FEEDBACK LOOP FOR AUTOMATED VULNERABILITY SCANNING OF HIDDEN NETWORK SYSTEMS

    公开(公告)号:US20240179171A1

    公开(公告)日:2024-05-30

    申请号:US18072022

    申请日:2022-11-30

    CPC classification number: H04L63/1433

    Abstract: A network vulnerability scanning system scans a target device for vulnerabilities to obtain initial network connection data for the target device via a first network interface of the target device, the initial network connection data identifying an initial network connection between the target device and a first hidden network system. The network vulnerability scanning system installs a network scanning application on the target device subsequent to scanning the target device for vulnerabilities to obtain the initial network connection data. The network vulnerability system scans the first hidden network system for vulnerabilities via the network scanning application. Subsequent to scanning the first hidden network system for vulnerabilities, the network vulnerability scanning system obtains additional network connection data for the target device via the first network interface of the target device, the additional network connection data identifying an additional network connection between the target device and a second hidden network system.

    DYNAMIC GENERATION AND DEPLOYMENT OF A CONTAINER GROUP SPECIFICATION THAT MATCHES A TAINT

    公开(公告)号:US20240168976A1

    公开(公告)日:2024-05-23

    申请号:US17993492

    申请日:2022-11-23

    CPC classification number: G06F16/285

    Abstract: A set of computing nodes that compose a container orchestration computing cluster are identified. A set of taints that are associated with the set of computing nodes are identified, wherein each taint in the set of taints prohibits scheduling of a container group, which is defined by a container group specification that does not meet a condition defined by the taint, on a computing node associated with the taint. A first container group specification that meets the condition defined by each taint is generated, wherein the first container group specification identifies a container image. The container group, via the first container group specification, is caused to be deployed on each computing node in the set of computing nodes that has an associated taint.

    Feedback loop for automated vulnerability scanning of hidden network systems

    公开(公告)号:US12231455B2

    公开(公告)日:2025-02-18

    申请号:US18072022

    申请日:2022-11-30

    Abstract: A network vulnerability scanning system scans a target device for vulnerabilities to obtain initial network connection data for the target device via a first network interface of the target device, the initial network connection data identifying an initial network connection between the target device and a first hidden network system. The network vulnerability scanning system installs a network scanning application on the target device subsequent to scanning the target device for vulnerabilities to obtain the initial network connection data. The network vulnerability system scans the first hidden network system for vulnerabilities via the network scanning application. Subsequent to scanning the first hidden network system for vulnerabilities, the network vulnerability scanning system obtains additional network connection data for the target device via the first network interface of the target device, the additional network connection data identifying an additional network connection between the target device and a second hidden network system.

    VULNERABILITY SCANNING OF HIDDEN NETWORK SYSTEMS

    公开(公告)号:US20240179172A1

    公开(公告)日:2024-05-30

    申请号:US18072057

    申请日:2022-11-30

    CPC classification number: H04L63/1433

    Abstract: A network vulnerability scanning system scans a target device for vulnerabilities to obtain network connection data for the target device. The network vulnerability scanning system determines the network connection data includes a network connection between the target device and a hidden network system. The network vulnerability scanning system installs a network scanning application on the target device in response to determining the network connection data includes the network connection between the target device and the hidden network system. The network vulnerability scanning system scans the hidden network system for vulnerabilities via the network scanning application installed on the target device.

    Establishing an encrypted communications channel without prior knowledge of the encryption key

    公开(公告)号:US11743242B2

    公开(公告)日:2023-08-29

    申请号:US16939178

    申请日:2020-07-27

    CPC classification number: H04L63/0485 H04L9/085 H04L9/0819

    Abstract: Establishing an encrypted communications channel without prior knowledge of an encryption key is disclosed. A gateway router device receives, from a server device via an intermediate modem device, a first secret key code for use in establishing an encrypted communications channel between the gateway router device and the modem device. The gateway router device makes an attempt to establish the encrypted communications channel with the modem device using a pre-shared key that is based on the first secret key code. The gateway router device determines that the attempt to establish the encrypted communications channel has either succeeded or failed. The gateway router device, in response to determining that the attempt to establish the encrypted communications channel has either succeeded or failed, performs a success action or performs a failure action.

    ESTABLISHING AN ENCRYPTED COMMUNICATIONS CHANNEL WITHOUT PRIOR KNOWLEDGE OF THE ENCRYPTION KEY

    公开(公告)号:US20220029974A1

    公开(公告)日:2022-01-27

    申请号:US16939178

    申请日:2020-07-27

    Abstract: Establishing an encrypted communications channel without prior knowledge of an encryption key is disclosed. A gateway router device receives, from a server device via an intermediate modem device, a first secret key code for use in establishing an encrypted communications channel between the gateway router device and the modem device. The gateway router device makes an attempt to establish the encrypted communications channel with the modem device using a pre-shared key that is based on the first secret key code. The gateway router device determines that the attempt to establish the encrypted communications channel has either succeeded or failed. The gateway router device, in response to determining that the attempt to establish the encrypted communications channel has either succeeded or failed, performs a success action or performs a failure action.

Patent Agency Ranking