Diagnosing and tracking product vulnerabilities for telecommunication devices via a database

Systems and methods for tracking telecom computing device vulnerabilities. The system includes a database storing a plurality of entries that describe security vulnerabilities, and a controller that receives input from a user selecting a class of telecommunication devices, e.g. a product line, and s...

Full description

Saved in:
Bibliographic Details
Main Authors Vasireddy, Rao, Shah, Kirtan, McGee, Andrew R, Johnson, Keith W, McBride, Donald, Jaramillo, Fabio, Verbruggen, Marc
Format Patent
LanguageEnglish
Published 05.06.2018
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Systems and methods for tracking telecom computing device vulnerabilities. The system includes a database storing a plurality of entries that describe security vulnerabilities, and a controller that receives input from a user selecting a class of telecommunication devices, e.g. a product line, and searches the database to identify pertinent entries describing a relevant security vulnerability for the class. The controller also identifies an authoritative entry that describes the relevant security vulnerability, validates pertinent entries within the database that conform with the authoritative entry, generates a report indicating a severity of the security vulnerability within the class based on valid entries within the database, and assesses a severity of the relevant security vulnerability for the class based on the conforming entries.
Bibliography:Application Number: US201514748756