The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 12, 2021

Filed:

Jan. 04, 2020
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Muhammed Fatih Bulut, Ossining, NY (US);

Lisa Chavez, Placitas, NM (US);

Jinho Hwang, Ossining, NY (US);

Anup Kalia, Elmsford, NY (US);

Virginia Mayo Policarpio, Jersey City, NJ (US);

Sai Zeng, Yorktown Heights, NY (US);

Attorneys:
Primary Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); H04L 12/58 (2006.01); G06Q 50/00 (2012.01);
U.S. Cl.
CPC ...
H04L 63/1433 (2013.01); G06Q 50/01 (2013.01); H04L 51/32 (2013.01); H04L 63/1441 (2013.01);
Abstract

A method and system of identifying a computing device vulnerability is provided. Social media communication is monitored. Social media threads that are related to a vulnerability, based on the monitored social media communication, are identified, filtered, and categorized into one or more predetermined categories of computing device vulnerabilities. Upon determining that a number of social media posts related to the vulnerability is above a first predetermined threshold, one or more dependable social media threads in a same one or more categories as the vulnerability are searched. One or more possible root causes of the vulnerability are determined from the searched dependable social media threads. A validity score for each of the one or more possible root causes is assigned. A possible root cause from that has a highest validity score that is above a second predetermined threshold is selected to be the root cause of the vulnerability.


Find Patent Forward Citations

Loading…