×

Method of distributed denial of service (DDos) and hacking protection for internet-based servers using a private network of internet servers by executing computer-executable instructions stored on a non-transitory computer-readable medium

  • US 9,985,985 B2
  • Filed: 02/22/2017
  • Issued: 05/29/2018
  • Est. Priority Date: 10/05/2012
  • Status: Active Grant
First Claim
Patent Images

1. A method of Distributed Denial of Service (DDoS) and hacking protection for internet-based servers by executing computer-executable instructions stored on a non-transitory computer-readable medium, the method comprising:

  • providing data routing software on a computing device;

    establishing a first network connection between the computing device and a first edge server through the data routing software,establishing a second network connection between the computing device and a second edge server;

    transmitting a first user data stream from the computing device to the first edge server through the first network connection;

    transmitting a second user data stream from the computing device to the second edge server through the second network connection, wherein the second user data stream is redundant to the first user data stream;

    transmitting the first and second user data streams from the first and second edge servers, respectively, to a global private network having a plurality of global private network servers and, subsequently, transmitting the first and second user data streams from the global private network toward a destination server;

    determining the first user data stream to arrive at the destination server before the second user data stream;

    utilizing the first user data stream based on the determination that the first user data stream arrived at the destination server before the second user data stream;

    analyzing incoming traffic to the first and second edge servers to determine whether the incoming traffic constitutes malicious activity;

    determining incoming traffic to the first edge server constitutes malicious activity;

    after determining incoming traffic to the first edge server constitutes malicious activity, blocking the incoming traffic at the first edge server in response to determining incoming traffic to the first edge server constitutes malicious activity; and

    after blocking the incoming traffic at the first edge server, utilizing the second user data stream at the destination server.

View all claims
  • 1 Assignment
Timeline View
Assignment View
    ×
    ×