US 11,722,514 B1
Dynamic vulnerability correlation
Tyler Reguly, Toronto (CA); Chris Pawlukowsky, Alpharetta, GA (US); and Matthew Jonathan Condren, Cumming, GA (US)
Assigned to TRIPWIRE, INC., Portland, OR (US)
Filed by Tripwire, Inc., Portland, OR (US)
Filed on Aug. 6, 2021, as Appl. No. 17/396,467.
Application 16/170,962 is a division of application No. 14/165,410, filed on Jan. 27, 2014, granted, now 10,158,660, issued on Dec. 18, 2018.
Application 17/396,467 is a continuation of application No. 16/170,962, filed on Oct. 25, 2018, granted, now 11,128,652.
Claims priority of provisional application 61/922,679, filed on Dec. 31, 2013.
Claims priority of provisional application 61/892,318, filed on Oct. 17, 2013.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) [H04L 63/20 (2013.01)] 18 Claims
OG exemplary drawing
 
1. A method of vulnerability paring for scanning a target computer, the method comprising:
receiving a plurality of ordered patch milestones, each of the patch milestones designating a set of one or more vulnerability scanning rules having an associated scanning order;
based on a current patch level for the target computer, selecting a set of one or more of but not all of the patch milestones, wherein at least some of the patch milestones are not selected based on the ordering of the patch milestones and the current patch level, wherein the ordering of the patch milestones defines whether an install date of a first patch milestone of the plurality of ordered patch milestones precedes or supercedes an install date a second patch milestone of the plurality of ordered patch milestones; and
evaluating the selected set of patch milestones, the evaluating comprising executing at least one of the vulnerability scanning rules associated with the selected set of patch milestones.