The present technology is directed to cloud computing security, and more specifically, but not by limitation, to systems and methods for providing security to distributed microservices within a cloud.
According to some embodiments, the present technology is directed to a system providing secure virtual boundaries for microservices, the system comprising: (a) at least one microservice, the at least one microservice comprising a plurality of distributed microservice components communicating with one another so as to provide a service; (b) a plurality of enforcement points positioned in association with the plurality of distributed microservice components to define a secure virtual boundary around the plurality of distributed microservice components; and (c) a director module that manages sessions and settings of the plurality of distributed microservice components within the secure virtual boundary.
According to some embodiments, the present technology is directed to a system that comprises: (a) a plurality of microservices, each of the plurality of microservices comprising a plurality of distributed microservice components, wherein at least a portion of the distributed microservice components execute on different physical servers or virtual machines in a cloud; and (b) a plurality of logical security boundaries, wherein each of the plurality of logical security boundaries is created by a plurality of enforcement points positioned in association with the plurality of distributed microservice components, wherein each of plurality of microservices is bounded by one of the plurality of logical security boundaries.
According to some embodiments, the present technology is directed to a method for providing a logical security boundary for microservices; the method comprising: (a) locating a plurality of distributed microservice components that belong to a microservice, at least a portion of the plurality of distributed microservice components being located on different physical servers in a cloud; (b) distributing a plurality of logical enforcement points around the plurality of distributed microservice components that belong to the microservice; and (c) forming a logical security boundary from the plurality of logical enforcement points.
The accompanying drawings, where like reference numerals refer to identical or functionally similar elements throughout the separate views, together with the detailed description below, are incorporated in and form part of the specification, and serve to further illustrate embodiments of concepts that include the claimed disclosure, and explain various principles and advantages of those embodiments.
The methods and systems disclosed herein have been represented where appropriate by conventional symbols in the drawings, showing only those specific details that are pertinent to understanding the embodiments of the present disclosure so as not to obscure the disclosure with details that will be readily apparent to those of ordinary skill in the art having the benefit of the description herein.
The present technology is directed to providing security within distributed microservices. The present technology creates secure virtual boundaries around microservices.
In one embodiment, the present technology involves a datacenter, which can be implemented within a cloud. The datacenter includes physical resources such as servers that provide virtual machines. The virtual machines can provide microservice components such as web services, application services, database services, and so forth. In some embodiments, the servers are physically separate from one another within the datacenter.
A microservice is a combination of microservice components selected to facilitate the microservice. An example microservice includes, but is not limited to, a game, an e-commerce application, a media service, and so forth. Because the servers providing the microservice components can be distributed in different physical locations, the microservice is itself distributed because its microservice components may not reside on the same physical server. To be sure, the present technology can manage enforcement points on multiple servers as a single, logical system. Enforcement points are described in related U.S. patent application Ser. No. 14/673,679, filed Mar. 30, 2015, now U.S. Pat. No. 9,294,442, issued Mar. 22, 2016, entitled “System and Method for Threat-Driven Security Policy Controls,” which is hereby incorporated by reference in its entirety.
In the present technology, the servers and virtual machines are controlled with a host server that coordinates the operations of the distributed microservice components to provide the microservice. The host server includes a director module that manages sessions and settings of the distributed microservice components.
The director module can also instantiate (e.g., “spin up”) a plurality of enforcement points that are configured to create a secure virtual boundary around a set of distributed microservice components for a microservice.
The enforcement points can intercept and measure traffic at locations within the secure virtual boundary, such as traffic entering and exiting the distributed microservice components.
In some embodiments, the director module distributes a security policy, such as a firewall policy to the enforcement points which protect each of the distributed microservice components. The director module can also receive traffic information from the enforcement points and determine the network traffic profiles and malicious attacks that are occurring on, or within the secure virtual boundary.
Advantageously, the present technology provides a distributed microservice system where distributed enforcement points are placed in communication with enterprise assets such as microservice components. The enforcement points are configured to correlate information to understand the traffic flows within the secure virtual boundary.
The enforcement points provide a stateful solution by operating as security policy enforcement devices that use stateful inspection engines for analyzing network traffic.
In another advantage, the present technology provides for real-time detection and visualization of threat movement, attack remediation, and exfiltration prevention, as well as micro-segmentation and policy enforcement control.
As mentioned above, the present technology provides a data center security solution that protects enterprise data, whether on-cloud or on-premise, with a single virtual security system.
The data center security of the present technology delivers a consistent layer of visibility and control across virtual, cloud and physical applications. Using the present technology, enterprises can understand the progression of an attack and trace its lineage to a “Patient Zero”, the attacker's point of entry (or the first infected computer). Using the present technology, enterprises have immediate insight into their data center risk profile and are able to adjust security measures without changing existing policies or Information Technology (IT) infrastructures.
Referring now to
In general, a cloud-based computing environment is a resource that typically combines the computational power of a large grouping of processors, and/or an environment that combines the storage capacity of a large grouping of computer memories or storage devices. For example, systems that provide a cloud resource may be utilized exclusively by their owners; or such systems may be accessible to outside users who deploy applications within the computing infrastructure to obtain the benefit of large computational or storage resources.
The cloud may be formed, for example, by a network of web servers, such as web servers, with each web server (or at least a plurality thereof) providing processor and/or storage resources. These servers may manage workloads servicing multiple users (e.g., cloud resource customers or other users). Typically, each user places workload demands upon the cloud that vary in real-time, sometimes dramatically. The nature and extent of these variations typically depend on the type of business associated with the user.
The data center 100 is configured to provide microservices to tenants. A microservice will be understood to include a software application (e.g., service) that is comprised of a plurality of independently deployable services, referred to herein as “microservice components”. In some embodiments, the data center 100 comprises a plurality of physical servers (sometimes referred to as racks or blades), such as a first server 102, a second server 104, and a third server 106.
In one embodiment, the first server 102 provides web service microservices that provide a standardized means for integrating web applications using various open standards such as JavaScript Object Notation (JSON), Representational State Transfer (REST), and so forth. As illustrated, the first server 102 comprises a plurality of microservice components such as a first web service 108, a second web service 110, and a third web service 112. Again, the first server 102 can comprise additional or fewer microservice components than those illustrated. Also, the type of web service provided by each of the microservice components can be identical or different. For example, the web service microservice components 108-112 could all provide Simple Object Access Protocol (SOAP) services, while in another embodiment each of the web service microservice components 108-112 could provide a unique web service.
The second server 104 comprises a plurality of microservice components such as the first application (App) 114, the second application 116, and the third application 118. Again, the second server 104 can comprise additional or fewer microservice components than those illustrated. Also, the type of web service provided by each of the microservice components can be identical or different. The applications provided by the application microservice components 114-118 can be identical or different from one another.
The third server 106 comprises a plurality of microservice components such as the first database 120, the second database 122, and the third database 124. Again, the third server 106 can comprise additional or fewer microservice components than those illustrated. Also, the type of web service provided by each of the microservice components can be identical or different. The applications provided by the application microservice components 120-124 can be identical or different from one another.
The data center 100 also comprises a server host 126 that can be located away from the servers 102-106 so as to reduce the likelihood that the host server will be infected with malware or subject to a malicious attack if any of the servers 102-106 or their microservice components are attacked. The server host 126 can also include a virtual machine server or a physical server. The server host 126 can comprise a director module 128. The director module 128 can comprise executable instructions that are stored in a non-transitory computer readable medium, such as memory of the server host 126. The director module 128 can be executed by a processor of the server host 126 to provide functionalities ascribed to the director module 128 which are described in greater detail below.
As used herein, the term “module” may also refer to any of an application-specific integrated circuit (“ASIC”), an electronic circuit, a processor (shared, dedicated, or group) that executes one or more software or firmware programs, a combinational logic circuit, and/or other suitable components that provide the described functionality.
The servers 102-106 each provide a microservice type. For example, the microservice type for the first server 102 comprises web services, while a microservice type of the second server 104 are applications, and the microservice type of the third server 106 is database related.
In some embodiments, the data center 100 can comprise additional or fewer servers than those illustrated. Also, the microservices of some of the servers, for example servers 102 and 104, can be combined onto a single physical server but facilitated by a virtual machine. Thus, the web services microservice components 108-112 could be executed using a first virtual machine, while the application microservice components 114-118 could be executed on a second virtual machine. Indeed, the first and second virtual machines can be managed on the same physical server, such as the first or second servers 102 and 104, respectively.
In some embodiments the data center 100 comprises a network 130 that communicatively couples the servers 102-106 and server host 126. Suitable networks may include or interface with any one or more of, for instance, a local intranet, a Personal Area Network (PAN), a Local Area Network (LAN), a Wide Area Network (WAN), a Metropolitan Area Network (MAN), a virtual private network (VPN), a storage area network (SAN), a frame relay connection, an Advanced Intelligent Network (AIN) connection, a synchronous optical network (SONET) connection, a digital T1, T3, E1 or E3 line, Digital Data Service (DDS) connection, Digital Subscriber Line (DSL) connection, an Ethernet connection, an Integrated Services Digital Network (ISDN) line, a dial-up port such as a V.90, V.34 or V.34bis analog modem connection, a cable modem, an Asynchronous Transfer Mode (ATM) connection, or a Fiber Distributed Data Interface (FDDI) or Copper Distributed Data Interface (CDDI) connection. Furthermore, communications may also include links to any of a variety of wireless networks, including Wireless Application Protocol (WAP), General Packet Radio Service (GPRS), Global System for Mobile Communication (GSM), Code Division Multiple Access (CDMA) or Time Division Multiple Access (TDMA), cellular phone networks, Global Positioning System (GPS), Cellular Digital Packet Data (CDPD), Research in Motion, Limited (RIM) duplex paging network, Bluetooth radio, or an IEEE 802.11-based radio frequency network.
The network can further include or interface with any one or more of an RS-232 serial connection, an IEEE-1394 (Firewire) connection, a Fiber Channel connection, an IrDA (infrared) port, a SCSI (Small Computer Systems Interface) connection, a USB (Universal Serial Bus) connection or other wired or wireless, digital or analog interface or connection, mesh or Digi® networking.
In some embodiments, individual microservice components from an individual server can be used to facilitate a microservice. For example, a first microservice 132 comprises a game service. The first microservice 132 comprises the second web service 110, the second application 116, and the second database 122. To be sure, these selected microservice components are needed to facilitate the game service.
In various exemplary embodiments, a second microservice 134 comprises an e-commerce service. The second microservice 134 comprises the third web service 112, the third application 118, and the third database 124. To be sure, these selected microservice components are needed to facilitate the e-commerce service.
In sum, the data center 100 is configured to provide a plurality of microservices where each microservice is comprised of a plurality of microservice components.
Cooperative communication between microservice components allows the data center 100 to provide the microservice to the tenant/end user. For example, the second web service 110, the second application 116, and the second database 122 are all communicatively coupled with one another using the network 130.
As mentioned above, the servers that host these microservice components can be positioned remotely from one another. Thus, the microservice components need not be collocated in the same physical server. This physical separation of servers results in physical separation of microservice components for a microservice.
The present technology can provide security policies such as firewall policies that protect these distributed microservices. Rather than directing network traffic to a static firewall or other static appliance, the data center 100 can employ the use of enforcement points, such as enforcement points 136-140 that are disposed within the network communications path of the microservice components of a microservice.
In general, an enforcement point is a virtual or physical module that operates as a security policy enforcement device that uses stateful inspection engines for analyzing network traffic within a secure virtual (e.g., logical) boundary.
An enforcement point can be “spun up” or initiated when a microservice is requested by a tenant or user of the data center 100. For example, if an end user desires to use the first microservice 132 (e.g., a game microservice), the user will request use of the first microservice 132 through the server host 126. The server host 126 will determine which microservice components are needed (in this case second web service 110, second application 116, and second database 122) and will deploy a plurality of enforcement points for the microservice components.
In one embodiment, the data center 100 includes a first enforcement point 136, a second enforcement point 138, and a third enforcement point 140. The first enforcement point 136 is deployed for the first server 102 and the second web service 110. The second enforcement point 138 is deployed for the second server 104 and the second application 116, while the third enforcement point 140 is deployed for the third server 106 and the second database 122. Again, the deployment of the enforcement points is controlled by the director module 128 of the host server 126.
Each of the enforcement points can be placed in network communication with their respective microservice component to intercept and analyze network traffic. In some embodiments, each of the enforcement points analyzes microservice component network traffic by decoding higher-level protocols that create the data stream in software, at “line rate”, with an acceptable computational cost.
The enforcement points can be deployed near an asset (such as a server or microservice component) to examine precisely the internal and external traffic into that asset (which may be indicative of malicious attacks) or from that asset (indications of infection and internal attacks), and can also be used to provide very granular control (e.g., pass only specific traffic). In some embodiments, the enforcement points comprise logical entities and operate in a global context, the enforcement points can migrate when an asset, such as a microservice component, migrates (e.g., in a virtual environment).
Referring now to
Referring now to
The enforcement points 136-140 can create a logical or virtual security boundary around the microservice components for a microservice. In one example, the enforcement points 136-140 can create a first virtual security boundary 144 around the first microservice 132 (e.g., a game microservice), and specifically the microservice components of the first microservice 132 (the second web service 110, the second application 116, and the second database 122). In another example, the enforcement points 136-140 can create a second virtual security boundary 146 around the second microservice 134 (e.g., an e-commerce service), and specifically the microservice components of the second microservice 134 (the third web service 112, the third application 118, and the third database 124).
While
As mentioned above, a set of enforcement points such as enforcement points 136-140, can be used to create a plurality of virtual security boundaries. In other embodiments, a set of enforcement points can be deployed for each microservice. The use of virtual security boundaries also allows for microservices to be logically separated from one another for security purposes.
In
According to some embodiments, the director module 128 is configured to manage sessions and settings of the distributed microservice components. For example, the director module 128 specifies what microservice components are required for a microservice, when each of the microservice components should be initiated and/or deactivated, and so forth. The director module 128 also determines if additional microservice components should be initiated during microservice use. For example, in a gaming microservice, the director module 128 may increase processing capacity for an application microservice component by initiating one or more additional application microservice component(s). The director module 128 can deploy additional enforcement points if needed to enlarge the virtual security boundary. This type of dynamic virtual security boundary management ensures that the one or more additional application microservice component(s) are protected through inclusion into the virtual security boundary of the gaming microservice. A similar but inverse process can be performed by the director module 128 when microservice components are deactivated.
Also, the director module 128 can track migration of the microservice components and re-deploy the enforcement points. For example, if the first server 102 is taken offline or is no longer functioning, the data center 100 may have backup servers that provide the same microservice as the first server 102. When this backup server comes online, the web service microservice is migrated over to the backup server and the virtual boundary is reconfigured, or the enforcement point is re-deployed. This re-deployment of the enforcement point or reconfiguration of security policy of the enforcement point causes a reconfiguration of the virtual security boundary.
In some embodiments, the director module 128 is configured to implement and distribute security policies for microservices. The security policy may be in accordance with a security profile for a microservice. The security profile can define what types of network traffic anomalies indicate possible malware issues. These traffic anomalies can involve comparisons of network traffic volume over a period of time, network traffic volume at a given period of time, network traffic volume compared to application usage, network traffic input volume versus network traffic output volume, and other similar traffic anomalies.
The director module 128 can selectively control and isolate the network traffic entering and/or exiting any of the microservice components of a microservice, due to the presence of enforcement points with each microservice component. For example, if the network traffic is determined to be anomalous at the second web service 110, the director module 128 can cause the first enforcement point 136 to throttle network traffic into or out of the second web service 110.
Advantageously, the director module 128 can isolate or quarantine a microservice component that appears to be (or actually is) infected with malware or is being subjected to malware attack by providing commands to the enforcement point associated with the microservice component.
Referring now to
The method further includes distributing 404 a plurality of logical enforcement points around the plurality of distributed microservice components that belong to the microservice. For example, the director module can spin up one or more virtual enforcement points (e.g., virtual security appliances) for each distributed microservice component. In some embodiments, virtual enforcement points are positioned both upstream and downstream of each distributed microservice component.
Next, the method comprises forming 406 a logical security boundary from the plurality of logical enforcement points. That is, the virtual enforcement points are communicatively coupled to form a logical security boundary that includes the distributed microservice components.
In some embodiments, the method comprises intercepting 408 by the plurality of logical enforcement points, traffic entering or exiting each of the plurality of distributed microservice components. The method also includes detecting 410 malicious behavior by inspection of the traffic.
In some embodiments, the method includes quarantining 412 any of the distributed microservice components that are found to have anomalous traffic during the inspection process.
Referring now to
In some embodiments, the method includes implementing 502 a security profile for the microservice that includes monitoring traffic within the logical security boundary using the plurality of logical enforcement points.
Next, the method includes comparing 504 the measured traffic to traffic rules included in the security profile. This comparison process can occur at the enforcement point or at the director module.
The method also comprises providing 506 an alert if the traffic within the logical security boundary is indicative of a malicious attack. In some embodiments, the director module can output a message to a system administrator, such as an email or SMS message that indicates that a violation of the security profile has occurred.
In some embodiments, the method comprises generating 508 and displaying a visual representation of the traffic within the logical security boundary.
