Security scanning system and method
First Claim
1. A computer-readable medium accessible to a processor for executing instructions contained in a computer program embedded in the computer readable medium, the computer program comprising:
- instructions to run a first scanning program against a first application program relating to a control panel for use on customer device;
instructions to run a second scanning program against a second application program that provides Internet content to the customer device over a communications network to identify security vulnerabilities with the second application program;
instructions to run a third scanning program relating to a component management system for a customer premises equipment (CPE) against a third application program to identify security vulnerabilities with the third application program; and
instructions to correlate the identified security vulnerabilities with the first, second, third and fourth application programs.
3 Assignments
0 Petitions
Accused Products
Abstract
The present disclosure provides a computer-readable medium, method and system for determining security vulnerabilities for a plurality of application programs used to provide television services to a customer device over a communications network. The method includes running a first scanning program against a first application program relating to a control panel for the customer device; running a second scanning program against a second application program that provides Internet content to the customer device; running a third scanning program against a third application program that relates to a component management system of customer premises equipment; and correlating security vulnerabilities identified utilizing the first, second, and third scanning programs.
41 Citations
20 Claims
-
1. A computer-readable medium accessible to a processor for executing instructions contained in a computer program embedded in the computer readable medium, the computer program comprising:
-
instructions to run a first scanning program against a first application program relating to a control panel for use on customer device;
instructions to run a second scanning program against a second application program that provides Internet content to the customer device over a communications network to identify security vulnerabilities with the second application program;
instructions to run a third scanning program relating to a component management system for a customer premises equipment (CPE) against a third application program to identify security vulnerabilities with the third application program; and
instructions to correlate the identified security vulnerabilities with the first, second, third and fourth application programs. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of determining security vulnerabilities for a plurality of application programs for use in providing television services to a set-top-box (STB) over a communications network, comprising:
-
running a first scanning program against a first application program relating to a control panel for the STB provided over a communications network;
running a second scanning program against a second application program that provides Internet content to the STB over the communications network;
running a third scanning program against a third application program that relates to component management system of a CPE; and
correlating security vulnerabilities identified utilizing the first, second, and third scanning programs. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A system, comprising:
-
a database that stores information relating to security vulnerabilities for a plurality of application programs associated with a customer device;
a server having access to a computer program, the server utilizing the database and executing instructions contained in the computer program that includes;
instructions to run a first scanning program against a first application program relating to a control panel for use on customer device that interfaces with a television set to identify security vulnerabilities with the first application program;
instructions to run a second scanning program against a second application program that provides Internet content to the customer device over a communications network to identify security vulnerabilities with the second application program;
instructions to run a third scanning program against a third application program that is a component management system for a CPE to identify security vulnerabilities with the third application program;
instructions to run a fourth scanning program against a fourth application program that is used in the customer device to identify security vulnerabilities with the fourth application program; and
instructions to correlate the identified security vulnerabilities with the first, second, third and fourth application programs. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification