The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 28, 2022

Filed:

Oct. 31, 2018
Applicant:

International Business Machines Corporation, Armonk, NY (US);

Inventors:

Huyanh D. Ngo, Sterling Heights, MI (US);

Aankur Bhatia, Bethpage, NY (US);

Adam J. Paquin, Suwanee, GA (US);

Srinivas B. Tummalapenta, Broomfield, CO (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01); G06N 3/08 (2006.01); G06F 8/65 (2018.01); G06F 21/57 (2013.01); G06F 40/30 (2020.01);
U.S. Cl.
CPC ...
H04L 63/1433 (2013.01); G06F 8/65 (2013.01); G06F 21/577 (2013.01); G06F 40/30 (2020.01); G06N 3/08 (2013.01); H04L 63/10 (2013.01);
Abstract

A method provides an intermediate mitigation of a vulnerability in a particular computer system. One or more processors receive a description of a vulnerability of a computer system to a malicious attack. The processor(s) perform an NLP analysis of the description of the vulnerability in order to extract risk information related to the vulnerability, where the risk information includes an identity of a type of vulnerable computer system resource in the computer system. The processor(s) match the vulnerable computer system resource to a computer system resource in a particular computer system, and perform an intermediate mitigation action that reduces a functionality of the computer system resource in the particular computer system until a solution is implemented that both restores the functionality of the computer system resource in the particular computer system and mitigates the vulnerability of the particular computer system to the malicious attack.


Find Patent Forward Citations

Loading…