Akamai Technologies, Inc.

United States of America

Back to Profile

1-100 of 727 for Akamai Technologies, Inc. and 2 subsidiaries Sort by
Query
Aggregations
IP Type
        Patent 703
        Trademark 24
Jurisdiction
        United States 603
        World 106
        Canada 10
        Europe 8
Owner / Subsidiary
[Owner] Akamai Technologies, Inc. 718
Nominum, Inc. 6
Xerocole, Inc. 6
Date
New (last 4 weeks) 5
2025 January (MTD) 1
2024 December 5
2024 November 1
2024 October 1
See more
IPC Class
H04L 29/06 - Communication control; Communication processing characterised by a protocol 263
H04L 29/08 - Transmission control procedure, e.g. data link level control procedure 236
G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs 115
H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system 77
H04L 9/40 - Network security protocols 71
See more
NICE Class
42 - Scientific, technological and industrial services, research and design 20
09 - Scientific and electric apparatus and instruments 15
38 - Telecommunications services 7
37 - Construction and mining; installation and repair services 3
41 - Education, entertainment, sporting and cultural services 3
See more
Status
Pending 43
Registered / In Force 684
  1     2     3     ...     8        Next Page

1.

End-to-end verifiable multi-factor authentication service

      
Application Number 18887357
Status Pending
Filing Date 2024-09-17
First Publication Date 2025-01-09
Owner Akamai Technologies, Inc. (USA)
Inventor Grinman, Alex

Abstract

A verifiable multi-factor authentication scheme uses an authentication service. An authentication request is received from an organization, the request having been generated in response to receipt of an access request from a user. The user has an associated public-private key pair. The organization provides the authentication request together with a first nonce. In response to receiving the authentication request and the first nonce, the service generates a second nonce, and then it sends the first and second nonces to the user. Thereafter, the service receives a data string, the data string having been generated by the client applying its private key over the nonces. Using the user's public key, the service attempts to verify that the data string includes the nonces. If it does, the authentication service provides the authentication decision in response to the authentication request, together with a proof that the user approved the authentication request.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

2.

FAST, SECURE, AND SCALABLE DATA STORE AT THE EDGE FOR CONNECTING NETWORK ENABLED DEVICES

      
Application Number 18673520
Status Pending
Filing Date 2024-05-24
First Publication Date 2024-12-26
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Ingerman, Mark M.
  • Bird, Robert B.

Abstract

A distributed computing system provides a distributed data store for network enabled devices at the edge. The distributed database is partitioned such that each node in the system has its own partition and some number of followers that replicate the data in the partition. The data in the partition is typically used in providing services to network enabled devices from the edge. The set of data for a particular network enabled device is owned by the node to which the network enabled device connects. Ownership of the data (and the data itself) may move around the distributed computing system to different nodes, e.g., for load balancing, fault-resilience, and/or due to device movement. Security/health checks are enforced at the edge as part of a process of transferring data ownership, thereby providing a mechanism to mitigate compromised or malfunctioning network enabled devices.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

3.

Edge network-based account protection service

      
Application Number 18829516
Status Pending
Filing Date 2024-09-10
First Publication Date 2024-12-26
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Summers, John
  • Polansky, Robert
  • Nicholson, Darryl
  • Markwell, Scott

Abstract

An account protection service to prevent user login or other protected endpoint request abuse. In one embodiment, the service collects user recognition data, preferably for each login attempt (e.g. data about the connection, session, and other relevant context), and it constructs a true user profile for each such user over time, preferably using the recognition data from successful logins. The profile evolves as additional recognition data is collected from successful logins. The profile is a model of what the user “looks like” to the system. For a subsequent login attempt, the system then calculates a true user score. This score represents how well the current user recognition data matches the model represented by the true user profile. The user recognition service is used to drive policy decisions and enforcement capabilities.

IPC Classes  ?

4.

SERVER-SIDE ADAPTIVE BITRATE STREAMING (ABR) WITH MANIFEST FILE ENCODING

      
Application Number US2024033000
Publication Number 2024/258740
Status In Force
Filing Date 2024-06-07
Publication Date 2024-12-19
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor Kadaroesman, Harald

Abstract

An enhanced server-side Adaptive Bitrate Streaming (ABR) of source content. The ABR switching logic is located in association with a server, and this logic also receives telemetry data as measured by the client. The client receives a single manifest that comprises a set of encoded entries each associated with a segment of the source content and comprising a first portion encoding, as a set of options, each of the multiple bitrates, and a second portion that, for each of the multiple bitrate options, encodes a size of the segment associated therewith. In operation, the client media player makes a request for a portion of the source content, and that request includes one of the encoded entries. In response, the server-side ABR switching logic determines whether to switch delivery of the source content from an existing first bitrate to a second bitrate. If so, the requested portion is delivered to the client at the second bitrate.

IPC Classes  ?

  • H04N 21/2662 - Controlling the complexity of the video stream, e.g. by scaling the resolution or bitrate of the video stream based on the client capabilities
  • H04N 21/2343 - Processing of video elementary streams, e.g. splicing of video streams or manipulating MPEG-4 scene graphs involving reformatting operations of video signals for distribution or compliance with end-user requests or end-user device requirements
  • H04N 21/262 - Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission or generating play-lists
  • H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests
  • H04N 21/6379 - Control signals issued by the client directed to the server or network components directed to server directed to encoder
  • H04N 21/647 - Control signaling between network components and server or clients; Network processes for video distribution between server and clients, e.g. controlling the quality of the video stream, by dropping packets, protecting content from unauthorised alteration within the network, monitoring of network load or bridging bet
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 65/75 - Media network packet handling

5.

Server-side adaptive bitrate streaming (ABR) with manifest file encoding

      
Application Number 18208442
Status Pending
Filing Date 2023-06-12
First Publication Date 2024-12-12
Owner Akamai Technologies, Inc. (USA)
Inventor Kadaroesman, Harald

Abstract

An enhanced server-side Adaptive Bitrate Streaming (ABR) of source content. The ABR switching logic is located in association with a server, and this logic also receives telemetry data as measured by the client. The client receives a single manifest that comprises a set of encoded entries each associated with a segment of the source content and comprising a first portion encoding, as a set of options, each of the multiple bitrates, and a second portion that, for each of the multiple bitrate options, encodes a size of the segment associated therewith. In operation, the client media player makes a request for a portion of the source content, and that request includes one of the encoded entries. In response, the server-side ABR switching logic determines whether to switch delivery of the source content from an existing first bitrate to a second bitrate. If so, the requested portion is delivered to the client at the second bitrate.

IPC Classes  ?

  • H04L 65/75 - Media network packet handling
  • H04L 65/61 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
  • H04N 21/238 - Interfacing the downstream path of the transmission network, e.g. adapting the transmission rate of a video stream to network bandwidth; Processing of multiplex streams

6.

Establishing On Demand Connections To Intermediary Nodes With Advance Information For Performance Improvement

      
Application Number 18327659
Status Pending
Filing Date 2023-06-01
First Publication Date 2024-12-05
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Gero, Charles E
  • Tang, David

Abstract

An agent deployed within a private network creates on-demand connections to an intermediary node outside the private network. When a client contacts the intermediary node for an application or more generally any service available from within the private network, the intermediary node signals the agent to create the on-demand connection outbound to the intermediary. The agent may include advance information in the signal that accelerates the establishment of the on-demand connection and/or transmission of responsive data to the client.

IPC Classes  ?

7.

Fast Query Execution For Large Datasets

      
Application Number 18321822
Status Pending
Filing Date 2023-05-23
First Publication Date 2024-11-28
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Marks-Bluth, Alex
  • Elbert, Dan Ariel

Abstract

Systems and methods for querying large amounts of data are disclosed. Several different versions of a data feed are provided, ranging from a full set of data to various other versions that are smaller or faster to query (e.g., sampled versions, aggregations, sketches) . . . . A machine learning model is trained on features of input queries run against the various versions of the data feed and the corresponding results. The trained model is then applied to a new query to choose, automatically, which version of the data feed to apply the query against. That is, the system can select which version of the data feed to use when executing the given query, optimizing speed and/or compute costs while providing an appropriate level of accuracy for the given query.

IPC Classes  ?

8.

Detection of site phishing using neural network-enabled site image analysis leveraging few-shot learning

      
Application Number 18135778
Status Pending
Filing Date 2023-04-18
First Publication Date 2024-10-24
Owner Akamai Technologies, Inc. (USA)
Inventor Costa, Nadav George

Abstract

Website phishing detection is enabled using a siamese neural network. One twin receives a query image associated with a website page. The other twin receives a subset of a set of reference website images together with positive (phishing) examples that were used to train the networks, the subset of reference website images having been determined by applying an identifier associated with a brand of interest. The operation of applying the identifier significantly reduces the relevant search space for the inferencing task. If the inferencing determines a sufficient likelihood that the website page is a phishing page, control signaling is generated to control a system to take a given mitigation action n.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06V 10/82 - Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks

9.

Browser extensionless phish-proof multi-factor authentication (MFA)

      
Application Number 18636468
Status Pending
Filing Date 2024-04-16
First Publication Date 2024-08-15
Owner Akamai Technologies, Inc. (USA)
Inventor Gero, Charles E.

Abstract

A multi-factor authentication scheme uses an MFA authentication service and a browser extensionless phish-proof method to facilitate an MFA workflow. Phish-proof MFA verifies that the browser the user is in front of is actually visiting the authentic (real) site and not a phished site. This achieved by only allowing MFA to be initiated from a user trusted browser by verifying its authenticity through a signing operation using a key only it possesses, and then also verifying that the verified browser is visiting the authentic site. In a preferred embodiment, this latter check is carried out using an iframe postMessage owning domain check. In a variant embodiment, the browser is verified to be visiting the authentic site through an origin header check. By using the iframe-based or ORIGIN header-based check, the solution does not require a physical security key (such as a USB authenticator) or any browser extension or plug-in.

IPC Classes  ?

10.

API SECURITY BASED ON INSPECTION OF OBFUSCATED REQUEST AND RESPONSE BODIES

      
Application Number US2024012048
Publication Number 2024/155835
Status In Force
Filing Date 2024-01-18
Publication Date 2024-07-25
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor Mirkis, Leonid

Abstract

Improved security inspections for API traffic are disclosed. A data obfuscation process is applied to structured data in a request or response body to obfuscate the content while retaining the structural aspects thereof. The resulting sanitized version of the structured data is sent for analysis. For example a machine learning component is trained on such sanitized data to develop a signature or model that detects anomalous interactions with the API. The retained structure contains signals useful for pattern recognition and anomaly detection. The signature or model is preferably developed for a specific API endpoint. Then, a detection engine can be deployed to assess subsequent API traffic for the API endpoint, with such subsequent live traffic being similarly obfuscated by the system before being assessed. The teachings hereof can be used to block attacks or other malicious activities directed against API endpoints.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06F 21/55 - Detecting local intrusion or implementing counter-measures

11.

Ensuring coherency across responses when handling a series of client requests

      
Application Number 18146340
Grant Number 12132781
Status In Force
Filing Date 2022-12-23
First Publication Date 2024-06-27
Grant Date 2024-10-29
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Flack, Martin
  • Ludin, Stephen
  • Bishop, Michael

Abstract

It is often important that a server's responses to a set of client requests are coherent with one another, but if the client's requests are spread over time, that may not occur. In accordance with the teaching of this patent document, a client is able to communicate with a server to achieve coherency. A client can send a request (e.g., an HTTP request for a given resource) with a data preservation directive. The data preservation directive causes the server to initiate a server-side process to preserve the state of underlying server-side data upon which the response relies (or will rely). Also, a client can send a request with an attribute requesting the response be coherent with respect to some date-time or other reference point. This attribute thus asks the server to ensure coherency in the response to the client.

IPC Classes  ?

  • H04L 67/1025 - Dynamic adaptation of the criteria on which the server selection is based
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/1001 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
  • H04L 67/1012 - Server selection for load balancing based on compliance of requirements or conditions with available server resources
  • G06F 12/0815 - Cache consistency protocols
  • H04L 9/40 - Network security protocols
  • H04L 67/1029 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer

12.

REAL-TIME DETECTION OF SITE PHISHING USING MESSAGE PASSING NEURAL NETWORKS (MPNN) ON DIRECTED GRAPHS

      
Application Number US2023084986
Publication Number 2024/137725
Status In Force
Filing Date 2023-12-20
Publication Date 2024-06-27
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor Costa, Nadav George

Abstract

Website phishing detection is enabled using a Message Passing Neural Network (MPNN) that scores requested HTML with a likelihood of being a phishing website. The technique leverages the assumption that the HTML in a phishing website often presents anomalous structure or features when compared with an analogous benign website. Once a phishing site is detected, a given mitigation action is then taken.

IPC Classes  ?

13.

Real-time detection of site phishing using Message Passing Neural Networks (MPNN) on directed graphs

      
Application Number 18084593
Status Pending
Filing Date 2022-12-20
First Publication Date 2024-06-20
Owner Akamai Technologies, Inc. (USA)
Inventor Costa, Nadav George

Abstract

Website phishing detection is enabled using a Message Passing Neural Network (MPNN) that scores requested HTML with a likelihood of being a phishing website. The technique leverages the assumption that the HTML in a phishing website often presents anomalous structure or features when compared with an analogous benign website. Once a phishing site is detected, a given mitigation action is then taken.

IPC Classes  ?

14.

Detecting anomalous Application Programming Interface (API) behaviors

      
Application Number 17982562
Status Pending
Filing Date 2022-11-08
First Publication Date 2024-05-16
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Gero, Charles E.
  • Patel, Vishal A.

