Method of distributed denial of service (DDos) and hacking protection for internet-based servers using a private network of internet servers by executing computer-executable instructions stored on a non-transitory computer-readable medium
First Claim
Patent Images
1. A method of Distributed Denial of Service (DDoS) and hacking protection for internet-based servers by executing computer-executable instructions stored on a non-transitory computer-readable medium, the method comprising:
- providing data routing software on a computing device;
establishing a first network connection between the computing device and a first edge server through the data routing software,establishing a second network connection between the computing device and a second edge server;
transmitting a first user data stream from the computing device to the first edge server through the first network connection;
transmitting a second user data stream from the computing device to the second edge server through the second network connection, wherein the second user data stream is redundant to the first user data stream;
transmitting the first and second user data streams from the first and second edge servers, respectively, to a global private network having a plurality of global private network servers and, subsequently, transmitting the first and second user data streams from the global private network toward a destination server;
determining the first user data stream to arrive at the destination server before the second user data stream;
utilizing the first user data stream based on the determination that the first user data stream arrived at the destination server before the second user data stream;
analyzing incoming traffic to the first and second edge servers to determine whether the incoming traffic constitutes malicious activity;
determining incoming traffic to the first edge server constitutes malicious activity;
after determining incoming traffic to the first edge server constitutes malicious activity, blocking the incoming traffic at the first edge server in response to determining incoming traffic to the first edge server constitutes malicious activity; and
after blocking the incoming traffic at the first edge server, utilizing the second user data stream at the destination server.
1 Assignment
0 Petitions
Accused Products
Abstract
A method of DDoS and hacking protection for internet-based servers using a private network of internet servers utilizes multiple data streams sent over a network of proxy servers to mitigate malicious attacks and ensure fast connections from a user to a destination server. The destination server is hidden from the user and the redundancy of the proxy network serves to maintain security and connection quality between the user and the destination server.
-
Citations
10 Claims
-
1. A method of Distributed Denial of Service (DDoS) and hacking protection for internet-based servers by executing computer-executable instructions stored on a non-transitory computer-readable medium, the method comprising:
-
providing data routing software on a computing device; establishing a first network connection between the computing device and a first edge server through the data routing software, establishing a second network connection between the computing device and a second edge server; transmitting a first user data stream from the computing device to the first edge server through the first network connection; transmitting a second user data stream from the computing device to the second edge server through the second network connection, wherein the second user data stream is redundant to the first user data stream; transmitting the first and second user data streams from the first and second edge servers, respectively, to a global private network having a plurality of global private network servers and, subsequently, transmitting the first and second user data streams from the global private network toward a destination server; determining the first user data stream to arrive at the destination server before the second user data stream; utilizing the first user data stream based on the determination that the first user data stream arrived at the destination server before the second user data stream; analyzing incoming traffic to the first and second edge servers to determine whether the incoming traffic constitutes malicious activity; determining incoming traffic to the first edge server constitutes malicious activity; after determining incoming traffic to the first edge server constitutes malicious activity, blocking the incoming traffic at the first edge server in response to determining incoming traffic to the first edge server constitutes malicious activity; and after blocking the incoming traffic at the first edge server, utilizing the second user data stream at the destination server. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A non-transitory computer-readable medium storing a plurality of instructions which, when executed by a processor, cause the processor to perform operations for providing Distributed Denial of Service (DDoS) and hacking protection, the operations comprising:
-
providing data routing software on a computing device; establishing a first network connection between the computing device and a first edge server through the data routing software, establishing a second network connection between the computing device and a second edge server; transmitting a first user data stream from the computing device to the first edge server through the first network connection; transmitting a second user data stream from the computing device to the second edge server through the second network connection, wherein the second user data stream is redundant to the first user data stream; transmitting the first and second user data streams from the first and second edge servers, respectively, to a global private network having a plurality of global private network servers and, subsequently, transmitting the first and second user data streams from the global private network towards a destination server; determining the first user data stream to arrive at the destination server before the second user data stream; utilizing the first user data stream based on the determination that the first user data stream arrived at the destination server before the second user data stream; analyzing incoming traffic to the first and second edge servers to determine whether the incoming traffic constitutes malicious activity; determining incoming traffic to the first edge server constitutes malicious activity; after determining incoming traffic to the first edge server constitutes malicious activity, blocking the incoming traffic at the first edge server in response to determining incoming traffic to the first edge server constitutes malicious activity; and after blocking the incoming traffic at the first edge server, utilizing the second user data stream at the destination server. - View Dependent Claims (9, 10)
-
Specification