The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Mar. 06, 2012

Filed:

Mar. 30, 2007
Applicants:

Paul Gleichauf, Saratoga, CA (US);

Mark Bakke, Maple Grove, MN (US);

Timothy Kuik, Lino Lakes, MN (US);

David Thompson, Rogers, MN (US);

Xiaoxue MA, Sunnyvale, CA (US);

Inventors:

Paul Gleichauf, Saratoga, CA (US);

Mark Bakke, Maple Grove, MN (US);

Timothy Kuik, Lino Lakes, MN (US);

David Thompson, Rogers, MN (US);

Xiaoxue Ma, Sunnyvale, CA (US);

Assignee:

Cisco Technology, Inc., San Jose, CA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 11/00 (2006.01); G06F 12/14 (2006.01); G06F 12/16 (2006.01); G08B 23/00 (2006.01);
U.S. Cl.
CPC ...
Abstract

A computer system, comprising at least one controlled execution space hosting an operating system and an application program; a vulnerability monitoring agent coupled to the controlled execution space; one or more vulnerability profiles coupled to the vulnerability monitoring agent, wherein each of the vulnerability profiles comprises an application program identifier, an operating system identifier, a vulnerability specification describing a vulnerability of an application program that the application program identifier indicates when executed with an operating system that the operating system identifier indicates, and a remedial action which when executed will remediate the vulnerability; wherein the vulnerability monitoring agent is configured to monitor execution of the operating system and the application program in the controlled execution space, to detect an anomaly associated with the vulnerability, to determine the remedial action for the operating system and application program based on one of the vulnerability profiles, and to cause the remedial action.


Find Patent Forward Citations

Loading…