×

Methods and systems for protecting a secured network

  • US 10,142,372 B2
  • Filed: 01/24/2017
  • Issued: 11/27/2018
  • Est. Priority Date: 04/16/2014
  • Status: Active Grant
First Claim
Patent Images

1. A method comprising:

  • receiving, by a server and from a first computing device, a first security update comprising a first set of network addresses;

    updating, by the server, one or more rules stored in a memory of the server to include the first set of network addresses;

    receiving, by the server and from a second computing device, a second security update comprising a second set of network addresses;

    determining, by the server, that the second set of network addresses includes at least a portion of network addresses included in the first set of network addresses;

    responsive to determining that the second set of network addresses includes the at least a portion of network addresses included in the first set of network addresses;

    identifying, by the server, the at least a portion of network addresses included in the first set of network addresses;

    identifying, by the server, at least one of the one or more rules stored in the memory of the server that specifies a range of network addresses comprising the at least a portion of network addresses included in the first set of network addresses; and

    updating, by the server, the at least one of the one or more rules to include one or more other network addresses included in the second set of network addresses;

    transmitting, by the server and to at least one packet security gateway, at least one of the one or more updated rules;

    causing executing, by the packet security gateway and on a packet by packet basis, one or more rules in time-shifted phases, wherein the executing comprises;

    executing, by the at least one packet security gateway, a first rule during a first period of time based on a first subset of network addresses;

    executing, by the at least one packet security gateway, a second rule during a second period of time based on a second subset of network addresses; and

    executing, by the at least one packet security gateway, a third rule during a third period of time based on a third subset of network addresses,wherein the first period of time is followed by the second period of time, and the second period of time is followed by the third period of time, andwherein the first subset of network addresses is smaller than the second subset of network addresses, and the second subset of network addresses is smaller than the third subset of network addresses.

View all claims
  • 2 Assignments
Timeline View
Assignment View
    ×
    ×