METHOD AND SYSTEM OF REPAIRING VULNERABILITIES OF SMART DEVICES
First Claim
1. A method for repairing vulnerabilities of smart devices connected to a data network, the method comprising:
- transmitting, by a processor, a broadcast request through the data network to obtain access to a smart device;
obtaining settings of the smart device by accessing a configuration file stored on the smart device, the configuration file containing settings of the smart device;
comparing each of the settings of the smart device with settings of known vulnerabilities to identify a network vulnerability of the smart device that can be exploited by the processor by identifying a setting with a similar vulnerable status in the database;
determining a repair action for repairing the at least one network vulnerability associated with at least one setting of the smart device based on the setting with the similar vulnerable status in the database; and
transmitting, by the processor, instructions to the smart device to perform the repair action wherein the repair action comprises adjusting the setting of the smart device by making changes in the configuration file.
0 Assignments
0 Petitions
Accused Products
Abstract
Disclosed are systems and methods for repairing vulnerabilities of smart devices connected to a data network. An example method includes: transmitting a request through the network to obtain access to a smart device; obtaining settings of the smart device by accessing a configuration file containing settings of the smart device; comparing each of the settings of the device with known vulnerabilities to identify a vulnerability of the smart device that can be exploited; determining a repair action for repairing the at least one network vulnerability associated with at least one setting of the smart device based on the setting with the similar vulnerable status in the database; and transmitting instructions to the smart device to perform the repair action wherein the repair action comprises adjusting the setting of the smart device by making changes in the configuration file.
1 Citation
20 Claims
-
1. A method for repairing vulnerabilities of smart devices connected to a data network, the method comprising:
-
transmitting, by a processor, a broadcast request through the data network to obtain access to a smart device; obtaining settings of the smart device by accessing a configuration file stored on the smart device, the configuration file containing settings of the smart device; comparing each of the settings of the smart device with settings of known vulnerabilities to identify a network vulnerability of the smart device that can be exploited by the processor by identifying a setting with a similar vulnerable status in the database; determining a repair action for repairing the at least one network vulnerability associated with at least one setting of the smart device based on the setting with the similar vulnerable status in the database; and transmitting, by the processor, instructions to the smart device to perform the repair action wherein the repair action comprises adjusting the setting of the smart device by making changes in the configuration file. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for repairing vulnerabilities of smart devices connected to a data network, the system comprising:
-
a database that stores settings of devices relating to network vulnerabilities and actions for repairing the network vulnerabilities; and a hardware processor configured to; transmit a broadcast request through the data network to obtain access to a smart device; obtain settings of the smart device by accessing a configuration file stored on the smart device, the configuration file containing settings of the smart device; compare each of the settings of the smart device with settings of known vulnerabilities to identify a network vulnerability of the smart device that can be exploited by the processor by identifying a setting with a similar vulnerable status in the database; determine a repair action for repairing the at least one network vulnerability associated with at least one setting of the smart device based on the setting with the similar vulnerable status in the database; and transmit instructions to the smart device to perform the repair action wherein the repair action comprises adjusting the setting of the smart device by making changes in the configuration file. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer readable medium storing computer executable instructions for repairing vulnerabilities of smart devices connected to a data network, including instructions for:
-
transmitting a broadcast request through the data network to obtain access to a smart device; obtaining settings of the smart device by accessing a configuration file stored on the smart device, the configuration file containing settings of the smart device; comparing each of the settings of the smart device with settings of known vulnerabilities to identify a network vulnerability of the smart device that can be exploited by the processor by identifying a setting with a similar vulnerable status in the database; determining a repair action for repairing the at least one network vulnerability associated with at least one setting of the smart device based on the setting with the similar vulnerable status in the database; and transmitting instructions to the smart device to perform the repair action wherein the repair action comprises adjusting the setting of the smart device by making changes in the configuration file. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification