METHOD AND SYSTEM OF ELIMINATING VULNERABILITIES OF A ROUTER
First Claim
1. A method for eliminating vulnerabilities on a data network including a router for directing data in the data network, the method comprising:
- transmitting, by a processor, a request through the data network to obtain access to at least one device communicatively coupled to the data network;
accessing, by the processor, the at least one device to obtain a list of available resources of the at least one device that can be remotely accessed or adjusted by the processor, wherein the list of available resources includes one or both of a parameter or an attribute of the at least one device;
comparing, by the processor, each of the available resources of the at least one device with resource rules in a database to identify at least one network vulnerability of the at least one device that can be exploited by the processor by identifying a resource with a similar vulnerable status in the database;
determining, by the processor, an action for repairing the at least one network vulnerability associated with the one available resource of the at least one device based on comparing of the each of the available resources with the resource rules in the database to identify the resource with the similar vulnerable status in the database; and
transmitting instructions to the at least one device to perform the action for repairing the at least one network vulnerability associated with the one available resource.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and system is provided for eliminating vulnerabilities on a data network including a router for directing data in the data network. An example method includes transmitting a request through the data network to obtain access to a device coupled to the data network; accessing the device to obtain a list of available resources of the device; comparing each of the available resources of the device with resource rules in a database to identify network vulnerabilities associated with the available resources and determining an action for repairing the network vulnerabilities associated with the available resources of the device. Furthermore, according to the method, instructions can be transmitted to the device to perform the action for repairing the network vulnerabilities associated with the available resources.
-
Citations
21 Claims
-
1. A method for eliminating vulnerabilities on a data network including a router for directing data in the data network, the method comprising:
-
transmitting, by a processor, a request through the data network to obtain access to at least one device communicatively coupled to the data network; accessing, by the processor, the at least one device to obtain a list of available resources of the at least one device that can be remotely accessed or adjusted by the processor, wherein the list of available resources includes one or both of a parameter or an attribute of the at least one device; comparing, by the processor, each of the available resources of the at least one device with resource rules in a database to identify at least one network vulnerability of the at least one device that can be exploited by the processor by identifying a resource with a similar vulnerable status in the database; determining, by the processor, an action for repairing the at least one network vulnerability associated with the one available resource of the at least one device based on comparing of the each of the available resources with the resource rules in the database to identify the resource with the similar vulnerable status in the database; and transmitting instructions to the at least one device to perform the action for repairing the at least one network vulnerability associated with the one available resource. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for eliminating vulnerabilities on a data network including a router for directing data in the data network, the system comprising:
-
at least one database that stores resource rules relating to network vulnerabilities and actions for repairing the network vulnerabilities; and a processor configured to; transmit a request through the data network to obtain access to at least one device communicatively coupled to the data network, access the at least one device to obtain a list of available resources of the at least one device that can be remotely accessed or adjusted by the processor, wherein the list of available resources includes one or both of a parameter or an attribute of the at least one device, compare each of the available resources of the at least one device with resource rules in the at least one database to identify at least one network vulnerability of the at least one device that can be exploited by the processor by identifying a resource with a similar vulnerable status in the database, identify the action for repairing the at least one network vulnerability associated with the one available resource of the at least one device based on comparison of the each of the available resources with the resource rules in the database to identify the resource with the similar vulnerable status in the database, and transmit instructions to the at least one device to perform the action for repairing the at least one network vulnerability associated with the one available resource. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium storing computer executable instructions for eliminating vulnerabilities on a data network including a router for directing data in the data network, including instructions for:
-
transmitting a request through the data network to obtain access to at least one device communicatively coupled to the data network; accessing the at least one device to obtain a list of available resources of the at least one device that can be remotely accessed or adjusted, wherein the list of available resources includes one or both of a parameter or an attribute of the at least one device; comparing each of the available resources of the at least one device with resource rules in a database to identify at least one network vulnerability of the at least one device that can be exploited by identifying a resource with a similar vulnerable status in the database; determining an action for repairing the at least one network vulnerability associated with the one available resource of the at least one device based on comparing of the each of the available resources with the resource rules in the database to identify the resource with the similar vulnerable status in the database; and transmitting instructions to the at least one device to perform the action for repairing the at least one network vulnerability associated with the one available resource. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification