SECURITY SCANNING SYSTEM AND METHOD
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs.
3 Citations
37 Claims
-
1-20. -20. (canceled)
-
21. A non-transitory computer-readable storage medium including processor executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
initiating, by a backbone server, execution of a first scanning program on a first server to remotely scan a set-top-box control panel application program configured to enable a user to access a set-top-box remotely to navigate and select content; initiating execution of a second scanning program to remotely scan a second application program on a web server for use in providing television services; and invoking, by the backbone server, a program to compare security vulnerabilities identified by the first scanning program with security vulnerabilities identified by the second scanning program; wherein the first scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (22, 23, 24, 25, 26)
-
-
27. A method of determining security vulnerabilities associated with providing television services to a set-top-box over a communications network, comprising:
-
invoking, by a backbone server, a first scanning program on a first server to remotely scan a first application program for use in providing the television services, wherein the first application program comprises a set-top-box control panel application program configured to enable a user to access the set-top-box remotely to navigate and select content; invoking, by the backbone server, a second scanning program to remotely scan a second application program for use in providing the television services, the second scanning program residing on a web server; and invoking a program to compare security vulnerabilities identified by the first scanning program with security vulnerabilities identified by the second scanning program; wherein the first scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (28, 29, 30, 31)
-
-
32. A server, comprising:
-
a processor; and a storage medium including a database to store information relating to security vulnerabilities for a plurality of application programs associated with a customer device and processor executable program instructions that, when executed by the processor, cause the processor to perform operations comprising; initiating, by a backbone server associated with a communications network of a provider of television services, execution of a first scanning program to remotely scan a first application program for use in providing the television services via the communications network, the first scanning program residing on a first server of a provider of the first application program, wherein the first application program comprises a set-top-box control panel application program configured to enable a user to access a set-top-box remotely to navigate and select content; invoking, by the backbone server, a second scanning program to remotely scan a second application program for use in providing the television services, the second scanning program residing on a web server; and executing, by the backbone server, a program to compare security vulnerabilities identified by the first scanning program with security vulnerabilities identified by the second scanning program; wherein the first scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (33, 34, 35, 36, 37)
-
Specification