Abstract

A technique to detect and mitigate anomalous Application Programming Interface (API) behavior associated with an application having a set of APIs is described. Across one or more sessions during a time period, and in response to receiving a set of one or more transactions directed to the application, a behavioral graph is generated. The graph comprises a set of vertices, an associated set of edges, and a set of weights representing frequency of observation of one or more behaviors, wherein a behavior is denoted by an edge between a pair of connected vertices, wherein the edge depicts at least one interdependent relationship between first and second APIs of the set of APIs. One or more low weight edges are filtered from the behavioral graph to generate a decision graph. The decision graph is then used to detect that one or more new transactions represent anomalous behavior. In response to detecting that the given new transaction represents the anomalous behavior, an action is taken to protect the application.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

15.

DETECTING ANOMALOUS APPLICATION PROGRAMMING INTERFACE (API) BEHAVIORS

      
Application Number US2023036984
Publication Number 2024/102380
Status In Force
Filing Date 2023-11-08
Publication Date 2024-05-16
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor
  • Gero, Charles, E.
  • Patel, Vishal, A.

Abstract

A technique to detect and mitigate anomalous Application Programming Interface (API) behavior associated with an application having a set of APIs is described. Across one or more sessions during a time period, and in response to receiving a set of one or more transactions directed to the application, a behavioral graph is generated. The graph comprises a set of vertices, an associated set of edges, and a set of weights representing frequency of observation of one or more behaviors, wherein a behavior is denoted by an edge between a pair of connected vertices, wherein the edge depicts at least one interdependent relationship between first and second APIs of the set of APIs. One or more low weight edges are filtered from the behavioral graph to generate a decision graph. The decision graph is then used to detect that one or more new transactions represent anomalous behavior. In response to detecting that the given new transaction represents the anomalous behavior, an action is taken to protect the application.

IPC Classes  ?

  • G06F 21/55 - Detecting local intrusion or implementing counter-measures
  • G06F 21/57 - Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
  • G06F 21/51 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability

16.

NETWORK SECURITY ANALYSIS SYSTEM WITH REINFORCEMENT LEARNING FOR SELECTING DOMAINS TO SCAN

      
Application Number 18512509
Status Pending
Filing Date 2023-11-17
First Publication Date 2024-05-16
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Neystadt, Eugene ("john")
  • Heiman, Eyal
  • Ben-Zvi, Elisha
  • Nadler, Asaf

Abstract

This document describes among other things, network security systems that incorporate a feedback loop so as to automatically and dynamically adjust the scope of network traffic that is subject to inspection. Risky traffic can be sent for inspection; risky traffic that is demonstrated to have high rate of threats can be outright blocked without further inspection; traffic that is causing errors due to protocol incompatibility or should not be inspected for regulatory or other reasons can be flagged so it bypasses the security inspection system. The system can operate on a domain by domain basis, IP address basis, or otherwise.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • G06N 20/00 - Machine learning
  • H04L 47/263 - Rate modification at the source after receiving feedback
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

17.

Automated learning and detection of web bot transactions using deep learning

      
Application Number 18407604
Status Pending
Filing Date 2024-01-09
First Publication Date 2024-05-09
Owner Akamai Technologies, Inc. (USA)
Inventor Kurupati, Sreenath

Abstract

This disclosure describes a bot detection system that leverages deep learning to facilitate bot detection and mitigation, and that works even when an attacker changes an attack script. The approach herein provides for a system that rapidly and automatically (without human intervention) retrains on new, updated or modified attack vectors.

IPC Classes  ?

18.

Synchronizing independent media and data streams using media stream synchronization points

      
Application Number 18413448
Status Pending
Filing Date 2024-01-16
First Publication Date 2024-05-09
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Archer, Michael M.
  • Archer, Michael

Abstract

A messaging channel is embedded directly into a media stream. Messages delivered via the embedded messaging channel are extracted at a client media player. In lieu of embedding the message data in the media stream, a coordination index is injected, and the message data is sent separately and merged into the media stream downstream (at the media player) based on the index. In one example embodiment, multiple data streams (each potentially with different content intended for a particular “type” or class of user) are transmitted alongside the video stream in which the coordination index has been injected into a video frame. Based on a user's service level, a particular one of the multiple data streams is released when the sequence number appears in the video frame, and the data in that stream is associated with the media.

IPC Classes  ?

  • H04L 65/75 - Media network packet handling
  • H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast
  • H04L 65/80 - Responding to QoS

19.

Systems and Methods For Content Delivery Acceleration of Virtual Reality and Augmented Reality Web Pages

      
Application Number 18502306
Status Pending
Filing Date 2023-11-06
First Publication Date 2024-04-25
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Goel, Utkarsh
  • Flack, Martin T.
  • Ludin, Stephen L.

Abstract

Among other things, this document describes systems, devices, and methods for improving the delivery and performance of web pages authored to produce virtual reality (VR) or augmented reality (AR) experiences. In some embodiments, such web pages are analyzed. This analysis may be initiated at the request of a content server that receives a client request for the HTML. The analysis may involve, asynchronous to the client request, loading the the page into a non-user-facing browser environment and allowing the VR or AR scene to execute, even including executing animation routines for a predetermined period of time. Certain characteristics of the scene and of objects are thereby captured. Based on this information, an object list ordered by loading priority is prepared. Consulting this information in response to subsequent requests for the page, a content server can implement server push, early hints and/or other delivery enhancements.

IPC Classes  ?

  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • F16D 25/10 - Clutch systems with a plurality of fluid-actuated clutches
  • F16D 48/02 - Control by fluid pressure
  • F16H 61/00 - Control functions within change-speed- or reversing-gearings for conveying rotary motion
  • F16H 61/02 - Control functions within change-speed- or reversing-gearings for conveying rotary motion characterised by the signals used
  • F16K 17/04 - Safety valves; Equalising valves closing on insufficient pressure on one side spring-loaded
  • F16K 17/06 - Safety valves; Equalising valves closing on insufficient pressure on one side spring-loaded with special arrangements for adjusting the opening pressure
  • G06F 40/143 - Markup, e.g. Standard Generalized Markup Language [SGML] or Document Type Definition [DTD]
  • G06T 13/80 - 2D animation, e.g. using sprites
  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • G06V 30/413 - Classification of content, e.g. text, photographs or tables
  • H04L 7/10 - Arrangements for initial synchronisation
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 67/55 - Push-based network services
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching

20.

Key rotation for sensitive data tokenization

      
Application Number 18490843
Grant Number 12088710
Status In Force
Filing Date 2023-10-20
First Publication Date 2024-04-11
Grant Date 2024-09-10
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Neystadt, Eugene (john)
  • Herzog, Jonathan
  • Dror, Ittay
  • Ben-Zvi, Elisha

Abstract

This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W]. In some embodiments, a data layer of such a data store can encrypt arriving original data values twice. The original data value is first encrypted with a first key, producing a first token. The original data value is encrypted with a second key, producing a second token. Each encrypted token can be stored separately in the data store. A field may be associated with two database columns, one holding the value encrypted with the first key and the second holding the value encrypted with the second key. Keys are rotated after time [K], which is at least equal to and preferably longer than [W]. Rotation can involve discarding the older key and generating a new key so that two keys are still used.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

21.

Client Entity Validation with Session Tokens Derived From Underlying Communication Service Values

      
Application Number 17938386
Status Pending
Filing Date 2022-10-06
First Publication Date 2024-04-11
Owner Akamai Technologies, Inc. (USA)
Inventor Elbaz, Eric

Abstract

The generation and use of session tokens in a computer networking environment is disclosed. Such session tokens can be used in a variety of ways, such as to validate client identity and entitlement to resources, for security assessment, or in other trust establishment mechanisms. Preferably, the session token generation algorithm incorporates one or more non-ephemeral value(s) that are established for a given communication session between two hosts. To validate a token presented by a client, for example, a server can check it against the session values actually in use to communicate with the client.

IPC Classes  ?

22.

Warm migrations for virtual machines in a cloud computing environment

      
Application Number 17895687
Status Pending
Filing Date 2022-08-25
First Publication Date 2024-02-29
Owner Akamai Technologies, Inc. (USA)
Inventor Massry, Abraham

Abstract

A method of “warm” migrating a virtual machine (VM) on a source host to a target virtual machine on a destination host. The method begins by mirroring contents of disk onto a target disk associated with the target VM. Transfer of the RAM contents is then initiated. Unlike live migration strategies where data transfer occurs at a high rate, the RAM contents are transferred at a low transfer rate. While the contents of the RAM are being transferred, a shutdown of the virtual machine is initiated. This operation flushes to disk all of the remaining RAM contents. Before the shutdown completes, those remaining contents, now on disk, are mirrored to the target disk. Once that mirroring is finished, the shutdown of the virtual machine is completed, and this shutdown is mirrored at the destination host. To complete the warm migration, the target virtual machine is then booted from the target disk.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

23.

WARM MIGRATIONS FOR VIRTUAL MACHINES IN A CLOUD COMPUTING ENVIRONMENT

      
Application Number US2023031111
Publication Number 2024/044341
Status In Force
Filing Date 2023-08-25
Publication Date 2024-02-29
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor Massry, Abraham

Abstract

A method of "warm" migrating a virtual machine (VM) on a source host to a target virtual machine on a destination host. The method begins by mirroring contents of disk onto a target disk associated with the target VM. Transfer of the RAM contents is then initiated. Unlike live migration strategies where data transfer occurs at a high rate, the RAM contents are transferred at a low transfer rate. While the contents of the RAM are being transferred, a shutdown of the virtual machine is initiated. This operation flushes to disk all of the remaining RAM contents. Before the shutdown completes, those remaining contents, now on disk, are mirrored to the target disk. Once that mirroring is finished, the shutdown of the virtual machine is completed, and this shutdown is mirrored at the destination host. To complete the warm migration, the target virtual machine is then booted from the target disk.

IPC Classes  ?

  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/4401 - Bootstrapping
  • G06F 11/20 - Error detection or correction of the data by redundancy in hardware using active fault-masking, e.g. by switching out faulty elements or by switching in spare elements

24.

Efficient congestion control in a tunneled network

      
Application Number 18385776
Status Pending
Filing Date 2023-10-31
First Publication Date 2024-02-22
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Sears, William R.
  • Lohner, Martin K.

Abstract

A method of congestion control implemented by a sender over a network link that includes a router having a queue. During a first state, information is received from a receiver. The information comprises an estimated maximum bandwidth for the link, a one-way transit time for traffic over the link, and an indication whether the network link is congested. In response to the link being congested, the sender transitions to a second state. While in the second state, a sending rate of packets in reduced, in part to attempt to drain the queue of data packets contributed by the sender. The sender transitions to a third state when the sender estimates that the queue has been drained of the data packets contributed. During the third state, the sending rate is increased until either the sender transitions back to the first state, or receives a new indication that the link is congested.

IPC Classes  ?

  • H04L 47/24 - Traffic characterised by specific attributes, e.g. priority or QoS
  • H04L 47/125 - Avoiding congestion; Recovering from congestion by balancing the load, e.g. traffic engineering

25.

Bot detection in an edge network using Transport Layer Security (TLS) fingerprint

      
Application Number 18383351
Status Pending
Filing Date 2023-10-24
First Publication Date 2024-02-15
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Senecal, David
  • Kahn, Andrew
  • Segal, Ory
  • Shuster, Elad
  • Nguyen, Duc

Abstract

This disclosure describes a technique to fingerprint TLS connection information to facilitate bot detection. The notion is referred to herein as “TLS fingerprinting.” Preferably, TLS fingerprinting herein comprises combining different parameters from the initial “Hello” packet send by the client. In one embodiment, the different parameters from the Hello packet that are to create the fingerprint (the “TLS signature”) are: record layer version, client version, ordered TLS extensions, ordered cipher list, ordered elliptic curve list, and ordered signature algorithms list. Preferably, the edge server persists the TLS signature for the duration of a session.

IPC Classes  ?

26.

Detection and Optimization of Content in The Payloads of API Messages

      
Application Number 18365834
Status Pending
Filing Date 2023-08-04
First Publication Date 2024-02-15
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Goel, Utkarsh
  • Flack, Martin T.

Abstract

A server in a content delivery network (CDN) can examine API traffic and extract therefrom content that can be optimized before it is served to a client. The server can apply content location instructions to a given API message to find such content therein. Upon finding an instance of such content, the server can verify the identity of the content by applying a set of content verification instructions. If verification succeeds, the server can retrieve an optimized version of the identified content and swap it into the API message for the original version. If an optimized version is not available, the server can initiate an optimization process so that next time the optimized version will be available. In some embodiments, an analysis service can assist by observing traffic from an API endpoint over time, detecting the format of API messages and producing the content location and verification instructions.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks

27.

Real-time detection of online new-account creation fraud using graph-based neural network modeling

      
Application Number 17862460
Status Pending
Filing Date 2022-07-12
First Publication Date 2024-01-18
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Costa, Nadav George
  • Eli, Ziv

Abstract

A method executes upon receiving data (email, IP address) associated with an account registration. In response, an encoding is applied to the data to generate a node vector. The node vector indexes a database of such node vectors that the system maintains (from prior registrations). The database potentially includes one or more node vector(s) that may have a given similarity to the encoded node vector. To determine whether there are such vectors present, a set of k-nearest neighbors to the encoded node vector are then obtained from the database. This set of k-nearest neighbors together with the encoded node vector comprise a virtual graph that is then fed as a graph input to a Graph Neural Network previously trained on a set of training data. The GNN generates a probability that the virtual graph represents a NAF. If the probability exceeds a configurable threshold, the system outputs an indication that the registration is potentially fraudulent, and a mitigation action is taken.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence

28.

