US 12,113,772 B2
Cyber protections of remote networks via selective policy enforcement at a central network
Sean Moore, Hollis, NH (US); and Peter P. Geremia, Portsmouth, NH (US)
Assigned to Centripetal Networks, LLC, Portsmouth, NH (US)
Filed by Centripetal Networks, LLC, Portsmouth, NH (US)
Filed on Sep. 15, 2023, as Appl. No. 18/368,831.
Application 18/368,831 is a continuation of application No. 18/168,446, filed on Feb. 13, 2023, granted, now 11,799,832.
Application 18/168,446 is a continuation of application No. 17/669,093, filed on Feb. 10, 2022, granted, now 11,582,191, issued on Feb. 14, 2023.
Application 17/669,093 is a continuation in part of application No. 17/371,487, filed on Jul. 9, 2021, granted, now 11,374,905, issued on Jun. 28, 2022.
Application 17/371,487 is a continuation of application No. 17/194,886, filed on Mar. 8, 2021, granted, now 11,063,909, issued on Jul. 13, 2021.
Application 17/194,886 is a continuation of application No. 16/897,942, filed on Jun. 10, 2020, granted, now 10,944,721, issued on Mar. 9, 2021.
Application 16/897,942 is a continuation of application No. 16/502,565, filed on Jul. 3, 2019, granted, now 10,715,493, issued on Jul. 14, 2020.
Prior Publication US 2024/0007437 A1, Jan. 4, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); H04L 12/46 (2006.01); H04L 12/66 (2006.01)
CPC H04L 63/0245 (2013.01) [H04L 12/4633 (2013.01); H04L 12/66 (2013.01); H04L 63/0263 (2013.01)] 17 Claims
OG exemplary drawing
 
1. A method for selectively filtering traffic of a remote network by tunneling portions of that traffic to a central network to be filtered by the central network, the method comprising:
receiving, by a security policy management server at the central network, threat information from a plurality of different independent cyber threat intelligence providers;
generating, by the security policy management server and based on the threat information, a plurality of packet filtering rules of a security policy, wherein each of the plurality of packet filtering rules of the security policy comprises one or more packet matching criteria and corresponding rule actions to take on packets matching the packet matching criteria;
generating, by the security policy management server, a policy probabilistic data structure that represents each of the plurality of packet filtering rules of the security policy;
sending, by the security policy management server and to a remote network tunnel gateway at the remote network, the policy probabilistic data structure;
receiving, from the remote network tunnel gateway and via a tunnel between the remote network and the central network, a packet, wherein the remote network tunnel gateway sent the packet via the tunnel based on a determination that a first packet matching criterion of the packet was represented in the policy probabilistic data structure; and
filtering the packet based on the plurality of packet filtering rules of the security policy, wherein filtering the packet based on the plurality of packet filtering rules of the security policy comprises filtering the pack et in accordance with one or more rule actions.