METHODS AND SYSTEMS FOR PASSIVELY DETECTING SECURITY LEVELS IN CLIENT DEVICES
First Claim
1. A method for security testing, comprising:
- providing, to a server via a network, a security tool operable to be embedded in a web page provided by the server and accessible by a target computing device through the server, wherein the security tool is executed by the target computing device to collect one or more security metrics of the target computing device;
receiving, from the security tool, the one or more security metrics of the target computing device;
comparing the one or more security metrics with a security vulnerability database; and
determining a security level for the target computing device based on comparing the one or more security metrics with the security vulnerability database.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments of the present teachings relate to systems and methods for testing and analyzing the security of a target computing device. The method can include providing, to a server via a network, a security tool operable to be associated with a webpage accessible by a target computing device through the server, wherein security tool is operable to be executable by the target computing device and operable to collect one or more security metrics of the target computing device; receiving, from the server, the one or more security metrics of the target computing device; comparing the one or more security metrics with a security vulnerability database; and determining a level of security vulnerability for the target computing device based on comparing the one or more security metrics with the security vulnerability database.
-
Citations
30 Claims
-
1. A method for security testing, comprising:
-
providing, to a server via a network, a security tool operable to be embedded in a web page provided by the server and accessible by a target computing device through the server, wherein the security tool is executed by the target computing device to collect one or more security metrics of the target computing device; receiving, from the security tool, the one or more security metrics of the target computing device; comparing the one or more security metrics with a security vulnerability database; and determining a security level for the target computing device based on comparing the one or more security metrics with the security vulnerability database. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17)
-
-
18. A method for security testing a target computing system using a security tool from a security server, comprising:
-
receiving, at a web server from the security server via a network, the security tool operable to be executable by the target computing device and operable to collect one or more security metrics of the target computer device; embedding the security tool into a web page that is operable to be accessible by the target computing device; providing the web page with the security tool to the target computing device; and controlling access to the web page based on a security level as determined based on the one or more security metrics. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A device comprising:
-
one or more processors; and a computer readable medium comprising instructions that cause the one or more processors to perform a method comprising; providing, to a server via a network, a security tool operable to be embedded in a web page accessible by a target computing device through the server, wherein security tool is operable to be executable by the target computing device and operable to collect one or more security metrics of the target computing device; receiving, from the server, the one or more security metrics of the target computing device; comparing the one or more security metrics with a security vulnerability database; determining a security level for the target computing device based on comparing the one or more security metrics with the security vulnerability database; and controlling access to the web page based on the security level.
-
-
28. A device operable to provide security testing of a target computing system using a security tool from a security server, comprising:
-
one or more processors; and a computer readable medium comprising instructions that cause the one or more processors to perform a method comprising; receiving, at a web server from the security server via a network, the security tool operable to be executable by the target computing device and operable to collect one or more security metrics of the target computing device; embedding the security tool in a web page that is operable to be accessible by the target computing device; providing the web page with the security tool to the target computing device; and controlling access to the web page based on a security level as determined based on the one or more security metrics.
-
-
29. A method for security testing, comprising:
-
providing a security tool to a target computing device associated with a web page accessible by the target computing device, wherein security tool is executed by the target computing device to collect one or more security metrics of the target computer device; receiving the one or more security metrics of the target computing device; comparing the one or more security metrics with a security vulnerability database; determining a security level for the target computing device based on comparing the one or more security metrics with the security vulnerability database; and controlling an access capability of the target computing device based on the security level. - View Dependent Claims (30)
-
Specification