US 12,034,735 B2
Method for verifying security technology deployment efficacy across a computer network
Jeffrey J. Guy, Austin, TX (US); Dean Mekkawy, Austin, TX (US); Nevins Bartolomeo, Austin, TX (US); Luis Diego Cabezas, Austin, TX (US); Aaron Griffin, Austin, TX (US); Jacob Hackett, Austin, TX (US); Michael Alfonse, Austin, TX (US); Craig Cason, Austin, TX (US); Mark Shipley, Austin, TX (US); Jason McFarland, Austin, TX (US); Nicholas Murdock, Austin, TX (US); Steve Taylor, Austin, TX (US); and Aaron Smith, Austin, TX (US)
Assigned to Sevco Security, Inc., Austin, TX (US)
Filed by Sevco Security, Inc., Austin, TX (US)
Filed on Sep. 22, 2023, as Appl. No. 18/371,891.
Application 18/371,891 is a continuation in part of application No. 18/129,575, filed on Mar. 31, 2023.
Application 18/129,575 is a continuation of application No. 17/720,163, filed on Apr. 13, 2022, granted, now 11,647,027, issued on May 9, 2023.
Claims priority of provisional application 63/174,485, filed on Apr. 13, 2021.
Claims priority of provisional application 63/281,980, filed on Nov. 22, 2021.
Claims priority of provisional application 63/408,955, filed on Sep. 22, 2022.
Claims priority of provisional application 63/411,544, filed on Sep. 29, 2022.
Prior Publication US 2024/0015165 A1, Jan. 11, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 9/455 (2018.01); H04L 41/0893 (2022.01); H04L 41/12 (2022.01)
CPC H04L 63/104 (2013.01) [G06F 9/45558 (2013.01); H04L 41/0893 (2013.01); H04L 41/12 (2013.01); H04L 63/102 (2013.01); G06F 2009/45587 (2013.01); G06F 2009/45595 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A method comprising:
accessing a set of objects, generated by a set of sources during a first time interval, representing attributes of a set of assets affiliated with a computer network, the set of assets comprising:
a set of endpoint devices; and
a set of applications comprising a first application;
extracting application identifying data from the set of objects;
based on the application identifying data, partitioning the set of objects into a set of object groups comprising a first object group representing the first application during the first time interval;
aggregating attributes represented in objects in the first object group into a first application container, in a set of applications containers, representing the first application;
generating a first manifest of applications, comprising the first application, installed on endpoint devices in the set of endpoint devices during the first time interval based on the set of application containers;
in response to selection of the first application in the first manifest of applications at an operator portal, generating a visualization representing a first set of attributes exhibited by the first application during the first time interval, the first set of attributes comprising a first attribute representing a first subset of endpoint devices, in the set of endpoint devices, on which the first application is installed during the first time interval;
rendering the visualization at the operator interface;
accessing a first subset of endpoint device containers in a set of endpoint device containers, each endpoint device container, in the first subset of endpoint device containers, comprising fixed identifying data and variable status data representing an endpoint device in the first subset of endpoint devices; and
for each endpoint device container in the first subset of endpoint device containers:
generating a tag associating a corresponding endpoint device with the first application; and
compiling the tag in the endpoint device container.