Patents Assigned to Akamai Technologies, Inc.
  • Publication number: 20210194954
    Abstract: This document describes marker based approaches for a CDN to monitor and report on the amount of traffic that it is serving on behalf of content providers. They are particularly useful in hybrid delivery scenarios. Hybrid delivery scenarios means that a client may obtain content, such as a given multimedia stream, from one or more servers in the CDN, or from one or more peers in a peer to peer network. The amount of data served from the peer network is referred to herein as the “offload”, as delivery of that data has been offloaded from the CDN platform.
    Type: Application
    Filed: December 30, 2020
    Publication date: June 24, 2021
    Applicant: Akamai Technologies, Inc.
    Inventors: Rahul Singhal, Eric K. Geyer, Henning Makholm, Christian Worm Mortensen
  • Publication number: 20210182837
    Abstract: Transaction handling computing elements comprise a network core that processes transaction requests into a blockchain, wherein a data block is a collection of transactions, and wherein an Unspent Transaction Output (UTXO) supporting the blockchain is an output from a finalized transaction. The elements interoperate with a transaction signing mechanism that associates a set of addresses on the blockchain with a delegate address, the delegate address having a set of signing public keys corresponding to one or more signing private keys used to sign UTXOs. In association with a new transaction being processed by the set of transaction handling components, a signing public key for an associated UXTO is located by following an address chain that includes an address in the set of addresses together with the delegate address. The signing public key is retrieved from a location associated with the delegate address and then used to sign (unlock) the associated UXTO.
    Type: Application
    Filed: September 1, 2020
    Publication date: June 17, 2021
    Applicant: Akamai Technologies Inc.
    Inventors: William R. Sears, David C. Carver, Leen AlShenibr, Daniel Franke
  • Publication number: 20210182895
    Abstract: A set of transaction handling computing elements comprise a network core that receive and process transaction requests into an append-only immutable chain of data blocks, wherein a data block is a collection of transactions, and wherein an Unspent Transaction Output (UTXO) data structure supporting the immutable chain of data blocks is an output from a finalized transaction. Typically, the UTXO data structure consists essentially of an address and a value. In this approach, at least one UTXO data structure is configured to include information either in addition to or in lieu of the address and value, thereby defining a Transaction Output (TXO). A TXO may have a variety of types, and one type includes an attribute that encodes data. In response to receipt of a request to process a transaction, the set of transaction handling computing elements are executed to process the transaction into a block using at least the information in the TXO.
    Type: Application
    Filed: May 12, 2020
    Publication date: June 17, 2021
    Applicant: Akamai Technologies, Inc.
    Inventors: William R. Sears, Leen K. Al Shenibr, David C. Carver
  • Publication number: 20210185137
    Abstract: A method of delivering location-specific content by a content processing server is disclosed. A request for web content is received by the content processing server. A location of an originator of the received request for web content is identified. A local proxy server is selected based on the identified location of the originator of the received request for web content. The web content is requested via the selected local proxy server. Location-specific web content from the content provider is received via the selected local proxy server. The received local-specific web content is sent to the originator of the received request in response to the received request.
    Type: Application
    Filed: March 2, 2021
    Publication date: June 17, 2021
    Applicant: Akamai Technologies, Inc.
    Inventors: Justin Kenneth Fitzhugh, Peter Alan Blum, Girish Vaitheeswaran
  • Publication number: 20210182277
    Abstract: A set of transaction handling computing elements comprise a network core that receive and process transaction requests into an append-only immutable chain of data blocks, wherein a data block is a collection of transactions, and wherein an Unspent Transaction Output (UTXO) data structure supporting the immutable chain of data blocks is an output from a finalized transaction. Typically, the UTXO data structure consists essentially of an address and a value. In this approach, at least one UTXO data structure is configured to include information either in addition to or in lieu of the address and value, thereby defining a Transaction Output (TXO). A TXO may have a variety of types, and one type includes an attribute that encodes data. In response to receipt of a request to process a transaction, the set of transaction handling computing elements are executed to process the transaction into a block using at least the information in the TXO.
    Type: Application
    Filed: June 30, 2020
    Publication date: June 17, 2021
    Applicant: Akamai Technologies, Inc.
