×

Scalable network security with fast response protocol

  • US 9,167,001 B1
  • Filed: 04/10/2015
  • Issued: 10/20/2015
  • Est. Priority Date: 02/01/2012
  • Status: Active Grant
First Claim
Patent Images

1. An apparatus comprising instructions stored on non-transitory computer readable storage, the instructions when executed to cause at least one computer of a first network to:

  • receive a query from a query source from outside the first network, the query specifying an identifier of a possible network security threat;

    determine whether the query is of a first type or a second type; and

    according to the determined type of queryif the query is of a first type, perform a localized search of at least one database for network security data responsive to the query, the localized search not including results solely obtainable from outside of the first network, generate a response to the query, even if there is no information responsive to the query found within the first network, and irrespective if additional information is available from one or more remote information sources obtainable via a wide area network external to the first network, and transmit the response to the query source,if the query is of a second type, responsively interrogate the one or more remote information sources via a wide area network for network security data responsive to the query, update at least one local information repository corresponding to the at least one database responsive to the interrogation of the one or more remote information sources, generate the response to the query to include information responsive to the query found within the first network as updated responsive to the interrogation of the one or more remote information sources, and transmit the response including information as updated to the query source;

    wherein the instructions when executed are further to cause the at least one computer to;

    if the query is of the first type, transmit the response to query to the query source within an enforced response time, responsively interrogate the one or more remote information sources via a wide area network for network security data responsive to the query, and responsively update one or more local information repositories within the first network, and if the query is of the second type, transmit the response to the query source irrespective passage of the enforced response time and only once the one or more remote information sources have responded to the interrogation.

View all claims
  • 4 Assignments
Timeline View
Assignment View
    ×
    ×