Security scanning system and method
First Claim
1. A non-transitory computer-readable storage medium including processor executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
- invoking, by a backbone server via which a provider of television services provides the television services, a first television service scanning program to remotely scan a first television service application program for use in providing the television services, the first television service scanning program residing on a server of a provider of the first television service application program, wherein the first television service application program comprises a set-top-box control panel application program configured to enable a user to access a set-top-box remotely to navigate and select content;
invoking a second television service scanning program to remotely scan a second television service application program for use in providing the television services, the second television service scanning program residing on a web server; and
invoking, by the backbone server, a program to correlate security vulnerabilities identified by the first television service scanning program with security vulnerabilities identified by the second television service scanning program,wherein the first television service scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides a computer-readable medium, method, and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device, running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs.
-
Citations
17 Claims
-
1. A non-transitory computer-readable storage medium including processor executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
invoking, by a backbone server via which a provider of television services provides the television services, a first television service scanning program to remotely scan a first television service application program for use in providing the television services, the first television service scanning program residing on a server of a provider of the first television service application program, wherein the first television service application program comprises a set-top-box control panel application program configured to enable a user to access a set-top-box remotely to navigate and select content; invoking a second television service scanning program to remotely scan a second television service application program for use in providing the television services, the second television service scanning program residing on a web server; and invoking, by the backbone server, a program to correlate security vulnerabilities identified by the first television service scanning program with security vulnerabilities identified by the second television service scanning program, wherein the first television service scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of determining security vulnerabilities associated with providing television services to a set-top-box over a communications network, comprising:
-
invoking, by a backbone server, a first television service scanning program to remotely scan a first television service application program for use in providing the television services, the first television service scanning program residing on a server of a provider of the first television service application program, wherein the first television service application program comprises a set-top-box control panel application program configured to enable a user to access the set-top-box remotely to navigate and select content; invoking, by the backbone server, a second television service scanning program to remotely scan a second television service application program for use in providing the television services, the second television service scanning program residing on a web server; and invoking a program to correlate security vulnerabilities identified by the first television service scanning program with security vulnerabilities identified by the second television service scanning program, wherein the first television service scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A server, comprising:
-
a processor having access to computer executable instructions embedded in a storage medium and further having access to a database that stores information relating to security vulnerabilities for a plurality of application programs associated with a customer device, the instructions that when executed by the processor, cause the processor to perform operations comprising; invoking, by a backbone server associated with a communications network of a provider of television services, a first television service scanning program to remotely scan a first television service application program for use in providing the television services via the communications network, the first television service scanning program residing on a server of a provider of the first television service application program, wherein the first television service application program comprises a set-top-box control panel application program configured to enable a user to access the set-top-box remotely to navigate and select content; invoking, by the backbone server, a second television service scanning program to remotely scan a second television service application program for use in providing the television services, the second television service scanning program residing on a web server; and invoking, by the backbone server, a program to correlate security vulnerabilities identified by the first television service scanning program with security vulnerabilities identified by the second television service scanning program, wherein the first television service scanning program accesses the set-top-box via a digital subscriber line using a pass-through connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (13, 14, 15, 16, 17)
-
Specification