Systems and methods for determining the trustworthiness of files within organizations
First Claim
1. A computer-implemented method for determining trustworthiness of files within organizations, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
- identifying a file on a computing device within a plurality of computing devices managed by an organization;
before allowing the computing device to access the file;
identifying a user of an additional computing device within the plurality of computing devices that is qualified to assess the trustworthiness of the file based on determining that the user has previously assessed additional files that share characteristics with the file;
distributing at least a portion of the file to the user of the additional computing device with a request to receive an indication of the trustworthiness of the file; and
receiving, from the additional computing device, a response that indicates the trustworthiness of the file based on at least the portion of the file that was distributed to the user of the additional computing device;
protecting a security state of the computing device by controlling the computing device'"'"'s access to the file based on the trustworthiness of the file indicated in the response;
determining, based at least in part on an analysis of the response received from the additional computing device, that the user of the additional computing device is a trusted reviewer that is capable of accurately identifying security threats within the organization; and
in response to determining that the user of the additional computing device is the trusted reviewer, rewarding the user by enabling the additional computing device to access other files before the other files have been assessed for trustworthiness by other users within the organization.
2 Assignments
0 Petitions
Accused Products
Abstract
The disclosed computer-implemented method for determining the trustworthiness of files within organizations may include (1) identifying a file on a computing device within multiple computing devices managed by an organization, (2) in response to identifying the file, identifying at least one additional computing device within the multiple computing devices that is potentially associated with the file, (3) distributing at least a portion of the file to a user of the additional computing device with a request to receive an indication of the trustworthiness of the file, and then (4) receiving, from the additional computing device, a response that indicates the trustworthiness of the file. Various other methods, systems, and computer-readable media are also disclosed.
-
Citations
20 Claims
-
1. A computer-implemented method for determining trustworthiness of files within organizations, at least a portion of the method being performed by a computing device comprising at least one processor, the method comprising:
-
identifying a file on a computing device within a plurality of computing devices managed by an organization; before allowing the computing device to access the file; identifying a user of an additional computing device within the plurality of computing devices that is qualified to assess the trustworthiness of the file based on determining that the user has previously assessed additional files that share characteristics with the file; distributing at least a portion of the file to the user of the additional computing device with a request to receive an indication of the trustworthiness of the file; and receiving, from the additional computing device, a response that indicates the trustworthiness of the file based on at least the portion of the file that was distributed to the user of the additional computing device; protecting a security state of the computing device by controlling the computing device'"'"'s access to the file based on the trustworthiness of the file indicated in the response; determining, based at least in part on an analysis of the response received from the additional computing device, that the user of the additional computing device is a trusted reviewer that is capable of accurately identifying security threats within the organization; and in response to determining that the user of the additional computing device is the trusted reviewer, rewarding the user by enabling the additional computing device to access other files before the other files have been assessed for trustworthiness by other users within the organization. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 18, 19, 20)
-
-
11. A system for determining trustworthiness of files within organizations, the system comprising:
-
a memory; a physical processor coupled to the memory; an identification module, stored in the memory, that; identifies a file on a computing device within a plurality of computing devices managed by an organization; and before the computing device is allowed to access the file, identifies a user of an additional computing device within the plurality of computing devices that is qualified to assess the trustworthiness of the file based on determining that the user has previously assessed additional files that share characteristics with the file; a distribution module, stored in the memory, that distributes at least a portion of the file to the user of the additional computing device with a request to receive an indication of the trustworthiness of the file; a reception module, stored in the memory, that receives, from the additional computing device, a response that indicates the trustworthiness of the file based on at least the portion of the file that was distributed to the user of the additional computing device; a security module, stored in the memory, that protects a security state of the computing device by controlling the computing device'"'"'s access to the file based on the trustworthiness of the file indicated in the response; a reward module, stored in memory, that; determines, based at least in part on an analysis of the response received from the additional computing device, that the user of the additional computing device is a trusted reviewer that is capable of accurately identifying security threats within the organization; and in response to determining that the user of the additional computing device is the trusted reviewer, rewards the user by enabling the additional computing device to access other files before the other files have been assessed for trustworthiness by other users within the organization; and wherein the physical processor is configured to execute the identification module, the distribution module, the reception module, the security module, and the reward module. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A non-transitory computer-readable medium comprising one or more computer-executable instructions that, when executed by a computing device comprising at least one processor, cause the computing device to:
-
identify a file on a computing device within a plurality of computing devices managed by an organization; before allowing the computing device to access the file; identify a user of an additional computing device within the plurality of computing devices that is qualified to assess the trustworthiness of the file based on determining that the user has previously assessed additional files that share characteristics with the file; distribute at least a portion of the file to the user of the additional computing device with a request to receive an indication of the trustworthiness of the file; and receive, from the additional computing device, a response that indicates the trustworthiness of the file based on at least the portion of the file that was distributed to the user of the additional computing device; protect a security state of the computing device by controlling the computing device'"'"'s access to the file based on the trustworthiness of the file indicated in the response; determine, based at least in part on an analysis of the response received from the additional computing device, that the user of the additional computing device is a trusted reviewer that is capable of accurately identifying security threats within the organization; and in response to determining that the user of the additional computing device is the trusted reviewer, reward the user by enabling the additional computing device to access other files before the other files have been assessed for trustworthiness by other users within the organization.
-
Specification