Diagnosing and tracking product vulnerabilities for telecommunication devices via a database
Systems and methods for tracking telecom computing device vulnerabilities. The system includes a database storing a plurality of entries that describe security vulnerabilities, and a controller that receives input from a user selecting a class of telecommunication devices, e.g. a product line, and s...
Saved in:
Main Authors | , , , , , , |
---|---|
Format | Patent |
Language | English |
Published |
05.06.2018
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Systems and methods for tracking telecom computing device vulnerabilities. The system includes a database storing a plurality of entries that describe security vulnerabilities, and a controller that receives input from a user selecting a class of telecommunication devices, e.g. a product line, and searches the database to identify pertinent entries describing a relevant security vulnerability for the class. The controller also identifies an authoritative entry that describes the relevant security vulnerability, validates pertinent entries within the database that conform with the authoritative entry, generates a report indicating a severity of the security vulnerability within the class based on valid entries within the database, and assesses a severity of the relevant security vulnerability for the class based on the conforming entries. |
---|---|
Bibliography: | Application Number: US201514748756 |