| CPC H04L 63/1416 (2013.01) [G06Q 20/389 (2013.01); H04L 63/1441 (2013.01)] | 20 Claims |

|
1. A system comprising:
a computing device; and
a Cyber Security Management (CSM) service executable in the computing device, wherein the CSM service causes the computing device to at least:
obtain cyber intelligence input data, via a consortium blockchain channel, shared from a cyber defender computing device that is a participant of the consortium blockchain channel, wherein the cyber defender computing device manages network security of a network, wherein the cyber intelligence input data identifies a cyber attacker or a victim of a cyber attack on the network, wherein the consortium blockchain channel provides a blockchain ledger for on-chain data storage and a state database for on-chain data storage;
execute one or more CSM functions with the cyber intelligence input data received from the cyber defender computing device via the consortium blockchain channel;
store, via the one or more CSM functions, cyber data collected by the one or more CSM functions to a local off-chain database maintained by the computing device, wherein the cyber data includes discovery of an identification of a potential cyber attacker or potential victim of the cyber attack on the network;
share the discovery of the identification of the potential cyber attacker or the potential victim of the cyber attack on the network as new input cyber intelligence data on the consortium blockchain channel by storing the new input cyber intelligence data in the state database of each participant in the consortium blockchain channel after completion of a consensus protocol with other participants in the consortium blockchain channel, wherein the blockchain ledger of the consortium blockchain channel is updated to include an invocation history of the one or more CSM functions that discovered the identification of the potential cyber attacker or the potential victim of the cyber attack on the network; and
output an alert to the cyber defender computing device with the potential cyber attacker or the potential victim of the cyber attack on the network managed by the cyber defender computing device.
|