Systems and methods for providing supply-chain trust networks
First Claim
1. A computer-implemented method for providing supply-chain trust networks, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- identifying a computational partnership between a primary computing entity and a partnered computing entity, wherein the primary computing entity and the partnered computing entity are under separate control and the partnered computing entity handles at least one computing resource to be used by the primary computing entity, wherein the at least one computing resource is used in computational tasks, and wherein the identifying the computational partnership further comprises;
receiving, from the primary computing entity, an identifier of the partnered computing entity as a computational partner of the primary computing entity; and
receiving, from the partnered computing entity, an agreement to provide the security data from the computing environment controlled by the partnered computing entity;
receiving, from a computing environment controlled by the partnered computing entity and with permission from the partnered computing entity, security data that comprises information about at least one security characteristic of the computing environment;
analyzing the security data to make a security determination about the computing environment controlled by the partnered computing entity, wherein;
analyzing the security data comprises identifying an indicator of a security threat in the security data that matches an indicator of a security threat from a computing environment controlled by the primary computing entity; and
making the security determination comprises inferring that the security threat from the computing environment controlled by the primary computing entity originated from the partnered computing entity based on the indicator of the security threat in the security data matching the indicator of the security threat from the computing environment controlled by the primary computing entity; and
providing, in response to identifying the computational partnership, the security determination about the computing environment controlled by the partnered computing entity to the primary computing entity.
2 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method for providing supply-chain trust networks may include (1) identifying a computational partnership between a primary computing entity and a partnered computing entity, wherein the primary computing entity and the partnered computing entity are under separate control and the partnered computing entity handles at least one computing resource to be used by the primary computing entity, (2) receiving, from a computing environment controlled by the partnered computing entity and with permission from the partnered computing entity, security data that comprises information about at least one security characteristic of the computing environment, (3) analyzing the security data to make a security determination about the computing environment controlled by the partnered computing entity, and (4) providing, in response to identifying the computational partnership, the security determination about the computing environment to the primary computing entity. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
17 Claims
-
1. A computer-implemented method for providing supply-chain trust networks, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
identifying a computational partnership between a primary computing entity and a partnered computing entity, wherein the primary computing entity and the partnered computing entity are under separate control and the partnered computing entity handles at least one computing resource to be used by the primary computing entity, wherein the at least one computing resource is used in computational tasks, and wherein the identifying the computational partnership further comprises; receiving, from the primary computing entity, an identifier of the partnered computing entity as a computational partner of the primary computing entity; and receiving, from the partnered computing entity, an agreement to provide the security data from the computing environment controlled by the partnered computing entity; receiving, from a computing environment controlled by the partnered computing entity and with permission from the partnered computing entity, security data that comprises information about at least one security characteristic of the computing environment; analyzing the security data to make a security determination about the computing environment controlled by the partnered computing entity, wherein; analyzing the security data comprises identifying an indicator of a security threat in the security data that matches an indicator of a security threat from a computing environment controlled by the primary computing entity; and making the security determination comprises inferring that the security threat from the computing environment controlled by the primary computing entity originated from the partnered computing entity based on the indicator of the security threat in the security data matching the indicator of the security threat from the computing environment controlled by the primary computing entity; and providing, in response to identifying the computational partnership, the security determination about the computing environment controlled by the partnered computing entity to the primary computing entity. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for providing supply-chain trust networks, the system comprising:
-
an identification module, stored in memory, that identifies a computational partnership between a primary computing entity and a partnered computing entity, wherein the primary computing entity and the partnered computing entity are under separate control and the partnered computing entity handles at least one computing resource to be used by the primary computing entity, wherein the at least one computing resource is used in computational tasks and wherein the identification module identifies the computational partnership by; receiving, from the primary computing entity, an identifier of the partnered computing entity as a computational partner of the primary computing entity; and receiving, from the partnered computing entity, an agreement to provide the security data from the computing environment controlled by the partnered computing entity; a receiving module, stored in memory, that receives, from a computing environment controlled by the partnered computing entity and with permission from the partnered computing entity, security data that comprises information about at least one security characteristic of the computing environment; an analysis module, stored in memory, that analyzes the security data to make a security determination about the computing environment controlled by the partnered computing entity, wherein; analyzing the security data comprises identifying an indicator of a security threat in the security data that matches an indicator of a security threat from a computing environment controlled by the primary computing entity; and making the security determination comprises inferring that the security threat from the computing environment controlled by the primary computing entity originated from the partnered computing entity based on the indicator of the security threat in the security data matching the indicator of the security threat from the computing environment controlled by the primary computing entity; a providing module, stored in memory, that provides, in response to identifying the computational partnership, the security determination about the computing environment controlled by the partnered computing entity to the primary computing entity; and at least one physical processor configured to execute the identification module, the receiving module, the analysis module, and the providing module. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium comprising one or more computer-readable instructions that, when executed by at least one processor of a computing device, cause the computing device to:
-
identify a computational partnership between a primary computing entity and a partnered computing entity, wherein the primary computing entity and the partnered computing entity are under separate control and the partnered computing entity handles at least one computing resource to be used by the primary computing entity, wherein the at least one computing resource is used in computational tasks and wherein identification of the computational partnership further comprises; receiving, from the primary computing entity, an identifier of the partnered computing entity as a computational partner of the primary computing entity; and receiving, from the partnered computing entity, an agreement to provide the security data from the computing environment controlled by the partnered computing entity; receive, from a computing environment controlled by the partnered computing entity and with permission from the partnered computing entity, security data that comprises information about at least one security characteristic of the computing environment; analyze the security data to make a security determination about the computing environment controlled by the partnered computing entity, wherein; analyzing the security data comprises identifying an indicator of a security threat in the security data that matches an indicator of a security threat from a computing environment controlled by the primary computing entity; and making the security determination comprises inferring that the security threat from the computing environment controlled by the primary computing entity originated from the partnered computing entity based on the indicator of the security threat in the security data matching the indicator of the security threat from the computing environment controlled by the primary computing entity; and provide, in response to identifying the computational partnership, the security determination about the computing environment controlled by the partnered computing entity to the primary computing entity.
-
Specification