Patents by Inventor Philip Lisiecki

Philip Lisiecki has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20170302585
    Abstract: According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with clients that have exhibited attack characteristics (for example, characteristics indicating a DoS attack), and for transitioning internal ownership of those connections such that server resources consumed by the connection are reduced, while keeping the connection open. The connection thus moves from a state of relatively high resource use to a state of relatively low server resource use. According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended by enabling the server to determine that any of a client and a connection exhibits one or more attack characteristics (e.g., based on at least one of client attributes, connection attributes, and client behavior during the connection, or otherwise). As a result of the determination, the server changes its treatment of the connection.
    Type: Application
    Filed: March 18, 2017
    Publication date: October 19, 2017
    Applicant: Akamai Technologies, Inc.
    Inventors: Sudhin Mishra, Stephen L. Ludin, John A. Dilley, Erik Nygren, Philip Lisiecki, Karl-Eliv J. Hallin, Joshua Hunt
  • Patent number: 9794282
    Abstract: According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with clients that have exhibited attack characteristics (for example, characteristics indicating a DoS attack), and for transitioning internal ownership of those connections such that server resources consumed by the connection are reduced, while keeping the connection open. The connection thus moves from a state of relatively high resource use to a state of relatively low server resource use. According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended by enabling the server to determine that any of a client and a connection exhibits one or more attack characteristics (e.g., based on at least one of client attributes, connection attributes, and client behavior during the connection, or otherwise). As a result of the determination, the server changes its treatment of the connection.
    Type: Grant
    Filed: March 18, 2017
    Date of Patent: October 17, 2017
    Assignee: Akamai Technologies, Inc.
    Inventors: Sudhin Mishra, Stephen L. Ludin, John A. Dilley, Erik Nygren, Philip Lisiecki, Karl-Eliv J. Hallin, Joshua Hunt
  • Patent number: 9634957
    Abstract: According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with clients that have exhibited attack characteristics (for example, characteristics indicating a DoS attack), and for transitioning internal ownership of those connections such that server resources consumed by the connection are reduced, while keeping the connection open. The connection thus moves from a state of relatively high resource use to a state of relatively low server resource use. According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended by enabling the server to determine that any of a client and a connection exhibits one or more attack characteristics (e.g., based on at least one of client attributes, connection attributes, and client behavior during the connection, or otherwise). As a result of the determination, the server changes its treatment of the connection.
    Type: Grant
    Filed: August 31, 2016
    Date of Patent: April 25, 2017
    Assignee: Akamai Technologies, Inc.
    Inventors: John A. Dilley, Stephen L. Ludin, Sudhin Mishra, Erik Nygren, Philip Lisiecki, Karl-Eliv J. Hallin, Joshua Hunt
  • Publication number: 20160373371
    Abstract: According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended with a mechanism for identifying connections with clients that have exhibited attack characteristics (for example, characteristics indicating a DoS attack), and for transitioning internal ownership of those connections such that server resources consumed by the connection are reduced, while keeping the connection open. The connection thus moves from a state of relatively high resource use to a state of relatively low server resource use. According to certain non-limiting embodiments disclosed herein, the functionality of a server is extended by enabling the server to determine that any of a client and a connection exhibits one or more attack characteristics (e.g., based on at least one of client attributes, connection attributes, and client behavior during the connection, or otherwise). As a result of the determination, the server changes its treatment of the connection.
    Type: Application
    Filed: August 31, 2016
    Publication date: December 22, 2016
    Applicant: Akamai Technologies, Inc.
    Inventors: John A. Dilley, Stephen L. Ludin, Sudhin Mishra, Erik Nygren, Philip Lisiecki, Karl-Eliv J. Hallin, Joshua Hunt
  • Publication number: 20070288588
    Abstract: To serve content through a content delivery network (CDN), the CDN must have some information about the identity, characteristics and state of its target objects. Such additional information is provided in the form of object metadata, which according to the invention can be located in the request string itself, in the response headers from the origin server, in a metadata configuration file distributed to CDN servers, or in a per-customer metadata configuration file. CDN content servers execute a request identification and parsing process to locate object metadata and to handle the request in accordance therewith. Where different types of metadata exist for a particular object, metadata in a configuration file is overridden by metadata in a response header or request string, with metadata in the request string taking precedence.
    Type: Application
    Filed: July 2, 2007
    Publication date: December 13, 2007
    Inventors: Joel Wein, John Kloninger, Mark Nottingham, David Karger, Philip Lisiecki
  • Publication number: 20070250560
    Abstract: To serve content through a content delivery network (CDN), the CDN must have some information about the identity, characteristics and state of its target objects. Such additional information is provided in the form of object metadata, which according to the invention can be located in the request string itself, in the response headers from the origin server, in a metadata configuration file distributed to CDN servers, or in a per-customer metadata configuration file. CDN content servers execute a request identification and parsing process to locate object metadata and to handle the request in accordance therewith. Where different types of metadata exist for a particular object, metadata in a configuration file is overridden by metadata in a response header or request string, with metadata in the request string taking precedence.
    Type: Application
    Filed: June 27, 2007
    Publication date: October 25, 2007
    Applicant: AKAMAI TECHNOLOGIES, INC.
    Inventors: Joel Wein, John Kloninger, Mark Nottingham, David Karger, Philip Lisiecki
  • Publication number: 20070174442
    Abstract: A content file purge mechanism for a content delivery network (CDN) is described. A Web-enabled portal is used by CDN customers to enter purge requests securely. A purge request identifies one or more content files to be purged. The purge request is pushed over a secure link from the portal to a purge server, which validates purge requests from multiple CDN customers and batches the requests into an aggregate purge request. The aggregate purge request is pushed from the purge server to a set of staging servers. Periodically, CDN content servers poll the staging servers to determine whether an aggregate purge request exists. If so, the CDN content servers obtain the aggregate purge request and process the request to remove the identified content files from their local storage.
    Type: Application
    Filed: September 18, 2006
    Publication date: July 26, 2007
    Inventors: Alexander Sherman, Philip Lisiecki, Joel Wein, Don Dailey, John Dilley, William Weihl
  • Publication number: 20070055765
    Abstract: A method for content storage on behalf of participating content providers begins by having a given content provider identify content for storage. The content provider then uploads the content to a given storage site selected from a set of storage sites. Following upload, the content is replicated from the given storage site to at least one other storage site in the set. Upon request from a given entity, a given storage site from which the given entity may retrieve the content is then identified. The content is then downloaded from the identified given storage site to the given entity. In an illustrative embodiment, the given entity is an edge server of a content delivery network (CDN).
    Type: Application
    Filed: November 10, 2006
    Publication date: March 8, 2007
    Inventors: Philip Lisiecki, Cosmos Nicolaou, Kyle Rose
  • Publication number: 20050187981
    Abstract: A file transport mechanism according to the invention is responsible for accepting, storing and distributing files, such as configuration or control files, to a large number of field machines. The mechanism is comprised of a set of servers that accept, store and maintain submitted files. The file transport mechanism implements a distributed agreement protocol based on “vector exchange.” A vector exchange is a knowledge-based algorithm that works by passing around to potential participants a commitment bit vector. A participant that observes a quorum of commit bits in a vector assumes agreement. Servers use vector exchange to achieve consensus on file submissions. Once a server learns of an agreement, it persistently marks (in a local data store) the request as “agreed.” Once the submission is agreed, the server can stage the new file for download.
    Type: Application
    Filed: February 20, 2004
    Publication date: August 25, 2005
    Inventors: Alexander Sherman, Andrew Berkheimer, Philip Lisiecki, William Weihl, Joel Wein