REAL-TIME DETECTION OF ONLINE NEW-ACCOUNT CREATION FRAUD USING GRAPH-BASED NEURAL NETWORK MODELING

      
Application Number US2023027465
Publication Number 2024/015423
Status In Force
Filing Date 2023-07-12
Publication Date 2024-01-18
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor
  • Costa, Nadav, George
  • Eli, Ziv

Abstract

A method executes upon receiving data (email, IP address) associated with an account registration. In response, an encoding is applied to the data to generate a node vector. The node vector indexes a database of such node vectors that the system maintains (from prior registrations). The database potentially includes one or more node vector(s) that may have a given similarity to the encoded node vector. To determine whether there are such vectors present, a set of k-nearest neighbors to the encoded node vector are then obtained from the database. This set of k-nearest neighbors together with the encoded node vector comprise a virtual graph that is then fed as a graph input to a Graph Neural Network previously trained on a set of training data. The GNN generates a probability that the virtual graph represents a NAF. If the probability exceeds a configurable threshold, the system outputs an indication that the registration is potentially fraudulent, and a mitigation action is taken.

IPC Classes  ?

29.

Patternless obfuscation of data with low-cost data recovery

      
Application Number 17644018
Grant Number 11848919
Status In Force
Filing Date 2021-12-13
First Publication Date 2023-12-19
Grant Date 2023-12-19
Owner Akamai Technologies, Inc. (USA)
Inventor Poghosyan, Kristine

Abstract

Systems and methods for obfuscating data. The technology herein can be used to produce an obfuscated output that exhibits no easily discernible pattern, making difficult to identify or to filter using regular expressions, signature matching or other pattern matching. The output nevertheless can be reversed and the original data recovered by an intended recipient with a relatively low-cost of processing, making it suitable for low-powered devices. The obfuscation is stateless and does not require encryption.

IPC Classes  ?

30.

Learning-based storage reduction in an overlay network

      
Application Number 18214899
Grant Number 12038884
Status In Force
Filing Date 2023-06-27
First Publication Date 2023-10-26
Grant Date 2024-07-16
Owner Akamai Technologies, Inc. (USA)
Inventor Banerjee, Indrajit

Abstract

An overlay network is augmented to provide more efficient data storage by processing a dataset of high dimension into an equivalent dataset of lower dimension, wherein the data reduction reduces the amount of actual physical data but not necessarily its informational value. Data to be processed (dimensionally-reduced) is received by an ingestion layer and supplied to a learning-based storage reduction application that implements the data reduction technique. The application applies a data reduction algorithm and stores the resulting dimensionally-reduced data sets in the native data storage or third party cloud. To recover the original higher-dimensional data, an associated reverse algorithm is implemented. In general, the application coverts an N dimensional data set to a K dimensional data set, where K<

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/14 - File systems; File servers - Details of searching files based on file metadata
  • G06F 16/182 - Distributed file systems
  • G06F 17/16 - Matrix or vector computation
  • G06N 20/00 - Machine learning

31.

REAL-TIME DETECTION AND PREVENTION OF ONLINE NEW-ACCOUNT CREATION FRAUD AND ABUSE

      
Application Number US2023019115
Publication Number 2023/205247
Status In Force
Filing Date 2023-04-19
Publication Date 2023-10-26
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor Costa, Nadav, George

Abstract

A method, apparatus and computer program product for real-time new account fraud detection and prevention. The technique leverages machine learning. In this approach, first and second computational branches of a machine learning model are trained jointly on a corpus of emails. Following training, an arbitrary email is received. The arbitrary email is then applied through the computational branches of the machine learning model. The first branch has an attention layer, and the second branch has a convolutional layer. The outputs of the branches are aggregated into an output that is then applied through another self-attention layer to generate a score. Based on the score, the arbitrary email is characterized. If the email is characterized as fraudulent, a mitigation action is taken.

IPC Classes  ?

32.

Real-time detection and prevention of online new-account creation fraud and abuse

      
Application Number 17723518
Status Pending
Filing Date 2022-04-19
First Publication Date 2023-10-19
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Costa, Nadav George
  • Eli, Ziv

Abstract

A method, apparatus and computer program product for real-time new account fraud detection and prevention. The technique leverages machine learning. In this approach, first and second computational branches of a machine learning model are trained jointly on a corpus of emails. Following training, an arbitrary email is received. The arbitrary email is then applied through the computational branches of the machine learning model. The first branch has an attention layer, and the second branch has a convolutional layer. The outputs of the branches are aggregated into an output that is then applied through another self-attention layer to generate a score. Based on the score, the arbitrary email is characterized. If the email is characterized as fraudulent, a mitigation action is taken.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 51/212 - Monitoring or handling of messages using filtering or selective blocking
  • H04L 51/08 - Annexed information, e.g. attachments
  • G06N 3/04 - Architecture, e.g. interconnection topology

33.

Connecting to a fixed network using an extensible drone-based, dynamic network

      
Application Number 18211719
Status Pending
Filing Date 2023-06-20
First Publication Date 2023-10-19
Owner Akamai Technologies, Inc. (USA)
Inventor Kanitkar, Vinay

Abstract

A method for dynamic and extensible creation of an extensible wireless network, using a set of drones that individually support server processes. The drones interact with one another, exchanging information, type of coverage, type and amount of throughput, location, etc. A control node connects to a wired network. The node operates a leader election protocol, captures state information from the drones, and positions/re-positions the drones as necessary. Drones are flown in to position and then engaged as necessary to stretch/adapt the coverage as necessary. The drone's power utilization is monitored and its coverage area modified as necessary to optimize power utilization. The control node performs drone-based coverage/power utilization computations, and attempts to apply the appropriate location assignments to provide maximum network coverage (extensibility) while also preserving drone-specific power (battery) utilization. The approach herein can be used to supplement existing networks during events, migrations of populations during work hours, etc.

IPC Classes  ?

  • H04W 84/18 - Self-organising networks, e.g. ad hoc networks or sensor networks
  • H04W 40/12 - Communication route or path selection, e.g. power-based or shortest path routing based on transmission quality or channel quality
  • H04W 16/18 - Network planning tools
  • B64C 39/02 - Aircraft not otherwise provided for characterised by special use
  • H04L 43/0888 - Throughput

34.

Systems and methods for electronic identification of objects with privacy controls

      
Application Number 17659189
Grant Number 12166900
Status In Force
Filing Date 2022-04-14
First Publication Date 2023-10-19
Grant Date 2024-12-10
Owner Akamai Technologies, Inc. (USA)
Inventor Ingerman, Mark M.

Abstract

A physical object having a programmable, electronically readable tag can be identified and tracked in a given third party system with the aid of an identity services platform. When the owner of the object is about to place it in the custody of a third party system, the owner can use a client device to instruct the identity services platform to generate a nonce, for programming into the object's tag. Devices in the third party system read and use the nonce to identify and track the object and to make decisions about how it is handled. When the object exits from the control of the third party system for return to the owner, the identity services platform is asked to provide a proof of ownership to the third party system, which enables accurate return of the object to its proper owner.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06K 19/06 - Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
  • G06K 19/077 - Constructional details, e.g. mounting of circuits in the carrier
  • H04L 12/10 - Current supply arrangements

35.

Systems and methods for content delivery acceleration of virtual reality and augmented reality web pages

      
Application Number 18157882
Grant Number 11811853
Status In Force
Filing Date 2023-01-23
First Publication Date 2023-09-21
Grant Date 2023-11-07
Owner Akamal Technologies, Inc. (USA)
Inventor
  • Goel, Utkarsh
  • Flack, Martin T.
  • Ludin, Stephen L.

Abstract

Among other things, this document describes systems, devices, and methods for improving the delivery and performance of web pages authored to produce virtual reality (VR) or augmented reality (AR) experiences. In some embodiments, such web pages are analyzed. This analysis may be initiated at the request of a content server that receives a client request for the HTML. The analysis may involve, asynchronous to the client request, loading the page into a non-user-facing browser environment and allowing the VR or AR scene to execute, even including executing animation routines for a predetermined period of time. Certain characteristics of the scene and of objects are thereby captured. Based on this information, an object list ordered by loading priority is prepared. Consulting this information in response to subsequent requests for the page, a content server can implement server push, early hints and/or other delivery enhancements.

IPC Classes  ?

  • G06T 19/00 - Manipulating 3D models or images for computer graphics
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • G06T 13/80 - 2D animation, e.g. using sprites
  • H04L 7/10 - Arrangements for initial synchronisation
  • G06F 40/143 - Markup, e.g. Standard Generalized Markup Language [SGML] or Document Type Definition [DTD]
  • G06V 30/413 - Classification of content, e.g. text, photographs or tables
  • H04L 67/55 - Push-based network services
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching

36.

Caching content securely within an edge environment

      
Application Number 18200983
Status Pending
Filing Date 2023-05-23
First Publication Date 2023-09-21
Owner Akamai Technologies, Inc. (USA)
Inventor Chen, Tong

Abstract

A technique to cache content securely within edge network environments, even within portions of that network that might be considered less secure than what a customer desires, while still providing the acceleration and off-loading benefits of the edge network. The approach ensures that customer confidential data (whether content, keys, etc.) are not exposed either in transit or at rest. In this approach, only encrypted copies of the customer's content objects are maintained within the portion of the edge network, but without any need to manage the encryption keys. To take full advantage of the secure content caching technique, preferably the encrypted content (or portions thereof) are pre-positioned within the edge network portion to improve performance of secure content delivery from the environment.

IPC Classes  ?

  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/01 - Protocols
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching

37.

Content delivery to physically-proximate devices using a mesh-assisted cache

      
Application Number 18139239
Grant Number 11962646
Status In Force
Filing Date 2023-04-25
First Publication Date 2023-08-17
Grant Date 2024-04-16
Owner Akamai Technologies, Inc. (USA)
Inventor Law, William R.

Abstract

A plurality of WiFi-enabled devices that are physically proximate to one another form an ad hoc mesh network, which is associated with an overlay network, such as a content delivery network. A typical WiFi device is a WiFi router that comprises addressable data storage, together with control software operative to configure the device seamlessly into the WiFi mesh network formed by the device and one or more physically-proximate devices. The addressable data storage across multiple such devices comprises a distributed or “mesh-assisted” cache that is managed by the overly network. The WiFi mesh network thus provides bandwidth that is leveraged by the overlay network to provide distribution of content, e.g., content that has been off-loaded for delivery (by content providers) to the CDN. Other devices that may be leveraged include set-top boxes and IPTV devices.

IPC Classes  ?

  • H04L 67/104 - Peer-to-peer [P2P] networks
  • H04L 12/28 - Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
  • H04L 67/1061 - Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
  • H04L 67/1087 - Peer-to-peer [P2P] networks using cross-functional networking aspects
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04W 4/70 - Services for machine-to-machine communication [M2M] or machine type communication [MTC]

38.

High performance distributed system of record with cryptographic service support

      
Application Number 18121470
Status Pending
Filing Date 2023-03-14
First Publication Date 2023-07-27
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Carver, David C.
  • Champagne, Andrew F.
  • Mallikarjuna, Ramanath
  • Houman, Thomas

Abstract

A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation, conversion or transfer of information or value) are processed concurrently in a scalable, reliable, secure and efficient manner. In one embodiment, the computing network fabric or “core” is configured to support a distributed blockchain network that organizes data in a manner that allows communication, processing and storage of blocks of the chain to be performed concurrently, with little synchronization, at very high performance and low latency, even when the transactions themselves originate from distant sources. This data organization relies on segmenting a transaction space within autonomous but cooperating computing nodes that are configured as a processing mesh. Each computing node typically is functionally-equivalent to all other nodes in the core. The nodes operate on blocks independently from one another while still maintaining a consistent and logically-complete view of the blockchain as a whole. According to another feature, secure transaction processing is facilitated by storing cryptographic key materials in secure and trusted computing environments associated with the computing nodes to facilitate construction of trust chains for transaction requests and their associated responses.

IPC Classes  ?

  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/12 - Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

39.

Uniquely identifying and securely communicating with an appliance in an uncontrolled network

      
Application Number 18112373
Status Pending
Filing Date 2023-02-21
First Publication Date 2023-06-29
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Gill, Rupinder Singh
  • Mettu, Shravan Kumar
  • Ayyadevara, Seetharama Sarma

Abstract

A service consumer that utilizes a cloud-based access service provided by a service provider has associated therewith a network that is not capable of being controlled by the service provider. An enterprise connector is supported in this uncontrolled network, preferably as an appliance-based solution. According to this disclosure, the enterprise configures an appliance and then deploys it in the uncontrolled network. To this end, an appliance is required to proceed through a multi-stage approval protocol before it is accepted as a “connector” and is thus enabled for secure communication with the service provider. The multiple stages include a “first contact” (back to the service) stage, an undergoing approval stage, a re-generating identity material stage, and a final approved and configured stage. Unless the appliance passes through these stages, the appliance is not permitted to interact with the service as a connector. As an additional aspect, the service provides various protections for addressing scenarios wherein entities masquerade as approved appliances.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 9/14 - Arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy

40.

Systems and methods for preventing the caching of rarely requested objects

      
Application Number 17930935
Grant Number 11758015
Status In Force
Filing Date 2022-09-09
First Publication Date 2023-06-22
Grant Date 2023-09-12
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Sotnikov, Dmitry
  • Mancuso, Brian
  • Kedem, Shai
  • Guttman, Omri
  • Hakimi, Michael

Abstract

Improved technology for managing the caching of objects that are rarely requested by clients. A cache system can be configured to assess a class of objects (such as objects associated with a particular domain) for cacheability, based on traffic observations. If the maximum possible cache offloading for the class of objects falls below a threshold level, which indicates a high proportion of non-cacheable or “single-hitter” content, then cache admission logic is configured to admit objects only after multiple clients requests during a time period (usually the object's time in cache, or eviction age). Otherwise, the cache admission logic may operate to admit objects to the cache after the first client request, assuming the object meets cacheability criteria. The technological improvements disclosed herein can be used to improve cache utilization, for example by preventing single-hitter objects from pushing out multi-hit objects (the objects that get hits after being added to cache).

IPC Classes  ?

  • H04L 67/5682 - Policies or rules for updating, deleting or replacing the stored data
  • H04L 61/58 - Caching of addresses or names
  • H04L 67/5681 - Pre-fetching or pre-delivering data based on network characteristics

41.

Detecting device masquerading in application programming interface (API) transactions

      
Application Number 18112100
Grant Number 11997134
Status In Force
Filing Date 2023-02-21
First Publication Date 2023-06-22
Grant Date 2024-05-28
Owner Akamai Technologies, Inc. (USA)
Inventor Kurupati, Sreenath

Abstract

This disclosure describes a technique to determine whether a client computing device accessing an API is masquerading its device type (i.e., pretending to be a device that it is not). To this end, and according to this disclosure, the client performs certain processing requested by the server to reveal its actual processing capabilities and thereby its true device type, whereupon—once the server learns the true nature of the client device—it can take appropriate actions to mitigate or prevent further damage. To this end, during the API transaction the server returns information to the client device that causes the client device to perform certain computations or actions. The resulting activity is captured on the client computing and then transmitted back to the server, which then analyzes the data to inform its decision about the true client device type. Thus, when the server detects the true client device type (as opposed to the device type that the device is masquerading to be), it can take appropriate action to defend the site.

IPC Classes  ?

42.

Unified, browser-based enterprise collaboration platform

      
Application Number 18106905
Grant Number 11956317
Status In Force
Filing Date 2023-02-07
First Publication Date 2023-06-15
Grant Date 2024-04-09
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Gero, Charles E.
  • Houman, Thomas
  • Mehta, Abhijit C.
  • Burd, Greg
  • Shtokman, Vladimir

Abstract

A system for enterprise collaboration is associated with an overlay network, such as a content delivery network (CDN). The overlay network comprises machines capable of ingress, forwarding and broadcasting traffic, together with a mapping infrastructure. The system comprises a front-end application, a back-end application, and set of one or more APIs through which the front-end application interacts with the back-end application. The front-end application is a web or mobile application component that provides one or more collaboration functions. The back-end application comprises a signaling component that maintains state information about each participant in a collaboration, a connectivity component that manages connections routed through the overlay network, and a multiplexing component that manages a multi-peer collaboration session to enable an end user peer to access other peers' media streams through the overlay network rather than directly from another peer. Peers preferably communicate with the platform using WebRTC. A collaboration manager component enables users to configure, manage and control their collaboration sessions.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 65/10 - Architectures or entities
  • H04L 65/1093 - In-session procedures by removing participants
  • H04L 65/40 - Support for services or applications
  • H04L 65/401 - Support for services or applications wherein the services involve a main real-time session and one or more additional parallel real-time or time sensitive sessions, e.g. white board sharing or spawning of a subconference
  • H04L 65/403 - Arrangements for multi-party communication, e.g. for conferences
  • H04L 67/104 - Peer-to-peer [P2P] networks
  • H04L 67/1042 - Peer-to-peer [P2P] networks using topology management mechanisms
  • H04L 67/14 - Session management
  • H04N 21/00 - Selective content distribution, e.g. interactive television or video on demand [VOD]

43.

High performance distributed system of record with ledger configuration system

      
Application Number 17549941
Status Pending
Filing Date 2021-12-14
First Publication Date 2023-06-15
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Carver, David C.
  • Erb, Samuel

Abstract

A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions are processed concurrently in a scalable, reliable, secure and efficient manner. In one embodiment, the computing network core is configured to support a distributed blockchain network that organizes data in a manner that allows communication, processing and storage of blocks of the chain to be performed concurrently at very high performance and low latency, even when the transactions themselves originate from distant sources. This data organization relies on segmenting a transaction space within autonomous but cooperating computing nodes that are configured as a processing mesh. The system also provides for confidence-based consensus. A configuration system is provided to enable configuration updates to be securely implemented across various subsets of the computing nodes.

IPC Classes  ?

  • G06F 16/23 - Updating
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system

44.

Edge network-based account protection service

      
Application Number 18103566
Grant Number 12088623
Status In Force
Filing Date 2023-01-31
First Publication Date 2023-06-01
Grant Date 2024-09-10
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Summers, John
  • Polansky, Robert
  • Nicholson, Darryl
  • Markwell, Scott

Abstract

An account protection service to prevent user login or other protected endpoint request abuse. In one embodiment, the service collects user recognition data, preferably for each login attempt (e.g. data about the connection, session, and other relevant context), and it constructs a true user profile for each such user over time, preferably using the recognition data from successful logins. The profile evolves as additional recognition data is collected from successful logins. The profile is a model of what the user “looks like” to the system. For a subsequent login attempt, the system then calculates a true user score. This score represents how well the current user recognition data matches the model represented by the true user profile. The user recognition service is used to drive policy decisions and enforcement capabilities. Preferably, user recognition works in association with bot detection in a combined solution.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 9/40 - Network security protocols
  • H04L 67/306 - User profiles

45.

BROWSER EXTENSIONLESS PHISH-PROOF MULTI-FACTOR AUTHENTICATION (MFA)

      
Application Number US2022050179
Publication Number 2023/091532
Status In Force
Filing Date 2022-11-17
Publication Date 2023-05-25
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor Gero, Charles, E.

Abstract

A multi-factor authentication scheme uses an MFA authentication service and a browser extensionless phish-proof method to facilitate an MFA workflow. Phish- proof MFA verifies that the browser the user is in front of is actually visiting the authentic (real) site and not a phished site. This achieved by only allowing MFA to be initiated from a user trusted browser by verifying its authenticity through a signing operation using a key only it possesses, and then also verifying that the verified browser is visiting the authentic site. In a preferred embodiment, this latter check is carried out using an iframe postMessage owning domain check. In a variant embodiment, the browser is verified to be visiting the authentic site through an origin header check. By using the iframe-based or ORIGIN header-based check, the solution does not require a physical security key (such as a USB authenticator) or any browser extension or plug-in.

IPC Classes  ?

46.

Secure request authentication for a threat protection service

      
Application Number 18095024
Status Pending
Filing Date 2023-01-10
First Publication Date 2023-05-25
Owner Akamai Technologies, Inc. (USA)
Inventor Williams, Brandon O.

Abstract

A client application sends DNS requests to a threat protection service when a mobile device operating the client application is operating off-network. The application is configured to detect network conditions and automatically configure an appropriate system-wide DNS resolution setting. Preferably, DNS requests from the client identify the customer and the device to threat protection (TP) service resolvers without introducing a publicly-visible customer or device identifier to the DNS requests or responses. The TP system then applies the correct policy to DNS requests coming from off-network clients. In particular, the resolver recognizes the customer for requests coming for off net clients and apply the customer’s policy to such request. The resolver is configured to log the customer and the device associated with requests from the TP off-net client. Request logs from the TP resolver are provided to a cloud security intelligence platform for threat intelligence analytics and customer visible reporting.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04W 12/37 - Managing security policies for mobile devices or for controlling mobile applications
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

47.

Internet caches with object hints

      
Application Number 17454910
Grant Number 11748263
Status In Force
Filing Date 2021-11-15
First Publication Date 2023-05-18
Grant Date 2023-09-05
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Sotnikov, Dmitry
  • Emelyanov, Denis
  • Tuberg, Dvir
  • Shoshany, Arnon
  • Hakimi, Michael
  • Zigdon, Kfir

Abstract

Improvements to internet cache protocols are disclosed. In certain embodiments, a client-facing proxy server can query peer servers to determine whether they have a copy of an object that the proxy server needs. The peer servers can respond based on object information that the peer servers stored about objects they have in cache, where the peers recorded such object information previously when ingesting the objects into their cache and stored it separately from the objects for fast access (e.g. in RAM vs. on disk). This information can be expressed in a compact way using just a few object flags, and enables the peer server to quickly respond and with detail about the status of objects they hold. The proxy server can make an intelligent decision about which peer to use, and indeed whether to use a peer at all.

IPC Classes  ?

  • G06F 12/00 - Accessing, addressing or allocating within memory systems or architectures
  • G06F 12/0802 - Addressing of a memory level in which the access to the desired data or data block requires associative addressing means, e.g. caches

48.

Browser extensionless phish-proof multi-factor authentication (MFA)

      
Application Number 17528504
Grant Number 11962580
Status In Force
Filing Date 2021-11-17
First Publication Date 2023-05-18
Grant Date 2024-04-16
Owner Akamai Technologies, Inc. (USA)
Inventor Gero, Charles E.

Abstract

A multi-factor authentication scheme uses an MFA authentication service and a browser extensionless phish-proof method to facilitate an MFA workflow. Phish-proof MFA verifies that the browser the user is in front of is actually visiting the authentic (real) site and not a phished site. This achieved by only allowing MFA to be initiated from a user trusted browser by verifying its authenticity through a signing operation using a key only it possesses, and then also verifying that the verified browser is visiting the authentic site. In a preferred embodiment, this latter check is carried out using an iframe postMessage owning domain check. In a variant embodiment, the browser is verified to be visiting the authentic site through an origin header check. By using the iframe-based or ORIGIN header-based check, the solution does not require a physical security key (such as a USB authenticator) or any browser extension or plug-in.

IPC Classes  ?

49.

High performance distributed system of record with extended transaction processing capability

      
Application Number 18092600
Grant Number 11954095
Status In Force
Filing Date 2023-01-03
First Publication Date 2023-05-11
Grant Date 2024-04-09
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Sears, William R.
  • Al Shenibr, Leen K.
  • Carver, David C.

Abstract

A set of transaction handling computing elements comprise a network core that receive and process transaction requests into an append-only immutable chain of data blocks, wherein a data block is a collection of transactions, and wherein an Unspent Transaction Output (UTXO) data structure supporting the immutable chain of data blocks is an output from a finalized transaction. Typically, the UTXO data structure consists essentially of an address and a value. In this approach, at least one UTXO data structure is configured to include information either in addition to or in lieu of the address and value, thereby defining a Transaction Output (TXO). A TXO may have a variety of types, and one type includes an attribute that encodes data. In response to receipt of a request to process a transaction, the set of transaction handling computing elements are executed to process the transaction into a block using at least the information in the TXO.

IPC Classes  ?

  • G06F 16/23 - Updating
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • G06Q 20/20 - Point-of-sale [POS] network systems
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

50.

Traffic forwarding and disambiguation by using local proxies and addresses

      
Application Number 18092543
Status Pending
Filing Date 2023-01-03
First Publication Date 2023-05-04
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Ayyadevara, Seetharama Sarma
  • Gero, Charles E.
  • Benny, Stephan
  • Tatti, Pravin
  • Kumar, Manoj
  • Choudhary, Seemant
  • Quiros, Robert Lauro
  • Adigopula, Priyatham Phani Srinath
  • Venkatesha, Sr., Poornima
  • Gupta, Sumeet

Abstract

A method of traffic forwarding and disambiguation through the use of local proxies and addresses. The technique leverages DNS to on-ramp traffic to a local proxy. The local proxy runs on the end user's device. According to a first embodiment, DNS is used to remap what would normally be a wide range of IP addresses to localhost based on 127.0.0.0/8 listening sockets, where the system can then listen for connections and data. In a second embodiment, a localhost proxy based on a TUN/TAP interface (or other packet interception method) with a user-defined CIDR range to which the local DNS server drives traffic is used. Requests on that local proxy are annotated (by adding data to the upstream connection).

IPC Classes  ?

  • H04L 67/56 - Provisioning of proxy services
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

51.

Service platform with configurable electricity usage characteristics

      
Application Number 17451620
Grant Number 12159170
Status In Force
Filing Date 2021-10-20
First Publication Date 2023-04-20
Grant Date 2024-12-03
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Flack, Martin T.
  • Bishop, Michael
  • Ludin, Stephen

Abstract

A multi-tenant service platform provides network services, such as content delivery, edge compute, and/or media streaming, on behalf of, or directly for, a given tenant. The service platform offers a policy layer enabling each tenant to specify levels of acceptable performance degradation that the platform may incur so that the platform can use electricity with desirable characteristics to service client requests associated with that tenant. Service nodes in the platform (e.g., edge servers) enforce the policy layer at the time of a service request. Preferably, the ‘quality’ of the electricity is a measurement of source of the energy, e.g., whether it is sourced from high-carbon fossil fuels (low-quality) or low-carbon renewables (high-quality). If the desired quality of electricity cannot be achieved, the node can resort to using less electricity to handle the request, which is achieved in a variety of ways.

IPC Classes  ?

  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt
  • G06F 1/18 - Packaging or power distribution
  • G06F 1/3206 - Monitoring of events, devices or parameters that trigger a change in power modality
  • G06F 1/3234 - Power saving characterised by the action undertaken
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation

52.

Key rotation for sensitive data tokenization

      
Application Number 17808327
Grant Number 11849036
Status In Force
Filing Date 2022-06-23
First Publication Date 2023-04-06
Grant Date 2023-12-19
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Neystadt, Eugene (john)
  • Herzog, Jonathan
  • Dror, Ittay
  • Ben-Zvi, Elisha

Abstract

This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W]. In some embodiments, a data layer of such a data store can encrypt arriving original data values twice. The original data value is first encrypted with a first key, producing a first token. The original data value is encrypted with a second key, producing a second token. Each encrypted token can be stored separately in the data store. A field may be associated with two database columns, one holding the value encrypted with the first key and the second holding the value encrypted with the second key. Keys are rotated after time [K], which is at least equal to and preferably longer than [W]. Rotation can involve discarding the older key and generating a new key so that two keys are still used.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • G06F 21/62 - Protecting access to data via a platform, e.g. using keys or access control rules

53.

High performance distributed system of record with key management

      
Application Number 18075617
Grant Number 11985223
Status In Force
Filing Date 2022-12-06
First Publication Date 2023-03-30
Grant Date 2024-05-14
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Carver, David C.
  • Erb, Samuel

Abstract

A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions are processed concurrently in a scalable, reliable, secure and efficient manner. In one embodiment, the computing network fabric or “core” is configured to support a distributed blockchain network that organizes data in a manner that allows communication, processing and storage of blocks of the chain to be performed concurrently, with little synchronization, at very high performance and low latency, even when the transactions themselves originate from distant sources. This data organization relies on segmenting a transaction space within autonomous but cooperating computing nodes that are configured as a processing mesh. Secure transaction processing is facilitated by storing cryptographic key materials in secure and trusted computing environments associated with the computing nodes to facilitate construction mining proofs during the validation of a block.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/23 - Updating
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

54.

High performance distributed system of record with extended transaction processing capability

      
Application Number 18075721
Grant Number 12117991
Status In Force
Filing Date 2022-12-06
First Publication Date 2023-03-30
Grant Date 2024-10-15
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Carver, David C.
  • Alshenibr, Leen K.
  • Sears, William R.
  • Shtokman, Vladimir

Abstract

A set of transaction handling computing elements comprise a network core that receive and process transaction requests into an append-only immutable chain of data blocks, wherein a data block is a collection of transactions, and wherein an Unspent Transaction Output (UTXO) data structure supporting the immutable chain of data blocks is an output from a finalized transaction. Typically, the UTXO data structure consists essentially of an address and a value. In this approach, at least one UTXO data structure is configured to include information either in addition to or in lieu of the address and value, thereby defining a Transaction Output (TXO). A TXO may have a variety of types, and one type includes an attribute that encodes data. In response to receipt of a request to process a transaction, the set of transaction handling computing elements are executed to process the transaction into a block using at least the information in the TXO.

IPC Classes  ?

  • G06F 16/00 - Information retrieval; Database structures therefor; File system structures therefor
  • G06F 16/22 - Indexing; Data structures therefor; Storage structures
  • G06F 16/23 - Updating
  • G06F 16/27 - Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
  • G06F 21/64 - Protecting data integrity, e.g. using checksums, certificates or signatures
  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06Q 20/40 - Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check of credit lines or negative lists
  • G06Q 30/0226 - Incentive systems for frequent usage, e.g. frequent flyer miles programs or point systems
  • H04L 9/08 - Key distribution
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • G06Q 20/20 - Point-of-sale [POS] network systems
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols

55.

Real-time message delivery and update service in a proxy server network

      
Application Number 17664331
Grant Number 11792295
Status In Force
Filing Date 2022-05-20
First Publication Date 2023-03-16
Grant Date 2023-10-17
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Stevens, Matthew J.
  • Merideth, Michael G.
  • Alexandrov, Nil
  • Champagne, Andrew F.
  • Coyle, Brendan
  • Glynn, Timothy
  • Roman, Mark A.
  • Xu, Xin

Abstract

This patent document describes technology for providing real-time messaging and entity update services in a distributed proxy server network, such as a CDN. Uses include distributing real-time notifications about updates to data stored in and delivered by the network, with both high efficiency and locality of latency. The technology can be integrated into conventional caching proxy servers providing HTTP services, thereby leveraging their existing footprint in the Internet, their existing overlay network topologies and architectures, and their integration with existing traffic management components.

IPC Classes  ?

  • H04L 65/80 - Responding to QoS
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/01 - Protocols
  • H04L 67/566 - Grouping or aggregating service requests, e.g. for unified processing
  • G06F 12/0813 - Multiuser, multiprocessor or multiprocessing cache systems with a network or matrix configuration
  • G06F 15/167 - Interprocessor communication using a common memory, e.g. mailbox

56.

Embedding MQTT messages in media streams

      
Application Number 17986605
Grant Number 11831700
Status In Force
Filing Date 2022-11-14
First Publication Date 2023-03-09
Grant Date 2023-11-28
Owner Akamai Technologies, Inc. (USA)
Inventor Archer, Michael

Abstract

This disclosure provides embedding a messaging channel directly into a media stream, where messages delivered via the embedded messaging channel are the extracted at a client media player. An advantage of embedding a message is that it can be done in a single ingest point and then passes transparently through a CDN architecture, effectively achieving message replication using the native CDN media delivery infrastructure.

IPC Classes  ?

  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • H04L 65/80 - Responding to QoS
  • H04W 28/02 - Traffic management, e.g. flow control or congestion control
  • H04L 67/141 - Setup of application sessions
  • H04L 65/65 - Network streaming protocols, e.g. real-time transport protocol [RTP] or real-time control protocol [RTCP]
  • H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast

57.

Detection and optimization of content in the payloads of API messages

      
Application Number 17807704
Grant Number 11720427
Status In Force
Filing Date 2022-06-17
First Publication Date 2023-02-16
Grant Date 2023-08-08
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Goel, Utkarsh
  • Flack, Martin T.

Abstract

A server in a content delivery network (CDN) can examine API traffic and extract therefrom content that can be optimized before it is served to a client. The server can apply content location instructions to a given API message to find such content therein. Upon finding an instance of such content, the server can verify the identity of the content by applying a set of content verification instructions. If verification succeeds, the server can retrieve an optimized version of the identified content and swap it into the API message for the original version. If an optimized version is not available, the server can initiate an optimization process so that next time the optimized version will be available. In some embodiments, an analysis service can assist by observing traffic from an API endpoint over time, detecting the format of API messages and producing the content location and verification instructions.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06N 7/01 - Probabilistic graphical models, e.g. probabilistic networks

58.

Intelligently pre-positioning and migrating compute capacity in an overlay network, with compute handoff and data consistency

      
Application Number 17978275
Status Pending
Filing Date 2022-11-01
First Publication Date 2023-02-16
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Kanitkar, Vinay
  • Bird, Robert B.
  • Bohra, Aniruddha
  • Merideth, Michael

Abstract

Edge server compute capacity demand in an overlay network is predicted and used to pre-position compute capacity in advance of application-specific demands. Preferably, machine learning is used to proactively predict anticipated compute capacity needs for an edge server region (e.g., a set of co-located edge servers). In advance, compute capacity (application instances) are made available in-region, and data associated with an application instance is migrated to be close to the instance. The approach facilitates compute-at-the-edge services, which require data (state) to be close to a pre-positioned latency-sensitive application instance. Overlay network mapping (globally) may be used for more long-term positioning, with short-duration scheduling then being done in-region as needed. Compute instances and associated state are migrated intelligently based on predicted (e.g., machine-learned) demand, and with full data consistency enforced.

IPC Classes  ?

  • H04W 36/12 - Reselecting a serving backbone network switching or routing node
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 67/12 - Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

59.

SYNCHRONIZING INDEPENDENT MEDIA AND DATA STREAMS USING MEDIA STREAM SYNCHRONIZATION POINTS

      
Application Number US2022039268
Publication Number 2023/014783
Status In Force
Filing Date 2022-08-03
Publication Date 2023-02-09
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor Ingerman, Mark K.

Abstract

A messaging channel is embedded directly into a media stream. Messages delivered via the embedded messaging channel are extracted at a client media player. According to a variant embodiment, and in lieu of embedding all of the message data in the media stream, only a coordination index is injected, and the message data is sent separately and merged into the media stream downstream (at the client media player) based on the coordination index. In one example embodiment, multiple data streams (each potentially with different content intended for a particular "type" or class of user) are transmitted alongside the video stream in which the coordination index (e.g., a sequence number) has been injected into a video frame. Based on a user's service level, a particular one of the multiple data streams is released when the sequence number appears in the video frame, and the data in that stream is associated with the media.

IPC Classes  ?

  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
  • H04L 67/562 - Brokering proxy services
  • H04L 67/61 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources taking into account QoS or priority requirements
  • H04N 21/242 - Synchronization processes, e.g. processing of PCR [Program Clock References]
  • H04N 21/43 - Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronizing decoder's clock; Client middleware

60.

Traffic delivery using anycast and end user-based mapping in an overlay network

      
Application Number 17972773
Grant Number 11888650
Status In Force
Filing Date 2022-10-25
First Publication Date 2023-02-09
Grant Date 2024-01-30
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Lubashev, Igor
  • Borowsky, Elizabeth L.
  • Hill, Stephen
  • Jenkins, Katharine
  • Banerjee, Debabrata
  • Freedman, Noam
  • Torres, Marcelo

Abstract

An overlay network is enhanced to provide traffic delivery using anycast and end user mapping. An anycast IP address is associated with sets of forwarding machines positioned in the overlay network. These locations correspond with IP addresses for zero rated billing traffic. In response to receipt at a forwarding machine of a packet, the machine issues an end user mapping request to the mapping mechanism. The mapping request has an IP address associated with the client from which the end user request originates. The mapping mechanism resolves the request and provides a response to the request. The response is an IP address associated with a set of server machines distinct from the forwarding machine. The forwarding machine encapsulates the packet and proxies the connection to the identified server. The server receives the connection, decapsulates the request, and processes the packet. The server machine responds to the requesting client directly.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 12/46 - Interconnection of networks
  • H04W 4/02 - Services making use of location information
  • H04L 12/64 - Hybrid switching systems

61.

Server-side prediction of media client steady state

      
Application Number 17959807
Grant Number 12088657
Status In Force
Filing Date 2022-10-04
First Publication Date 2023-01-26
Grant Date 2024-09-10
Owner Akamai Technologies, Inc. (USA)
Inventor Law, William R.

Abstract

A method of delivering a media stream in a network having first and second media servers each capable of delivering segmented media content to a requesting media client. The network provides for HTTP-based delivery of segmented media, and the media client is supported on a client-side device. The method begins by associating the media client with the first media server. As the first server receives from the media client request for media content segments, request times for a given number of the most-recent segments requested are used to generate a prediction, by the first server, of when the media client has transitioned from a start-up or buffering state, to a steady state. In response to a new segment request being received, and upon the first server predicting that the media client has completed a transition to steady state, the new segment request is redirected to the second media server.

IPC Classes  ?

  • G06F 15/16 - Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
  • H04L 65/70 - Media network packetisation
  • H04L 65/75 - Media network packet handling
  • H04L 65/80 - Responding to QoS
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/1023 - Server selection for load balancing based on a hash applied to IP addresses or costs
  • H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload
  • H04L 67/63 - Routing a service request depending on the request content or context

62.

Systems and methods for failure recovery in at-most-once and exactly-once streaming data processing

      
Application Number 17383187
Grant Number 12079087
Status In Force
Filing Date 2021-07-22
First Publication Date 2023-01-26
Grant Date 2024-09-03
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Bohra, Aniruddha
  • Sultan, Florin
  • Bragadin, Umberto Boscolo
  • Lee, James
  • Lifshits, Solomon

Abstract

This patent document describes failure recovery technologies for the processing of streaming data, also referred to as pipelined data. The technologies described herein have particular applicability in distributed computing systems that are required to process streams of data and provide at-most-once and/or exactly-once service levels. In a preferred embodiment, a system comprises many nodes configured in a network topology, such as a hierarchical tree structure. Data is generated at leaf nodes. Intermediate nodes process the streaming data in a pipelined fashion, sending towards the root aggregated or otherwise combined data from the source data streams towards. To reduce overhead and provide locally handled failure recovery, system nodes transfer data using a protocol that controls which node owns the data for purposes of failure recovery as it moves through the network.

IPC Classes  ?

  • G06F 11/14 - Error detection or correction of the data by redundancy in operation, e.g. by using different operation sequences leading to the same result
  • G06F 11/07 - Responding to the occurrence of a fault, e.g. fault tolerance
  • H04L 1/18 - Automatic repetition systems, e.g. Van Duuren systems
  • H04L 1/1867 - Arrangements specially adapted for the transmitter end
  • H04L 69/10 - Streamlined, light-weight or high-speed protocols, e.g. express transfer protocol [XTP] or byte stream
  • H04L 41/0654 - Management of faults, events, alarms or notifications using network fault recovery

63.

Certificate authority (CA) security model in an overlay network supporting a branch appliance

      
Application Number 17888251
Grant Number 11818279
Status In Force
Filing Date 2022-08-15
First Publication Date 2022-12-08
Grant Date 2023-11-14
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Williams, Brandon O.
  • Guedez, Andres

Abstract

A method to generate a trusted certificate on an endpoint appliance located in an untrusted network, wherein client devices are configured to trust a first Certificate Authority (CA) that is administered by the untrusted network. In this approach, an overlay network is configured between the endpoint appliance and an origin server associated with the endpoint appliance. The overlay comprises an edge machine located proximate the endpoint appliance, and an associated key management service. A second CA is configured in association with the key management service to receive a second certificate signed by the first CA. A third CA is configured in association with the edge machine to receive a third certificate signed by the second CA. In response to a request from the appliance, a server certificate signed by the third CA is dynamically generated and provided to the appliance. A client device receiving the server certificate from the endpoint appliance trusts the server certificate as if the server certificate originated from the first CA, thereby enabling the endpoint appliance to terminate a secure information flow received at the endpoint appliance.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/08 - Key distribution
  • H04L 9/40 - Network security protocols

64.

Virtual private network (VPN)-as-a-service with delivery optimizations while maintaining end-to-end data security

      
Application Number 17884068
Status Pending
Filing Date 2022-08-09
First Publication Date 2022-12-01
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Williams, Brandon O.
  • Lohner, Martin K.
  • Harmon, Kevin
  • Bower, Jeffrey

Abstract

A mechanism to facilitate a private network (VPN)-as-a-service, preferably within the context of an overlay IP routing mechanism implemented within an overlay network. A network-as-a-service customer operates endpoints that are desired to be connected to one another securely and privately using the overlay IP (OIP) routing mechanism. The overlay provides delivery of packets end-to-end between overlay network appliances positioned at the endpoints. During such delivery, the appliances are configured such that the data portion of each packet has a distinct encryption context from the encryption context of the TCP/IP portion of the packet. By establishing and maintaining these distinct encryption contexts, the overlay network can decrypt and access the TCP/IP flow. This enables the overlay network provider to apply one or more TCP optimizations. At the same time, the separate encryption contexts ensure the data portion of each packet is never available in the clear at any point during transport.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
  • H04L 12/46 - Interconnection of networks
  • H04L 45/02 - Topology update or discovery
  • H04L 47/193 - Flow control; Congestion control at layers above the network layer at the transport layer, e.g. TCP related

65.

