The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.
The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.
Patent No.:
Date of Patent:
Jan. 23, 2024
Filed:
Jun. 21, 2022
Palantir Technologies Inc., Denver, CO (US);
Elliot Colquhoun, Sydney, AU;
Abhishek Agarwal, Jaipur, IN;
Andrew Eggleton, Doha, QA;
Brandon Helms, Arnold, MD (US);
Carl Ambroselli, Potsdam, DE;
Cem Zorlular, New York, NY (US);
Daniel Kelly, New York, NY (US);
Gautam Punukollu, New York, NY (US);
Jeffrey Tsui, Palo Alto, CA (US);
Morten Kromann, Copenhagen, DK;
Nikhil Seetharaman, Palo Alto, CA (US);
Raj Krishnan, Mumbai, IN;
Samuel Jones, Chelmsford, MA (US);
Tareq Alkhatib, Richmond, CA;
Dayang Shi, New York, NY (US);
Palantir Technologies Inc., Denver, CO (US);
Abstract
A method, apparatus, and computer program are disclosed. The method may be performed by one or more processors and may comprise receiving first data representing an infrastructure of a computer network, the first data comprising an indication of hosts which form at least part of the computer network and one or more software resources on respective hosts. The method may also comprise receiving second data from a vulnerability scanning software, the second data comprising an indication of one or more vulnerabilities detected in the one or more software resources provided on at least some of the hosts of the computer network. Using a combination of the first data and the second data, output data may be generated representing a risk profile of the computer network infrastructure, the output data indicating one or more subsets of hosts, determined as being at risk of being affected by the detected vulnerabilities by virtue of the software resources they provide for output on a user interface.