US 12,348,568 B1
Methods for optimizing selection of a hardware security server and devices thereof
Liang Cheng, Seattle, WA (US); and Saxon C. Amdahl, Seattle, WA (US)
Assigned to F5, Inc., Seattle, WA (US)
Filed by F5, Inc., Seattle, WA (US)
Filed on Dec. 23, 2022, as Appl. No. 18/087,955.
Int. Cl. H04L 9/40 (2022.01); H04L 43/04 (2022.01); H04L 43/0805 (2022.01)
CPC H04L 63/20 (2013.01) [H04L 43/04 (2013.01); H04L 43/0805 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for optimizing selection from hardware security servers, the method implemented by a cloud service or a network traffic management system comprising network traffic apparatuses, client devices, or server devices, the method comprising:
receiving data from candidate hardware security servers after sending an operation status request or a capability query to the candidate hardware security servers, wherein the data comprises a response from the candidate hardware security servers, performance data, or runtime observational data of the candidate hardware security servers, wherein the data is received subsequent to receiving or retrieving hardware security server requirements for a hardware security server recommendation, and wherein the hardware security server requirements comprise one or more server operation rules;
generating compliance scores for the candidate hardware security servers based on hardware security server requirements, built-in hardware security server requirements, and received data from the candidate hardware security servers;
generating a rank for the candidate hardware security servers based on the compliance scores of the candidate hardware security servers; and
providing the hardware security server recommendation for one of the candidate hardware security servers to the client based on the generated rank of the candidate hardware security servers with compliance scores above a predetermined threshold.