Computer System For Distributed Discovery Of Vulnerabilities In Applications

  • Published: Nov 26, 2015
  • Earliest Priority: May 06 2014
  • Family: 15
  • Cited Works: 0
  • Cited by: 2
  • Cites: 0
  • Additional Info: Full text
Abstract

In one aspect, the disclosure provides: a data processing method comprising: using a computer, inviting a distributed plurality of researcher computers to participate in one or more computer vulnerability research projects directed to identifying computer vulnerabilities of one or more systems that are owned or operated by a third party; using the computer, assigning a particular computer vulnerability research project, relating to a particular system under test, to a particular researcher computer from among a subset of the researcher computers; using control logic that is logically interposed between the particular researcher computer and the particular system under test, monitoring networked data communications between the particular researcher computer and the particular system under test, wherein the communications relate to attempting to identify a candidate security vulnerability of the particular system under test, and creating assessment data that assesses the particular researcher computer based upon the networked data communications that are monitored; validating a report of the candidate security vulnerability of the particular system under test that is received from the particular researcher computer; performing one or more remediation operations on the particular system under test based at least in part upon the report. -28- U)) o ~ ~ E cD r5 UU) U) U) U) 0*-0 c -~~~~ = -cD C-U -~~~~~~~l -a~U ) )~~ ~ ' ) ~~a U)C -U C U)l 00C-U 4 - C -')


Claims
Download PDF
Document Preview
Document History
  • Publication: Nov 26, 2015
  • Application: May 5, 2015
    AU AU 2015/202373 A
  • Priority: May 6, 2014
    US US 201414271110 A

Download Citation


Sign in to the Lens

Feedback