SG10201912351QA - Continuous vulnerability management for modern applications - Google Patents

Continuous vulnerability management for modern applications

Info

Publication number
SG10201912351QA
SG10201912351QA SG10201912351QA SG10201912351QA SG10201912351QA SG 10201912351Q A SG10201912351Q A SG 10201912351QA SG 10201912351Q A SG10201912351Q A SG 10201912351QA SG 10201912351Q A SG10201912351Q A SG 10201912351QA SG 10201912351Q A SG10201912351Q A SG 10201912351QA
Authority
SG
Singapore
Prior art keywords
vulnerability management
modern applications
continuous vulnerability
continuous
modern
Prior art date
Application number
SG10201912351QA
Inventor
Velur Shashi
Sharma Abha
Kengan Karthiga
MANIVANNAN Keeshini
VASHI Chintal
Original Assignee
Visa Int Service Ass
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visa Int Service Ass filed Critical Visa Int Service Ass
Publication of SG10201912351QA publication Critical patent/SG10201912351QA/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2115Third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
SG10201912351QA 2019-01-28 2019-12-17 Continuous vulnerability management for modern applications SG10201912351QA (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US16/259,960 US11481498B2 (en) 2019-01-28 2019-01-28 Continuous vulnerability management for modern applications

Publications (1)

Publication Number Publication Date
SG10201912351QA true SG10201912351QA (en) 2020-08-28

Family

ID=69326399

Family Applications (1)

Application Number Title Priority Date Filing Date
SG10201912351QA SG10201912351QA (en) 2019-01-28 2019-12-17 Continuous vulnerability management for modern applications

Country Status (4)

Country Link
US (1) US11481498B2 (en)
EP (1) EP3693874B1 (en)
CN (1) CN111488578A (en)
SG (1) SG10201912351QA (en)

