17962756. GENERATING A MULTI-PLATFORM REMEDIATION INFRASTRUCTURE BASED ON INTELLIGENTLY FORECASTING AND CONFIGURING A REMEDIATION SCHEDULE simplified abstract (Bank of America Corporation)
Contents
- 1 GENERATING A MULTI-PLATFORM REMEDIATION INFRASTRUCTURE BASED ON INTELLIGENTLY FORECASTING AND CONFIGURING A REMEDIATION SCHEDULE
- 1.1 Organization Name
- 1.2 Inventor(s)
- 1.3 GENERATING A MULTI-PLATFORM REMEDIATION INFRASTRUCTURE BASED ON INTELLIGENTLY FORECASTING AND CONFIGURING A REMEDIATION SCHEDULE - A simplified explanation of the abstract
- 1.4 Simplified Explanation
- 1.5 Potential Applications
- 1.6 Problems Solved
- 1.7 Benefits
- 1.8 Potential Commercial Applications
- 1.9 Possible Prior Art
- 1.10 Unanswered Questions
- 1.11 Original Abstract Submitted
GENERATING A MULTI-PLATFORM REMEDIATION INFRASTRUCTURE BASED ON INTELLIGENTLY FORECASTING AND CONFIGURING A REMEDIATION SCHEDULE
Organization Name
Inventor(s)
Aashish Chandrahas Vinherkar of Mumbai (IN)
Kommu John Bilton of Secunderabad (IN)
Siva Venkata Lakshmi Sai Kumar Devulapalli of Hyderabad (IN)
GENERATING A MULTI-PLATFORM REMEDIATION INFRASTRUCTURE BASED ON INTELLIGENTLY FORECASTING AND CONFIGURING A REMEDIATION SCHEDULE - A simplified explanation of the abstract
This abstract first appeared for US patent application 17962756 titled 'GENERATING A MULTI-PLATFORM REMEDIATION INFRASTRUCTURE BASED ON INTELLIGENTLY FORECASTING AND CONFIGURING A REMEDIATION SCHEDULE
Simplified Explanation
The patent application abstract describes a system for generating a multi-platform remediation infrastructure by intelligently forecasting and configuring a remediation schedule based on analyzing vulnerabilities within an enterprise organization's infrastructure.
- The computing platform continuously analyzes components within the enterprise organization infrastructure to identify vulnerabilities.
- Vulnerabilities are grouped based on similarities, and a remediation schedule is generated for each group.
- The system analyzes the remediation schedule to ensure it does not contain anomalies before remediating the vulnerabilities.
- If anomalies are detected in the schedule, further analysis is conducted to determine if the vulnerabilities can still be remediated.
Potential Applications
This technology could be applied in various industries where cybersecurity is crucial, such as finance, healthcare, and government sectors.
Problems Solved
This technology helps organizations efficiently manage and remediate vulnerabilities in their infrastructure, reducing the risk of cyber attacks and data breaches.
Benefits
The system automates the process of identifying and remedying vulnerabilities, saving time and resources for organizations. It also helps improve overall cybersecurity posture by proactively addressing potential threats.
Potential Commercial Applications
One potential commercial application of this technology could be as a cybersecurity solution provider for businesses looking to enhance their security measures.
Possible Prior Art
One possible prior art for this technology could be existing vulnerability management systems that help organizations identify and remediate security vulnerabilities in their infrastructure.
Unanswered Questions
1. How does the system prioritize which vulnerabilities to remediate first? 2. What measures are in place to ensure the accuracy and reliability of the vulnerability analysis conducted by the computing platform?
Original Abstract Submitted
Aspects of the disclosure relate to generating a multi-platform remediation infrastructure based on intelligently forecasting and configuring a remediation schedule. The computing platform may continuously analyze components within the enterprise organization infrastructure to identify at least one vulnerability within the infrastructure. The computing platform may group the vulnerabilities based on identified similarities and may identify, for each group, a time during which each vulnerability may be remediated. The computing platform may use the times to generate a remediation schedule and may analyze the remediation schedule to determine whether the schedule comprises anomalies. Based on determining the remediation schedule does not comprise anomalies, the computing platform may remediate the vulnerabilities indicated on the remediation schedule. Alternatively, based on determining the remediation schedule comprises anomalies, the computing platform may further analyze the vulnerabilities to determine whether the vulnerabilities may be remediated.