US 12,407,702 B1
Gathering and presenting information related to common vulnerabilities and exposures
Christiaan de Wet, Wallingford (GB); and Yijou Chen, Cupertino, CA (US)
Assigned to Fortinet, Inc., Sunnyvale, CA (US)
Filed by LACEWORK, INC., Mountain View, CA (US)
Filed on Sep. 15, 2023, as Appl. No. 18/467,899.
Application 18/467,899 is a continuation in part of application No. 18/119,045, filed on Mar. 8, 2023, granted, now 11,882,141.
Application 18/119,045 is a continuation of application No. 17/510,179, filed on Oct. 25, 2021, granted, now 11,637,849.
Application 18/119,045 is a continuation of application No. 16/786,822, filed on Feb. 10, 2020, granted, now 11,157,502.
Application 18/119,045 is a continuation of application No. 16/134,806, filed on Sep. 18, 2018, granted, now 10,614,071.
Claims priority of provisional application 62/650,971, filed on Mar. 30, 2018.
Claims priority of provisional application 62/590,986, filed on Nov. 27, 2017.
Int. Cl. H04L 9/40 (2022.01); G06F 9/455 (2018.01); G06F 9/54 (2006.01); G06F 16/2455 (2019.01); G06F 16/901 (2019.01); G06F 16/9038 (2019.01); G06F 16/9535 (2019.01); G06F 16/9537 (2019.01); G06F 21/57 (2013.01); H04L 43/045 (2022.01); H04L 43/06 (2022.01); H04L 67/306 (2022.01); H04L 67/50 (2022.01)
CPC H04L 63/1425 (2013.01) [G06F 9/455 (2013.01); G06F 9/545 (2013.01); G06F 16/9024 (2019.01); G06F 16/9038 (2019.01); G06F 16/9535 (2019.01); G06F 16/9537 (2019.01); G06F 21/57 (2013.01); H04L 43/045 (2013.01); H04L 43/06 (2013.01); H04L 63/10 (2013.01); H04L 67/306 (2013.01); H04L 67/535 (2022.05); G06F 16/2456 (2019.01)] 20 Claims
OG exemplary drawing
 
1. A method of gathering and presenting information related to Common Vulnerabilities and Exposures, the method comprising:
gathering, from a plurality of data sources, information describing a Common Vulnerability and Exposure (CVE);
generating, based on the information, an enriched model object for the CVE comprising portions of the information from the plurality of data sources, including:
parsing the gathered information from each of the plurality of data sources to identify a plurality of attributes for the CVE; and
selecting a subset of the plurality of attributes for inclusion in the enriched model object; and
displaying a report for the CVE based on the enriched model object via a graphical user interface (GUI).