GB2580773B - Remediating software vulnerabilities - Google Patents

Remediating software vulnerabilities Download PDF

Info

Publication number
GB2580773B
GB2580773B GB1917563.7A GB201917563A GB2580773B GB 2580773 B GB2580773 B GB 2580773B GB 201917563 A GB201917563 A GB 201917563A GB 2580773 B GB2580773 B GB 2580773B
Authority
GB
United Kingdom
Prior art keywords
remediating
software vulnerabilities
vulnerabilities
software
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
GB1917563.7A
Other versions
GB201917563D0 (en
GB2580773A (en
Inventor
Hercock Robert
Giaconi Giulio
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
British Telecommunications PLC
Original Assignee
British Telecommunications PLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to GBGB1819706.1A priority Critical patent/GB201819706D0/en
Application filed by British Telecommunications PLC filed Critical British Telecommunications PLC
Publication of GB201917563D0 publication Critical patent/GB201917563D0/en
Publication of GB2580773A publication Critical patent/GB2580773A/en
Application granted granted Critical
Publication of GB2580773B publication Critical patent/GB2580773B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
GB1917563.7A 2018-12-03 2019-12-02 Remediating software vulnerabilities Active GB2580773B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GBGB1819706.1A GB201819706D0 (en) 2018-12-03 2018-12-03 Remediating software vulnerabilities

Publications (3)

Publication Number Publication Date
GB201917563D0 GB201917563D0 (en) 2020-01-15
GB2580773A GB2580773A (en) 2020-07-29
GB2580773B true GB2580773B (en) 2021-07-07

Family

ID=65024890

Family Applications (2)

Application Number Title Priority Date Filing Date
GBGB1819706.1A Ceased GB201819706D0 (en) 2018-12-03 2018-12-03 Remediating software vulnerabilities
GB1917563.7A Active GB2580773B (en) 2018-12-03 2019-12-02 Remediating software vulnerabilities

Family Applications Before (1)

Application Number Title Priority Date Filing Date
GBGB1819706.1A Ceased GB201819706D0 (en) 2018-12-03 2018-12-03 Remediating software vulnerabilities

Country Status (1)

Country Link
GB (2) GB201819706D0 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110321164A1 (en) * 2010-06-28 2011-12-29 Infosys Technologies Limited Method and system for adaptive vulnerability scanning of an application
CN107885999A (en) * 2017-11-08 2018-04-06 华中科技大学 A kind of leak detection method and system based on deep learning

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110321164A1 (en) * 2010-06-28 2011-12-29 Infosys Technologies Limited Method and system for adaptive vulnerability scanning of an application
CN107885999A (en) * 2017-11-08 2018-04-06 华中科技大学 A kind of leak detection method and system based on deep learning

Also Published As

Publication number Publication date
GB2580773A (en) 2020-07-29
GB201917563D0 (en) 2020-01-15
GB201819706D0 (en) 2019-01-16

Similar Documents

Publication Publication Date Title
IL257213D0 (en) Ransomware attack remediation
GB201700350D0 (en) Altered virus
GB201806174D0 (en) Improved downlighter
GB2555384B (en) Preventing phishing attacks
GB201820983D0 (en) Virus
EP3770334A4 (en) Shovel
EP3708718A4 (en) Excavator
GB2580773B (en) Remediating software vulnerabilities
GB201802375D0 (en) Retaining members
GB2574093B (en) Malware barrier
GB201814790D0 (en) Ransomware Remediation
GB2581127B (en) Protection apparatus
GB2560707B (en) Virtualise software application performance
GB201801622D0 (en) Software
GB201801623D0 (en) Software
GB201801238D0 (en) Software application
GB201801237D0 (en) Software application
GB201811225D0 (en) Area denial
GB201901596D0 (en) Software encryption
GB201812740D0 (en) Firewall
GB201716047D0 (en) Virus
IL262221D0 (en) Treat ments forcahcers etc
GB201700259D0 (en) Virus
GB201808656D0 (en) Yoti E-sign
GB201813719D0 (en) Are we there yet