( 72 ) Inventors : Benjamin Czarny , San Francisco , CA Inventors: Benjamin Czarny, San Francisco, CA Inventors: Benjamin Czarny, San Francisco, CA (72) (72) ( US ) ; Jianpeng Mo , Burlingame , CA (US); Jianpeng Mo, Burlingame, CA (US); Jianpeng Mo, Burlingame, CA ( US ) ; Ali Rezafard , Millbrae , CA ( US ) ; (US); Ali Rezafard, Millbrae, CA (US); (US); Ali Rezafard, Millbrae, CA (US); David Matthew Patt , Kansas City , MO David Matthew Patt, Kansas City, MO David Matthew Patt, Kansas City, MO
The diate response to eliminate a threat to the computer device diate response to eliminate a threat to the computer device computerized system receives product vulnerability data and computerized system receives product vulnerability data and of a potentially imminent malicious event .
In some embodiments, the order to prevent security problems , while allowing business product binary data contains strings of bits , bytes , words or order to prevent security problems, while allowing business product binary data contains strings of bits, bytes, words or operations to proceed with minimal interruption .
11 is a simplified schematic diagram of a vulner bits , bytes , words or characters that were extracted , 4 ) the bits, bytes, words or characters that were extracted, 4) the FIG. 11 is a simplified schematic diagram of a vulner- ability database system for use in the example computer complete binary level files of the software products , or 5 ) complete binary level files of the software products, or 5) ability database system for use in the example computer security vulnerability assessment system shown in FIG .
Conventional security vulnerabil- be apparent to those skilled in the art that modifications and ity assessment systems use such file identification data ( to variations can be made in the present technology without 30 30 ity assessment systems use such file identification data (to variations can be made in the present technology without departing from the spirit and scope thereof .