CPC H04L 63/20 (2013.01) [G06F 9/5027 (2013.01); H04L 63/02 (2013.01); H04L 63/1408 (2013.01)] | 20 Claims |
1. A computer-implemented method comprising:
communicating tag information between a first device and a second device coupled to the first device via a network, the second device configured to perform a plurality of security tasks, wherein the tag information is about traffic flow between the first device and the second device over the network;
identifying, by the second device, a subset of the plurality of security tasks to be performed by the second device for the traffic flow, based at least in part on the tag information, wherein the second device includes a hardware accelerator, and wherein identifying the subset of the plurality of security tasks includes:
determining that the subset of the plurality of security tasks are capable of being performed by the hardware accelerator,
determining that at least one security task is not to be performed by the hardware accelerator, and
excluding the at least one security task from the subset; and
performing for the traffic flow, by the second device, each task in the subset of the plurality of security tasks, wherein performing each task in the subset of the plurality of security tasks includes performing one or more tasks of the subset of the plurality of security tasks by the hardware accelerator.
|