×

System and method for patching a device through exploitation

  • US 9,607,156 B2
  • Filed: 02/24/2014
  • Issued: 03/28/2017
  • Est. Priority Date: 02/22/2013
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • identifying a vulnerability in a computing device;

    accessing a vulnerability exploitation mapped to the identified vulnerability, wherein the vulnerability exploitation comprises pre-identified computer-executable scripts or routines specifically provided to target the identified vulnerability in the computing device to thereby resolve or reduce the identified vulnerability, wherein, once executed, the pre-identified computer-executable scripts or routines of the vulnerability exploitation automatically change an operating mode of the computing device from an operating mode with less privileges to an operating mode with increased privileges;

    at the computing device, executing the pre-identified scripts or routines of the vulnerability exploitation and, through execution of the pre-identified scripts or routines of the vulnerability exploitation causing an entering into an operating mode of escalated privileges within the computing device; and

    while in the operating mode of escalated privileges, updating the computing device with a vulnerability resolution that functions to automatically use the escalated privileges to resolve or reduce the identified vulnerability.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×