US 12,470,588 B2
Software bill of materials and vulnerability management via deep packet inspection
Aveek Kumar Das, Berkeley, CA (US); Dylan Stewart Spagnuolo, Santa Clara, CA (US); Sultanbek Omurzakov, Los Gatos, CA (US); Gong Cheng, Sunnyvale, CA (US); Mei Wang, Saratoga, CA (US); Jianlin Zeng, Saratoga, CA (US); and Xu Zou, Saratoga, CA (US)
Assigned to Palo Alto Networks, Inc., Santa Clara, CA (US)
Filed by Palo Alto Networks, Inc., Santa Clara, CA (US)
Filed on Jul. 21, 2023, as Appl. No. 18/356,446.
Prior Publication US 2025/0030719 A1, Jan. 23, 2025
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/1433 (2013.01) [H04L 63/1425 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method comprising:
extracting a first plurality of identifiers from network traffic of a first device, wherein at least a subset of the first plurality of identifiers comprises identifiers of at least one of software components and software component versions on the first device;
filtering, from the first plurality of identifiers, identifiers that match one or more of a second plurality of identifiers to obtain the subset of the first plurality of identifiers that correspond to at least one of the software components and software component version, wherein the second plurality of identifiers comprise identifiers known to not correspond to software components or software component versions; and
generating a software bill of materials (SBOM) file for the first device based, at least in part, on the subset of the first plurality of identifiers.