Security broker

ABSTRACT

An attempted transaction is identified involving a customer device and the first customer device is redirected to a security broker. A security report for the first customer device is received from the security broker. The security report is based on security data transmitted from the customer device to the security broker. An action can be performed in association with the attempted transaction based at least in part on the received security report. In some aspects, the security broker receives security data describing security conditions on the customer device in connection with the transaction between the customer device and a transaction partner. A risk tolerance policy is identified that corresponds to the transaction partner, such as an ecommerce provider. A security report is generated based on a comparison of the risk tolerance policy and the security data and the security report.

TECHNICAL FIELD

This disclosure relates in general to the field of computer securityand, more particularly, to risk assessment in ecommerce transactions.

BACKGROUND

The Internet has enabled interconnection of different computer networksall over the world. The ability to effectively protect and maintainstable computers and systems, however, presents a significant obstaclefor component manufacturers, system designers, computer and networkoperators. This obstacle is made even more complicated due to thecontinually-evolving array of tactics exploited by malicious softwareauthors as well as the never-ceasing development of new computingdevices and software vulnerable to such threats. Risk can be assessedfor computing devices and environments and may be based on thevulnerabilities present on the respective computing device as well asthreats to which a computing device is exposed. For instance, risk canbe assessed within an enterprise computing environment based on riskpresent in the respective computing devices and networks within theenterprise computing environment. In such instances, administrators canutilize risk scores computed for their systems and environments toappreciate what types of security weaknesses and risk face the systems,together with the amount of risk, and the devices most affected by riskwithin the system. Consumer security tools also exist for use on privateand home computers and networks that can provide risk assessments ofsuch private computing devices and networks.

Through the identification of risk on computing devices, system ownersand administrators can apply certain remedies to counteract or fixvulnerabilities and deficiencies in their systems. However, given theincreasing interconnection of devices, systems transact and communicatemore and more with other systems, including systems undergoing lessvigilant risk assessment and management. Accordingly, while a systemowner or manager can employ proactive risk and security management totheir own system, they are, at some level, also at the mercy of othersystems with which they interact, potentially exposing their systems tothreats and risk from these external systems and activities.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a simplified schematic diagram of an example computing systemincluding functionality for providing security brokering in accordancewith at least one embodiment;

FIG. 2 is a simplified block diagram of an example computing systemincluding an example security broker in accordance with at least oneembodiment;

FIGS. 3A-3C are simplified block diagrams illustrating exampleoperations of a security broker in accordance with at least oneembodiment;

FIGS. 4A-4B are simplified block diagrams illustrating additionalexample operations of a security broker in accordance with at least oneembodiment;

FIGS. 5A-5B are simplified block diagrams illustrating further exampleoperations of a security broker in accordance with at least oneembodiment; and

FIGS. 6A-6B are simplified flowcharts illustrating example techniquesfor providing security brokering in accordance with at least someembodiments.

Like reference numbers and designations in the various drawings indicatelike elements.

DETAILED DESCRIPTION OF EXAMPLE EMBODIMENTS

FIG. 1 is a simplified block diagram illustrating an example computingsystem 100 including end-user host devices 105, 110, 115 for whichcorresponding security assessments can be performed and securityprofiles generated. The security scores can be based on thecorresponding security-related system attributes of the host devicesdetermined from security data originating from the host devices 105,110, 115 themselves (and tools local to the host devices 105, 110, 115),and/or other services, devices, and entities outside the host device,such as network elements (e.g., of network 120), remote applications,services, and software tools that interact with, monitor, communicatewith, or are used by the host devices 105, 110, 115. In someimplementations, system 100 can include one or more security assessmentservers 125 which can collect security data relating to one or more hostdevices (e.g., 105, 110, 115) and generate a security profile for eachhost device based on an assessment of the security data. In someimplementations, the security profile can be a security score.Additionally, security assessment server 125 can be utilized to providea neutral security profile for the host device (e.g., 105, 110, 115)that is insulated from influence by outside software vendors and systemsecurity providers with incentives for favorable risk and securityassessments (e.g., to promote the sale of a particular security productor under-assess risk associated with vulnerabilities or deficiencies ofparticular software or hardware utilized on the assessed system).

System 100 can further include one or more ecommerce provider systems(e.g., 130, 135) with which host devices (e.g., 105, 110, 115) caninteract in connection with the completion of ecommerce transactions(e.g., between the user of a host device (e.g., 105, 110, 115) and acommercial enterprise selling goods and services online). Ecommerceproviders can maintain system 130, 135 adapted to communicate withmultiple customer host devices, in some cases simultaneously and inparallel. Indeed, some modern ecommerce provider systems completethousands of transactions per day with thousands of different customerhost devices. Such frequent and varied exposure to various host devicescan potentially expose the ecommerce provider systems (e.g., 130, 135)to a variety of threats including hacks, viruses, malware, dataintrusion attacks. However, many ecommerce providers, in order tomaximize revenue generated through their ecommerce platforms, aresensitive to user experience and are careful not to make the initiationand completion of ecommerce transactions through their platforms toodifficult or unfriendly. This welcoming posture, unchecked, can resultin security threats presented through interactions with poorly-managedor malicious client devices that the ecommerce platform is potentiallyhesitant to confront. As a result, in some instances, ecommerce vendorsrespond by imposing additional (and sometimes off-putting)authentications on potential customers in connection with the completionof an ecommerce transaction, among other examples.

In some implementations, a security broker system 140 can be providedwith which an ecommerce system (e.g., 130, 135) can coordinate with toassess, on behalf of the ecommerce system, risk associated withtransacting with a particular customer host device (e.g., 105, 110,115). In theory, an ecommerce system (e.g., 130, 135) could solicitsecurity data or security profiles directly from customer host devicesto assess the riskiness of a transaction with the customer host devices.Such direct risk assessments by ecommerce providers or other serviceproviders, however, can introduces a variety of issues. For instance, asecurity profile or security data received directly from a customer hostdevice could be manipulated or otherwise compromised by the host device,calling the reliability of the data and security assessments based onthe data into question. Further, legitimate actual and potentialcustomers of the ecommerce provider may balk at frequenting theecommerce platform's site if they expect to have to share informationrelating to the system configurations and attributes of their device.Further, customers' privacy may also be impinged by a direct securityassessment or sharing of security-related data with an ecommerceprovider. Such concerns can be further founded in a fear that anecommerce provider could misuse such information, such as to takeadvantage of or disclose a particular identified vulnerability in thecustomer host device shared with or detected by the ecommerce system ina direct risk assessment.

In some implementations, a security broker system 140 can maintaintrusted relationships with ecommerce providers and perform securityassessments of potential customers on behalf of the ecommerce providerto thereby verify the veracity of information relating to security of aparticular host device and hiding sensitive user and systemconfiguration information of the host device from the ecommerceprovider, among other advantages. In some implementations, host devicescan register or otherwise establish a trusted relationship with asecurity broker system (or other system with which the security brokercooperates (such as security assessment system 125)) to encourageparticipation by the host devices and assist in insuring trustworthysecurity assessments of the host devices. In addition, to incentivizeparticipation or registration of customer host devices with securitybroker system 140, ecommerce providers can themselves offer rebates,special offers, and other incentives based on the completion of a riskassessment for the customer device using the security broker system 140among other examples, including those discussed elsewhere herein.

In some implementations, system 100 can further include tools (notshown) for use in connection with the risk assessment and risk scoringof end-user host devices 105, 110, 115, including security tools andservices already deployed on or servicing the host devices 105, 110,115. Security data can be collected from the host devices 105, 110, 115as well as other sources (e.g., network elements, security tools, andother services and entities with which the host devices interact), thesecurity data describing attributes of the respective host devices(e.g., 105, 110, 115) relevant to assessing security of the hostdevices. Such security data can be accessed or obtained directly fromthe host device and describe such attributes as the host device'soperating system, hardware, installed software, deployedcountermeasures, detected vulnerabilities, etc. Additionally, in someimplementations, security data can be obtained from security tools andother entities remote from the host devices but collecting informationfrom and/or concerning attributes of the host devices. Security datafrom remote sources can supplement security data obtained internallyfrom the host device. Security data, originating either local to orremote from a host device, can then be used by a security assessmentserver 125 or other tool to generate a security profile or securityscore for a corresponding host device, in some cases identifying thoseattributes or categories of attributes of the device that negativelyand/or positively affect the device's security. In some instances, atleast a portion of the security assessment server 125 can be providedlocally on the host device and/or remote from the host device.

The generation of security profile or security scores for a host devicecan include the identification and assessment of threats and/orvulnerabilities affecting the device or system and the consideration ofcountermeasures potentially mitigating against risks derived from theidentified threats and vulnerabilities. A threat can broadly refer tosomething that causes, attempts to cause, or potentially could cause anegative impact to an objective or an asset. For example, a threat mayinclude malware that could disrupt business operations, a naturaldisaster, an organization that is targeting a person, industry, etc., oreven a partner or vendor that has been compromised. A vulnerability cangenerally include any weakness or condition that can be affected by orexploited by a threat. A vulnerability may include, for example,misconfigured software or hardware; an employee susceptible tomanipulation, temptation, or persuasion; inadequate security measures,password protections, etc., or a facility housing the system and assetsnot being equipped with adequate security measures such as a fireextinguishers, locks, monitoring equipment, etc. or other adequatesecurity measures. A countermeasure can include anything that canmitigate a vulnerability or threat, such as antivirus software,intrusion protection systems, a software patch, a background check,hardware upgrades, network security tools, password strength, encryptionschemes, among many other examples both deployed locally at the deviceor on other, remote devices, such as network elements, used or incommunication with the device.

Quantitative risk assessment, in some instances, can include theevaluation of both the magnitude of the potential impact (e.g., loss orharm) to an asset, and the probability that an event will cause theimpact. The combination of these components can be used to create a riskmetric that is both forward-looking and has predictive capabilities. Theability to predict allows for identification of risk metrics relating tovarious assets within an operating environment or the operatingenvironment as a whole, as well as allowing for prioritization of tasksto reduce risk, which is the foundation of in connection with riskmanagement of the operating environment. Managing risk can includeidentifying, characterizing, and assessing threats; assessingvulnerability of assets to specific threats; determining the risk tospecific assets based on specific vulnerabilities and threats; andimplementing strategies for reducing or eliminating the risk, includingthe identification of countermeasures that wholly or partially eliminatea threat or vulnerability responsible for a particular risk.

A security profile or security score (collectively “security profiledata”) generated, for instance, by a security assessment server 125 fora particular host device (e.g., can be utilized by a security broker 140to determine whether the particular host device meets certain thresholdstandards of security required or desired by a particular ecommerceprovider. The security broker 140 can make such an assessment andprovide a security report or security assessment result to the ecommerceprovider indicating, in general terms, whether the particular hostdevice has met one or more thresholds defined for the ecommerceprovider. Such reports could withhold from the ecommerce provider moredetailed configuration and identification information relating to thehost device while communicating the results of the assessment.

In some instances, the assessment by the security broker 140 and thegeneration of a corresponding security report for a particular hostdevice can take place in response to an attempt by the particular hostdevice (or the ecommerce provider) to initiate a transaction. Further,on the basis of such security report data, an ecommerce provider canperform certain actions when engaged in a potential transaction with theparticular host device. For instance, the ecommerce provider cancomplete or deny a transaction based on the report, demand additionaltransaction steps or information from the customer (or allow such stepsto be skipped), provide discounts or other offers, and other actionsbased on the security report.

In general, “servers,” “clients,” “computing devices,” “host devices,”“endpoint devices,” “network elements,” “hosts,” and “systems,”including host and server devices in example computing environment 100(e.g., 105, 110, 115, 120, 125, 130, 135, 140, etc.), can includeelectronic computing devices operable to receive, transmit, process,store, or manage data and information associated with the computingenvironment 100. As used in this document, the term “computer,”“processor,” “processor device,” or “processing device” is intended toencompass any suitable processing device. For example, elements shown assingle devices within the computing environment 100 may be implementedusing a plurality of computing devices and processors, such as serverpools including multiple server computers. Further, any, all, or some ofthe computing devices may be adapted to execute any operating system,including Linux, UNIX, Microsoft Windows, Apple OS, Apple iOS, GoogleAndroid, Windows Server, etc., as well as virtual machines adapted tovirtualize execution of a particular operating system, includingcustomized and proprietary operating systems.

Further, servers, clients, network elements, systems, and computingdevices (e.g., 105, 110, 115, 125, 130, 135, 140, etc.) can each includeone or more processors, computer-readable memory, and one or moreinterfaces, among other features and hardware. Servers can include anysuitable software component or module, or computing device(s) capable ofhosting and/or serving software applications and services (e.g.,security assessment server 125, ecommerce servers 130, 135, and securitybroker 140, etc.), including distributed, enterprise, or cloud-basedsoftware applications, data, and services. For instance, in someimplementations, a security assessment server 125, security broker 140,or other sub-system of computing system 100 can be a cloud-implementedsystem configured to remotely host, serve, or otherwise manage data,software services and applications interfacing, coordinating with,dependent on, or used by other services and devices in system 100. Insome instances, a server, system, subsystem, or computing device can beimplemented as some combination of devices that can be hosted on acommon computing system, server, server pool, or cloud computingenvironment and share computing resources, including shared memory,processors, and interfaces.

Host, endpoint, client, or client computing devices (e.g., 105, 110,115, etc.) can include traditional and mobile computing devices,including personal computers, laptop computers, tablet computers,smartphones, personal digital assistants, feature phones, handheld videogame consoles, notebook computers, desktop computers, internet-enabledtelevisions, and other devices designed to interface with human usersand capable of communicating with other devices over one or morenetworks (e.g., 120). Such devices can also include computer-assisted,or “smart,” appliances, such as household and industrial devices andmachines that include computer processors and/or one or more softwareprograms executed by the computer processors that control, monitor,assist, supplement, or otherwise enhance the functionality of thedevices. Computer-assisted appliances can include a wide-variety ofcomputer-assisted machines and products including refrigerators, washingmachines, automobiles, HVAC systems, industrial machinery, ovens,security systems, and so on.

Attributes of host computing devices, computer-assisted appliances,servers, and computing devices generally can vary widely from device todevice, including the respective operating systems and collections ofapplications, security tools, and other software programs loaded,installed, executed, operated, or otherwise accessible to each device.For instance, computing devices can run, execute, have installed, orotherwise include various sets of programs, including variouscombinations of operating systems, applications, plug-ins, applets,virtual machines, machine images, drivers, executable files, and othersoftware-based programs capable of being run, executed, or otherwiseused by the respective devices. A similarly diverse array of hardwarecan be utilized and included in host computing devices, including avariety of different chip sets, ports, display devices, networkinterface hardware, input devices, peripherals, and other hardware-basedcomponents. Graphical display devices and user interfaces, supported bycomputer processors of the host devices, can further allow a user toview and interact with graphical user interfaces of applications andother programs provided in system 100, including user interfaces andgraphical representations of programs interacting with applicationshosted within the host devices, as well as graphical user interfacesassociated with remote servers, etc. Moreover, while system devices maybe described in terms of being used by one user, this disclosurecontemplates that many users may use one computer or that one user mayuse multiple computers.

While FIG. 1 is described as containing or being associated with aplurality of elements, not all elements illustrated within computingenvironment 100 of FIG. 1 may be utilized in each alternativeimplementation of the present disclosure. Additionally, one or more ofthe elements described in connection with the examples of FIG. 1 may belocated external to computing environment 100, while in other instances,certain elements may be included within or as a portion of one or moreof the other described elements, as well as other elements not describedin the illustrated implementation. Further, certain elements illustratedin FIG. 1 may be combined with other components, as well as used foralternative or additional purposes in addition to those purposesdescribed herein.

Turning to FIG. 2, a simplified block diagram 200 is shown illustratingan example implementation of a security broker 205 in use within asystem including multiple potential customer host devices (e.g., 210,215) and ecommerce platforms (e.g., 220, 225) communicating over anetwork (e.g., 120), such as the Internet. An example security broker205 can include one or more processors 226 and one or more memoryelements 228, as well as components and entities such as a securityreport generator 230, scoring engine 235, risk tolerance records 240,transaction manager 245, as well as potentially additional componentsand related functionality. A security report generator 230, inconnection with an attempted ecommerce transaction between a particularhost device (e.g., 210, 215) and a particular ecommerce system (e.g.,220, 225), can generate a security report for the transaction andcommunicate the security report to the particular ecommerce system toreport to what extent a particular host device complies with risktolerance thresholds and policies set by the ecommerce provider. Thiscan be achieved generally, for instance, by accessing risk tolerancepolicy data 240 maintained for the particular ecommerce provider andcomparing security profile data describing security characteristics ofthe particular host device against the risk tolerance policy data 240.The security broker 205 can maintain risk tolerance policies 240 for aplurality of different ecommerce platforms 220, 225 and ecommerceproviders and generate security reports in connection with a variety ofdifferent transactions involving a variety of different customers andcustomer devices, including ecommerce transactions of varying types.

In some implementations, an example security broker 205 can utilize anexample scoring engine 235 to obtain security profile data for aparticular host device (e.g., 210, 215) in connection with thegeneration of a particular security report. In some instances, securityprofile data can be pre-generated and provided to the security broker205 through the scoring engine 235. In other instances, the scoringengine 235 can calculate, at least in part, the security profile datafor use in the generation of a security report. For instance, a scoringengine 235 can access data describing attributes of a particular hostdevice and generate security profile data for the particular host devicebased on the described attributes. In some implementations, securityprofile data (or attribute data) can be provided to the security brokervia secure and trusted mechanisms in an attempt to ensuretrustworthiness (and accuracy) of the data describing thesecurity-related characteristics of a particular host device. Forinstance, security profile data (or attribute data) can be providedthrough a trusted source (e.g., a neutral security assessment engine(e.g., 125)), such as a source that has collected data directly from thehost device and/or has a trusted relationship with the host device.Further, secure communication channels and/or secure data stores can beused to extract, collect, and store security profile data and/orattribute data directly from the host device, the secured featuresprotecting against manipulation and compromising of the data at the hostdevice prior to delivery to and use by the trusted source and/orsecurity broker 205.

Security profile data of a host device accessed by the security broker205 can be assessed against one or more risk tolerance policies 240 todetermine whether transacting with the host device presents a level ofrisk in excess of risk tolerated by a corresponding ecommerce provider.The results of this assessment can be documented in a security reportcommunicated to the ecommerce provider. While security profile data canidentify more specific attributes of the host device at varying levelsof detail, such details can be withheld from generated security reportsso as to keep more sensitive information concerning specific attributesand configurations of the host device (or attributes of its user) hiddenfrom the ecommerce provider.

Risk tolerance policy data can specify conditions or security thresholdsdefined for a particular ecommerce provider. In some implementations,risk tolerance data can specify a plurality of certain host deviceattributes or vulnerabilities that are unacceptable to or not favored bythe particular ecommerce provider, as well as particular attributes thatare desirable. As an example, security profile data that indicates thepresence of such an undesirable attributes at a host, a certain numberof such attributes above a set threshold, or certain combinations ofsuch attributes, as defined in risk tolerance policy data, can result inthe security broker 205 generating a security report that fails orscores the host device at a certain level and reports these findings tothe related ecommerce provider. The security report can genericallyidentify that the host device fell short of certain general risk levelsor conditions set in the risk tolerance data without detailing thespecific basis for the determination and the generated report.

In other instances, risk tolerance data can dictate thresholds mapped toparticular security scoring schemes that further abstract the specificsecurity-related attributes of the host device. For instance, riskthreshold data can reference a pre-defined security scoring scheme orstandard and request identification of host devices that fall below acertain threshold score, within one or more ranges of security scores,etc. Further, in some implementations, a security score can includemultiple category-specific scores. For example, a single securityscoring scheme can include sub-scores such as a network-related securityscore, password-related security score, hardware-related security score,application-related security score, etc. In such examples, risktolerance data can set a threshold for each of the sub-scores (or eventmultiple thresholds within a single sub-score category).

Multiple risk thresholds can be defined for a single ecommerce provider.For instance, an ecommerce provider can offer a variety of differentservices, products, and even online storefronts. Depending on the typeand nature of a particular transaction, different risk thresholds can bedefined. For instance, an ecommerce provider can set a first risktolerance threshold for lower value transactions (e.g., under a certaindollar amount) and a second risk tolerance threshold for higher value orhigh exposure transactions (e.g., transactions above the dollar amount,transaction involving the extension of credit, etc.). In other examples,an ecommerce provider can set varying risk thresholds based, forinstance, on the method of payment offered the customer in thetransaction, the type of product or service to be purchased in thetransaction, the return policy applied to the purchase, etc.

Example implementations of security broker 205 can include a transactionmanager 245 that identifies the nature of a transaction for which asecurity report is to be generated. For instance, an example transactionmanager 245 can identify the type of transaction, for instance, fromdata (transaction data) received from the ecommerce platform (e.g., 225)and/or customer host device (e.g., 210, 215), as well as the identity ofthe involved ecommerce provider, and the identity of the customer hostdevice. This information can be collected using the transaction manager245 and used in the generation of a security report. In some instances,a security report can be generated in response to each transaction. Inother instances, using the security broker 205 can identify a particularhost device and identify further that the host device has recently beenassessed by the security broker (e.g., within a predefined period oftime). From the determination, the security broker 205 can reuse aprevious security report. In some instances, the security broker 205 candetermine that a host device identified in the transaction data hasout-of-date (or no known) security profile data for use by the securitybroker, causing the security broker to request (e.g., from a remote orlocal security assessment engine, scoring engine, security datarepository) or generate security profile data for the host device.Additionally, among other uses, transaction data can be used to identifyfrom a set of risk tolerance data for a ecommerce provider, particularrisk tolerance data defining thresholds for the particular type oftransaction.

In some implementations, transaction data can be received by thesecurity broker 205 from the host device participating in the attemptedtransaction with an ecommerce provider. The ecommerce provider can passa transaction identifier to the host device to forward to the securitybroker 205. The security broker 205 (e.g., using transaction manager245) can process the transaction identifier to identify, among otherinformation, the identification of the ecommerce provider and the typeof transaction. The security broker can then send the responsivesecurity report to the ecommerce provider referencing the receivedtransaction identifier, allowing the ecommerce provider to relate thereceived security report to the proper transaction type, correspondingtransaction and host device. In other instances, transaction data can bereceived by the security broker 205 from both the participating hostdevice and ecommerce provider in a transaction, which the securitybroker 205 can use to corroborate a security report generation requestand identify the transaction and transaction attributes (e.g., ecommerceprovider identifier, host device identifier, transaction type, time ofthe transaction, etc.) for the requested security report generationrequest.

Example ecommerce platforms (e.g., 220, 225) operated by ecommerceproviders can include processors (e.g., 272, 274) and memory elements(e.g., 275, 276), together with various other hardware and softwarecomponents including, for instance, an ecommerce service (e.g., 280,285), risk threshold manager (e.g., 290, 295), and other components andfunctionality, such as modules configured to generate transaction datafor use by a security broker 205 in the generation of a security reportfor a related transaction. Ecommerce services 280, 285 can include thosemodules, databases, database managers, programs, and resources used byan ecommerce provider to launch and manage ecommerce platforms of theecommerce platform including the online websites, storefronts, and otherinterfaces for interacting with and conducting ecommerce transactionswith existing and potential customers and the host devices (e.g., 210,215) of the customers.

Example ecommerce platforms 220, 225 can further include, in someimplementations, a risk threshold manager (e.g., 290, 295) that includesfunctionality for managing risk tolerance policies used by the securitybroker 205 in the generation of security reports. In someimplementations, an example risk threshold manager 290, 295 can allowone or more users, such as administrators of the ecommerce provider, tospecify particular conditions, host device attributes, security scores,and other information that can be used to build risk tolerance policydata for one or more transactions types or storefronts of the ecommerceprovider. In some implementations, risk threshold manager 290, 295 cangenerate the risk tolerance policy data and communicate the risktolerance policy data to one or more security brokers (e.g., 205). Insystems including multiple security brokers, such as security brokersrun by different competing providers, risk threshold manager 290, 295can generate risk tolerance policy data and tailor other communicationsto respective security brokers based on the specific schemes employed(and security profile data considered) by each respective, differentsecurity broker. In other implementations, risk threshold manager 290,295 can provide risk threshold information, select preferences, orprovide other information for use by the security broker 205 ingenerating risk tolerance policy data for the ecommerce provider, amongother implementations and alternatives.

Host devices 210, 215 can include any variety of computing devices,including user host devices such as handheld and desktop personalcomputing devices and automated computer-controlled host devices,capable of interacting with ecommerce platforms 220, 225 and attempt,legitimately or illegitimately, to conduct an ecommerce transaction withthe ecommerce platform. In some instances, a host device can be utilizedby a malicious entity, such as in a spoof attack, to compromise, hack,or otherwise attack an ecommerce platform. Generally, host devices 210,215 can include one or more processor devices (e.g., 246, 248) and oneor more memory elements (e.g., 250, 252), as well as other software andhardware components providing various functionality, such as variousapplications (e.g., 254, 255), security tools (e.g., 256, 258),operating systems, peripherals, and other components, such as a securecommunication platform 270, among other examples.

Attributes of an individual host device (e.g., 210, 215) can bedependent on the software installed, used, and accessed by therespective host device (e.g., applications 254, 255), the networksaccessed by the host device, hardware components of the host device,users of the host devices, security tools (e.g., 256, 258) deployed orused by the host device, etc. Data describing such attributes (e.g.,attribute data) can be collected by the host device, security tools(e.g., 256, 258) accessing the host device, and/or security assessmentand scoring engines in connection with the generation of securityprofile data for the host device. Security tools (e.g., 256, 258)deployed on or used by the host device, can include programs andservices local to and remote from the host device, including suchsecurity tools as antivirus software, encryption tools, web browsersecurity tools, password protection tools, antimalware detection andremoval tools, firewalls, web gateways, mail gateways, host intrusionprotection (HIP) tools, data loss prevention (DLP) tools, vulnerabilitymanagers, policy compliance managers, among others.

In some implementations, security attribute data, such as securityscores, generated for a host device can be maintained on the host deviceitself. For instance, in one example, to ensure neutrality andtrustworthiness of security attribute data (e.g., 260) determined for ahost device 215 and describing security of the host device 215 can begenerated by a neutral third party (e.g., security assessment service125, etc.) or another service outside the host device 215 itself. Theresults of the security assessment can be made accessible on the hostdevice 215, for instance, to inform users of the host device of securityconditions on the host device. For instance, security scores and otherprofile data can be generated both for use on the host device as well asin connection with the generation of security reports by a securitybroker, including security scores and security profile data described,for instance, in U.S. patent application Ser. No. ______, filed ______,entitled “User Device Security Profile,” which is hereby incorporated byreference in its entirety as if explicitly set forth herein.

Once a host device 215 receives security attribute data describingsecurity attributes of the host device 215, it can be advantageous totake measures to protect the integrity of the security assessments andscores (e.g., 260) that can serve as the basis for other actions,including remedial actions at the host device 215, as well as inecommerce transactions utilizing services of an example security broker205 such as described herein. In some implementations, a host device 215can include secure memory containers 265, such as memory on secureprocessing chips or other hardware physically isolated from theoperating system and other hardware of the host device. A securecommunication manager 270 on the host device 215 can include furtherfunctionality allowing for secure, out-of-band communication with otherremote entities such as security assessment and scoring services, andthe security broker 205 allowing for updates to the security profiledata (e.g., 260) to be received securely and for the security profiledata (e.g., 260) to be shared securely and free of tampering with othertrusted partners (e.g., security broker 205). Additionally, in someimplementations, special authentication may be a condition for accessingthe profile data dedicated to particular licensed security brokers (andnot otherwise available to other entities in the general network).Further, enterprise environments can utilize such data together withpolicy enforcement and management tools to determine operationalcriteria for any host device (e.g., 215), among other examples.

