SHARING INFORMATION
First Claim
Patent Images
1. A method for sharing information, the method comprising:
- identifying, utilizing a threat exchange server, a security occurrence associated with a participant within a threat exchange community;
determining what participant-related information to share with the threat exchange server in response to the identified security occurrence; and
receiving, at the threat exchange server, information associated with the determined participant-related information via communication links within the threat exchange community.
8 Assignments
0 Petitions
Accused Products
Abstract
Sharing information can include identifying, utilizing a threat exchange server, a security occurrence associated with a participant within a threat exchange community. Sharing information can also include determining what participant-related information to share with the threat exchange server in response to the identified security occurrence, and receiving, at the threat exchange server, information associated with the determined participant-related information via communication links within the threat exchange community.
-
Citations
15 Claims
-
1. A method for sharing information, the method comprising:
-
identifying, utilizing a threat exchange server, a security occurrence associated with a participant within a threat exchange community; determining what participant-related information to share with the threat exchange server in response to the identified security occurrence; and receiving, at the threat exchange server, information associated with the determined participant-related information via communication links within the threat exchange community. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing a set of instructions executable by a processor to cause a computer to:
-
continuously identify, utilizing a threat exchange server, individual security occurrences affecting a participant within a threat exchange community and global security occurrences affecting the threat exchange community utilizing shared information tables; dynamically request participant-related information from the participant based on the individual security occurrences and the global security occurrences; in response to a change in at least one of the individual security occurrences and the global security occurrences, dynamically adjust a granularity of the participant-related information requested; and receive, at the threat exchange server, information associated with at least one of the individual security occurrences and the global security occurrences from the participant. - View Dependent Claims (9, 10)
-
-
11. A system for sharing information, the system comprising a processing resource in communication with a non-transitory computer-readable medium, wherein the non-transitory computer-readable medium includes a set of instructions and wherein the processing resource is designed to carry out the set of instructions to:
-
continuously identify community security occurrences associated with a threat exchange community based on a number of global parameters associated with the community; continuously identify individual security occurrences for each of the number of participants based on a number of local parameters associated with each of the number of participants; dynamically determine an amount and a granularity of participant-related information of each of the number of participants to share with at least one of a threat exchange server within the threat exchange community and the number of participants based on the community security occurrences and each of the individual security occurrences; and receive, via a communication link, the determined participant-related information at the at least one of the threat exchange server and the number of participants. - View Dependent Claims (14, 15)
-
- 12. The system of claim 12, wherein the instructions to dynamically determine the amount and the granularity of participant-related information include instructions to dynamically increase an amount of information and an information granularity level for each of the number of participants in response to a number of the community security occurrences including a security threat.
Specification