Apparatus and method for acceleration of security applications through pre-filtering
First Claim
1. A method for processing information, the method comprising:
- receiving a data stream in a first format;
processing the received data stream via a first security processing stage configured to perform a first plurality of tasks at a first processing speed to generate one or more first processed data streams in a second format;
processing the one or more first processed data streams via a second security processing stage configured to perform a second plurality of tasks at a second processing speed to generate one or more second processed data streams in a third format;
said first and second plurality of tasks to include one or more common tasks; and
said first processing speed being greater than said second processing speed.
2 Assignments
0 Petitions
Accused Products
Abstract
A first security processing stage performs a first multitude of tasks and a second security processing stage performs a second multitude of tasks. The first and second multitude of tasks may include common tasks. The first security processing stage is a prefilter to the second security processing stage. The input data received as a data stream is first processed by the first security processing stage, which in response, generates one or more first processed data streams. The first processed data streams may be further processed by the second security processing stage or may bypass the second security processing stage. The first security processing stage operates at a speed greater than the speed of the second security processing stage.
-
Citations
32 Claims
-
1. A method for processing information, the method comprising:
-
receiving a data stream in a first format;
processing the received data stream via a first security processing stage configured to perform a first plurality of tasks at a first processing speed to generate one or more first processed data streams in a second format;
processing the one or more first processed data streams via a second security processing stage configured to perform a second plurality of tasks at a second processing speed to generate one or more second processed data streams in a third format;
said first and second plurality of tasks to include one or more common tasks; and
said first processing speed being greater than said second processing speed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 28)
-
-
17. A processing system comprising:
-
a first security processing stage configured to perform a first plurality of tasks on a data stream having a first format and at a first processing speed to generate one or more first processed data streams in a second format;
a second security processing stage configured to perform a second plurality of tasks on the one or more first processed data streams at a second processing speed to generate one or more second processed data streams in a third format;
said first and second plurality of tasks to include one or more overlapping tasks; and
said first processing speed being greater than said second processing speed. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 29, 30, 31, 32)
-
Specification