Patents by Inventor Marin S. Lulic

Marin S. Lulic has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20190318131
    Abstract: Among other things, this document describes systems, devices, and methods for responding to the detection of tampering with a remotely deployed computer, such as a server in a network data center. In one embodiment, the computer can be equipped with various tamper detection mechanisms, such as proximity sensors or circuitry triggered when the server's case is opened and/or internal components are moved or altered. Tamper detection can invoke an automated trust revocation mechanism. When tampering is detected, the computer hardware can automatically prevents access to, and/or use of, a previously stored authentication key. Consequently, the computer cannot authenticate to a remote entity, such as a network operations center and/or another computer in a distributing computing system. In some embodiments, the computer remains operable so that administrators can communicate with the server and/or extract information therefrom, although the computer will be treated as entrusted.
    Type: Application
    Filed: April 17, 2018
    Publication date: October 17, 2019
    Applicant: Akamai Technologies, Inc.
    Inventor: Marin S. Lulic
  • Publication number: 20190318133
    Abstract: Among other things, this document describes systems, devices, and methods for responding to the detection of tampering with a remotely deployed computer, such as a server in a network data center. In one embodiment, the computer can be equipped with various tamper detection mechanisms, such as proximity sensors or circuitry triggered when the server's case is opened and/or internal components are moved or altered. Tamper detection can invoke an automated trust revocation mechanism. When tampering is detected, the computer hardware can automatically prevents access to, and/or use of, a previously stored authentication key. Consequently, the computer cannot authenticate to a remote entity, such as a network operations center and/or another computer in a distributing computing system. In some embodiments, the computer remains operable so that administrators can communicate with the server and/or extract information therefrom, although the computer will be treated as entrusted.
    Type: Application
    Filed: April 17, 2018
    Publication date: October 17, 2019
    Applicant: Akamai Technologies, Inc.
    Inventors: Marin S. Lulic, Timothy Y. Dunn