    Inventors: David C. Carver, Leen Al Shenibr, William R. Sears, Vladimir Shtokman
  • Patent number: 11038854
    Abstract: An Internet infrastructure delivery platform (e.g., operated by a service provider) provides an RSA proxy “service” as an enhancement to the SSL protocol that off-loads the decryption of the encrypted pre-master secret (ePMS) to an external server. Using this service, instead of decrypting the ePMS “locally,” the SSL server proxies (forwards) the ePMS to an RSA proxy server component and receives, in response, the decrypted pre-master secret. In this manner, the decryption key does not need to be stored in association with the SSL server.
    Type: Grant
    Filed: May 8, 2017
    Date of Patent: June 15, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Charles E. Gero, Jeremy N. Shapiro, Dana J. Burd
  • Publication number: 20210176061
    Abstract: A method of enabling single sign-on (SSO) access to an application executing in an enterprise, wherein authorized, secure access to specific enterprise applications are facilitated via an enterprise-based connector. In response to successful authentication of an end user via a first authentication method, a credential associated with the successful authentication is encrypted to generate an encrypted user token. The encrypted user token is then for storage in a database accessible by the enterprise-based connector. Following a redirect (e.g., from a login server instance) that returns the end user to the enterprise-based connector, the encrypted user token is fetched and decrypted recover the credential. The credential so recovered is then used to attempt to authenticate the user to an application via a second authentication method distinct from the first authentication method.
    Type: Application
    Filed: February 21, 2021
    Publication date: June 10, 2021
    Applicant: Akamai Technologies, Inc.
    Inventors: Seetharama Ayyadevara, Seemant Choudhary, Stephan Benny, Pundit Kandoi, Pravin Tatti
  • Patent number: 11025584
    Abstract: A method for improving client subnet efficiency by equivalence class aggregation includes receiving a Domain Name System (DNS) query from a client, determining, based on predetermined class criteria, that the client is associated with an equivalency class, searching a cache associated with the equivalence class for an answer corresponding to the DNS query, and upon locating the answer, serving the answer to the client. Membership in equivalence classes can be adjusted, tuned, or otherwise modified based upon one or more criteria or rules. The adjustment of memberships may be a necessary step in response to changing network conditions. A membership in one or more equivalence classes can be adjusted based on determining changes in service (such as changes in bandwidth, quality of service, client location, and so forth), and/or based on detection of a modification to the network topology, and/or based on received input concerning performance.
    Type: Grant
    Filed: May 13, 2020
    Date of Patent: June 1, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Robert Thomas Halley, Brian Wellington
  • Patent number: 11025477
    Abstract: This disclosure relates to enhanced overlay network-based transport of traffic to and from customer branch office locations, facilitated through the use of the Internet-based overlay routing. A method of selecting an ingress edge region of the overlay network begins by mapping a service hostname to an IKEv2 destination of an outer IPsec tunnel associated with a first overlay network edge. An IKEv2 session is established from the first overlay network edge to the customer router. Upon tunnel establishment, a secondary lookup is performed to determine whether the first overlay network edge is an appropriate ingress region. Based on a response to the secondary lookup, a IKEv2 redirect is issued to a second overlay network edge. A new tunnel is then established from the second overlay network edge to the customer router. Thereafter, an additional lookup may also be performed to determine whether the second overlay network edge remains an appropriate ingress region.
    Type: Grant
    Filed: December 28, 2016
    Date of Patent: June 1, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Ryan Ruel, Fardad Farahmand, Brandon O. Williams
  • Patent number: 11019034
    Abstract: This document describes, among other things, systems and methods for more efficiently resuming a client-to-origin TLS session through a proxy layer that fronts the origin in order to provide network security services. At the time of an initial TLS handshake with an unknown client, for example, the proxy can perform a set of security checks. If the client passes the checks, the proxy can transmit a ‘proxy token’ upstream to the origin. The origin can incorporate this token into session state data which is passed back to and stored on the client, e.g., using a TLS session ticket extension field, pre-shared key extension field, or other field. On TLS session resumption, when the client sends the session state data, the proxy can recover its proxy token from the session state data, and upon successful validation, bypass security checks that it would otherwise perform against the client, thereby more efficiently handling known clients.
