SECURITY SCANNING SYSTEM AND METHOD
First Claim
1. A non-transitory computer-readable storage medium including processor executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
- scanning, by a server, a set-top-box control panel application program with a web level scanning program configured to access a set-top-box via a broadband connection to a residential gateway locally coupled to the set-top-box;
scanning, by the server, the set-top-box control panel application program with an operating system level scanning program;
scanning a second application program that provides Internet content to the set-top-box with the web level scanning program;
scanning the second application program with the operating system level scanning program;
scanning a third application program that relates to a component management system with a third scanning program; and
correlating security vulnerabilities identified by the web level scanning program, the operating system level scanning program, and the third scanning program.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs.
-
Citations
20 Claims
-
1. A non-transitory computer-readable storage medium including processor executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
scanning, by a server, a set-top-box control panel application program with a web level scanning program configured to access a set-top-box via a broadband connection to a residential gateway locally coupled to the set-top-box; scanning, by the server, the set-top-box control panel application program with an operating system level scanning program; scanning a second application program that provides Internet content to the set-top-box with the web level scanning program; scanning the second application program with the operating system level scanning program; scanning a third application program that relates to a component management system with a third scanning program; and correlating security vulnerabilities identified by the web level scanning program, the operating system level scanning program, and the third scanning program. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of determining security vulnerabilities associated with providing television services to a set-top-box over a communications network, comprising:
-
scanning, by a server, a set-top-box control panel application program with a web level scanning program configured to access a set-top-box via a broadband connection to a residential gateway locally coupled to the set-top-box; scanning, by the server, the set-top-box control panel application program with an operating system level scanning program; scanning a second application program that provides Internet content to the set-top-box with the web level scanning program; scanning the second application program with the operating system level scanning program; scanning a third application program that relates to a component management system with a third scanning program; and correlating security vulnerabilities identified by the web level scanning program, the operating system level scanning program, and the third scanning program. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A server, comprising:
-
a processor; and a storage medium including a database to store information relating to security vulnerabilities for a plurality of application programs associated with a customer device and processor executable program instructions that, when executed by the processor, cause the processor to perform operations comprising; scanning, by a server, a set-top-box control panel application program with a web level scanning program configured to access a set-top-box via a broadband connection to a residential gateway locally coupled to the set-top-box; scanning, by the server, the set-top-box control panel application program with an operating system level scanning program; scanning a second application program that provides Internet content to the set-top-box with the web level scanning program; scanning the second application program with the operating system level scanning program; scanning a third application program that relates to a component management system with a third scanning program; and correlating security vulnerabilities identified by the web level scanning program, the operating system level scanning program, and the third scanning program. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification