Nozomi Networks has patented a method for verifying network device vulnerabilities using Common Vulnerabilities and Exposures (CVE) entries. The method involves indexing CVE entries, decoding network packets, and matching them with CVE entries to raise alerts. The process includes generating a CVE tree, splitting CPE records, and tokenizing decoded strings for matching. GlobalData’s report on Nozomi Networks gives a 360-degree view of the company including its patenting strategy. Buy the report here.

According to GlobalData’s company profile on Nozomi Networks, Facial recognition AI was a key innovation area identified from patents. Nozomi Networks's grant share as of February 2024 was 15%. Grant share is based on the ratio of number of grants to total number of patents.

Method for verifying network device vulnerabilities using cve entries

Source: United States Patent and Trademark Office (USPTO). Credit: Nozomi Networks Inc

A recently granted patent (Publication Number: US11930033B2) outlines a method for verifying vulnerabilities of network devices using Common Vulnerabilities and Exposures (CVE) entries. The method involves indexing each CVE entry, decoding network packets related to the network device, and matching the decoded string with the indexed CVE entry to raise an alert when a match is found. The indexing process includes generating a CVE tree, identifying vulnerable configuration fields, and extracting sets of vulnerable conditions. The decoding process involves tokenizing the decoded string into n-grams, while the matching process includes a lookup into the CVE tree based on the operator attribute and CPE records.

Furthermore, the patent details additional aspects of the method, such as identifying main operator attributes and nested sets of vulnerable conditions, as well as specific protocols like the Cisco Discovery Protocol for network packets. The method also specifies the range of n-gram sizes used, the identification of vulnerable configuration fields and operator attributes, and the normalization process for the decoded string before tokenizing. Overall, the method provides a comprehensive approach to verifying vulnerabilities in network devices using CVE entries, enhancing cybersecurity measures for network infrastructure.

To know more about GlobalData’s detailed insights on Nozomi Networks, buy the report here.

Premium Insights

From

The gold standard of business intelligence.

Blending expert knowledge with cutting-edge technology, GlobalData’s unrivalled proprietary data will enable you to decode what’s happening in your market. You can make better informed decisions and gain a future-proof advantage over your competitors.

GlobalData

GlobalData, the leading provider of industry intelligence, provided the underlying data, research, and analysis used to produce this article.

GlobalData Patent Analytics tracks bibliographic data, legal events data, point in time patent ownerships, and backward and forward citations from global patenting offices. Textual analysis and official patent classifications are used to group patents into key thematic areas and link them to specific companies across the world’s largest industries.