    Type: Grant
    Filed: November 16, 2018
    Date of Patent: May 25, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Stephen L. Ludin, Michael A. Bishop
  • Patent number: 11018850
    Abstract: A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation, conversion or transfer of information or value) are processed concurrently in a scalable, reliable, secure and efficient manner. In one embodiment, the computing network fabric or “core” is configured to support a distributed blockchain network that organizes data in a manner that allows communication, processing and storage of blocks of the chain to be performed concurrently, with little synchronization, at very high performance and low latency, even when the transactions themselves originate from distant sources. This data organization relies on segmenting a transaction space within autonomous but cooperating computing nodes that are configured as a processing mesh. Each computing node typically is functionally-equivalent to all other nodes in the core.
    Type: Grant
    Filed: August 2, 2018
    Date of Patent: May 25, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: David C. Carver, Leen Khalid A. Al Shenibr, Vladimir Shtokman
  • Publication number: 20210152604
    Abstract: Among other things, this document describes systems, methods and devices for discovering and identifying client devices that attempt to access out-of-policy network services via a secure web gateway (or other network security gateway) that lacks visibility into the client network actual IP space. This is a common problem with cloud hosted SWG services that enforce access policy from outside of a customer network (e.g., external to an enterprise network), due to network address translation at the interface between the customer network and the public Internet where the cloud-hosted SWG resides. The teachings hereof address this problem. In one embodiment, a cloud hosted SWG can redirect a client to a bouncer device inside the customer network; that bouncer device can capture the actual client IP address.
    Type: Application
    Filed: November 3, 2020
    Publication date: May 20, 2021
    Applicant: Akamai Technologies, Inc.
    Inventors: Eugene (John) Neystadt, Michael Graham, John Devasia
  • Patent number: 11012416
    Abstract: Among other things, this document describes systems, devices, and methods for executing rules in an application layer firewall, including in particular a web application firewall (WAF). An application layer firewall engine employs symbolic execution techniques that result in improved performance and efficiency. In preferred embodiments, an arbitrary firewall rule can be pre-processed to discover and define a set of one or more properties that an input must have in order for the input to have the potential to trigger the rule. By quickly examining an input for these properties, then application layer firewall can conclude that the input cannot trigger and therefore skip full execution of the rule against the input. This can be repeated for many if not all rules in a firewall ruleset. When a high proportion of the inputs have the required properties for rule-skipping, performance can be dramatically improved.
    Type: Grant
    Filed: February 20, 2018
    Date of Patent: May 18, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Andrew Jacob Kahn, Yannis Drougas, Ameya Prakash Shendarkar
  • Patent number: 11012362
    Abstract: Among other things, this document describes systems, devices, and methods for wireless content delivery to vehicles and in particular to vehicles in cellular radio environments. The teachings hereof can be used to deliver a vehicle manufacturer's head unit updates, firmware, configurations, and other data to a vehicle. In embodiments, downloads are managed at the control plane and/or data plane. Download management can include mitigating either current or anticipated wireless congestion at cell towers, enforcing campaign priority for firmware updates, accommodating occupant-originated data flows to and from the vehicle, and/or accounting for contractual data arrangements between vehicles makers and cellular providers, among other things.
    Type: Grant
    Filed: June 18, 2018
    Date of Patent: May 18, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Mark M. Ingerman, Thomas Michael Mistretta
  • Patent number: 10986159
    Abstract: Among other things, this document describes systems, devices, and methods for using TLS session resumption tickets to store and manage information about objects that a server or a set of servers has previously delivered to a client and therefore that the client is likely to have in client-side cache. When communicated to a server later, this information can be used to drive server decisions about whether to push an object to a client, e.g., using an HTTP/2 server push function or the like, or whether to send an early hint to the client about anobject.
