Security scanning system and method
First Claim
1. A non-transitory computer-readable medium including program instructions, executable by a processor, the program instructions comprising instructions to:
- invoke, by a backbone server residing on a network via which a provider of television services provides the television services, a first television service scanning program to remotely scan a first television service application for use in providing the television services, the first television service scanning program residing on a server of a provider of the first television service application program, wherein the first television service application program comprises a set-top-box control panel application configured to enable a user to access a set-top-box remotely to navigate and select content;
invoke a second television service scanning program to remotely scan a second television service application for use in providing the television services, the second television service scanning program residing on a web server; and
invoke, by the backbone server, a program to correlate security vulnerabilities identified by the first television service scanning program with security vulnerabilities identified by the second television service scanning program,wherein the first television service scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs.
-
Citations
16 Claims
-
1. A non-transitory computer-readable medium including program instructions, executable by a processor, the program instructions comprising instructions to:
-
invoke, by a backbone server residing on a network via which a provider of television services provides the television services, a first television service scanning program to remotely scan a first television service application for use in providing the television services, the first television service scanning program residing on a server of a provider of the first television service application program, wherein the first television service application program comprises a set-top-box control panel application configured to enable a user to access a set-top-box remotely to navigate and select content; invoke a second television service scanning program to remotely scan a second television service application for use in providing the television services, the second television service scanning program residing on a web server; and invoke, by the backbone server, a program to correlate security vulnerabilities identified by the first television service scanning program with security vulnerabilities identified by the second television service scanning program, wherein the first television service scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of determining security vulnerabilities associated with providing television services to a set-top-box over a communications network, comprising:
-
invoking, by a backbone server residing on the communications network, a first television service scanning program to remotely scan a first television service application program for use in providing the television services, the first television service scanning program residing on a server of a provider of the first television service application program, wherein the first television service application program comprises a set-top-box control panel application program configured to enable a user to access the set-top-box remotely to navigate and select content; invoking, by the backbone server, a second television service scanning program to remotely scan a second television service application for use in providing the television services, the second television service scanning program residing on a web server; and invoking a program to correlate security vulnerabilities identified by the first television service scanning program with security vulnerabilities identified by the second television service scanning program, wherein the first television service scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A server, comprising:
-
a processor having access to computer executable instructions embedded in a storage medium and further having access to a database that stores information relating to security vulnerabilities for a plurality of application programs associated with a customer device, the instructions comprising instructions to; invoke, by a backbone server residing on a backbone of a communications network of a provider of television services, a first television service scanning program to remotely scan a first television service application program for use in providing the television services via the communications network, the first television service scanning program residing on a server of a provider of the first television service application program, wherein the first television service application program, comprises a set-top-box control panel application program configured to enable a user to access the set-top-box remotely to navigate and select content; invoke, by the backbone server, a second television service scanning program to remotely scan a second television service application for use in providing the television services, the second television service scanning program residing on a web server; and invoke, by the backbone server, a program to correlate security vulnerabilities identified by the first television service scanning program with security vulnerabilities identified by the second television service scanning program, wherein the first television service scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (13, 14, 15, 16)
-
Specification