Methods, Computer Networks and Computer Program Products for Reducing the Vulnerability of User Devices
12 Assignments
0 Petitions
Accused Products
Abstract
Methods, computer networks, and computer program products that reduce the vulnerability of network user devices to security threats include scanning a user device connected to a network to determine whether the user device contains a particular version of an application; downloading the particular version of the application via the network in response to verifying that the user device does not contain the particular version of the application; installing the downloaded application on the user device; scanning the user device for security vulnerabilities; downloading a patch via the network in response to detecting a security vulnerability, wherein the patch is configured to remedy the security vulnerability; and executing the downloaded patch on the user device to remedy the detected security vulnerability.
-
Citations
36 Claims
-
1-18. -18. (canceled)
-
19. A method of reducing the vulnerability of a network user device to security threats, comprising:
-
executing a health check application residing on the user device that gathers information from the user device and sends the gathered information to a designated health check web site via the network; scanning the user device via the health check application to determine whether the user device contains a particular version of a core application; downloading the particular version of the core application via the network in response to verifying that the user device does not contain the particular version of the core application; installing the downloaded core application on the user device; scanning the user device via the health check application for security vulnerabilities; downloading a patch via the network in response to detecting a security vulnerability, wherein the patch is configured to remedy the security vulnerability; and executing the downloaded patch on the user device to remedy the detected security vulnerability. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
-
26. A network user device, comprising:
-
a processor; memory coupled to the processor; and a computer program residing in the memory that, when executed by the processor, causes the processor to perform the following; execute a health check application residing on the user device that gathers information from the user device and sends the gathered information to a designated health check web site via the network; scan the user device to determine whether the user device contains a particular version of a core application; download the particular version of the core application via the network in response to verifying that the user device does not contain the particular version of the core application; install the downloaded core application on the user device; scan the user device for security vulnerabilities; download a patch via the network in response to detecting a security vulnerability, wherein the patch is configured to remedy the security vulnerability; and execute the downloaded patch on the user device to remedy the detected security vulnerability. - View Dependent Claims (27, 28, 29, 30, 31)
-
-
32. A computer program product for reducing the vulnerability of a network user device to security threats, comprising a non-transitory computer readable medium having computer readable program code embodied therein that, when executed by a processor, cause the processor to:
-
execute a health check application residing on the user device that gathers information from the user device and sends the gathered information to a designated health check web site via the network; scan the user device via the health check application to determine whether the user device contains a particular version of a core application; download the particular version of the core application via the network in response to verifying that the user device does not contain the particular version of the core application; install the downloaded core application on the user device; scan the user device via the health check application for security vulnerabilities; download a patch via the network in response to detecting a security vulnerability, wherein the patch is configured to remedy the security vulnerability; and execute the downloaded patch on the user device to remedy the detected security vulnerability. - View Dependent Claims (33, 34, 35, 36)
-
Specification