    Type: Grant
    Filed: January 24, 2020
    Date of Patent: April 20, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Utkarsh Goel, Martin T. Flack, Stephen L. Ludin, Moritz M. Steiner
  • Patent number: 10986027
    Abstract: A method of congestion control implemented by a sender over a network link that includes a router having a queue. During a first state, information is received from a receiver. The information comprises an estimated maximum bandwidth for the link, a one-way transit time for traffic over the link, and an indication whether the link is congested. In response to the link being congested, the sender transitions to a second state. While in the second state, a sending rate of packets is reduced, in part to attempt to drain the queue of data packets contributed by the sender. The sender transitions to a third state when the sender estimates that the queue has been drained of the data packets contributed. During the third state, the sending rate is increased until either the sender transitions back to the first state, or receives a new indication that the link is congested.
    Type: Grant
    Filed: March 26, 2019
    Date of Patent: April 20, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: William R. Sears, Martin K. Lohner
  • Patent number: 10979485
    Abstract: Described herein are methods, apparatus and systems for selectively delivering content through one of two communication channels, one being origin to client and the other being from or through a CDN to client. Thus a client may choose to request content from a CDN and/or from an origin server. This disclosure sets forth techniques for, among other things, distinguishing between which channel to use for a given object, using the CDN-client channel to obtain the performance benefit of doing so, and reverting to the origin-client channel where content may be private, sensitive, corrupted, or otherwise considered to be unsuitable from delivery from and/or through the CDN.
    Type: Grant
    Filed: September 16, 2020
    Date of Patent: April 13, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: Charles E. Gero, Guy Podjarny
  • Patent number: 10977747
    Abstract: A content delivery network (CDN) comprises a set of edge servers, and a domain name service (DNS) that is authoritative for content provider domains served by the CDN. The CDN is extended into one or more mobile or wireline networks that cannot or do not otherwise support fully-managed CDN edge servers. In particular, an “Extender” is deployed in the mobile or wireline network, preferably as a passive web caching proxy that is beyond the edge of the CDN but that serves CDN-provisioned content under the control of the CDN. The Extender may also be used to transparently cache and serve non-CDN content. An information channel is established between the Extender and the CDN to facilitate the Extender functionality.
    Type: Grant
    Filed: June 20, 2011
    Date of Patent: April 13, 2021
    Assignee: AKAMAI TECHNOLOGIES, INC.
    Inventors: Robert D. Blumofe, Vinay Kanitkar, Dane S. Walther, Charles E. Gero
  • Patent number: 10972568
    Abstract: A high-performance distributed ledger and transaction computing network fabric over which large numbers of transactions (involving the transformation, conversion or transfer of information or value) are processed concurrently in a scalable, reliable, secure and efficient manner. In one embodiment, the computing network fabric or “core” is configured to support a distributed blockchain network that organizes data in a manner that allows communication, processing and storage of blocks of the chain to be performed concurrently, with little synchronization, at very high performance and low latency, even when the transactions themselves originate from distant sources. This data organization relies on segmenting a transaction space within autonomous but cooperating computing nodes that are configured as a processing mesh. Each computing node typically is functionally-equivalent to all other nodes in the core.
    Type: Grant
    Filed: April 1, 2019
    Date of Patent: April 6, 2021
    Assignee: Akamai Technologies, Inc.
    Inventors: David C. Carver, Thomas Houman, Andrew F. Champagne, Vladimir Shtokman, Patrick Alexander Deegan, Ramanath Mallikarjuna
  • Publication number: 20210091940
    Abstract: This document describes techniques for rotating keys used to tokenize data stored in a streaming data store where data is stored for a maximum time [W]. In some embodiments, a data layer of such a data store can encrypt arriving original data values twice. The original data value is first encrypted with a first key, producing a first token. The original data value is encrypted with a second key, producing a second token. Each encrypted token can be stored separately in the data store. A field may be associated with two database columns, one holding the value encrypted with the first key and the second holding the value encrypted with the second key. Keys are rotated after time [K], which is at least equal to and preferably longer than [W]. Rotation can involve discarding the older key and generating a new key so that two keys are still used.
    Type: Application
    Filed: September 24, 2019
    Publication date: March 25, 2021
    Applicant: Akamai Technologies Inc.
    Inventors: Eugene (John) Neystadt, Jonathan Herzog, Ittay Dror, Elisha Ben-Zvi