The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 01, 2025

Filed:

Apr. 18, 2022
Applicant:

Armis Security Ltd., Tel Aviv-Jaffa, IL;

Inventors:

Evgeny Luk-Zilberman, Herzliya, IL;

Tom Hanetz, Tel Aviv, IL;

Ron Shoham, Tel Aviv, IL;

Yuval Friedlander, Petah-Tiqwa, IL;

Gil Ben Zvi, Hod Hasharon, IL;

Assignee:

Armis Security Ltd., Tel Aviv-Jaffa, IL;

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/73 (2013.01); G06F 16/14 (2019.01); G06F 16/242 (2019.01); G06F 16/903 (2019.01); G06F 21/57 (2013.01); H04L 9/32 (2006.01); H04L 9/40 (2022.01);
U.S. Cl.
CPC ...
G06F 21/73 (2013.01); G06F 16/152 (2019.01); G06F 16/2425 (2019.01); G06F 16/90344 (2019.01); G06F 21/577 (2013.01); H04L 9/3213 (2013.01); H04L 63/1433 (2013.01);
Abstract

A system and method for vulnerability detection. A method includes: tokenizing device attribute data for a device into at least one set of first tokens, wherein each of the first tokens is formatted according to a token schema; creating at least one device attribute string, each device attribute string including one of the first tokens; matching each of the at least one device attribute string to combinations of device attributes stored in a vulnerabilities database in order to identify at least one matching combination of device attributes for the device, wherein the vulnerabilities database stores mappings between combinations of device attributes and vulnerabilities, wherein each combination of device attributes in the vulnerabilities database includes second tokens formatted according to the token schema; detecting at least one vulnerability of the device based on the at least one matching combination of device attributes and the mappings in the vulnerabilities database.


Find Patent Forward Citations

Loading…