Using a benevolent worm to assess and correct computer security vulnerabilities
First Claim
1. A method for assessing computer security vulnerabilities, the method comprising:
- a benevolent worm attempting to copy itself to a computer, in order to assess potential security vulnerabilities of the computer;
at least one copy of the benevolent worm attempting to copy itself to an additional computer, in order to assess potential security vulnerabilities of the additional computer; and
at least one copy of the benevolent worm communicating information concerning at least one security vulnerability of a computer to a benevolent worm controller.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer readable media utilize a benevolent worm (100) to assess computer security vulnerabilities, and to correct computer security vulnerabilities. A benevolent worm (100) attempts (301) to copy itself to a computer (201), in order to assess (303) potential security vulnerabilities of the computer (201). The benevolent worm (100) communicates information (203) concerning at least one security vulnerability of a computer (201) to a benevolent worm controller (205). The benevolent worm (100) can determine (1003) that a computer (201) has at least one security vulnerability which allowed installation of the benevolent worm (100). The benevolent worm (100) can correct (1005) at least one security vulnerability of the computer (201).
56 Citations
63 Claims
-
1. A method for assessing computer security vulnerabilities, the method comprising:
-
a benevolent worm attempting to copy itself to a computer, in order to assess potential security vulnerabilities of the computer;
at least one copy of the benevolent worm attempting to copy itself to an additional computer, in order to assess potential security vulnerabilities of the additional computer; and
at least one copy of the benevolent worm communicating information concerning at least one security vulnerability of a computer to a benevolent worm controller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
-
23. A computer readable medium containing a computer program product for assessing computer security vulnerabilities, the computer program product comprising:
-
program code for attempting to copy the computer program product to remote computers on a network;
program code for assessing potential security vulnerabilities of computers on the network; and
program code for communicating, to a benevolent worm controller, information concerning security vulnerabilities of computers on the network. - View Dependent Claims (24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44)
-
-
45. A method for correcting detected computer security vulnerabilities, the method comprising:
-
installing a benevolent worm on a computer;
the benevolent worm determining that the computer has at least one security vulnerability which allowed installation of the benevolent worm; and
correcting at least one security vulnerability of the computer. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. A method for informing a user of computer security vulnerabilities, the method comprising:
-
installing a benevolent worm on a computer;
the benevolent worm determining that the computer has at least one security vulnerability which allowed installation of the benevolent worm; and
outputting information to a user concerning at least one security vulnerability of the computer. - View Dependent Claims (58)
-
-
59. A computer readable medium containing a computer program product for correcting detected computer security vulnerabilities, the computer program product comprising:
-
program code for installing the computer program product on a computer;
program code for determining that the computer has at least one security vulnerability which allowed installation of the computer program product; and
program code for correcting at least one security vulnerability of the computer.
-
-
60. A computer readable medium containing a computer program product for informing a user of computer security vulnerabilities, the computer program product comprising:
-
program code for installing the computer program product on a computer;
program code for determining that the computer has at least one security vulnerability which allowed installation of the computer program product; and
program code for outputting information to a user concerning at least one security vulnerability of the computer.
-
-
61. A system for assessing computer security vulnerabilities, the system comprising:
-
means for attempting to copy a benevolent worm to remote computers on a network;
means for assessing potential security vulnerabilities of computers on the network; and
means for communicating, to a benevolent worm controller, information concerning security vulnerabilities of computers on the network.
-
-
62. A system for correcting detected computer security vulnerabilities, the system comprising:
-
means for installing a benevolent worm on a computer;
means for a benevolent worm determining that the computer has at least one security vulnerability which allowed installation of the benevolent worm; and
means for correcting at least one security vulnerability of the computer.
-
-
63. A system for informing a user of computer security vulnerabilities, the system comprising:
-
means for installing a benevolent worm on a computer;
means for the benevolent worm determining that the computer has at least one security vulnerability which allowed installation of the benevolent worm; and
means for outputting information to a user concerning at least one security vulnerability of the computer.
-
Specification