Method and apparatus to detect non-human users on computer systems

      
Application Number 17884317
Grant Number 11895136
Status In Force
Filing Date 2022-08-09
First Publication Date 2022-12-01
Grant Date 2024-02-06
Owner Akamai Technologies, Inc. (USA)
Inventor Kurupati, Sreenath

Abstract

Methods and systems for malicious non-human user detection on computing devices are described. The method includes collecting, by a processing device, raw data corresponding to a user action, converting, by the processing device, the raw data to features, wherein the features represent characteristics of a human user or a malicious code acting as if it were the human user, and comparing, by the processing device, at least one of the features against a corresponding portion of a characteristic model to differentiate the human user from the malicious code acting as if it were the human user.

IPC Classes  ?

66.

Dynamic placement of computing tasks in a distributed computing environment

      
Application Number 17658672
Grant Number 11588885
Status In Force
Filing Date 2022-04-11
First Publication Date 2022-12-01
Grant Date 2023-02-21
Owner Akamai Technologies, Inc. (USA)
Inventor Choi, Byung K.

Abstract

Among other things, this document describes systems, methods and devices for performance testing and dynamic placement of computing tasks in a distributed computing environment. In embodiments, a given client request is forwarded up a hierarchy of nodes, or across tiers in the hierarchy. A particular computing node in the system self-determines to perform a computing task to generate (or help generate) particular content for a response to the client. The computing node injects its identifier into the response indicating that it performed those tasks; the identifier is transmitted to the client with particular content. The client runs code that assesses the performance of the system from the client's perspective, e.g., in servicing the request, and beacons this performance data, along with the aforementioned identifier, to a system intelligence component. The performance information may be used to dynamically place and improve the placement of the computing task(s).

IPC Classes  ?

  • H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload
  • G06F 17/18 - Complex mathematical operations for evaluating statistical data
  • G06F 11/34 - Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation
  • H04L 67/1023 - Server selection for load balancing based on a hash applied to IP addresses or costs
  • G06F 9/50 - Allocation of resources, e.g. of the central processing unit [CPU]
  • G06F 9/48 - Program initiating; Program switching, e.g. by interrupt

67.

Network security system with enhanced traffic analysis based on feedback loop

      
Application Number 17659561
Grant Number 11831609
Status In Force
Filing Date 2022-04-18
First Publication Date 2022-12-01
Grant Date 2023-11-28
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Neystadt, Eugene (“john”)
  • Heiman, Eyal
  • Ben-Zvi, Elisha
  • Nadler, Asaf

Abstract

This document describes among other things, network security systems that incorporate a feedback loop so as to automatically and dynamically adjust the scope of network traffic that is subject to inspection. Risky traffic can be sent for inspection; risky traffic that is demonstrated to have high rate of threats can be outright blocked without further inspection; traffic that is causing errors due to protocol incompatibility or should not be inspected for regulatory or other reasons can be flagged so it bypasses the security inspection system. The system can operate on a domain by domain basis, IP address basis, or otherwise.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 47/263 - Rate modification at the source after receiving feedback
  • G06N 20/00 - Machine learning
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]

68.

Fast, secure, and scalable data store at the edge for connecting network enabled devices

      
Application Number 17323141
Grant Number 11997096
Status In Force
Filing Date 2021-05-18
First Publication Date 2022-11-24
Grant Date 2024-05-28
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Ingerman, Mark M.
  • Bird, Robert B.

Abstract

A distributed computing system provides a distributed data store for network enabled devices at the edge. The distributed database is partitioned such that each node in the system has its own partition and some number of followers that replicate the data in the partition. The data in the partition is typically used in providing services to network enabled devices from the edge. The set of data for a particular network enabled device is owned by the node to which the network enabled device connects. Ownership of the data (and the data itself) may move around the distributed computing system to different nodes, e.g., for load balancing, fault-resilience, and/or due to device movement. Security/health checks are enforced at the edge as part of a process of transferring data ownership, thereby providing a mechanism to mitigate compromised or malfunctioning network enabled devices.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 67/1095 - Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
  • H04L 67/1097 - Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

69.

FAST, SECURE, AND SCALABLE DATA STORE AT THE EDGE FOR CONNECTING NETWORK ENABLED DEVICES

      
Application Number US2022072361
Publication Number 2022/246396
Status In Force
Filing Date 2022-05-17
Publication Date 2022-11-24
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor
  • Ingerman, Mark, M.
  • Bird, Robert, B.

Abstract

A distributed computing system provides a distributed data store for network enabled devices at the edge. The distributed database is partitioned such that each node in the system has its own partition and some number of followers that replicate the data in the partition. The data in the partition is typically used in providing services to network enabled devices from the edge. The set of data for a particular network enabled device is owned by the node to which the network enabled device connects. Ownership of the data (and the data itself) may move around the distributed computing system to different nodes, e.g., for load balancing, fault-resilience, and/or due to device movement. Security /health checks are enforced at the edge as part of a process of transferring data ownership, thereby providing a mechanism to mitigate compromised or malfunctioning network enabled devices.

IPC Classes  ?

  • H04L 67/14 - Session management
  • H04L 67/142 - Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
  • H04L 67/148 - Migration or transfer of sessions
  • H04W 12/12 - Detection or prevention of fraud
  • H04L 9/40 - Network security protocols

70.

Internet address structure analysis, and applications thereof

      
Application Number 17875494
Grant Number 11736362
Status In Force
Filing Date 2022-07-28
First Publication Date 2022-11-17
Grant Date 2023-08-22
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Foremski, Pawel J.
  • Berger, Arthur W.
  • Plonka, David J.

Abstract

An analysis system automates IP address structure discovery by deep analysis of sample IPv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of IP addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed IPv6 address structure. The structural information is then applied as input to applications that include: (a) identifying homogeneous groups of client addresses, e.g., to assist in mapping clients to content in a CDN; (b) supporting network situational awareness efforts, e.g., in cyber defense; (c) selecting candidate targets for active measurements, e.g., traceroutes campaigns, vulnerability assessments, or reachability surveys; and (d) remotely assessing a network's addressing plan and address assignment policy.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 29/12 - Arrangements, apparatus, circuits or systems, not covered by a single one of groups characterised by the data terminal
  • H04L 41/14 - Network analysis or design
  • H04L 41/142 - Network analysis or design using statistical or mathematical methods
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 61/5092 - Address allocation by self-assignment, e.g. picking addresses at random and testing if they are already in use
  • H04L 101/659 - Internet protocol version 6 [IPv6] addresses
  • H04L 101/686 - Types of network addresses using dual-stack hosts, e.g. in Internet protocol version 4 [IPv4]/Internet protocol version 6 [IPv6] networks

71.

Mapping internet routing with anycast and utilizing such maps for deploying and operating anycast points of presence (PoPs)

      
Application Number 17655574
Grant Number 11936615
Status In Force
Filing Date 2022-03-21
First Publication Date 2022-11-03
Grant Date 2024-03-19
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor
  • Schomp, Kyle G.
  • Al-Dalky, Rami

Abstract

Generally, aspects of the invention involve creating a data structure (a map) that reflects routing of Internet traffic to Anycast prefixes. Assume, for example, that each Anycast prefix is associated with two or more deployments (Points of Presence or PoPs) that can provide a service such as DNS, content delivery (e.g., via proxy servers, as in a CDN), distributed network storage, compute, or otherwise. The map is built in such a way as to identify portions of the Internet (e.g., in IP address space) that are consistently routed with one another, i.e., always to the same PoP as one another, regardless of how the Anycast prefixes are deployed. Aspects of the invention also involve the use of this map, once created. The map can be applied in a variety of ways to assist and/or improve the operation of Anycast deployments and thus represents an improvement to computer networking technology.

IPC Classes  ?

  • G06F 15/173 - Interprocessor communication using an interconnection network, e.g. matrix, shuffle, pyramid, star or snowflake
  • H04L 45/74 - Address processing for routing
  • H04L 61/4511 - Network directories; Name-to-address mapping using standardised directory access protocols using domain name system [DNS]
  • H04L 61/5007 - Internet protocol [IP] addresses
  • H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload

72.

Overload protection for data sinks in a distributed computing system

      
Application Number 17656663
Grant Number 11658910
Status In Force
Filing Date 2022-03-28
First Publication Date 2022-11-03
Grant Date 2023-05-23
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Bohra, Aniruddha
  • Grinshpun, Vadim
  • Raghunathan, Hari
  • Nagendra, Mithila

Abstract

Described in this document, among other things, is an overload protection system that can protect data sinks from overload by controlling the volume of data sent to those data sinks in a fine-grained manner. The protection system preferably sits in between edge servers, or other producers of data, and data sinks that will receive some or all of the data. Preferably, each data sink owner defines a policy to control how and when overload protection will be applied. Each policy can include definitions of how to monitor the stream of data for overload and specify one or more conditions upon which throttling actions are necessary. In embodiments, a policy can contain a multi-part specification to identify the class(es) of traffic to monitor to see if the conditions have been triggered.

IPC Classes  ?

  • H04L 43/062 - Generation of reports related to network traffic
  • H04L 47/20 - Traffic policing
  • H04L 47/22 - Traffic shaping
  • H04L 49/50 - Overload detection or protection within a single switching element
  • H04L 47/25 - Flow control; Congestion control with rate being modified by the source upon detecting a change of network conditions
  • H04L 43/045 - Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
  • H04L 41/142 - Network analysis or design using statistical or mathematical methods
  • H04L 41/14 - Network analysis or design
  • H04L 41/147 - Network analysis or design for predicting network behaviour
  • H04L 41/16 - Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks using machine learning or artificial intelligence
  • H04L 43/067 - Generation of reports using time frame reporting

73.

Intermediary handling of identity services to guard against client side attack vectors

      
Application Number 17657773
Grant Number 11695737
Status In Force
Filing Date 2022-04-04
First Publication Date 2022-10-27
Grant Date 2023-07-04
Owner Akamai Technologies, Inc. (USA)
Inventor Bonci, Jason C.

Abstract

This document describes, among other things, security hardening techniques that guard against certain client-side attack vectors. These techniques generally involve the use of an intermediary that detects and handles identity service transactions on behalf of a client. In one embodiment, the intermediary establishes a resource domain session with the client in order to provide the client with desired resource domain content or services from a resource domain host. The intermediary detects when the resource domain host invokes a federated identity service as a condition of client access. The intermediary handles the identity transaction in the identity domain on behalf of the client within the client's resource domain session. Upon successful authentication and/or authorization with an IdP, the intermediary connects the results of the identity services domain transaction to the resource domain.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols

74.

PROXY SERVER ENTITY TRANSFER MODES

      
Application Number US2022071819
Publication Number 2022/226510
Status In Force
Filing Date 2022-04-20
Publication Date 2022-10-27
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor
  • Stevens, Matthew, J.
  • Merideth, Michael, G.
  • Alexandrov, Nil
  • Champagne, Andrew, F.
  • Coyle, Brendan
  • Glynn, Timothy
  • Roman, Mark, A.
  • Lisiecki, Philip, A.
  • Xu, Xin

Abstract

A proxy server is augmented with the capability of taking transient possession of a received entity for purposes of serving consuming devices. This capability supplements destination forwarding and/or origin server transactions performed by the proxy server. This capability enables several entity transfer modes, including a rendezvous service, in which the proxy server can (if invoked by a client) fulfill a client's request with an entity that the proxy server receives from a producing device contemporaneous with (or shortly after) the request for that entity. It also enables server-to- server transfers with synchronous or asynchronous destination forwarding behavior. It also enables a mode in which clients can request different representations of entities, e.g., from either the near-channel (e.g., the version stored at the proxy server) or a far-channel (e.g., at origin server). The teachings hereof are compatible with, although not limited to, conventional HTTP messaging protocols, including GET, POST and PUT methods.

IPC Classes  ?

  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04L 67/5683 - Storage of data provided by user terminals, i.e. reverse caching
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

75.

REAL-TIME MESSAGE DELIVERY AND UPDATE SERVICE IN A PROXY SERVER NETWORK

      
Application Number US2022071599
Publication Number 2022/221818
Status In Force
Filing Date 2022-04-07
Publication Date 2022-10-20
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor
  • Stevens, Matthew, J.
  • Merideth, Michael, G.
  • Alexandrov, Nil
  • Champagne, Andrew, F.
  • Coyle, Brendan
  • Glynn, Timothy
  • Roman, Maek, A.
  • Xu, Xin

Abstract

This patent document describes technology for providing real-time messaging and entity update services in a distributed proxy server network, such as a CDN. Uses include distributing real-time notifications about updates to data stored in and delivered by the network, with both high efficiency and locality of latency. The technology can be integrated into conventional caching proxy servers providing HTTP services, thereby leveraging their existing footprint in the Internet, their existing overlay network topologies and architectures, and their integration with existing traffic management components.

IPC Classes  ?

  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/566 - Grouping or aggregating service requests, e.g. for unified processing

76.

Low touch integration of a bot detection service in association with a content delivery network

      
Application Number 17844431
Grant Number 12101350
Status In Force
Filing Date 2022-06-20
First Publication Date 2022-10-13
Grant Date 2024-09-24
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Senecal, David
  • Bhurke, Prajakta

Abstract

A server interacts with a bot detection service to provide bot detection as a requesting client interacts with the server. In an asynchronous mode, the server injects into a page a data collection script configured to record interactions at the requesting client, to collect sensor data about the interactions, and to send the collected sensor data to the server. After the client receives the page, the sensor data is collected and forwarded to the server through a series of posts. The server forwards the posts to the detection service. During this data collection, the server also may receive a request from the client for a protected endpoint. When this occurs, and in a synchronous mode, the server issues a query to the detection service to obtain a threat score based in part on the collected sensor data that has been received and forwarded by the server. Based on the threat score returned, the server then determines whether the request for the endpoint should be forwarded onward for handling.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
  • H04L 9/40 - Network security protocols

77.

