US 11,843,605 B2
Methods and systems for data traffic based adaptive security
Bernard Harguindeguy, Atherton, CA (US); Udayakumar Subbarayan, Bangalore (IN); Isidore Rosenblum, Pleasanton, CA (US); Abduraheem Poonthiruthi, Bangalore (IN); Anoop Krishnan Gopalakrishnan, Bangalore (IN); and Ashwani Kumar, Bengaluru (IN)
Assigned to Ping Identity Corporation, Denver, CO (US)
Filed by Ping Identity Corporation, Denver, CO (US)
Filed on Oct. 31, 2022, as Appl. No. 18/051,240.
Application 18/051,240 is a continuation of application No. 16/733,570, filed on Jan. 3, 2020, granted, now 11,496,475.
Claims priority of application No. 201911000540 (IN), filed on Jan. 4, 2019.
Prior Publication US 2023/0231852 A1, Jul. 20, 2023
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01)
CPC H04L 63/101 (2013.01) [H04L 63/0807 (2013.01); H04L 63/0884 (2013.01); H04L 63/1425 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, at an access control server, a server resource request message from a client, the server resource request message requesting information from a server resource;
extracting server resource request message data from the server resource request message;
sending the server resource request message data to a security server such that the security server, in response to receiving the server resource request message data, analyzes the server resource request message data to identify whether there is an error, anomaly, or indicator of compromise associated with the server resource request message;
routing, prior to receiving a message from the security server indicating that there is an error, anomaly, or indicator of compromise associated with the server resource request message, the server resource request message and one or more additional server resource request messages subsequently received from the client to a resource server implementing the server resource; and
in response to receiving the message from the security server indicating that there is an error, anomaly, or indicator of compromise associated with the server resource request message, blocking server resource request messages subsequently received from the client from being sent to the resource server and responses from the resource server subsequently being sent to the client from being sent to the client.