×

Systems and methods for providing supply-chain trust networks

  • US 10,033,764 B1
  • Filed: 11/16/2015
  • Issued: 07/24/2018
  • Est. Priority Date: 11/16/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer-implemented method for providing supply-chain trust networks, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:

  • identifying a computational partnership between a primary computing entity and a partnered computing entity, wherein the primary computing entity and the partnered computing entity are under separate control and the partnered computing entity handles at least one computing resource to be used by the primary computing entity, wherein the at least one computing resource is used in computational tasks, and wherein the identifying the computational partnership further comprises;

    receiving, from the primary computing entity, an identifier of the partnered computing entity as a computational partner of the primary computing entity; and

    receiving, from the partnered computing entity, an agreement to provide the security data from the computing environment controlled by the partnered computing entity;

    receiving, from a computing environment controlled by the partnered computing entity and with permission from the partnered computing entity, security data that comprises information about at least one security characteristic of the computing environment;

    analyzing the security data to make a security determination about the computing environment controlled by the partnered computing entity, wherein;

    analyzing the security data comprises identifying an indicator of a security threat in the security data that matches an indicator of a security threat from a computing environment controlled by the primary computing entity; and

    making the security determination comprises inferring that the security threat from the computing environment controlled by the primary computing entity originated from the partnered computing entity based on the indicator of the security threat in the security data matching the indicator of the security threat from the computing environment controlled by the primary computing entity; and

    providing, in response to identifying the computational partnership, the security determination about the computing environment controlled by the partnered computing entity to the primary computing entity.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×