Method and system of eliminating vulnerabilities of smart devices
First Claim
1. A method for eliminating vulnerabilities of smart devices connected to a data network, the method comprising:
- identifying, by a processor, a router configured to provide access to the data network;
obtaining access to the network by connecting to the router;
transmitting, by the processor, a broadcast request through the data network to obtain access to at least one smart device communicatively coupled to the router;
accessing the at least one smart device communicatively coupled to the router;
obtaining settings of the at least one smart device by accessing a configuration file stored on the at least one smart device and containing settings of the smart device, wherein the settings of the at least one smart device includes one or both of a parameter or an attribute of the at least one smart device;
comparing, in a database, each of the settings of the at least one smart device with settings of known vulnerabilities to identify at least one network vulnerability of the at least one smart device that can be exploited by the processor by identifying a setting with a similar vulnerable status in the database;
determining, by the processor, an action for repairing the at least one network vulnerability associated with the at least one setting of the at least one smart device based on comparing of the each of the settings with the settings of known vulnerabilities in the database to identify the setting with the similar vulnerable status in the database; and
transmitting instructions to the at least one smart device to perform the action for repairing the at least one network vulnerability associated with the at least one setting of the at least one smart device, wherein the action comprises adjusting the setting of the smart device by making changes in the configuration file itself.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for eliminating vulnerabilities of smart devices connected to a data network. An example method includes: identifying a router providing access to the data network, obtaining access to the network and transmitting a request through the data network to obtain access to a smart device on the network. Furthermore, the method includes accessing the smart device to obtain its settings, comparing the settings with known vulnerabilities, determining an action for repairing the a network vulnerability associated with the settings of the device, and transmitting instructions to the smart device to perform the action to repair network vulnerability associated with the setting.
-
Citations
20 Claims
-
1. A method for eliminating vulnerabilities of smart devices connected to a data network, the method comprising:
-
identifying, by a processor, a router configured to provide access to the data network; obtaining access to the network by connecting to the router; transmitting, by the processor, a broadcast request through the data network to obtain access to at least one smart device communicatively coupled to the router; accessing the at least one smart device communicatively coupled to the router; obtaining settings of the at least one smart device by accessing a configuration file stored on the at least one smart device and containing settings of the smart device, wherein the settings of the at least one smart device includes one or both of a parameter or an attribute of the at least one smart device; comparing, in a database, each of the settings of the at least one smart device with settings of known vulnerabilities to identify at least one network vulnerability of the at least one smart device that can be exploited by the processor by identifying a setting with a similar vulnerable status in the database; determining, by the processor, an action for repairing the at least one network vulnerability associated with the at least one setting of the at least one smart device based on comparing of the each of the settings with the settings of known vulnerabilities in the database to identify the setting with the similar vulnerable status in the database; and transmitting instructions to the at least one smart device to perform the action for repairing the at least one network vulnerability associated with the at least one setting of the at least one smart device, wherein the action comprises adjusting the setting of the smart device by making changes in the configuration file itself. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for eliminating vulnerabilities of smart devices connected to a data network, the system comprising:
-
at least one database that stores settings of devices relating to network vulnerabilities and actions for repairing the network vulnerabilities; and a hardware processor configured to; identify a router configured to provide access to the data network, obtain access to the network by connecting to the router, transmit a broadcast request through the data network to obtain access to at least one smart device communicatively coupled to the router, access the at least one smart device communicatively coupled to the router; obtain settings of the at least one smart device by accessing a configuration file stored on the at least one smart device and containing settings of the smart device, wherein the settings of the at least one smart device includes one or both of a parameter or an attribute of the at least one smart device, compare, in the least one database, each of the settings of the at least one smart device with the settings of devices of known vulnerabilities to identify at least one network vulnerability of the at least one smart device that can be exploited by the processor by identifying a setting with a similar vulnerable status in the database, determine an action for repairing the at least one network vulnerability associated with the at least one setting of the at least one smart device based on the comparison of the each of the settings with the settings of known vulnerabilities in the database to identify the setting with the similar vulnerable status in the database, and transmit instructions to the at least one smart device to perform the action for repairing the at least one network vulnerability associated with the at least one setting of the at least one smart device, wherein the action comprises adjusting the setting of the smart device by making changes in the configuration file itself. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium storing computer executable instructions for eliminating vulnerabilities of smart devices connected to a data network, including instructions for:
-
identifying a router configured to provide access to the data network; obtaining access to the network by connecting to the router; transmitting a broadcast request through the data network to obtain access to at least one smart device communicatively coupled to the router; accessing the at least one smart device communicatively coupled to the router; obtaining settings of the at least one smart device by accessing a configuration file stored on the at least one smart device and containing settings of the smart device, wherein the settings of the at least one smart device includes one or both of a parameter or an attribute of the at least one smart device; comparing, in a database, each of the settings of the at least one smart device with settings of known vulnerabilities to identify at least one network vulnerability of the settings of the at least one smart device that can be exploited by the processor by identifying a setting with a similar vulnerable status in the database; determining an action for repairing the at least one network vulnerability associated with the at least one setting of the at least one smart device based on comparing of the each of the settings with the settings of known vulnerabilities in the database to identify the setting with the similar vulnerable status in the database; and transmitting instructions to the at least one smart device to perform the action for repairing the at least one network vulnerability associated with the at least one setting of the at least one smart device, wherein the action comprises adjusting the setting of the smart device by making changes in the configuration file itself. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification