Browse Prior Art Database

Method and System for Possible Vulnerability Prediction

IP.com Disclosure Number: IPCOM000244616D
Publication Date: 2015-Dec-30
Document File: 5 page(s) / 107K

Publishing Venue

The IP.com Prior Art Database

Abstract

Disclosed is a method and system to assist users of multiple networked wireless devices in maintaining system and software updates and protecting the same from vulnerabilities. The solution system creates a stream of data from multiple appropriate manufacturer sites, social sites, and blogs that details potential issues as seen by active users of any versioned component, and then communicates to the user the problem and the fix or source of resolution.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 30% of the total text.

Page 01 of 5

Method and System for Possible Vulnerability Prediction

For users of wireless devices in a home or office network, keeping up with updates and protection from vulnerabilities is a challenge. Technological innovation in one area might induce vulnerabilities in other related areas. A smarter technological upgrade system is needed in order to appropriately upgrade related products to avoid system or device vulnerability. For example, Internet of Things (IoT) devices have increased many opportunities and technical advantages in different home network devices. However, if not all home networking devices are properly upgraded with respect to other devices, then the entire home network might be vulnerable to damage.

The novel contribution is a method and system to create a stream of data from multiple appropriate manufacturer sites, social sites, and blogs that details potential issues as seen by active users of any versioned component. The stream includes information about any potential vulnerabilities of the component. Vulnerabilities can be caused by problems with the monitored component or in combination with any other component that may be installed on a user's same system or network.

Based on the findings, the system then presents to the user either solutions or advertisements on behalf of a vetted solutions provider. In one possible business model, the pricing of this advertising might be based on how many times any company's message is pushed to users of the system.

Figure 1 illustrates a user upgrading some IoT devices. At the same time, some others are not upgraded. At a high level, the novel software system identifies all components, products, sensors, etc. and understands which components are updated to the latest version and which are not. The system also determines whether the latest versions are available for the non-upgraded components.

Figure 1: Typical network of components

1


Page 02 of 5

Figure 2 is a high-level depiction of how information may be presented to any user in order to show vulnerabilities, including how a user may be impacted by any vulnerability.

Figure 2: Rudimentary view of a simple system depiction of issues and possible solutions

In addition, the solution system shows how to upgrade the user's system. Further, it can directly provide certain advertisements from the software that has gathered the knowledge. This is a one-time advertisement based on system discovery, and it links to specific text to show a user how to amend the issue. This is NOT any communication from the company itself. Therefore, only the novel system can display the information to the user; said user will not be inundated with advertisements from any company.

The solution is comprised of multiple components.

System software and component data manager: works as the central hub for the entire network in order to know about all components in the user's entire system (i.e. System Management). Separately, the system has a database popul...