to receive the binary data therefrom.
-
-
-
-
-
-