17840035. DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION simplified abstract (Microsoft Technology Licensing, LLC)

From WikiPatents
Jump to navigation Jump to search

DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION

Organization Name

Microsoft Technology Licensing, LLC

Inventor(s)

Riley Joseph Mckenna of Sammamish WA (US)

Kevin Matthew Martin of Seattle WA (US)

Kristopher Michael Thomas of Issaquah WA (US)

DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION - A simplified explanation of the abstract

This abstract first appeared for US patent application 17840035 titled 'DISTRIBUTED HARDWARE VULNERABILITY IDENTIFICATION AND RESOLUTION

Simplified Explanation

The abstract describes a method for identifying and resolving hardware vulnerabilities in a distributed manner. Here is a simplified explanation of the abstract:

  • The method starts by conducting an inventory of devices on a network.
  • A queue of scanning jobs is generated for each device in the inventory to discover possible ways that the network can be accessed through each device.
  • Devices that are to be blocked based on an expected configuration are scanned to identify devices of interest.
  • A new job is queued for a deep scan of each device of interest, which searches a greater portion and in greater detail of the device compared to prior scanning.
  • The results of the deep scan are passed to an incident manager, which opens an incident ticket for each device of interest.

Potential applications of this technology:

  • Network security: The method can be used to identify and resolve hardware vulnerabilities in a network, enhancing overall security.
  • Incident management: The incident tickets generated can be used to track and resolve identified vulnerabilities efficiently.

Problems solved by this technology:

  • Efficient vulnerability identification: The method automates the process of scanning devices on a network and deep scanning devices of interest, allowing for the efficient identification of hardware vulnerabilities.
  • Distributed approach: By distributing the scanning and resolution process, the method can handle large networks and ensure comprehensive coverage.

Benefits of this technology:

  • Enhanced network security: By identifying and resolving hardware vulnerabilities, the method improves the overall security of a network.
  • Time and resource efficiency: The method automates the scanning process and focuses on devices of interest, saving time and resources compared to manual scanning.
  • Scalability: The distributed approach allows the method to scale and handle networks of various sizes.


Original Abstract Submitted

Various embodiments herein include distributed hardware vulnerability identification and resolution. One method embodiment includes conducting an inventory of devices on a network and generating a queue of scanning jobs for each inventoried device to discover possible modes of network entry via each device. The method then proceeds by scanning devices on the network that are to be blocked according to a stored representation of an expected configuration of each device to identify devices of interest and queuing a new job for a deep scan of each device of interest. Each deep scan is executed to search one or both of a greater portion and in greater detail of a device of interest than prior scanning. The method then passes deep scan results to an incident manager to open an incident ticket for each device of interest.