Turning to FIGS. 3A-3C, simplified block diagrams 300 a-c are shownillustrating various functionality and example operations of a systemincluding a security broker 205 in example ecommerce transactions. Forinstance, as shown in the example of FIG. 3A, a particular host device105, such as a handheld smartphone or tablet computing device, cancommunicate with an ecommerce platform server 130 in connection with anattempted ecommerce transaction. Such communications can include, asexamples, the host device sending a query for particular good orservices offered by the corresponding ecommerce provider, the adding ofgoods or services to an online shopping cart, an attempt to check-out orinitiate payment for selected goods or services, or any othercommunication exchanged between the ecommerce platform server 130 andthe host device 105 prior to completion of the transaction.

In response to the initiation of an ecommerce transaction attempt orparticular actions prior to and potentially leading up to the completionof the transaction, an ecommerce server 130 can communicate a redirectto the host device in connection with a requested system security checkor assessment of the host device. The redirect can cause or request thehost device to begin communication with a security broker 205 inconnection with the security assessment. In some instances, an ecommerceserver 130 can elect to skip such a security check, for instance, if thecustomer-user of the host device 105 has logged-in as a known registereduser, if the identifiers of the host device 105 (e.g., IP address, MACaddress, etc.) match or otherwise correspond to previous identifiers ofa trusted customer device (e.g., as recognized from previoustransactions), among other examples. In such instances, the ecommerceserver can continue toward completion of the ecommerce transactionwithout involvement of the security broker 205. In otherimplementations, an ecommerce provider can issue a redirect to andinvolve the security broker in every transaction. Additionally, in someinstances, the redirect to the security broker 205 communicated to hostdevice 105 can include transaction data that is to be used or forwardedto the security broker 205 in connection with the security assessment,such as a transaction identification number, an identifier of thecorresponding ecommerce provider, an identifier of the transaction type,among other examples. In still other instances, a host device 105 canopt-out of the security-broker-assisted risk assessment, although thehost device may, as a result, forfeit certain privileges offered by theecommerce provider to host devices that agree to participate in theassessment, among other examples.

In response to receiving a redirect message from the ecommerce server130, an example host device 105 can initiate communications with asecurity broker 205 identified in the redirect. In some instances, auser of host device 105 can select a particular security broker from alist of accepted security brokers used in connection with the ecommerceserver 130, such as a particular security broker 205 with which the hostdevice already has a relationship and trust. In either instance, thehost device 105 can communicate security data to the security broker 205for use by the security broker 205 in determining whether the hostdevice 105 meets certain security standards set by the ecommerceprovider as defined in risk tolerance policy data corresponding to theecommerce provider and particular transaction type. In some instances,security profile data can include a pre-generated security score, whilein other instances, security profile data can include data identifyingcertain attributes of the host device 105 that can be further processed(e.g., at the security broker 205) to derive a particular baseline scoreor format for comparison against an ecommerce provider's risk tolerancedata. Based on this comparison, the security broker 205 can generate andissue a security report to be communicated to ecommerce server 130. Asnoted above, such a security report can be limited to an abstractreporting of the general state of security of the host device and itsperformance relative to the ecommerce provider's risk tolerance datawithout identifying specific attributes, vulnerabilities,configurations, or other features of the host device 105.

In connection with the delivery of a security report to the ecommerceprovider 130, the ecommerce transaction between the host device 105 andecommerce server 130 can be resumed (e.g., through a return oradditional redirect) and the transaction attempt can be resolved basedon the security report. In some implementations, the results of thesecurity report can affect how the ecommerce server 130 completes thetransaction. In some instances, the ecommerce server 130 can simply denythe transaction (e.g., after a negative report) or complete thetransaction (e.g., in response to a positive report). The ecommerceserver 130 can apply a promotion, discount, or other favorabletransaction terms in response to a positive report in some examples.Additionally, in some instances, an ecommerce server 130 can force ahost device 105 to participate in more or fewer verification orauthentication steps in connection with the transaction such as user oraccount registration steps, password checks, user verification checks(e.g., to check against bots or other automated clients), and othersteps based on the reported relative risk level of the host device.Further, in some instances, a security report can indicate that the hostdevice possesses a security or risk level within a plurality of rangesor levels. Accordingly, varying degrees of action can be taken by theecommerce server based on the varying degrees of security results thatcan be reported for a particular host device in a security report, amongother examples.

Turning to FIG. 3B, another example is shown of examples operations thatcan be involved in a security check of a host device by a securitybroker in connection with a particular ecommerce transaction. Asdiscussed above, in some instances, a security score for a host devicecan be predetermined and, in some cases, securely stored at the hostdevice and securely communicated to and from the host device utilizingsecured hardware on the host device 105, among other examples. In someinstances, a scoring engine 305 can be employed by a host device 105 togenerate a security score 315 a for the host device based on attributedata 310 a communicated to the scoring engine 305 describingsecurity-related attributes of the host device 105. This security scorecan then be used by the host device 105 in connection with a variety offunctions including security assessments by an examples security broker205. For instance, in one example, at least a portion of the securityscore generated for the host device 105 by scoring engine 205 can becommunicated to the security broker 205, for instance, in response to aredirect to the security broker 205 or security assessment requestcommunicated to the host device 105 by the ecommerce server 130. Thesecurity broker 205 can use this pre-generated security profile data forthe basis of its security report generated in connection with thetransaction. In some instance, use of the security profile data can bepredicated on a recognized relationship or trust established with theoriginal author of the security profile data or score (e.g., scoringengine 305) and the security broker 205, among other examples.

While in the example of FIG. 3B, the security score or securityattribute data generated by an example scoring engine 305 can becommunicated to the security broker 205 directly from the correspondinghost device 105, in other examples, a scoring engine can communicatethis security profile data (or security score, in such instances) to thesecurity broker 205 directly. In some instances, this implementation canbe preferable, for instance, to ensure authenticity of the securityprofile data or trustworthiness of the security profile data (e.g., ininstances where secure storage, processing, and communicationfunctionality of the host device is insufficient). For examples, asshown in the example of FIG. 3C, attribute data 310 b can be sent to ascoring engine 305 and used as the basis of the generation ofcorresponding security profile data 315 b for the host device 105. Insuch an example, a redirect to security broker 205 can cause the hostdevice 105 to additionally communicate with scoring engine 305 andrequest the forwarding of the security profile data 315 b to thesecurity broker in connection with a particular ecommerce transaction.Indeed, in some examples, host device 105 can also communicate at leasta portion of transaction data (e.g., 320) to the scoring engine 305identifying the ecommerce transaction for which this request applies,which the scoring engine 305 can reference in communication of securityscores 315 b to the security broker 205 in response to the host device'srequest. Further, as in the examples of FIGS. 3A and 3B, the securitybroker 205 can use received security attribute data as the basis ofcomparisons with risk tolerance data of the corresponding ecommerceprovider and the generation of security reports communicated to theecommerce server 130.

In some instances, functionality of one or more of the components anddevices described herein can be combined. For instance, in one example,scoring engine 305 and security broker 205 can be combined. In such anexample, the security broker 205 can receive attribute data, evenoutside of or before initiation of a particular ecommerce transactionand calculate risk profile data for one or more host devices (e.g.,105). Indeed, security broker 205 can maintain a library of securityprofile data or security scores for a plurality of different hostdevices that it can reference in future risk assessments requested ofecommerce providers in connection with ecommerce transactions with theplurality of different host devices. In such instances, the securitybroker 205 can identify the host device (e.g., 105) involved in theecommerce transaction and attempt to identify if security profile dataexists for the host device and use the security profile data to generatea security report for the transaction.

In some instances, a security broker 205 (or third-party scoring engineor the host device itself) can be used to dynamically generate or updatesecurity profile data for a particular host device involved in anecommerce transaction. For example, it can identified that a securityscore for the particular host device is out-of-date, expired, orotherwise ready for updating. Additionally, it can be identified that noknown security scores (usable by the security broker 205) have beengenerated or are able to be identified. In such instances, attributes ofthe host device can be identified in substantially real time, reportingthe most current security status and profile of the host device. In someinstances, attributes of the host device can change over time thusresulting in the generation of different security profile data (orscores) over the life of the host device. Indeed, security profile dataat a first instance can be used to generate a first result (and securityreport) against a set of risk tolerance data of an ecommerce providerand be updated and used at a second instance to generate a differentresult (and security report) against the same set of risk tolerance dataof the same ecommerce provider. For instance, configurations of a hostdevice can change as new applications are added, malware is uploaded,hardware is updated, patches are released (and either kept up-to-date ornot), among other examples.

Further, in some examples, some categories of attributes can beparticularly prone to changing regularly and serve as the basis forupdates to security profile data for a host device used by a securitybroker 205. In some instances, a host device 105 can be continuouslyreassessed, at least partially, to identify its current status andattributes, in particular those attributes known to be prone to regularchange or alternation between a set of values. To avoid repeatedassessments, in some implementations, multiple security profiles can begenerated for a host device a priori in anticipation that conditions atthe host device change from transaction to transaction. Such changingattributes of a host device that can affect its security profile caninclude the network to which it is presently connected during aparticular ecommerce transaction. For instance, as the host devicemigrates from a home network to a public network, it may be determinedthat the security of the host device has decreased based on the changeto the network it uses. Accordingly, different security profile data canbe considered for the host device thereby affecting results reported ina security report generated for a particular ecommerce transaction. Inanother example, the geographical location in which a host device islocated can affect the level of security assessed for a host device. Instill another example, the identity of the user of the host device canalso be considered. In some implementations, users' historical behaviorusing the host device (and other host devices) can be identified andconsidered in risk assessments of the host device. Indeed, identifyingthat a first, less-risky user is the present user of the host device cancause a first set of risk profile data to be applied in risk assessmentsinvolving a security broker 205, while identifying a second, riskieruser can cause different security profile data to be used thatidentifies the corresponding higher risk facing the host device andthose devices (e.g., ecommerce server 130) interacting with the hostdevice. Accordingly, security at a given host device 105 can be somewhatfluid and changes at the host device can be reported and considered by asecurity broker in connection with the generation of security reportscorresponding to a particular attempted ecommerce transaction involvingthe host device.

Turning to the examples of FIGS. 4A-4B, multiple host devices 105, 110can attempt to transact with a single ecommerce provider's system (e.g.,135). As each host device 105, 115 can have its own varying set ofsecurity-related attributes, assessments of each host device 105, 115can yield different outcomes. For instance, in the simplified blockdiagram 400 a of example FIG. 4A, a first host device 105 attempts toengage in an ecommerce transaction with ecommerce platform 135 resultingin a redirect to security broker 205 for a security assessment inconnection with the attempted transaction. In the example of FIG. 4A,the security broker 205 assesses security profile data of host 105 andgenerates a security report based on the security profile data reportinga negative security status of the host device 105 relative to the riskthreshold data of the ecommerce provider 135. Accordingly, in theexample of FIG. 4A the transaction with the ecommerce provider 135 isdenied based on the received security report (i.e., “Report 1”).

As shown in the simplified block diagram 400 b of example FIG. 4B, asecond host device 110 can attempt a similar transaction with the sameecommerce provider leading to another security assessment by thesecurity broker on behalf of the ecommerce provider, this time of thesecond host device 110 based on corresponding second security profiledata (such as a security score generated for the second host device 110based on identified security-related attributes of the second hostdevice 110). In this instance however, based on the respectivesecurity-related attributes of the second host device 110, a morepositive security report is generated and acted upon by the ecommerceplatform 135 resulting in the successful completion of the attemptedtransaction (i.e., based on a determination that the second host devicewas an acceptable safe transaction partner). While the ecommerceprovider can identify (from the respective security reports “Report 1”and “Report 2”) that the second host device 110 is in better compliancewith its security thresholds, as defined in the ecommerce provider'srisk tolerance data, the ecommerce provider 135, due to the abstractedand generalized nature of the security reports (e.g., for customerdevices 105, 110), may not know why and what precise conditions of thefirst device 105 caused it to fail the assessment by the security broker205 or the precise reasons for the determination that the second hostdevice 110 is sufficiently secure (e.g., as defined by the ecommerceprovider's security threshold). In this manner, both the privacy andintegrity of each of the customer devices 105, 110 can be preserved andwithheld from ecommerce providers with which they transact, reservingdisclosure of more sensitive technical and security attributes totrusted sources such as scoring engines, assessment engines, securitybrokers, etc.

The respective risk tolerance data of a particular ecommerce providerand transaction type can also influence the results of assessments ofvarious host devices' security by a security broker 205. For instance,turning to the examples of FIGS. 5A-5B, a single customer host device110 can experience different results in attempted transactions with twodifferent ecommerce providers based on the ecommerce providers'respective risk tolerance data defining one or more risk thresholds forone or more different types of transactions of the ecommerce provider.For instance, turning first to FIG. 5A, a block diagram 500 a is shownof system including a customer host device 110 attempting to engage inan ecommerce transaction with a first ecommerce provider 130. As inother examples, the first ecommerce provider 130 can respond to anidentified attempt to engage in an ecommerce transaction with a redirectthat causes the host device 110 to interact with a security broker 205that analyzes security attributes or scores of the host device 110against risk tolerance data of the ecommerce provider 130 to generate asecurity report for the ecommerce provider 130. Based on the securityreport, the ecommerce provider 130 can determine that the host device isinsufficiently secure to grant any one of a variety of privilegespotentially offered by the ecommerce provider 130 in the transaction,including the ability to complete the transaction, discounts availableto low risk hosts, streamlined transaction and checkout processes, etc.Turning to the example of FIG. 5B, the same host device 110 can laterattempt to engage in an ecommerce transaction with a second ecommerceprovider 135. As in the example of FIG. 5B, the initiation of thetransaction with ecommerce provider 135 can cause the same, or adifferent, security broker 205 to assess the host device 110 on behalfof the second ecommerce provider 135 and according to risk tolerancedata of the second ecommerce provider 135. However, in the example ofFIG. 5B, the security broker 205 can determine that the same attributesor scores of host device 110, while falling short of thresholds andpreferences embodied in risk tolerance policy data of the firstecommerce provider 130, are in compliance with one or more thresholds ofrisk tolerance policy data of the second ecommerce provider 135.

