Security scanning system and method
First Claim
1. A non-transitory computer-readable storage medium including processor executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
- scanning, with a website scanning program, a control panel application for enabling a user to access a set-top-box remotely to navigate and select content, wherein the website scanning program is configured to access the set-top-box via a broadband connection to a modem locally coupled to the set-top-box, wherein scanning the control panel application includes;
receiving a uniform resource locator (URL) associated with a web server level of the control panel application, wherein the URL is indicative of a particular website; and
automatically navigating the particular website as a simulated user to discover links and record responses;
scanning, with an operating system level scanning program, the control panel application and an operating system in which the control panel application is executing;
scanning, with the website scanning program, a second application, wherein the second application provides Internet content to the set-top-box;
scanning, by the operating system level scanning program, the second application;
scanning, with a third scanning program, a component management application for managing and auto-configuring the set-top-box with a third scanning program; and
correlating security vulnerabilities identified by the website scanning program, the operating system level scanning program, and the third scanning program.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs.
26 Citations
20 Claims
-
1. A non-transitory computer-readable storage medium including processor executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
scanning, with a website scanning program, a control panel application for enabling a user to access a set-top-box remotely to navigate and select content, wherein the website scanning program is configured to access the set-top-box via a broadband connection to a modem locally coupled to the set-top-box, wherein scanning the control panel application includes; receiving a uniform resource locator (URL) associated with a web server level of the control panel application, wherein the URL is indicative of a particular website; and automatically navigating the particular website as a simulated user to discover links and record responses; scanning, with an operating system level scanning program, the control panel application and an operating system in which the control panel application is executing; scanning, with the website scanning program, a second application, wherein the second application provides Internet content to the set-top-box; scanning, by the operating system level scanning program, the second application; scanning, with a third scanning program, a component management application for managing and auto-configuring the set-top-box with a third scanning program; and correlating security vulnerabilities identified by the website scanning program, the operating system level scanning program, and the third scanning program. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of determining security vulnerabilities associated with providing television services to a set-top-box over a communications network, the method comprising:
-
scanning, with a website scanning program, a control panel application for enabling a user to access a set-top-box remotely to navigate and select content, wherein the website scanning program is configured to access the set-top-box via a broadband connection to a modem locally coupled to the set-top-box, wherein scanning the control panel application includes; receiving a uniform resource locator (URL) associated with a web server level of the control panel application, wherein the URL is indicative of a particular website; and automatically navigating the particular website as a simulated user to discover links and record responses; scanning, with an operating system level scanning program, the control panel application and an operating system executing associated with the control panel application; scanning, with the website scanning program, a second application, wherein the second application provides Internet content to the set-top-box; scanning, by the operating system level scanning program, the second application; scanning, with a third scanning program, a component management application for managing and auto-configuring the set-top-box with a third scanning program; and correlating security vulnerabilities identified by the website scanning program, the operating system level scanning program, and the third scanning program. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A server, comprising:
-
a processor; and a storage medium including a database to store information relating to security vulnerabilities for a plurality of applications associated with a customer device and processor executable program instructions that, when executed by the processor, cause the processor to perform operations comprising; scanning, with a website scanning program, a control panel application for enabling a user to access a set-top-box remotely to navigate and select content, wherein the website scanning program is configured to access the set-top-box via a broadband connection to a modem locally coupled to the set-top-box, wherein scanning the control panel application includes; receiving a uniform resource locator (URL) associated with a web server level of the control panel application, wherein the URL is indicative of a particular website; and automatically navigating the particular website as a simulated user to discover links and record responses; scanning, with an operating system level scanning program, the control panel application and an operating system associated with the control panel application; scanning, with the website scanning program, a second application, wherein the second application provides Internet content to the set-top-box; scanning, by the operating system level scanning program, the second application; scanning, with a third scanning program, a component management application for managing and auto-configuring the set-top-box with a third scanning program; and correlating security vulnerabilities identified by the website scanning program, the operating system level scanning program, and the third scanning program. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification