The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 25, 2022

Filed:

Aug. 31, 2018
Applicant:

Siemens Corporation, Iselin, NJ (US);

Inventors:

Zhen Song, Austin, TX (US);

Rizwan Majeed, Monmouth Junction, NJ (US);

Arquimedes Martinez Canedo, Plainsboro, NJ (US);

Guannan Ren, Monmouth Junction, NJ (US);

Gustavo Arturo Quiros Araya, Princeton, NJ (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06N 20/00 (2019.01); G06F 16/951 (2019.01); G06F 8/77 (2018.01); G06N 5/04 (2006.01); G06F 21/57 (2013.01); G06F 11/36 (2006.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 8/77 (2013.01); G06F 11/3672 (2013.01); G06F 16/951 (2019.01); G06N 5/04 (2013.01); G06N 20/00 (2019.01); G06F 2221/033 (2013.01);
Abstract

A system for checking security vulnerabilities for automation system design includes a security database, an Internet crawler application, and security service application. The security database stores descriptions of known software vulnerabilities related to an automation system. The Internet crawler application is configured to systematically browse the Internet to find new software vulnerabilities related to the automation system and index the new software vulnerability into the security database. The security service application retrieves, from the security database, potential software vulnerabilities related to a hardware/software configuration of the automation system. The security service application also identifies policies related to the potential vulnerabilities. Each policy describes a potential vulnerability and action to be performed in response to detection of the potential vulnerabilities. The security service applies the policies to the hardware/software configuration and software code corresponding to an automation application to identify actual vulnerabilities that can be displayed to a user.


Find Patent Forward Citations

Loading…