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11960609B2 (en) * 2019-10-21 2024-04-16 Snyk Limited Package dependencies representation
US11100239B2 (en) 2019-05-06 2021-08-24 Sap Se Open source library security rating
US11210404B2 (en) * 2019-06-14 2021-12-28 Netiq Corporation Blockchain-based state verifications of software component vulnerability database for software products
US11422917B2 (en) * 2019-07-26 2022-08-23 Red Hat, Inc. Deriving software application dependency trees for white-box testing
US11704414B2 (en) 2020-04-29 2023-07-18 Jpmorgan Chase Bank, N.A. Systems and methods for managing vulnerability data
US11470159B2 (en) * 2020-08-28 2022-10-11 Cisco Technology, Inc. API key security posture scoring for microservices to determine microservice security risks
US20220083667A1 (en) * 2020-09-16 2022-03-17 At&T Intellectual Property I, L.P. Open Source Software Security Vulnerability Prioritization Scheme
US20220156383A1 (en) * 2020-09-17 2022-05-19 Dynatrace Llc Method And System For Real Time Detection And Prioritization Of Computing Assets Affected By Publicly Known Vulnerabilities Based On Topological And Transactional Monitoring Data
EP4226240A1 (en) * 2020-10-09 2023-08-16 Conektto, Inc. Natural language processing of api specifications for automatic artifact generation
CN112416757B (en) * 2020-11-03 2021-11-12 前海飞算云智软件科技(深圳)有限公司 Component development method, device, storage medium and electronic equipment
CN112434305B (en) * 2020-12-07 2024-03-08 北京中科微澜科技有限公司 Patch-based vulnerability detection method and device, storage medium and electronic equipment
CN113139192B (en) * 2021-04-09 2024-04-19 扬州大学 Third party library security risk analysis method and system based on knowledge graph
CN113360955A (en) * 2021-06-16 2021-09-07 深圳市雪球科技有限公司 Applet management method and device and server
US11831688B2 (en) * 2021-06-18 2023-11-28 Capital One Services, Llc Systems and methods for network security
US20230036739A1 (en) * 2021-07-28 2023-02-02 Red Hat, Inc. Secure container image builds
US11775290B2 (en) * 2021-08-06 2023-10-03 Fujitsu Limited Detection of API backward compatibility across software versions
US11893116B2 (en) 2021-08-19 2024-02-06 Bank Of America Corporation Assessment plug-in system for providing binary digitally signed results
US11805017B2 (en) 2021-08-19 2023-10-31 Bank Of America Corporation Systems and methods for identifying and determining third party compliance
US11546218B1 (en) 2021-08-30 2023-01-03 Bank Of America Corporation Systems and methods for bi-directional machine-learning (ML)-based network compatibility engine
WO2023038957A1 (en) * 2021-09-08 2023-03-16 Lacework, Inc. Monitoring a software development pipeline
CN116028057A (en) * 2021-10-27 2023-04-28 北京字节跳动网络技术有限公司 Code management method and device
CN114143110B (en) * 2021-12-08 2024-04-26 湖北天融信网络安全技术有限公司 Vulnerability processing method, device and system of mimicry equipment
US20230237158A1 (en) * 2022-01-24 2023-07-27 Dell Products L.P. Method and system for detecting vulnerabilities of an installed application before a computing device gets affected
CN115220765A (en) * 2022-03-08 2022-10-21 洪兴发 Vulnerability supplementary repair analysis method and system based on big data vulnerability analysis
CN117131514B (en) * 2023-10-25 2024-04-09 中汽智联技术有限公司 Internet of vehicles supply chain security vulnerability early warning method, system and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1739552A1 (en) * 2005-06-21 2007-01-03 Hewlett-Packard Development Company, L.P. Software installation method and computer system
JP4722730B2 (en) 2006-03-10 2011-07-13 富士通株式会社 Security management program, security management device, and security management method
KR101478134B1 (en) * 2012-02-29 2015-01-26 주식회사 팬택 File management method for mobile device and mobile device using thereof
CN105989283B (en) * 2015-02-06 2019-08-09 阿里巴巴集团控股有限公司 A kind of method and device identifying virus mutation
US10614223B2 (en) 2015-05-28 2020-04-07 Micro Focus Llc Security vulnerability detection
US9703961B2 (en) * 2015-06-05 2017-07-11 Accenture Global Services Limited Process risk classification
US10277620B2 (en) * 2016-09-08 2019-04-30 Corax Cyber Security, Inc. Determining an assessment of a security breach for an asset of a network infrastructure
WO2018085732A1 (en) * 2016-11-03 2018-05-11 RiskIQ, Inc. Techniques for detecting malicious behavior using an accomplice model
US10678513B2 (en) * 2017-09-12 2020-06-09 Devfactory Fz-Llc Library upgrade method, apparatus, and system

Also Published As

Publication number Publication date
US20200242254A1 (en) 2020-07-30
CN111488578A (en) 2020-08-04
EP3693874A1 (en) 2020-08-12
EP3693874B1 (en) 2022-10-19
US11481498B2 (en) 2022-10-25

Similar Documents

Publication Publication Date Title
SG10201912351QA (en) Continuous vulnerability management for modern applications
GB2614141B (en) Firmware management for IoT devices
IL288030B (en) Rate-optimized congestion management
SG11202010075XA (en) Multi-uav management
SG11202107072VA (en) Blockchain management system
GB201902167D0 (en) Communications systems
SG11202108335RA (en) Management system
EP3806253C0 (en) Cable management systems
IL292873A (en) Spatio-temporal-interactive networks
EP3931088C0 (en) Thermal management system
ZA202110088B (en) Environmental management system
PL3909180T3 (en) Scell management for ca
GB2585010B (en) Cryptocurrency key management
SG11202109749QA (en) Access right management
GB2581795B (en) Thermal management system
GB201900480D0 (en) Network management
EP3881646A4 (en) Trace management
EP4085145A4 (en) Guided excision-transposition systems
GB201905355D0 (en) Vehicle-distributed asset management
SG11202110786SA (en) Cryptographic systems
GB2582653B (en) Cooling arrangement
GB201909003D0 (en) Anonymization
SG11202111108PA (en) Management system
GB2612918B (en) Firmware management for IOT devices
GB2582281B (en) Vehicle management