The example computer system 1 includes a processor or multiple processors 5 (e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both), and a main memory 10 and static memory 15, which communicate with each other via a bus 20. The computer system 1 may further include a video display 35 (e.g., a liquid crystal display (LCD)). The computer system 1 may also include an alpha-numeric input device(s) 30 (e.g., a keyboard), a cursor control device (e.g., a mouse), a voice recognition or biometric verification unit (not shown), a drive unit 37 (also referred to as disk drive unit), a signal generation device 40 (e.g., a speaker), and a network interface device 45. The computer system 1 may further include a data encryption module (not shown) to encrypt data.
The drive unit 37 includes a computer or machine-readable medium 50 on which is stored one or more sets of instructions and data structures (e.g., instructions 55) embodying or utilizing any one or more of the methodologies or functions described herein. The instructions 55 may also reside, completely or at least partially, within the main memory 10 and/or within the processors 5 during execution thereof by the computer system 1. The main memory 10 and the processors 5 may also constitute machine-readable media.
The instructions 55 may further be transmitted or received over a network via the network interface device 45 utilizing any one of a number of well-known transfer protocols (e.g., Hyper Text Transfer Protocol (HTTP)). While the machine-readable medium 50 is shown in an example embodiment to be a single medium, the term “computer-readable medium” should be taken to include a single medium or multiple media (e.g., a centralized or distributed database and/or associated caches and servers) that store the one or more sets of instructions. The term “computer-readable medium” shall also be taken to include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by the machine and that causes the machine to perform any one or more of the methodologies of the present application, or that is capable of storing, encoding, or carrying data structures utilized by or associated with such a set of instructions. The term “computer-readable medium” shall accordingly be taken to include, but not be limited to, solid-state memories, optical and magnetic media, and carrier wave signals. Such media may also include, without limitation, hard disks, floppy disks, flash memory cards, digital video disks, random access memory (RAM), read only memory (ROM), and the like. The example embodiments described herein may be implemented in an operating environment comprising software installed on a computer, in hardware, or in a combination of software and hardware.
Not all components of the computer system 1 are required and thus portions of the computer system 1 can be removed if not needed, such as Input/Output (I/O) devices (e.g., input device(s) 30). One skilled in the art will recognize that the Internet service may be configured to provide Internet access to one or more computing devices that are coupled to the Internet service, and that the computing devices may include one or more processors, buses, memory devices, display devices, input/output devices, and the like. Furthermore, those skilled in the art may appreciate that the Internet service may be coupled to one or more databases, repositories, servers, and the like, which may be utilized in order to implement any of the embodiments of the disclosure as described herein.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the present technology has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the present technology in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the present technology. Exemplary embodiments were chosen and described in order to best explain the principles of the present technology and its practical application, and to enable others of ordinary skill in the art to understand the present technology for various embodiments with various modifications as are suited to the particular use contemplated.
Aspects of the present technology are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the present technology. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer readable medium that can direct a computer, other programmable data processing apparatus, or other devices to function in a particular manner, such that the instructions stored in the computer readable medium produce an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present technology. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular embodiments, procedures, techniques, etc. in order to provide a thorough understanding of the present invention. However, it will be apparent to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details.
Reference throughout this specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, the appearances of the phrases “in one embodiment” or “in an embodiment” or “according to one embodiment” (or other phrases having similar import) at various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. Furthermore, depending on the context of discussion herein, a singular term may include its plural forms and a plural term may include its singular form. Similarly, a hyphenated term (e.g., “on-demand”) may be occasionally interchangeably used with its non-hyphenated version (e.g., “on demand”), a capitalized entry (e.g., “Software”) may be interchangeably used with its non-capitalized version (e.g., “software”), a plural term may be indicated with or without an apostrophe (e.g., PE's or PEs), and an italicized term (e.g., “N+1”) may be interchangeably used with its non-italicized version (e.g., “N+1”). Such occasional interchangeable uses shall not be considered inconsistent with each other.
Also, some embodiments may be described in terms of “means for” performing a task or set of tasks. It will be understood that a “means for” may be expressed herein in terms of a structure, such as a processor, a memory, an I/O device such as a camera, or combinations thereof. Alternatively, the “means for” may include an algorithm that is descriptive of a function or method step, while in yet other embodiments the “means for” is expressed in terms of a mathematical formula, prose, or as a flow chart or signal diagram.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is noted that the terms “coupled,” “connected”, “connecting,” “electrically connected,” etc., are used interchangeably herein to generally refer to the condition of being electrically/electronically connected. Similarly, a first entity is considered to be in “communication” with a second entity (or entities) when the first entity electrically sends and/or receives (whether through wireline or wireless means) information signals (whether containing data information or non-data/control information) to the second entity regardless of the type (analog or digital) of those signals. It is further noted that various figures (including component diagrams) shown and discussed herein are for illustrative purpose only, and are not drawn to scale.
If any disclosures are incorporated herein by reference and such incorporated disclosures conflict in part and/or in whole with the present disclosure, then to the extent of conflict, and/or broader disclosure, and/or broader definition of terms, the present disclosure controls. If such incorporated disclosures conflict in part and/or in whole with one another, then to the extent of conflict, the later-dated disclosure controls.
The terminology used herein can imply direct or indirect, full or partial, temporary or permanent, immediate or delayed, synchronous or asynchronous, action or inaction. For example, when an element is referred to as being “on,” “connected” or “coupled” to another element, then the element can be directly on, connected or coupled to the other element and/or intervening elements may be present, including indirect and/or direct variants. In contrast, when an element is referred to as being “directly connected” or “directly coupled” to another element, there are no intervening elements present. The description herein is illustrative and not restrictive. Many variations of the technology will become apparent to those of skill in the art upon review of this disclosure. For example, the technology is not limited to use for stopping email threats, but applies to any messaging threats including email, social media, instant messaging, and chat.
While various embodiments have been described above, it should be understood that they have been presented by way of example only, and not limitation. The descriptions are not intended to limit the scope of the invention to the particular forms set forth herein. To the contrary, the present descriptions are intended to cover such alternatives, modifications, and equivalents as may be included within the spirit and scope of the invention as defined by the appended claims and otherwise appreciated by one of ordinary skill in the art. Thus, the breadth and scope of a preferred embodiment should not be limited by any of the above-described exemplary embodiments.
Number | Name | Date | Kind |
---|---|---|---|
6226372 | Beebe et al. | May 2001 | B1 |
6578076 | Putzolu | Jun 2003 | B1 |
6765864 | Natarajan et al. | Jul 2004 | B1 |
6986061 | Kunzinger | Jan 2006 | B1 |
6992985 | Das | Jan 2006 | B1 |
7028179 | Anderson et al. | Apr 2006 | B2 |
7058712 | Vasko et al. | Jun 2006 | B1 |
7062566 | Amara et al. | Jun 2006 | B2 |
7068598 | Bryson et al. | Jun 2006 | B1 |
7397794 | Lacroute et al. | Jul 2008 | B1 |
7464407 | Nakae et al. | Dec 2008 | B2 |
7502841 | Small | Mar 2009 | B2 |
7607170 | Chesla | Oct 2009 | B2 |
7620808 | Le | Nov 2009 | B2 |
7620986 | Jagannathan et al. | Nov 2009 | B1 |
7735141 | Noel et al. | Jun 2010 | B1 |
7774837 | McAlister | Aug 2010 | B2 |
7849495 | Huang et al. | Dec 2010 | B1 |
7900240 | Terzis et al. | Mar 2011 | B2 |
7904962 | Jajodia et al. | Mar 2011 | B1 |
7949677 | Croft et al. | May 2011 | B2 |
7954150 | Croft et al. | May 2011 | B2 |
8051460 | Lum et al. | Nov 2011 | B2 |
8250213 | Glover et al. | Aug 2012 | B2 |
8274912 | Wray et al. | Sep 2012 | B2 |
8321862 | Swamy et al. | Nov 2012 | B2 |
8353021 | Satish et al. | Jan 2013 | B1 |
8490153 | Bassett et al. | Jul 2013 | B2 |
8514868 | Hill | Aug 2013 | B2 |
8516478 | Edwards et al. | Aug 2013 | B1 |
8612744 | Shieh | Dec 2013 | B2 |
8612971 | Fitzgerald et al. | Dec 2013 | B1 |