As risk tolerance data can be highly individualized to their respectiveecommerce provider, security reports can vary similarly in theirassessments against the differing risk tolerance data. Indeed, in someimplementations, multiple different risk tolerances or thresholds can bedefined for multiple different transaction types of a single ecommerceprovider, resulting in different security report results for a singlecustomer host depending on the corresponding transaction type. In otherimplementations, transaction type can be assessed together with otherattributes of the customer host by the security broker in connectionwith generating a security report for the respective transaction.

It should be appreciated that the examples presented above arenon-limiting examples provided merely for purposes of illustratingcertain principles and features and not necessarily limiting orconstraining the potential embodiments of the concepts described herein.For instance, a variety of different embodiments can be realizedutilizing various combinations of the features and components describedherein, including combinations realized through the variousimplementations of components described herein. For instance, risk scoregeneration, security attribute data, and other functionality can beprovided fully or partially on the host device in some implementations,while score generation can be reserved to services hosted at devices andsystem remote from the host devices in other implementations. Otherimplementations, features, and details should be appreciated from thecontents of this Specification.

Turning to FIGS. 6A-6B, simplified flowcharts 600 a-b are shownillustrating example techniques involving example security brokersgenerating security reports for one or more ecommerce transactionsinvolving one or more ecommerce systems. In the example of FIG. 6A, anattempted ecommerce transaction is identified 605 between the ecommercesystem of an ecommerce provider and a host device of a potentialcustomer of the ecommerce provider. A variety of activities by eitherthe ecommerce system or host device can be identified in the attemptedtransaction, including requests from the host device for pagescorresponding to the ecommerce provider's online storefront, theaddition of items to an online shopping cart, selection of a check-outbutton, payment options link, among many other examples. A redirect 610can be sent by the ecommerce system or another system associated withthe ecommerce system to the host device causing the host device toinitiate involvement of a security broker. For instance, the redirectcan cause a host device to send security attribute data to the securitybroker or to enlist a third party device (such as a trusted securityassessment system with knowledge of the host device's relevantattributes) to communicate security data to the security broker. Thesecurity broker can use the security data obtained in connection withthe redirect 610 to generate a security report that is communicated toand received 615 by the ecommerce provider. The ecommerce provider canconsider information within the security report, such as risk assessmentresults provided by the security broker relating to the host device'sgeneral security to perform 620 any one of a variety of actions inconnection with the transaction. Such actions 620 can be motivated, forinstance, by the ecommerce provider's desire to take preventativeactions against transactions with host devices having substandardsecurity profiles or of questionable repute or identity. Similarly,actions 620 can be directed toward rewarding or incentivizing hostdevices determined to be authentic customers or possessing high degreesof security (and posing low risk to the ecommerce provider), among otherexamples. For instance, such actions can include the application ordenial of discounts, streamlined transaction processes, the denial orallowance of the transaction, among other examples.

Turning to the flowchart 600 b of FIG. 6B, in some examples, securitydata can be received 625, for instance, at a security broker from a hostdevice or other system associated with the host device (such as atrusted security assessment system), the security data reportingattributes of the host device at any one of a variety of levels ofabstraction and relating to the security of the host device. Thesecurity data can be sent in connection with an attempted ecommercetransaction with a particular ecommerce provider, such as in response toa redirect transmitted to the host device by the ecommerce provider. Thesecurity data can include identification of the specific and detailedattributes and configurations of the host device in some instances,and/or composite security information, such as security profile data andsecurity scores generated from the raw host device attributes andrepresenting any one of a variety of characteristics or macro attributesof the host device. In some instances, only a subset of the securitydata available for the host device may be received 625. For instance, asubset of the security data can be identified that is relevant toecommerce transactions or particular types of security transactions,assessments by a particular security broker, particular securityattributes of interest to an ecommerce provider's risk tolerancepolicies, or other subset relevant to the security broker's generationof a security report for the host device in connection with theecommerce transaction.

A security broker can identify 630 a risk tolerance policy of theecommerce provider involved in the particular transaction. In someexamples, the risk tolerance policy can be received by the securitybroker from the ecommerce provider in connection with the particulartransaction, for instance, to provide up-to-date or transaction-specificrisk tolerance policies for consideration by the security broker. Inother instances, the security broker can identify the ecommerce providerand other transaction information, such as transaction type, andidentify pre-existing and/or pre-obtained risk tolerance policiescorresponding to the identified ecommerce provider and/or transactiontype. For instance, a corresponding risk tolerance policy for theattempted transaction involving the particular host device can beidentified from a database of risk tolerance policies for potentiallymultiple different ecommerce providers and transaction types, amongother examples. The identified risk tolerance policy can be assessed 635based on the risk tolerance policy to determine whether and to whatdegree a host device's attributes (described in received securityprofile data) comply with the corresponding risk tolerance policygoverning the transaction. A security report can be generated 640 fromand report generalized results of the assessment (e.g., at 635) and thesecurity report can be communicated 645 to the corresponding ecommerceprovider for use by the ecommerce provider during the transaction.

Although this disclosure has been described in terms of certainimplementations and generally associated methods, alterations andpermutations of these implementations and methods will be apparent tothose skilled in the art. For example, the actions described herein canbe performed in a different order than as described and still achievethe desirable results. As one example, the processes depicted in theaccompanying figures do not necessarily require the particular ordershown, or sequential order, to achieve the desired results. Systems andtools illustrated can similarly adopt alternate architectures,components, and modules to achieve similar results and functionality.For instance, in certain implementations, multitasking, parallelprocessing, and cloud-based solutions may be advantageous. Other systemsand tools can also make use of principles of this disclosure.Additionally, diverse user interface layouts and functionality can besupported. Other variations are within the scope of the followingclaims.

Embodiments of the subject matter and the operations described in thisspecification can be implemented in digital electronic circuitry, or incomputer software, firmware, or hardware, including the structuresdisclosed in this specification and their structural equivalents, or incombinations of one or more of them. Embodiments of the subject matterdescribed in this specification can be implemented as one or morecomputer programs, i.e., one or more modules of computer programinstructions, encoded on computer storage medium for execution by, or tocontrol the operation of, data processing apparatus. Alternatively or inaddition, the program instructions can be encoded on an artificiallygenerated propagated signal, e.g., a machine-generated electrical,optical, or electromagnetic signal that is generated to encodeinformation for transmission to suitable receiver apparatus forexecution by a data processing apparatus. A computer storage medium canbe, or be included in, a computer-readable storage device, acomputer-readable storage substrate, a random or serial access memoryarray or device, or a combination of one or more of them. Moreover,while a computer storage medium is not a propagated signal per se, acomputer storage medium can be a source or destination of computerprogram instructions encoded in an artificially generated propagatedsignal. The computer storage medium can also be, or be included in, oneor more separate physical components or media (e.g., multiple CDs,disks, or other storage devices), including a distributed softwareenvironment or cloud computing environment.