Content delivery network (CDN) edge server-based bot detection with session cookie support handling

      
Application Number 17851574
Grant Number 11818149
Status In Force
Filing Date 2022-06-28
First Publication Date 2022-10-13
Grant Date 2023-11-14
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Senecal, David
  • Bhurke, Prajakta
  • Vuong, Tu

Abstract

A server interacts with a bot detection service to provide bot detection as a requesting client interacts with the server. In an asynchronous mode, the server injects into a page a data collection script configured to record interactions at the requesting client, to collect sensor data about the interactions, and to send the collected sensor data to the server. After the client receives the page, the sensor data is collected and forwarded to the server through a series of posts. The server forwards the posts to the detection service. During this data collection, the server also may receive a request from the client for a protected endpoint. When this occurs, and in a synchronous mode, the server issues a query to the detection service to obtain a threat score based in part on the collected sensor data that has been received and forwarded by the server. Based on the threat score returned, the server then determines whether the request for the endpoint should be forwarded onward for handling.

IPC Classes  ?

78.

End-to-end verifiable multi-factor authentication service

      
Application Number 17697036
Grant Number 12095753
Status In Force
Filing Date 2022-03-17
First Publication Date 2022-10-13
Grant Date 2024-09-17
Owner Akamai Technologies, Inc. (USA)
Inventor Grinman, Alex

Abstract

An end-to-end verifiable multi-factor authentication scheme uses an authentication service. An authentication request is received from an organization, the request having been generated at the organization in response to receipt there of an access request from a user. The user has an associated public-private key pair. The organization provides the authentication request together with a first nonce. In response to receiving the authentication request and the first nonce, the authentication service generates a second nonce, and then it send the first and second nonces to the user. Thereafter, the service receives a data string, the data string having been generated by the client applying its private key over the first and second nonces. Using the user's public key, the service attempts to verify that the data string includes the first and second nonces. If it does, the authentication service provides the authentication decision in response to the authentication request, together with a proof that the user approved the authentication request.

IPC Classes  ?

  • H04L 9/08 - Key distribution
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols

79.

END-TO-END VERIFIABLE MULTI-FACTOR AUTHENTICATION SERVICE

      
Application Number US2022023946
Publication Number 2022/217011
Status In Force
Filing Date 2022-04-08
Publication Date 2022-10-13
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor Grinman, Alex

Abstract

An end-to-end verifiable multi-factor authentication scheme uses an authentication service. An authentication request is received from an organization, the request having been generated at the organization in response to receipt there of an access request from a user. The user has an associated public-private key pair. The organization provides the authentication request together with a first nonce. In response to receiving the authentication request and the first nonce, the authentication service generates a second nonce, and then it send the first and second nonces to the user. Thereafter, the service receives a data string, the data string having been generated by the client applying its private key over the first and second nonces. Using the user' s public key, the service attempts to verify that the data string includes the first and second nonces. If it does, the authentication service provides the authentication decision in response to the authentication request, together with a proof that the user approved the authentication request.

IPC Classes  ?

  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/30 - Public key, i.e. encryption algorithm being computationally infeasible to invert and users' encryption keys not requiring secrecy
  • H04L 9/08 - Key distribution

80.

Systems and methods for preventing the caching of rarely requested objects

      
Application Number 17645325
Grant Number 11445045
Status In Force
Filing Date 2021-12-21
First Publication Date 2022-09-13
Grant Date 2022-09-13
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Sotnikov, Dmitry
  • Mancuso, Brian
  • Kedem, Shai
  • Guttman, Omri
  • Hakimi, Michael

Abstract

Improved technology for managing the caching of objects that are rarely requested by clients. A cache system can be configured to assess a class of objects (such as objects associated with a particular domain) for cacheability, based on traffic observations. If the maximum possible cache offloading for the class of objects falls below a threshold level, which indicates a high proportion of non-cacheable or “single-hitter” content, then cache admission logic is configured to admit objects only after multiple clients requests during a time period (usually the object's time in cache, or eviction age). Otherwise, the cache admission logic may operate to admit objects to the cache after the first client request, assuming the object meets cacheability criteria. The technological improvements disclosed herein can be used to improve cache utilization, for example by preventing single-hitter objects from pushing out multi-hit objects (the objects that get hits after being added to cache).

IPC Classes  ?

  • H04L 67/5681 - Pre-fetching or pre-delivering data based on network characteristics
  • H04L 67/5682 - Policies or rules for updating, deleting or replacing the stored data
  • H04L 61/58 - Caching of addresses or names

81.

CDN configuration tuning for traffic share

      
Application Number 17648227
Grant Number 11641337
Status In Force
Filing Date 2022-01-18
First Publication Date 2022-08-11
Grant Date 2023-05-02
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Flack, Martin T.
  • Goel, Utkarsh

Abstract

This document relates to a CDN balancing mitigation system. An implementing CDN can deploy systems and techniques to monitor the domains of content provider customers with an active DNS scanner and detect which are using other CDNs on the same domain. This information can be used as an input signal for identifying and implementing adjustments to CDN configuration. Both automated and semi-automated adjustments are possible. The system can issue configuration adjustments or recommendations to the implementing CDN's servers or to its personnel. These might include “above-SLA” treatments intended to divert traffic to the implementing CDN. The effectiveness can be measured with the multi-CDN balance subsequently observed. The scanning and adjustment workflow can be permanent, temporary, or cycled. Treatments may include a variety of things, such as more cache storage, routing to less loaded servers, and so forth.

IPC Classes  ?

  • H04L 61/30 - Managing network names, e.g. use of aliases or nicknames
  • H04L 67/10 - Protocols in which an application is distributed across nodes in the network
  • H04L 67/1029 - Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers using data related to the state of servers by a load balancer
  • H04L 67/1008 - Server selection for load balancing based on parameters of servers, e.g. available memory or workload

82.

Secure transfer of data between programs executing on the same end-user device

      
Application Number 17162914
Grant Number 11610011
Status In Force
Filing Date 2021-01-29
First Publication Date 2022-08-04
Grant Date 2023-03-21
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Tang, David
  • Gero, Charles E.
  • Ross, Cameron

Abstract

It is often necessary to securely transfer data, such as authenticators or authorization tokens, between programs running on the same end-user device. The teachings hereof enable the pairing of two programs executing on a given end-user device and then the transfer of data from one program to the other. In an embodiment, a first program connects to a server and sends encrypted data elements. A second program intercepts the connection and/or the encrypted data elements. The second program tunnels the encrypted data elements (which remain opaque to the second program at this point) to a server, using an encapsulating protocol. This enables the server to receive the data elements sent by the first program, decrypt them, and provide them to the second program via return message using control fields of the encapsulating protocol. Once set up, the tunneling arrangement enables bidirectional data transfer.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 21/60 - Protecting data
  • H04L 9/40 - Network security protocols

83.

Systems and methods for automatically selecting an access control entity to mitigate attack traffic

      
Application Number 17647233
Grant Number 11895145
Status In Force
Filing Date 2022-01-06
First Publication Date 2022-08-04
Grant Date 2024-02-06
Owner Akamal Technologies, Inc. (USA)
Inventor
  • Lee, Bonita G.
  • Bero, Christopher

Abstract

The methods and system described herein automatically generate network router access control entities (ACEs) that are used to filter internet traffic and more specifically to block malicious traffic. The rules are generated by an ACE engine that processes incoming internet packets and examines existing ACEs and a statistical profile of the captured packets to produce one or more recommended ACEs with a quantified measure of confidence. Preferably, a recommended ACE is identified in real time of the attack, and preferably selected from a library of pre-authored ACEs. It is then deployed automatically or alternatively sent to system personnel for review and confirmation.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 43/067 - Generation of reports using time frame reporting

84.

HIGH PERFORMANCE DISTRIBUTED SYSTEM OF RECORD WITH WALLET SERVICES RESILIENCY

      
Application Number US2022013796
Publication Number 2022/164838
Status In Force
Filing Date 2022-01-26
Publication Date 2022-08-04
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor
  • Carver, David, C.
  • Sears, William, R.
  • Oliveira, Talmai

Abstract

A payment network comprises ledger services, and associated wallet services. To provide wallet services resiliency, multiple active wallet replicas are used to enable the system (i) to rely on collision detection and blockchain idempotency to produce a single correct outcome, and (2) to implement various collision avoidance techniques. Using a ledger services idempotency feature, multiple actors form independent valid intents and know that no more than one intent will get finalized on the ledger. In a variant embodiment, replicas implement processing delays and utilize so-called "intent" messages. By adding the delays, decision logic is biased logic towards one intent. The. intent messages are used to intercede before a wallet handles a same original upstream message and forms a different intent. Seeing the replica's intent, the wallet can adopt the same intent and proceed with downstream processing. After adopting intent, preferably a wallet also informs its replicas of its intent.

IPC Classes  ?

  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06Q 20/38 - Payment architectures, schemes or protocols - Details thereof
  • H04L 9/08 - Key distribution

85.

Sandbox environment for testing integration between a content provider origin and a content delivery network

      
Application Number 17650943
Grant Number 11665082
Status In Force
Filing Date 2022-02-14
First Publication Date 2022-07-28
Grant Date 2023-05-30
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Jones, Bradford A.
  • Gupta, Manish

Abstract

This document describes systems, devices, and methods for testing the integration of a content provider's origin infrastructure with a content delivery network (CDN). In embodiments, the teachings hereof enable a content provider's developer to rapidly and flexibly create test environments that send test traffic through the same CDN hardware and software that handle (or at least have the ability to handle) production traffic, but in isolation from that production traffic and from each other. Furthermore, in embodiments, the teachings hereof enable the content provider to specify an arbitrary test origin behind its corporate firewall with which the CDN should communicate.

IPC Classes  ?

  • H04L 43/50 - Testing arrangements
  • H04L 41/08 - Configuration management of networks or network elements
  • H04L 9/40 - Network security protocols
  • H04L 12/46 - Interconnection of networks
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources

86.

High performance distributed system of record with wallet services resiliency

      
Application Number 17577445
Status Pending
Filing Date 2022-01-18
First Publication Date 2022-07-28
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Carver, David C.
  • Sears, William R.
  • Oliveira, Talmai

Abstract

A payment network comprises ledger services, and associated wallet services. To provide wallet services resiliency, multiple active wallet replicas are used to enable the system (i) to rely on collision detection and blockchain idempotency to produce a single correct outcome, and (2) to implement various collision avoidance techniques. Using a ledger services idempotency feature, multiple actors form independent valid intents and know that no more than one intent will get finalized on the ledger. In a variant embodiment, replicas implement processing delays and utilize so-called “intent” messages. By adding the delays, decision logic is biased logic towards one intent. The intent messages are used to intercede before a wallet handles a same original upstream message and forms a different intent. Seeing the replica's intent, the wallet can adopt the same intent and proceed with downstream processing. After adopting intent, preferably a wallet also informs its replicas of its intent.

IPC Classes  ?

  • G06Q 20/36 - Payment architectures, schemes or protocols characterised by the use of specific devices using electronic wallets or electronic money safes
  • G06Q 20/38 - Payment architectures, schemes or protocols - Details thereof

87.

Securing an overlay network against attack

      
Application Number 17706805
Grant Number 11924491
Status In Force
Filing Date 2022-03-29
First Publication Date 2022-07-14
Grant Date 2024-03-05
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Williams, Brandon O.
  • Alenchery, Liza
  • Jin, Yixin

Abstract

The techniques herein provide for enhanced overlay network-based transport of traffic, such as IPsec traffic, e.g., to and from customer branch office locations, facilitated through the use of the Internet-based overlay routing infrastructure. This disclosure describes a method of providing integrity protection for traffic on the overlay network.

IPC Classes  ?

  • H04N 21/266 - Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system or merging a VOD unicast channel into a multicast channel
  • H04L 9/00 - Arrangements for secret or secure communications; Network security protocols
  • H04L 9/32 - Arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system
  • H04L 9/40 - Network security protocols
  • H04L 12/46 - Interconnection of networks
  • H04L 45/64 - Routing or path finding of packets in data switching networks using an overlay routing layer
  • H04N 21/6334 - Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key

88.

Synchronizing independent media and data streams using media stream synchronization points

      
Application Number 17700564
Grant Number 11876851
Status In Force
Filing Date 2022-03-22
First Publication Date 2022-07-07
Grant Date 2024-01-16
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Ingerman, Mark M.
  • Archer, Michael

Abstract

A messaging channel is embedded directly into a media stream. Messages delivered via the embedded messaging channel are extracted at a client media player. According to a variant embodiment, and in lieu of embedding all of the message data in the media stream, only a coordination index is injected, and the message data is sent separately and merged into the media stream downstream (at the client media player) based on the coordination index. In one example embodiment, multiple data streams (each potentially with different content intended for a particular “type” or class of user) are transmitted alongside the video stream in which the coordination index (e.g., a sequence number) has been injected into a video frame. Based on a user's service level, a particular one of the multiple data streams is released when the sequence number appears in the video frame, and the data in that stream is associated with the media.

IPC Classes  ?

  • G06F 13/00 - Interconnection of, or transfer of information or other signals between, memories, input/output devices or central processing units
  • H04L 65/75 - Media network packet handling
  • H04L 65/80 - Responding to QoS
  • H04L 65/612 - Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio for unicast

89.

Content delivery network (CDN) bot detection using primitive and compound feature sets

      
Application Number 17706718
Grant Number 11777955
Status In Force
Filing Date 2022-03-29
First Publication Date 2022-07-07
Grant Date 2023-10-03
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Modalavalasa, Venkata Sai Kishore
  • Kurupati, Sreenath
  • Vuong, Tu

Abstract

A method of detecting bots, preferably in an operating environment supported by a content delivery network (CDN) that comprises a shared infrastructure of distributed edge servers from which CDN customer content is delivered to requesting end users (clients). The method begins as clients interact with the edge servers. As such interactions occur, transaction data is collected. The transaction data is mined against a set of “primitive” or “compound” features sets to generate a database of information. In particular, preferably the database comprises one or more data structures, wherein a given data structure associates a feature value with its relative percentage occurrence across the collected transaction data. Thereafter, and upon receipt of a new transaction request, primitive or compound feature set data derived from the new transaction request are compared against the database. Based on the comparison, an end user client associated with the new transaction request is then characterized, e.g., as being associated with a human user, or a bot.