8726343 | Borzycki et al. | May 2014 | B1 |
8813169 | Shieh et al. | Aug 2014 | B2 |
8918785 | Brandwine et al. | Dec 2014 | B1 |
8959568 | Hudis | Feb 2015 | B2 |
9038151 | Chua et al. | May 2015 | B1 |
9098578 | Heim et al. | Aug 2015 | B2 |
9380027 | Lian et al. | Jun 2016 | B1 |
9438634 | Ross et al. | Sep 2016 | B1 |
9467476 | Shieh et al. | Oct 2016 | B1 |
9529995 | Shieh | Dec 2016 | B2 |
9560081 | Woolward | Jan 2017 | B1 |
9609026 | Ross et al. | Mar 2017 | B2 |
10009383 | Woolward | Jun 2018 | B2 |
20010014150 | Beebe et al. | Aug 2001 | A1 |
20020093527 | Sherlock et al. | Jul 2002 | A1 |
20020124067 | Parupudi et al. | Sep 2002 | A1 |
20030014665 | Anderson et al. | Jan 2003 | A1 |
20030172145 | Nguyen | Sep 2003 | A1 |
20030177389 | Albert et al. | Sep 2003 | A1 |
20030204632 | Willebeek-LeMair et al. | Oct 2003 | A1 |
20030204728 | Irwin | Oct 2003 | A1 |
20040093513 | Cantrell et al. | May 2004 | A1 |
20040095897 | Vafaei | May 2004 | A1 |
20040193943 | Kngelino et al. | Sep 2004 | A1 |
20040250124 | Chesla | Dec 2004 | A1 |
20050005169 | Kelekar | Jan 2005 | A1 |
20050008001 | Williams et al. | Jan 2005 | A1 |
20050010821 | Cooper et al. | Jan 2005 | A1 |
20050060573 | D'Souza | Mar 2005 | A1 |
20050081058 | Chang et al. | Apr 2005 | A1 |
20050160286 | Currie et al. | Jul 2005 | A1 |
20050188217 | Ghanea-Hercock | Aug 2005 | A1 |
20050193222 | Greene | Sep 2005 | A1 |
20050229255 | Gula et al. | Oct 2005 | A1 |
20060137009 | Chesla | Jun 2006 | A1 |
20060177063 | Conway et al. | Aug 2006 | A1 |
20070079308 | Chiaramonte et al. | Apr 2007 | A1 |
20070171921 | Wookey et al. | Jul 2007 | A1 |
20070192863 | Kapoor et al. | Aug 2007 | A1 |
20070271612 | Fang et al. | Nov 2007 | A1 |
20070283441 | Cole et al. | Dec 2007 | A1 |
20080052774 | Chesla | Feb 2008 | A1 |
20080077690 | Miyajima | Mar 2008 | A1 |
20080083011 | McAlister et al. | Apr 2008 | A1 |
20080086772 | Chesla | Apr 2008 | A1 |
20080155239 | Chowdhury et al. | Jun 2008 | A1 |
20080262990 | Kapoor | Oct 2008 | A1 |
20080276295 | Nair | Nov 2008 | A1 |
20080276297 | Shay | Nov 2008 | A1 |
20080301770 | Kinder | Dec 2008 | A1 |
20090003278 | Abdel-Kader et al. | Jan 2009 | A1 |
20090103524 | Mantripragada et al. | Apr 2009 | A1 |
20090182835 | Aviles et al. | Jul 2009 | A1 |
20090249472 | Litvin et al. | Oct 2009 | A1 |
20100043068 | Varadhan | Feb 2010 | A1 |
20100095367 | Narayanaswamy | Apr 2010 | A1 |
20100100616 | Bryson et al. | Apr 2010 | A1 |
20100100962 | Boren | Apr 2010 | A1 |
20100125900 | Dennerline et al. | May 2010 | A1 |
20100175134 | Ali-Ahmad et al. | Jul 2010 | A1 |
20100189110 | Kambhampati et al. | Jul 2010 | A1 |
20100228962 | Simon et al. | Sep 2010 | A1 |
20100235880 | Chen et al. | Sep 2010 | A1 |
20100251329 | Wei | Sep 2010 | A1 |
20100281533 | Mao et al. | Nov 2010 | A1 |
20100333165 | Basak et al. | Dec 2010 | A1 |
20110003580 | Belrose et al. | Jan 2011 | A1 |
20110030037 | Olshansky et al. | Feb 2011 | A1 |
20110033271 | Hanel | Feb 2011 | A1 |
20110069710 | Naven et al. | Mar 2011 | A1 |
20110075667 | Li et al. | Mar 2011 | A1 |
20110138384 | Bozek et al. | Jun 2011 | A1 |
20110185431 | Deraison | Jul 2011 | A1 |
20110214157 | Korsunsky | Sep 2011 | A1 |
20110225624 | Sawhney et al. | Sep 2011 | A1 |
20110249679 | Lin et al. | Oct 2011 | A1 |
20110261722 | Awano | Oct 2011 | A1 |
20110263238 | Riley et al. | Oct 2011 | A1 |