While this specification contains many specific implementation details,these should not be construed as limitations on the scope of anyinventions or of what may be claimed, but rather as descriptions offeatures specific to particular embodiments of particular inventions.Certain features that are described in this specification in the contextof separate embodiments can also be implemented in combination in asingle embodiment. Conversely, various features that are described inthe context of a single embodiment can also be implemented in multipleembodiments separately or in any suitable subcombination. Moreover,although features may be described above as acting in certaincombinations and even initially claimed as such, one or more featuresfrom a claimed combination can in some cases be excised from thecombination, and the claimed combination may be directed to asubcombination or variation of a subcombination.

Similarly, while operations are depicted in the drawings in a particularorder, this should not be understood as requiring that such operationsbe performed in the particular order shown or in sequential order, orthat all illustrated operations be performed, to achieve desirableresults. In certain circumstances, multitasking and parallel processingmay be advantageous. Moreover, the separation of various systemcomponents in the embodiments described above should not be understoodas requiring such separation in all embodiments, and it should beunderstood that the described program components and systems cangenerally be integrated together in a single software product orpackaged into multiple software products.

In general, subject matter of the present disclosure includes methods,software, computer executable instructions, and systems capable ofperforming such tasks as identifying an attempted transaction involvinga first customer device, redirecting the first customer device to asecurity broker, and receiving from the security broker a securityreport for the first customer device. The security report can be basedon security data transmitted from the first customer device to thesecurity broker. An action can be performed in association with theattempted transaction based at least in part on the received securityreport. Other tasks can include receiving security data describingsecurity conditions on a customer device in connection with a particularecommerce transaction between the customer device and an ecommerceprovider. A risk tolerance policy can be identified that corresponds tothe ecommerce provider. A security report can be generated based on acomparison of the risk tolerance policy and the security data and thesecurity report can be communicated to at least one computing deviceassociated with the ecommerce provider.

In some instances, systems can be implemented that include at least oneprocessor device, at least one memory element, and a security broker.The security broker can receive the security data, identify a risktolerance policy of the ecommerce provider, generate a security reportbased on a comparison of the risk tolerance policy and the securitydata, and communicate the security report to at least one computingdevice associated with the ecommerce provider. Systems can additionally,or alternatively, include an ecommerce server associated with theecommerce provider and adapted to identify attempted ecommercetransactions involving customer devices, redirect the customer devicesto the security broker, receive security reports generated by thesecurity broker, and perform actions in connection with the attemptedecommerce transactions based at least in part on the received securityreports.

In some instance, the action can include allowing or disallowing thetransaction and can be based at least in part on a type of the attemptedtransaction. For instance, the transaction can be an ecommercetransaction and the action can include applying a price discount in theattempted ecommerce transaction or applying a price premium in theattempted ecommerce transaction. The security broker can be a remotesecurity broker. The security report can be generated based on acomparison of the risk tolerance policy and the security data. Thesecurity report can mask attributes of the security data and thesecurity data can describe attributes of the first customer devicerelating to risk associated with the customer device.

In some instances, transaction data can be received in association withthe received security data, the transaction data including an identifierof the particular transaction and an identifier of the ecommerceprovider. The security requirements data can be obtained from a localmemory element. The risk tolerance policy can be defined by theecommerce provider. The security data can include a security scorecalculated for the customer device. The security data can be storedsecurely on the customer device and received over a secure communicationchannel. The security data describes configuration attributes of thecustomer device. The security data can include a pre-generated securityscore representing security conditions of the customer device. Thesecurity score can include a plurality of score components eachcorresponding to a particular security category. The security score canbe generated by a neutral third party based on attributes of thecustomer device. Specific attributes of the customer device can beabstracted in the security data.

In some instances, security data can be received describing securityconditions on the customer device in connection with a second ecommercetransaction between the customer device and a second ecommerce provider.A second risk tolerance policy can be identified corresponding to thesecond ecommerce provider. A second security report can be generatedbased on a comparison of the risk tolerance policy and the securitydata. The second security report can be communicated to at least onecomputing device associated with the second ecommerce provider, amongother examples and combinations of the above.

Thus, particular embodiments of the subject matter have been described.Other embodiments are within the scope of the following claims. In somecases, the actions recited in the claims can be performed in a differentorder and still achieve desirable results. In addition, the processesdepicted in the accompanying figures do not necessarily require theparticular order shown, or sequential order, to achieve desirableresults.

1. A method comprising: identifying an attempted transaction involving afirst customer device; redirecting the first customer device to asecurity broker; receiving from the security broker a security reportfor the first customer device, wherein the security report is based onsecurity data transmitted from the first customer device to the securitybroker; and performing an action in association with the attemptedtransaction based at least in part on the received security report. 2.The method of claim 1, wherein the action is one of a set of availableactions including allowing the transaction and disallowing thetransaction.
 3. The method of claim 1, wherein the action is based atleast in part on a type of the attempted transaction.
 4. The method ofclaim 3, wherein the action includes either allowance or disallowance ofthe transaction based on the security report.
 5. The method of claim 1,wherein the security broker is a remote security broker.
 6. The methodof claim 1, further comprising communicating a risk tolerance policy tothe security broker.
 7. The method of claim 6, wherein the securityreport is generated based on a comparison of the risk tolerance policyand the security data.
 8. A method comprising: receiving security datadescribing security conditions on a customer device in association witha particular ecommerce transaction between the customer device and anecommerce provider; identifying a risk tolerance policy corresponding tothe ecommerce provider; generating a security report based on acomparison of the risk tolerance policy and the security data; andcommunicating the security report to at least one computing deviceassociated with the ecommerce provider.
 9. The method of claim 8,further comprising receiving transaction data in association with thereceived security data, the transaction data including an identifier ofthe particular transaction and an identifier of the ecommerce provider.10. The method of claim 8, wherein the security requirements data isobtained from a local memory element.
 11. The method of claim 8, whereinthe risk tolerance policy is defined by the ecommerce provider.
 12. Themethod of claim 11, wherein the security data includes a security scorecalculated for the customer device.
 13. The method of claim 8, whereinthe security data is stored securely on the customer device and receivedover a secure communication channel.
 14. The method of claim 8, furthercomprising: receiving security data describing security conditions onthe customer device in association with a second ecommerce transactionbetween the customer device and a second ecommerce provider; identifyinga second risk tolerance policy corresponding to the second ecommerceprovider; generating a second security report based on a comparison ofthe risk tolerance policy and the security data; and communicating thesecond security report to at least one computing device associated withthe second ecommerce provider.
 15. At least one machine accessiblestorage medium having instructions stored thereon, the instructions whenexecuted on a machine, cause the machine to: identify an attemptedecommerce transaction involving a first customer device; redirect thefirst customer device to a security broker; receive from the securitybroker a security report for the first customer device, wherein thesecurity report is based on security data transmitted from the firstcustomer device to the security broker; and perform an action inassociation with the attempted ecommerce transaction based at least inpart on the received security report.
 16. The storage medium of claim15, wherein the transaction comprises an ecommerce transaction.
 17. Thestorage medium of claim 16, wherein the action is one of a set ofavailable actions including applying a price discount in the attemptedecommerce transaction and applying a price premium in the attemptedecommerce transaction.
 18. The storage medium of claim 15, wherein thesecurity report masks attributes of the security data.
 19. The storagemedium of claim 15, wherein the security data describes attributes ofthe first customer device relating to risk associated with the firstcustomer device. 20-27. (canceled)