Security assessment using service provider digital asset information
First Claim
1. A computer-implemented method comprisingreceiving from a service provider customer account data representative of relationships that exist at successive times between digital assets provided by the service provider and respective entities to whom the digital assets are provided by the service provider, andusing the received data to update a database to represent (a) mappings of the digital assets to respective entities to whom the digital assets are provided at one of the successive times, and (b) changes in the mappings between successive times, wherein the changes in mappings result from state-transitions of IP allocations at the service provider, and wherein the state-transitions comprise splitting an allocated IP address space into sub-spaces and allocating one or more of the sub-spaces to one of the respective entities, andwherein the customer account data is preprocessed by selectively identifying and ordering metadata within the customer account data to facilitate one of (i) matching of the customer account data to an existing entity in the database or (ii) creation of a new entity in the database, andderiving a cybersecurity rating for the respective entities based at least in part on the updated database.
4 Assignments
0 Petitions
Accused Products
Abstract
Among other things, customer account data is received from a service provider. The customer account data is representative of relationships that exist at successive times between digital assets provided by the service provider and respective entities to whom the digital assets are provided by the service provider. The received data is used to update a database to represent mappings of digital assets to respective entities to whom the digital assets are provided at one of the successive times, changes in the mappings between successive times, or both.
56 Citations
28 Claims
-
1. A computer-implemented method comprising
receiving from a service provider customer account data representative of relationships that exist at successive times between digital assets provided by the service provider and respective entities to whom the digital assets are provided by the service provider, and using the received data to update a database to represent (a) mappings of the digital assets to respective entities to whom the digital assets are provided at one of the successive times, and (b) changes in the mappings between successive times, wherein the changes in mappings result from state-transitions of IP allocations at the service provider, and wherein the state-transitions comprise splitting an allocated IP address space into sub-spaces and allocating one or more of the sub-spaces to one of the respective entities, and wherein the customer account data is preprocessed by selectively identifying and ordering metadata within the customer account data to facilitate one of (i) matching of the customer account data to an existing entity in the database or (ii) creation of a new entity in the database, and deriving a cybersecurity rating for the respective entities based at least in part on the updated database.
-
27. A computer-implemented method comprising
maintaining customer account data representative of relationships that exist at successive times between digital assets provided by a service provider and respective entities to whom the digital assets are provided by the service provider, making the customer account data available through the Internet to another party for use in updating a database to represent a mappings of digital assets to respective entities as of each of the successive times, and (b) changes in the mappings between successive times wherein the changes in mappings result from state-transitions of IP allocations at the service provider, and wherein the state-transitions comprise splitting an allocated IP address space into sub-spaces and allocating one or more of the sub-spaces to one of the respective entities, and wherein the customer account data is preprocessed by selectively identifying and ordering metadata within the customer account data to facilitate one of (i) matching of the customer account data to an existing entity in the database or (ii) creation of a new entity in the database, and deriving a cybersecurity rating for the respective entities based at least in part on the updated database.
Specification