IPC Classes  ?

  • H04L 9/40 - Network security protocols
  • H04L 61/3015 - Name registration, generation or assignment
  • H04N 21/239 - Interfacing the upstream path of the transmission network, e.g. prioritizing client requests
  • H04N 21/24 - Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth or upstream requests

90.

Content delivery network (CDN) edge server-based bot detection with session cookie support handling

      
Application Number 16273223
Grant Number 11374945
Status In Force
Filing Date 2019-02-12
First Publication Date 2022-06-28
Grant Date 2022-06-28
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Senecal, David
  • Bhurke, Prajakta
  • Vuong, Tu

Abstract

A server interacts with a bot detection service to provide bot detection as a requesting client interacts with the server. In an asynchronous mode, the server injects into a page a data collection script configured to record interactions at the requesting client, to collect sensor data about the interactions, and to send the collected sensor data to the server. After the client receives the page, the sensor data is collected and forwarded to the server through a series of posts. The server forwards the posts to the detection service. During this data collection, the server also may receive a request from the client for a protected endpoint. When this occurs, and in a synchronous mode, the server issues a query to the detection service to obtain a threat score based in part on the collected sensor data that has been received and forwarded by the server. Based on the threat score returned, the server then determines whether the request for the endpoint should be forwarded onward for handling.

IPC Classes  ?

91.

Low touch integration of a bot detection service in association with a content delivery network

      
Application Number 16273216
Grant Number 11368483
Status In Force
Filing Date 2019-02-12
First Publication Date 2022-06-21
Grant Date 2022-06-21
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Senecal, David
  • Bhurke, Prajakta

Abstract

A server interacts with a bot detection service to provide bot detection as a requesting client interacts with the server. In an asynchronous mode, the server injects into a page a data collection script configured to record interactions at the requesting client, to collect sensor data about the interactions, and to send the collected sensor data to the server. After the client receives the page, the sensor data is collected and forwarded to the server through a series of posts. The server forwards the posts to the detection service. During this data collection, the server also may receive a request from the client for a protected endpoint. When this occurs, and in a synchronous mode, the server issues a query to the detection service to obtain a threat score based in part on the collected sensor data that has been received and forwarded by the server. Based on the threat score returned, the server then determines whether the request for the endpoint should be forwarded onward for handling.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols
  • G06F 16/958 - Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

92.

Javascript engine fingerprinting using landmark features and API selection and evaluation

      
Application Number 17405598
Status Pending
Filing Date 2021-08-18
First Publication Date 2022-06-16
Owner Akamai Technologies, Inc. (USA)
Inventor Vera-Schockner, Simon E.

Abstract

A method and apparatus for data collection to facilitate bot detection. According to this approach, and in lieu of conventional user agent-based fingerprinting, a client script is executed to attempt to identify one or more Javascript “landmark” features. In one embodiment, a landmark Javascript feature is a Javascript implementation that exists in a first browser type but not a second browser type distinct from the first browser type, and that also exists in one or more releases of the first browser type, but not in one or more other releases of the first browser type. By testing against landmark Javascript features as opposed to an unconstrained set of API calls and the like, the technique herein provides for much more computationally-efficient client-side operation.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • G06F 9/54 - Interprogram communication
  • G06F 9/455 - Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines

93.

Content delivery network (CDN)-based bot detection service with stop and reset protocols

      
Application Number 17667023
Grant Number 11848960
Status In Force
Filing Date 2022-02-08
First Publication Date 2022-05-26
Grant Date 2023-12-19
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Senecal, David
  • Bhurke, Prajakta
  • Vuong, Tu

Abstract

A server interacts with a bot detection service to provide bot detection as a requesting client interacts with the server. In an asynchronous mode, the server injects into a page a data collection script configured to record interactions at the requesting client, to collect sensor data about the interactions, and to send the collected sensor data to the server. After the client receives the page, the sensor data is collected and forwarded to the server through a series of posts. The server forwards the posts to the detection service. During this data collection, the server also may receive a request from the client for a protected endpoint. When this occurs, and in a synchronous mode, the server issues a query to the detection service to obtain a threat score based in part on the collected sensor data that has been received and forwarded by the server. Based on the threat score returned, the server then determines whether the request for the endpoint should be forwarded onward for handling.

IPC Classes  ?

  • H04L 29/06 - Communication control; Communication processing characterised by a protocol
  • H04L 9/40 - Network security protocols

94.

Real-time message delivery and update service in a proxy server network

      
Application Number 17306199
Grant Number 11343348
Status In Force
Filing Date 2021-05-03
First Publication Date 2022-05-24
Grant Date 2022-05-24
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Stevens, Matthew J.
  • Merideth, Michael G.
  • Alexandrov, Nil
  • Champagne, Andrew F.
  • Coyle, Brendan
  • Glynn, Timothy
  • Roman, Mark A.
  • Xu, Xin

Abstract

This patent document describes technology for providing real-time messaging and entity update services in a distributed proxy server network, such as a CDN. Uses include distributing real-time notifications about updates to data stored in and delivered by the network, with both high efficiency and locality of latency. The technology can be integrated into conventional caching proxy servers providing HTTP services, thereby leveraging their existing footprint in the Internet, their existing overlay network topologies and architectures, and their integration with existing traffic management components.

IPC Classes  ?

  • H04L 65/80 - Responding to QoS
  • H04L 67/568 - Storing data temporarily at an intermediate stage, e.g. caching
  • H04L 67/01 - Protocols
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
  • H04L 67/566 - Grouping or aggregating service requests, e.g. for unified processing
  • G06F 12/0813 - Multiuser, multiprocessor or multiprocessing cache systems with a network or matrix configuration
  • G06F 21/53 - Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity, buffer overflow or preventing unwanted data erasure by executing in a restricted environment, e.g. sandbox or secure virtual machine

95.

Proxy server entity transfer modes

      
Application Number 17325450
Grant Number 11343344
Status In Force
Filing Date 2021-05-20
First Publication Date 2022-05-24
Grant Date 2022-05-24
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Stevens, Matthew J.
  • Merideth, Michael G.
  • Alexandrov, Nil
  • Champagne, Andrew F.
  • Coyle, Brendan
  • Glynn, Timothy
  • Roman, Mark A.
  • Lisiecki, Philip A.
  • Xu, Xin

Abstract

A proxy server is augmented with the capability of taking transient possession of a received entity for purposes of serving consuming devices. This capability supplements destination forwarding and/or origin server transactions performed by the proxy server. This capability enables several entity transfer modes, including a rendezvous service, in which the proxy server can (if invoked by a client) fulfill a client's request with an entity that the proxy server receives from a producing device contemporaneous with (or shortly after) the request for that entity. It also enables server-to-server transfers with synchronous or asynchronous destination forwarding behavior. It also enables a mode in which clients can request different representations of entities, e.g., from either the near-channel (e.g., the version stored at the proxy server) or a far-channel (e.g., at origin server). The teachings hereof are compatible with, although not limited to, conventional HTTP messaging protocols, including GET, POST and PUT methods.

IPC Classes  ?

  • G06F 15/167 - Interprocessor communication using a common memory, e.g. mailbox
  • H04L 67/563 - Data redirection of data network streams
  • H04L 67/60 - Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
  • H04L 67/02 - Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

96.

Detection and optimization of content in the payloads of API messages

      
Application Number 16951685
Grant Number 11379281
Status In Force
Filing Date 2020-11-18
First Publication Date 2022-05-19
Grant Date 2022-07-05
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Goel, Utkarsh
  • Flack, Martin T.

Abstract

A server in a content delivery network (CDN) can examine API traffic and extract therefrom content that can be optimized before it is served to a client. The server can apply content location instructions to a given API message to find such content therein. Upon finding an instance of such content, the server can verify the identity of the content by applying a set of content verification instructions. If verification succeeds, the server can retrieve an optimized version of the identified content and swap it into the API message for the original version. If an optimized version is not available, the server can initiate an optimization process so that next time the optimized version will be available. In some embodiments, an analysis service can assist by observing traffic from an API endpoint over time, detecting the format of API messages and producing the content location and verification instructions.

IPC Classes  ?

  • G06F 9/54 - Interprogram communication
  • G06N 7/00 - Computing arrangements based on specific mathematical models

97.

Measuring and improving origin offload and resource utilization in caching systems

      
Application Number 17081329
Grant Number 11445225
Status In Force
Filing Date 2020-10-27
First Publication Date 2022-04-28
Grant Date 2022-09-13
Owner Akamai Technologies, Inc. (USA)
Inventor Sotnikov, Dmitry

Abstract

Origin offload is a key performance indicator of a content delivery network (CDN). This patent document presents unique methods and systems for measuring origin offload and applying those measurements to improve the offload. The techniques presented herein enable resource-efficient measurement of origin offload by individual servers and aggregation and analysis of such measurements to produce significant insights. The teachings hereof can be used to better identify root causes of suboptimal offload performance, to tune CDN settings and configurations, and to modify network operations, deployment and/or capacity planning. In addition, discussed herein are improved metrics showing offload in relation to the maximum achievable offload for the particular traffic being served.

IPC Classes  ?

  • H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
  • H04N 21/2183 - Cache memory
  • H04N 21/2665 - Gathering content from different sources, e.g. Internet and satellite
  • H04N 21/226 - Internal components of the server
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems

98.

Measuring and improving origin offload and resource utilization in caching systems

      
Application Number 17081691
Grant Number 11743513
Status In Force
Filing Date 2020-10-27
First Publication Date 2022-04-28
Grant Date 2023-08-29
Owner Akamai Technologies, Inc. (USA)
Inventor
  • Sotnikov, Dmitry
  • Kasbekar, Mangesh
  • Zigdon, Kfir

Abstract

Origin offload is a key performance indicator of a content delivery network (CDN). This patent document presents unique methods and systems for measuring origin offload and applying those measurements to improve the offload. The techniques presented herein enable resource-efficient measurement of origin offload by individual servers and aggregation and analysis of such measurements to produce significant insights. The teachings hereof can be used to better identify root causes of suboptimal offload performance, to tune CDN settings and configurations, and to modify network operations, deployment and/or capacity planning. In addition, discussed herein are improved metrics showing offload in relation to the maximum achievable offload for the particular traffic being served.

IPC Classes  ?

  • H04N 21/231 - Content storage operation, e.g. caching movies for short term storage, replicating data over plural servers or prioritizing data for deletion
  • H04N 21/2183 - Cache memory
  • H04L 9/06 - Arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for blockwise coding, e.g. D.E.S. systems
  • H04N 21/2665 - Gathering content from different sources, e.g. Internet and satellite
  • H04N 21/226 - Internal components of the server

99.

IDENTIFICATION AND COORDINATION OF OPPORTUNITIES FOR VEHICLE TO VEHICLE WIRELESS CONTENT SHARING

      
Application Number US2021071914
Publication Number 2022/087576
Status In Force
Filing Date 2021-10-18
Publication Date 2022-04-28
Owner AKAMAI TECHNOLOGIES, INC. (USA)
Inventor Ingerman, Mark, M.

Abstract

Disclosed herein are systems and methods for coordinating the wireless sharing of content between vehicles in a secure and efficient manner. In one embodiment, vehicles recognize when there is an opportunity for them to participate in content sharing, such as when a vehicle is temporarily stopped at a traffic signal, or stuck in traffic, or the like. In response to this opportunity, the vehicle can notify a coordination component, sending a manifest of content it has available for sharing and content that it desires. The coordination component can match two vehicles in location and time, and can facilitate a secure wireless content share transaction. Such a transaction can involve use of ephemeral wireless network parameters, including temporary' network names, passwords and/or security keys. Feedback about the success of the content transfer may be reported to system component(s) to improve identification of sharing opportunities in the future.

IPC Classes  ?

  • H04L 29/08 - Transmission control procedure, e.g. data link level control procedure
  • H04W 4/46 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for vehicle-to-vehicle communication [V2V]
  • H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]

100.

IDENTIFICATION AND COORDINATION OF OPPORTUNITIES FOR VEHICLE TO VEHICLE WIRELESS CONTENT SHARING

      
Application Number 17077209
Status Pending
Filing Date 2020-10-22
First Publication Date 2022-04-28
Owner Akamai Technologies Inc. (USA)
Inventor Ingerman, Mark M.

Abstract

Disclosed herein are systems and methods for coordinating the wireless sharing of content between vehicles in a secure and efficient manner. In one embodiment, vehicles recognize when there is an opportunity for them to participate in content sharing, such as when a vehicle is temporarily stopped at a traffic signal, or stuck in traffic, or the like. In response to this opportunity, the vehicle can notify a coordination component, sending a manifest of content it has available for sharing and content that it desires. The coordination component can match two vehicles in location and time, and can facilitate a secure wireless content share transaction. Such a transaction can involve use of ephemeral wireless network parameters, including temporary network names, passwords and/or security keys. Feedback about the success of the content transfer may be reported to system component(s) to improve identification of sharing opportunities in the future.

IPC Classes  ?

  • H04W 4/44 - Services specially adapted for particular environments, situations or purposes for vehicles, e.g. vehicle-to-pedestrians [V2P] for communication between vehicles and infrastructures, e.g. vehicle-to-cloud [V2C] or vehicle-to-home [V2H]
  • H04W 76/14 - Direct-mode setup
  • H04W 4/02 - Services making use of location information
  • H04W 72/04 - Wireless resource allocation
  • H04W 12/08 - Access security
  • H04W 12/63 - Location-dependent; Proximity-dependent
  • G06N 20/00 - Machine learning
  1     2     3     ...     8        Next Page