×

Trusted third party broker for collection and private sharing of successful computer security practices

  • US 9,787,719 B2
  • Filed: 02/26/2015
  • Issued: 10/10/2017
  • Est. Priority Date: 02/26/2015
  • Status: Active Grant
First Claim
Patent Images

1. A computer implemented method for a trusted third party broker to collect information concerning successful computer security practices from a plurality of source organizations, and to share collected information at an inter-organizational level privately, the method comprising the steps of:

  • receiving, by a central computer, information concerning empirically successful computer security practices, from a plurality of remote computers associated with a plurality of source organizations, wherein different ones of the empirically successful computer security practices are being used at different ones of the plurality of source organizations;

    amalgamating the information concerning empirically successful computer security practices received from the plurality of remote computers associated with the plurality of source organizations, further comprising gleaning implicitly determined information about at least one of the plurality of source organizations of the received information;

    analyzing the amalgamated information concerning empirically successful computer security practices received from the plurality of remote computers associated with the plurality of source organizations, further comprising categorizing the amalgamated information based on the implicitly determined information about the at least one source organization;

    identifying specific information concerning empirically successful computer security practices to share with at least one specific target organization, based on analyzing category granularity of the amalgamated information;

    removing source information from the identified specific information concerning empirically successful computer security practices to share with the at least one specific target organization; and

    providing the identified specific information concerning empirically successful computer security practices to share with the at least one specific target organization, with the source information removed, wherein the at least one target organization does not receive information identifying the source of the provided information concerning empirically successful computer security practices.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×