20110277034 | Hanson | Nov 2011 | A1 |
20110299533 | Yu et al. | Dec 2011 | A1 |
20110314520 | Olszewski | Dec 2011 | A1 |
20120017258 | Suzuki | Jan 2012 | A1 |
20120131685 | Broch et al. | May 2012 | A1 |
20120167161 | Kim | Jun 2012 | A1 |
20120185913 | Martinez et al. | Jul 2012 | A1 |
20120203877 | Bartholomay | Aug 2012 | A1 |
20120210417 | Shieh | Aug 2012 | A1 |
20120240185 | Kapoor | Sep 2012 | A1 |
20120254980 | Takahashi | Oct 2012 | A1 |
20120287931 | Kidambi et al. | Nov 2012 | A1 |
20120297073 | Glover | Nov 2012 | A1 |
20120311144 | Akelbein et al. | Dec 2012 | A1 |
20120311575 | Song | Dec 2012 | A1 |
20130007234 | Bartfai-Walcott et al. | Jan 2013 | A1 |
20130019277 | Chang et al. | Jan 2013 | A1 |
20130055246 | Li et al. | Feb 2013 | A1 |
20130055398 | Li et al. | Feb 2013 | A1 |
20130086383 | Galvao de Andrade et al. | Apr 2013 | A1 |
20130091577 | McGinley et al. | Apr 2013 | A1 |
20130097692 | Cooper et al. | Apr 2013 | A1 |
20130108050 | Wu et al. | May 2013 | A1 |
20130117836 | Shieh | May 2013 | A1 |
20130125112 | Mittal et al. | May 2013 | A1 |
20130152187 | Strebe et al. | Jun 2013 | A1 |
20130174246 | Schrecker et al. | Jul 2013 | A1 |
20130254871 | Sun et al. | Sep 2013 | A1 |
20130275592 | Xu et al. | Oct 2013 | A1 |
20130283336 | Macy | Oct 2013 | A1 |
20130283370 | Vipat | Oct 2013 | A1 |
20130298184 | Ermagan et al. | Nov 2013 | A1 |
20130305357 | Ayyagari et al. | Nov 2013 | A1 |
20130340039 | Malaney | Dec 2013 | A1 |
20140013434 | Ranum et al. | Jan 2014 | A1 |
20140033271 | Barton et al. | Jan 2014 | A1 |
20140115654 | Rogers | Apr 2014 | A1 |
20140137184 | Russello | May 2014 | A1 |
20140149569 | Wittenstein et al. | May 2014 | A1 |
20140230008 | Feroz et al. | Aug 2014 | A1 |
20140283030 | Moore et al. | Sep 2014 | A1 |
20140298469 | Marion et al. | Oct 2014 | A1 |
20150089623 | Sondhi et al. | Mar 2015 | A1 |
20150150072 | Doctor et al. | May 2015 | A1 |
20150186296 | Guidry | Jul 2015 | A1 |
20150264011 | Liang | Sep 2015 | A1 |
20150281274 | Masurekar et al. | Oct 2015 | A1 |
20150281347 | Wang et al. | Oct 2015 | A1 |
20150304354 | Rogers | Oct 2015 | A1 |
20150326589 | Smith | Nov 2015 | A1 |
20160099962 | Peach et al. | Apr 2016 | A1 |
20170063791 | Ross et al. | Mar 2017 | A1 |
20170063933 | Shieh et al. | Mar 2017 | A1 |
20170163688 | Ross et al. | Jun 2017 | A1 |
Number | Date | Country |
---|---|---|
201702901 | Jan 2017 | TW |
WO2016148874 | Sep 2016 | WO |
WO2017040148 | Mar 2017 | WO |
WO2017040205 | Mar 2017 | WO |
Entry |
---|
Specification, U.S. Appl. No. 14/673,679, filed Mar. 30, 2015. |
Specification, U.S. Appl. No. 14/673,640, filed Mar. 30, 2015. |
Specification, U.S. Appl. No. 14/839,649, filed Aug. 28, 2015. |
Specification, U.S. Appl. No. 14/839,699, filed Aug. 28, 2015. |
International Search Report dated May 5, 2016 in Patent Cooperation Treaty Application No. PCT/US2016/019882, filed Feb. 26, 2016. |
Patent Cooperation Treaty Application No. PCT/US2016/048412, “International Search Report” and “Written Opinion of the International Searching Authority,” dated Nov. 4, 2016, 10 pages. |
Patent Cooperation Treaty Application No. PCT/US2016/048711, “International Search Report” and “Written Opinion of the International Searching Authority,” dated Nov. 4, 2016, 10 pages. |
Number | Date | Country | |
---|---|---|---|
20160269425 A1 | Sep 2016 | US |