Network-based risk-assessment tool for remotely detecting local computer vulnerabilities
First Claim
Patent Images
1. A method of remotely detecting vulnerabilities on a local computer, comprising:
- a) installing an agent on a local computer;
b) receiving encrypted commands for executing a risk-assessment scan from a remote computer utilizing a network;
c) decrypting the commands on the local computer utilizing the agent;
d) processing the commands on the local computer utilizing the agent; and
e) performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer;
wherein the agent includes a plurality of risk-assessment modules;
wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer;
wherein the commands each indicate at least one of the risk-assessment modules;
wherein the commands are processed by extracting parameters associated with the commands, and executing the risk-assessment modules indicated by the commands utilizing the associated parameters.
11 Assignments
0 Petitions
Accused Products
Abstract
A system, method and computer program product are provided for remotely detecting vulnerabilities on a local computer. Initially, an agent is installed on a local computer for receiving encrypted commands from a remote computer utilizing a network. Next, the commands are decrypted and processed on the local computer utilizing the agent. A risk-assessment scan is then performed on the local computer utilizing the agent in accordance with the processed commands for the purpose of remotely detecting local vulnerabilities on the local computer.
-
Citations
27 Claims
-
1. A method of remotely detecting vulnerabilities on a local computer, comprising:
-
a) installing an agent on a local computer; b) receiving encrypted commands for executing a risk-assessment scan from a remote computer utilizing a network; c) decrypting the commands on the local computer utilizing the agent; d) processing the commands on the local computer utilizing the agent; and e) performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer; wherein the agent includes a plurality of risk-assessment modules; wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer; wherein the commands each indicate at least one of the risk-assessment modules; wherein the commands are processed by extracting parameters associated with the commands, and executing the risk-assessment modules indicated by the commands utilizing the associated parameters. - View Dependent Claims (2, 3, 4, 5, 6, 7, 20, 21, 22, 23, 24, 25, 26, 27)
-
-
8. A computer program product embodied on a computer readable medium for remotely detecting vulnerabilities on a local computer, comprising:
-
a) computer code for installing an agent on a local computer; b) computer code for receiving encrypted commands for executing a risk-assessment scan from a remote computer utilizing a network; c) computer code for decrypting the commands on the local computer utilizing the agent; d) computer code for processing the commands on the local computer utilizing the agent; and e) computer code for performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer; wherein the agent includes a plurality of risk-assessment modules; wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer; wherein the commands each indicate at least one of the risk-assessment modules; wherein the commands are processed by extracting parameters associated with the commands, and executing the risk-assessment modules indicated by the commands utilizing the associated parameters. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system for remotely detecting vulnerabilities on a local computer, comprising:
-
a) an agent installed on a local computer for receiving encrypted commands for executing a risk-assessment scan from a remote computer utilizing a network, decrypting the commands on the local computer, and processing the commands on the local computer; and b) wherein the risk-assessment scan is performed on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer; wherein the agent includes a plurality of risk-assessment modules; wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer; wherein the commands each indicate at least one of the risk-assessment modules; wherein the commands are processed by extracting parameters associated with the commands, and executing the risk-assessment modules indicated by the commands utilizing the associated parameters.
-
-
16. A system for remotely detecting vulnerabilities on a local computer, comprising:
-
a) means for installing an agent on a local computer; b) means for receiving encrypted commands for executing a risk-assessment scan from a remote computer utilizing a network; c) means for decrypting the commands on the local computer utilizing the agent; d) means for processing the commands on the local computer utilizing the agent; and e) means for performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer; wherein the agent includes a plurality of risk-assessment modules; wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer; wherein the commands each indicate at least one of the risk-assessment modules; wherein the commands are processed by extracting parameters associated with the commands, and executing the risk-assessment modules indicated by the commands utilizing the associated parameters.
-
-
17. A method of remotely detecting vulnerabilities from a remote computer, comprising:
-
a) sending encrypted commands from a remote computer to an agent on a local computer for executing a risk-assessment scan utilizing a network, the commands adapted for being decrypted and processed on the local computer utilizing the agent for performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer; b) receiving results of the risk-assessment scan from the local computer utilizing the network; and c) transmitting feedback to the results from the remote computer to the local computer utilizing the network; wherein the agent includes a plurality of risk-assessment modules; wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer; wherein the commands each indicate at least one of the risk-assessment modules; wherein the commands are processed by extracting parameters associated with the commands, and executing the risk-assessment modules indicated by the commands utilizing the associated parameters.
-
-
18. A computer program product embodied on a computer readable medium for remotely detecting vulnerabilities from a remote computer, comprising:
-
a) computer code for sending encrypted commands from a remote computer to an agent on a local computer for executing a risk-assessment scan utilizing a network, the commands adapted for being decrypted and processed on the local computer utilizing the agent for performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer; b) computer code for receiving results of the risk-assessment scan from the local computer utilizing the network; and c) computer code for transmitting feedback to the results from the remote computer to the local computer utilizing the network; wherein the agent includes a plurality of risk-assessment modules; wherein the commands execute the risk-assessment modules in a specific manner that is configured at the remote computer; wherein the commands each indicate at least one of the risk-assessment modules; wherein the commands are processed by extracting parameters associated with the commands, and executing the risk-assessment modules indicated by the commands utilizing the associated parameters.
-
-
19. A method of remotely detecting vulnerabilities on a local computer, comprising:
-
a) installing an agent on a local computer, the agent including a plurality of risk-assessment modules selected based on at least one aspect of the computer; b) receiving encrypted commands for executing a risk-assessment scan from a remote computer utilizing a network; c) decrypting the commands on the local computer utilizing the agent; d) authenticating the commands on the local computer utilizing the agent; e) processing the commands on the local computer utilizing the agent, the commands adapted to execute the risk-assessment modules in a specific manner that is configured at the remote computer; f) performing the risk-assessment scan on the local computer in accordance with the processed commands to remotely detect local vulnerabilities on the local computer; g) transmitting results of the risk-assessment scan from the local computer to the remote computer utilizing the network; h) receiving feedback to the results from the remote computer utilizing the network; wherein the commands each indicate at least one of the risk-assessment modules; wherein the commands are processed by extracting parameters associated with the commands, and executing the risk-assessment modules indicated by the commands utilizing the associated parameters.
-
Specification