Qualys has patented a method and system for generating attack paths based on user and system risk profiles. The technology involves determining user information, system exploitability, and system criticality to create a risk profile and identify potential attack routes. GlobalData’s report on Qualys gives a 360-degree view of the company including its patenting strategy. Buy the report here.

According to GlobalData’s company profile on Qualys, Network threat detection was a key innovation area identified from patents. Qualys's grant share as of May 2024 was 34%. Grant share is based on the ratio of number of grants to total number of patents.

Generating attack paths based on user and system risk profiles

Source: United States Patent and Trademark Office (USPTO). Credit: Qualys Inc

A recently granted patent (Publication Number: US11968225B2) outlines a method for assessing the vulnerability of a computing device by analyzing user information and system exploitability data. The method involves determining user attributes related to the vulnerability, such as website usage, browser history, downloaded files, and passwords. This information is then quantified along with system exploitability and criticality data to create a risk profile for the device. Based on this profile, an attack path is generated to illustrate how an attacker could potentially access the device. The patent also covers aspects like vulnerability based on patching data, security windows indicating exposure time after a new patch release, and the combination of user, exploitability, and criticality information to determine the risk profile.

Furthermore, the patent includes details about a computer program product and a system implementing the method described. The computer program product consists of computer-readable code that quantifies user attributes, system exploitability, and criticality information to determine a risk profile and generate an attack path. The system, on the other hand, comprises computing system processors and memory storing instructions to carry out the vulnerability assessment process. It also emphasizes the importance of data related to vulnerability and patching, security windows indicating exposure and protection timeframes, and the amalgamation of user, exploitability, and criticality data to establish the risk profile. Overall, the patent provides a comprehensive framework for evaluating and addressing vulnerabilities in computing devices based on user behavior and system characteristics.

To know more about GlobalData’s detailed insights on Qualys, buy the report here.

Data Insights

From

The gold standard of business intelligence.

Blending expert knowledge with cutting-edge technology, GlobalData’s unrivalled proprietary data will enable you to decode what’s happening in your market. You can make better informed decisions and gain a future-proof advantage over your competitors.

GlobalData

GlobalData, the leading provider of industry intelligence, provided the underlying data, research, and analysis used to produce this article.

GlobalData Patent Analytics tracks bibliographic data, legal events data, point in time patent ownerships, and backward and forward citations from global patenting offices. Textual analysis and official patent classifications are used to group patents into key thematic areas and link them to specific companies across the world’s largest industries.