System and method for performing remote security assessment of firewalled computer
First Claim
1. A method comprising:
- providing an endpoint device comprising a web browser in communication with a network;
providing a scanner server in communication with the network, wherein the scanner server comprises a scanner engine;
establishing a secure layer connection between the scanner engine of the scanner server and a web browser plug-in of the endpoint device;
transmitting commands for collecting data associated with the endpoint device from the scanner engine to the web browser plug-in via the secure layer connection;
receiving data associated with the endpoint device at the scanner engine and from the web browser plug-in via the secure layer connection, wherein the received data was collected using the web browser plug-in;
analyzing the received data using the scanner engine to assess a current security vulnerability posture of the endpoint device;
identifying, using the scanner engine, an update for the endpoint device based on analyzing the received data; and
transmitting the update from the scanner engine to the endpoint device,wherein the scanner server is coupled to the network through a proxy server,wherein the proxy server takes over the secure layer connection in response to the web browser plug-in of the endpoint device no longer being in communication with the scanner engine of the scanner server.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for scanning an endpoint terminal across an open computer network are disclosed. An exemplary method includes providing a scanner engine in a computer server in communication with an open computer network, and establishing a secure connection across the open computer network between the scanner engine and a scanner agent installed on the endpoint terminal in communication with the open computer network. Commands for collecting data regarding the endpoint terminal are sent from the scanner engine across the secure connection to the scanner agent. The scanner engine then receives the collected data from the scanner agent across the secure connection, analyzes the data to assess a current posture of the endpoint terminal, and determines any updates for the endpoint terminal from the analysis. Updates are sent across the secure connection to the scanner agent for installation on the endpoint terminal, and the secure connection may then be terminated.
-
Citations
20 Claims
-
1. A method comprising:
-
providing an endpoint device comprising a web browser in communication with a network; providing a scanner server in communication with the network, wherein the scanner server comprises a scanner engine; establishing a secure layer connection between the scanner engine of the scanner server and a web browser plug-in of the endpoint device; transmitting commands for collecting data associated with the endpoint device from the scanner engine to the web browser plug-in via the secure layer connection; receiving data associated with the endpoint device at the scanner engine and from the web browser plug-in via the secure layer connection, wherein the received data was collected using the web browser plug-in; analyzing the received data using the scanner engine to assess a current security vulnerability posture of the endpoint device; identifying, using the scanner engine, an update for the endpoint device based on analyzing the received data; and transmitting the update from the scanner engine to the endpoint device, wherein the scanner server is coupled to the network through a proxy server, wherein the proxy server takes over the secure layer connection in response to the web browser plug-in of the endpoint device no longer being in communication with the scanner engine of the scanner server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A scanning server comprising:
-
at least one computer readable storage including instructions; and at least one processing device configured to execute the instructions, wherein executing the instructions causes the at least one processing device to perform the operations of; establishing a secure layer connection between a scanner engine comprised in the scanner server and a web browser plug-in of an endpoint device, wherein each of the scanning server and the endpoint device are in communication with a network; transmitting commands for collecting data associated with the endpoint device from the scanner engine to the web browser plug-in via the secure layer connection; receiving data associated with the endpoint device at the scanner engine and from the web browser plug-in via the secure layer connection, wherein the received data was collected using the web browser plug-in; analyzing the received data using the scanner engine to assess a current security vulnerability posture of the endpoint device; identifying, using the scanner engine, an update for the endpoint device based on analyzing the received data; and transmitting the update from the scanner engine to the endpoint device, wherein the scanner server is coupled to the network through a proxy server, wherein the proxy server takes over the secure layer connection in response to the web browser plug-in of the endpoint device no longer being in communication with the scanner engine of the scanner server. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system comprising:
-
an endpoint device comprising a web browser in communication with a network; a scanner server in communication with the network, wherein the scanner server comprises a scanning engine for conducting scans of the endpoint device, wherein conducting scans of the endpoint device comprises; establishing a secure layer connection between the scanner engine of the scanner server and a web browser plug-in of the endpoint device; transmitting commands for collecting data associated with the endpoint device from the scanner engine to the web browser plug-in via the secure layer connection; receiving data associated with the endpoint device at the scanner engine and from the web browser plug-in via the secure layer connection, wherein the received data was collected using the web browser plug-in; analyzing the received data using the scanner engine to assess a current security vulnerability posture of the endpoint device; identifying, using the scanner engine, an update for the endpoint device based on analyzing the received data; and transmitting the update from the scanner engine to the endpoint device, wherein the scanner server is coupled to the network through a proxy server, wherein the proxy server takes over the secure layer connection in response to the web browser plug-in of the endpoint device no longer being in communication with the scanner engine of the scanner server. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification