The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Nov. 18, 2025

Filed:

Apr. 01, 2022
Applicant:

Vectra Ai, Inc., San Jose, CA (US);

Inventors:

Nicolas Beauchesne, Honolulu, HI (US);

Sohrob Kazerounian, Brookline, MA (US);

William Stow Finlayson, Iv, Cherry Hill, NJ (US);

Karl Matthew Lynn, San Jose, CA (US);

Assignee:

Vectra AI, Inc., San Jose, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
H04L 9/40 (2022.01);
U.S. Cl.
CPC ...
H04L 63/145 (2013.01); H04L 63/1416 (2013.01); H04L 63/20 (2013.01);
Abstract

Disclosed is an approach for analyzing attack paths in computer network generated using a software representation that embodies network configuration and policy data for security management. In some embodiments, the approach includes a process to analyze attack paths in a computer network to determine which attack paths might be most productively covered using a corresponding detection signature. In some embodiments, the attack paths are identified using a software representation that embodies network configuration and policy data. The software representation comprises a state machine where different states can be reached using respective transitions or properties. The states correspond to respective entities on the network which may comprise resources that are identifiable for protection in the software representation using crash statements. The software representation can then be stimulated using software analysis tools such to identify sequences of state-to-state transitions that could be used to compromise a protected resource on the computer network.


Find Patent Forward Citations

Loading…