The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 19, 2024

Filed:

Feb. 25, 2021
Applicant:

Bank of America Corporation, Charlotte, NC (US);

Inventors:

Benjamin John Ansell, Basingstoke, GB;

Yuvraj Singh, Bracknell, GB;

Min Cao, Shanghai, CN;

Ra Uf Ridzuan Bin Ma Arof, Bedok, SG;

Hemant Meenanath Patil, Mumbai, IN;

Pallavi Yerra, Hyderabad, IN;

Kaushik Mitra Chowdhury, Yio Chu Kang, SG;

Assignee:

Bank of America Corporation, Charlotte, NC (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/57 (2013.01); G06F 21/51 (2013.01); G06N 5/04 (2023.01); G06N 20/00 (2019.01); G06V 30/416 (2022.01);
U.S. Cl.
CPC ...
G06F 21/577 (2013.01); G06F 21/51 (2013.01); G06N 5/04 (2013.01); G06N 20/00 (2019.01); G06V 30/416 (2022.01); G06F 2221/033 (2013.01);
Abstract

An apparatus includes a memory and a processor. The memory stores descriptions of known vulnerabilities and information generated by a monitoring subsystem. Each description of a known vulnerability identifies software components that are associated with the known vulnerability. The monitoring subsystem monitors software programs that are installed within a computer system. The information includes descriptions of issues that are associated with the software programs. The processor generates a set of mappings, based on a comparison between the text describing the known software vulnerabilities and the text describing the issues. Each mapping associates a software program that is associated with an issue with a known software vulnerability. The processor also uses a machine learning algorithm to predict that a given software program is associated with a particular software vulnerability. In response to predicting that the given software program is associated with the particular software vulnerability, the processor generates an alert.


Find Patent Forward Citations

Loading…