US 11,777,976 B2
Information technology security assessment system
Stephen Wayne Boyer, Waltham, MA (US); Nagarjuna Venna, Waltham, MA (US); and Megumi Ando, Cambridge, MA (US)
Assigned to BitSight Technologies, Inc., Boston, MA (US)
Filed by BitSight Technologies, Inc., Boston, MA (US)
Filed on Oct. 13, 2020, as Appl. No. 17/69,151.
Application 17/069,151 is a continuation of application No. 13/240,572, filed on Sep. 22, 2011, granted, now 10,805,331.
Claims priority of provisional application 61/492,287, filed on Jun. 1, 2011.
Claims priority of provisional application 61/386,156, filed on Sep. 24, 2010.
Prior Publication US 2021/0211454 A1, Jul. 8, 2021
Int. Cl. H04L 9/40 (2022.01); G06Q 10/0639 (2023.01); H04L 61/5007 (2022.01); H04L 67/53 (2022.01); H04L 43/062 (2022.01); H04L 43/0876 (2022.01)
CPC H04L 63/1433 (2013.01) [G06Q 10/0639 (2013.01); H04L 43/062 (2013.01); H04L 43/0876 (2013.01); H04L 61/5007 (2022.05); H04L 67/53 (2022.05); H04L 63/145 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method for determining a security rating of an entity, the method comprising:
determining an internal security rating comprising:
obtaining data indicative of internal security from a plurality of internal data sources;
extracting a plurality of internal security features from the obtained data;
applying a respective transformation function to each of the plurality of internal security features to determine a first plurality of transformed features; and
combining the first plurality of transformed features to form the internal security rating;
determining an external security rating comprising:
obtaining data indicative of external security from a plurality of external data sources;
extracting a plurality of external security features from the obtained data;
applying a respective transformation function to each of the plurality of external security features to determine a second plurality of transformed features; and
combining the second plurality of transformed features to form the external security rating; and
providing, via a reporting facility, a composite security rating for the entity based on the internal security rating and the external security rating, wherein at least one of the internal security features or the external security features indicates malicious activity associated with an IP address of the entity.