Security scanning system and method
First Claim
1. A non-transitory computer-readable storage medium including processor executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
- initiating, by a backbone server, execution of a first scanning program to perform a web level scan of a set-top-box control panel application program;
initiating execution of a second scanning program to perform an operating system level scan of the set-top-box control panel application program;
initiating, by the backbone server, a third scanning program to remotely scan a third application program that relates to a component management system of a digital subscriber line modem;
invoking, by the backbone server, a program to compare security vulnerabilities identified by the first scanning program with security vulnerabilities identified by the second scanning program;
running the first and second scanning programs against a second application program that provides Internet content to a set-top-box device;
running the first and second scanning program against a third application program configured to provide the component management system; and
combining security vulnerabilities identified utilizing the first, second, and third scanning programs;
wherein the first scanning program accesses the set-top-box via a broadband connection to a residential gateway locally coupled to the set-top-box.
4 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs.
21 Citations
16 Claims
-
1. A non-transitory computer-readable storage medium including processor executable instructions that, when executed by a processor, cause the processor to perform operations comprising:
-
initiating, by a backbone server, execution of a first scanning program to perform a web level scan of a set-top-box control panel application program; initiating execution of a second scanning program to perform an operating system level scan of the set-top-box control panel application program; initiating, by the backbone server, a third scanning program to remotely scan a third application program that relates to a component management system of a digital subscriber line modem; invoking, by the backbone server, a program to compare security vulnerabilities identified by the first scanning program with security vulnerabilities identified by the second scanning program; running the first and second scanning programs against a second application program that provides Internet content to a set-top-box device; running the first and second scanning program against a third application program configured to provide the component management system; and combining security vulnerabilities identified utilizing the first, second, and third scanning programs; wherein the first scanning program accesses the set-top-box via a broadband connection to a residential gateway locally coupled to the set-top-box. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of determining security vulnerabilities associated with providing television services to a set-top-box over a communications network, comprising:
-
initiating, by a backbone server, execution of a first scanning program to perform a web level scan of a set-top-box control panel application program; initiating execution of a second scanning program to perform an operating system level scan of the set-top-box control panel application program; initiating, by the backbone server, a third scanning program to remotely scan a third application program that relates to a component management system of a digital subscriber line modem; invoking, by the backbone server, a program to compare security vulnerabilities identified by the first scanning program with security vulnerabilities identified by the second scanning program; running the first and second scanning programs against a second application program that provides Internet content to the set-top-box device; running the first and second scanning program against a third application program configured to provide the component management system; and combining security vulnerabilities identified utilizing the first, second, and third scanning programs; wherein the first scanning program accesses the set-top-box via a broadband connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (8, 9, 10)
-
-
11. A server, comprising:
-
a processor; and a storage medium including a database to store information relating to security vulnerabilities for a plurality of application programs associated with a customer device and processor executable program instructions that, when executed by the processor, cause the processor to perform operations comprising; initiating, by a backbone server, execution of a first scanning program to perform a web level scan of a set-top-box control panel application program; initiating execution of a second scanning program to perform an operating system level scan of the set-top-box control panel application program; invoking, by the backbone server, a program to compare security vulnerabilities identified by the first scanning program with security vulnerabilities identified by the second scanning program; invoking, by the backbone server, a third scanning program relating to a component management system for customer premises equipment for use in providing the television services to remotely scan a third application program to identify security vulnerabilities with the third application program; running the first and second scanning programs against a second application program that provides Internet content to the customer device; running the first and second scanning program against a third application program configured to provide the component management system; and combining security vulnerabilities identified utilizing the first, second, and third scanning programs; wherein the first scanning program accesses the set-top-box via a broadband connection on a residential gateway locally coupled to the set-top-box. - View Dependent Claims (12, 13, 14, 15, 16)
-
Specification