System and method for repairing vulnerabilities of devices connected to a data network
First Claim
1. A method for repairing vulnerabilities of devices connected to a data network, the method comprising:
- accessing, by a hardware processor, a device communicatively coupled to the data network;
accessing, by the hardware processor, a configuration of the device, the configuration containing settings of the device;
comparing, by the hardware processor, each of the settings of the accessed device with settings of devices with known vulnerabilities from a database of vulnerabilities to identify at least one vulnerability of the device that can be exploited;
retrieving by the hardware processor, from the database, the settings of the devices with known vulnerabilities that repair the identified vulnerability in the accessed device;
determining, by the hardware processor, a repair action for repairing the at least one vulnerability, the repair action comprising adjusting one or more settings of the device based on the retrieved settings; and
transmitting, by the hardware processor, instructions to the accessed device to perform the repair action, the instructions comprising updating a setting of the accessed device by crawling a web page of an administrative console of the accessed device to identify controlling elements in the web page for the setting, and modifying values of the controlling elements based on the instructions.
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for repairing vulnerabilities of smart devices connected to a data network. An example method includes accessing, by a hardware processor, a smart device communicatively coupled to a data network, accessing a configuration of the smart device, the configuration containing settings of the smart device, comparing each of the settings of the smart device with settings of known vulnerabilities from a database of vulnerabilities to identify a network vulnerability of the smart device that can be exploited, retrieving one or more setting correcting the network vulnerability from the database, determining a repair action for repairing the at least one network vulnerability, the repair action comprising the one or more settings and transmitting, by the processor, instructions to the smart device to perform the repair action.
14 Citations
21 Claims
-
1. A method for repairing vulnerabilities of devices connected to a data network, the method comprising:
-
accessing, by a hardware processor, a device communicatively coupled to the data network; accessing, by the hardware processor, a configuration of the device, the configuration containing settings of the device; comparing, by the hardware processor, each of the settings of the accessed device with settings of devices with known vulnerabilities from a database of vulnerabilities to identify at least one vulnerability of the device that can be exploited; retrieving by the hardware processor, from the database, the settings of the devices with known vulnerabilities that repair the identified vulnerability in the accessed device; determining, by the hardware processor, a repair action for repairing the at least one vulnerability, the repair action comprising adjusting one or more settings of the device based on the retrieved settings; and transmitting, by the hardware processor, instructions to the accessed device to perform the repair action, the instructions comprising updating a setting of the accessed device by crawling a web page of an administrative console of the accessed device to identify controlling elements in the web page for the setting, and modifying values of the controlling elements based on the instructions. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for repairing vulnerabilities of devices connected to a data network, comprising:
a hardware processor configured to; access a device communicatively coupled to a data network; access a configuration of the device, the configuration containing settings of the device; compare each of the settings of the accessed device with settings of devices with known vulnerabilities from a database of vulnerabilities to identify a vulnerability of the device that can be exploited; retrieve, from the database, the settings of the devices with known vulnerabilities that repair the identified vulnerability in the accessed device; determine a repair action for repairing the at least one vulnerability, the repair action comprising adjusting one or more settings of the device based on the retrieved settings; and transmit instructions to the device to perform the repair action, the instructions comprising updating a setting of the accessed device by crawling a web page of an administrative console of the accessed device to identify controlling elements in the web page for the setting, and modifying values of the controlling elements based on the instructions. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable medium storing instructions thereon for repairing vulnerabilities of devices connected to a data network, the instructions comprising:
-
accessing a device communicatively coupled to a data network; accessing a configuration of the device, the configuration containing settings of the device; comparing each of the settings of the accessed device with settings of devices with known vulnerabilities from a database of vulnerabilities to identify at least one vulnerability of the device that can be exploited; retrieving, from the database, the settings of the devices with known vulnerabilities that repair the identified vulnerability in the accessed device; determining a repair action for repairing the at least one vulnerability, the repair action comprising adjusting one or more settings of the device based on the retrieved settings; and transmitting instructions to the device to perform the repair action, the instructions comprising updating a setting of the accessed device by crawling a web page of an administrative console of the accessed device to identify controlling elements in the web page for the setting, and modifying values of the controlling elements based on the instructions. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification