Using a benevolent worm to assess and correct computer security vulnerabilities
First Claim
1. A method for assessing computer security vulnerabilities, the method comprising:
- a benevolent worm attempting to copy itself to a computer, in order to assess potential security vulnerabilities of the computer;
the benevolent worm attempting to copy itself to an additional computer, in order to assess potential security vulnerabilities of the additional computer;
the benevolent worm communicating information concerning at least one security vulnerability of the computer to a benevolent worm controller;
the benevolent worm determining that it has not received a communication from the benevolent worm controller for a length of time;
the benevolent worm sending a signal to the benevolent worm controller responsive to the determination; and
the benevolent worm terminating itself, responsive to not receiving an acknowledgement from the benevolent worm controller.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and computer readable media utilize a benevolent worm (100) to assess computer security vulnerabilities, and to correct computer security vulnerabilities. A benevolent worm (100) attempts (301) to copy itself to a computer (201), in order to assess (303) potential security vulnerabilities of the computer (201). The benevolent worm (100) communicates information (203) concerning at least one security vulnerability of a computer (201) to a benevolent worm controller (205). The benevolent worm (100) can determine (1003) that a computer (201) has at least one security vulnerability which allowed installation of the benevolent worm (100). The benevolent worm (100) can correct (1005) at least one security vulnerability of the computer (201).
103 Citations
41 Claims
-
1. A method for assessing computer security vulnerabilities, the method comprising:
-
a benevolent worm attempting to copy itself to a computer, in order to assess potential security vulnerabilities of the computer; the benevolent worm attempting to copy itself to an additional computer, in order to assess potential security vulnerabilities of the additional computer; the benevolent worm communicating information concerning at least one security vulnerability of the computer to a benevolent worm controller; the benevolent worm determining that it has not received a communication from the benevolent worm controller for a length of time; the benevolent worm sending a signal to the benevolent worm controller responsive to the determination; and the benevolent worm terminating itself, responsive to not receiving an acknowledgement from the benevolent worm controller. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A computer readable storage medium containing a computer program product for assessing computer security vulnerabilities when executed by a processor, the computer program product comprising:
-
program code for attempting to copy the computer program product to remote computers on a network; program code for assessing potential security vulnerabilities of computers on the network; program code for communicating, to a benevolent worm controller, information concerning security vulnerabilities of computers on the network; program code for determining that the computer program product has not received a communication from the benevolent worm controller for a length of time; program code for sending a signal to the benevolent worm controller responsive to such a determination, the signal indicating current status of the computer program product; and program code for causing the computer program product to terminate itself, responsive to not receiving an acknowledgement from the benevolent worm controller. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A system for assessing computer security vulnerabilities, the system comprising:
-
means for attempting to copy a benevolent worm to remote computers on a network; means for assessing potential security vulnerabilities of computers on the network; means for communicating, to a benevolent worm controller, information concerning security vulnerabilities of computers on the network; means for determining that the benevolent worm has not received a communication from the benevolent worm controller for a length of time; means for sending a signal to the benevolent worm controller responsive to such a determination; and means for causing the benevolent worm to terminate itself responsive to the benevolent worm not receiving an acknowledgement from the benevolent worm controller.
-
Specification