US 12,192,249 B2
Systems and methods for decentralized security against defined and undefined threats
Clifton Kaznocha, Los Angeles, CA (US); and Marc Harrison, Seattle, WA (US)
Assigned to Impart Security Inc., Coral Gables, FL (US)
Filed by Impart Security Inc., Coral Gables, FL (US)
Filed on Sep. 19, 2022, as Appl. No. 17/933,223.
Prior Publication US 2024/0098118 A1, Mar. 21, 2024
Int. Cl. H04L 29/06 (2006.01); H04L 9/40 (2022.01)
CPC H04L 63/205 (2013.01) [H04L 63/1416 (2013.01); H04L 63/1441 (2013.01)] 19 Claims
OG exemplary drawing
 
1. A method comprising:
receiving, at a particular security controller of a decentralized security system, a plurality of states associated with different hashed identifiers from a plurality of other security controllers of the decentralized security system;
receiving, at the particular security controller, a request from a particular client that is directed to a particular endpoint;
generating, by execution of the particular security controller, a first hashed value from hashing an identifier from the request that identifies the particular endpoint;
updating, by execution of the particular security controller, a first state of the plurality of states based on the first hashed value matching a hashed identifier that is associated with the first state, wherein the first state is a first cumulative count representing a number of times the particular endpoint is requested across the decentralized security system, and wherein a second state of the plurality of states represents a number of requests received from the particular client across the decentralized security system; and
implementing, at the particular security controller, a protective action in response to an updated value generated from updating the first state violating a security rule.