US 12,192,247 B2
Systems and methods for network security
Andy Thomas, Long Wittenham (GB); Nishit Shah, Ahmedabad (IN); and Daniel Stutz, Karlsruhe (DE)
Assigned to Sophos Limited, Abingdon (GB)
Filed by Sophos Limited, Abingdon (GB)
Filed on Oct. 9, 2023, as Appl. No. 18/483,041.
Application 18/483,041 is a continuation of application No. 17/154,808, filed on Jan. 21, 2021, granted, now 11,792,228.
Claims priority of application No. 202011002757 (IN), filed on Jan. 22, 2020.
Prior Publication US 2024/0106863 A1, Mar. 28, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 9/50 (2006.01)
CPC H04L 63/20 (2013.01) [G06F 9/5027 (2013.01); H04L 63/02 (2013.01); H04L 63/1408 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
communicating tag information between a first device and a second device coupled to the first device via a network, the second device configured to perform a plurality of security tasks, wherein the tag information is about traffic flow between the first device and the second device over the network;
identifying, by the second device, a subset of the plurality of security tasks to be performed by the second device for the traffic flow, based at least in part on the tag information, wherein the second device includes a hardware accelerator, and wherein identifying the subset of the plurality of security tasks includes:
determining that the subset of the plurality of security tasks are capable of being performed by the hardware accelerator,
determining that at least one security task is not to be performed by the hardware accelerator, and
excluding the at least one security task from the subset; and
performing for the traffic flow, by the second device, each task in the subset of the plurality of security tasks, wherein performing each task in the subset of the plurality of security tasks includes performing one or more tasks of the subset of the plurality of security tasks by the hardware accelerator.