Real Time Touch



new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)




Real Time Touch

Akamai Technologies Inc patents


Recent patent applications related to Akamai Technologies Inc. Akamai Technologies Inc is listed as an Agent/Assignee. Note: Akamai Technologies Inc may have other listings under different names/spellings. We're not affiliated with Akamai Technologies Inc, we're just tracking patents.

ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Akamai Technologies Inc-related inventors


Consumer performance index scoring for websites and web-based applications

A computer implemented method creating a benchmark for consumer satisfaction of website or web application performance includes aggregating real user measurement (rum) data captured from devices of users during sessions on a website or web application, the rum data including a landing page load time of each user and whether a bounce occurred. The probability that each tenant will bounce is then modeled. ... Akamai Technologies Inc

Splicing into an active tls session without a certificate or private key

An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active tls session that is on-going between a client and the origin server. The technique allows for selective pieces of a data stream to be delegated from an origin to the edge server for the transmission (by the edge server) of authentic cached content, but without the edge server having the ability to obtain control of the entire stream or to decrypt arbitrary data after that point. ... Akamai Technologies Inc

Systems and methods for utilizing client side authentication to select services available at a given port number

Typically, clients request a service from a computer hosting multiple services by specifying a destination port number associated with the desired service. In embodiments, the functionality of such a host computer is enhanced by having it condition client access to services available at a particular port number based on client authentication and/or authorization. ... Akamai Technologies Inc

Correlating nameserver ipv6 and ipv4 addresses

Nameserver addresses are correlated in a multi-tier name server hierarchy comprising a first level authority for a domain, and one or more second level authorities to which the first level authority delegates with respect to a particular sub-domain associated with the domain. Preferably, the first level authority is ipv4-based and at least one second level authority is ipv6-based. ... Akamai Technologies Inc

Pixel-based load balancing

Disclosed are methods, systems, and apparatus for load-balancing image-processing jobs based on the number of pixels in the images and/or the nature of the processing that is requested on those pixels. For example, a set of machines may run software to provide various types of image processing services, such as format conversion, recompression, resizing, cropping, among others. ... Akamai Technologies Inc

Traffic on-boarding for acceleration through out-of-band security authenticators

A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (idp), the idp having generated the assertion upon receiving an authentication request from a service provider (sp), the sp having generated the authentication request upon receiving from a client a request for a protected resource. ... Akamai Technologies Inc

Representation of contextual information by projecting different participants' audio from different positions in a 3d soundscape

An overlay network platform facilitates a multi-party conference. End users participate in the conference using client-based web browser software. ... Akamai Technologies Inc

Dynamic speaker selection and live stream delivery for multi-party conferencing

An overlay network platform facilitates a multi-party videoconference. End users participate using client-based browser or mobile application rendering software, such as a web browser, and using a protocol such as webrtc. ... Akamai Technologies Inc

Collecting and correlating microphone data from multiple co-located clients, and constructing 3d sound profile of a room

An overlay network platform facilitates a multi-party conference. End users participate in the conference using client-based web browser software, and using a protocol such as webrtc. ... Akamai Technologies Inc

Unified, browser-based enterprise collaboration platform

A system for enterprise collaboration is associated with an overlay network, such as a content delivery network (cdn). The overlay network comprises machines capable of ingress, forwarding and broadcasting traffic, together with a mapping infrastructure. ... Akamai Technologies Inc

Multicast overlay network for delivery of real-time video

A method of multicasting real-time video is described. The method begins by establishing a multicast network of machines capable of ingress, forwarding and broadcasting traffic, together with a mapping infrastructure. ... Akamai Technologies Inc

Method and apparatus to detect non-human users on computer systems

Methods and systems for malicious non-human user detection on computing devices are described. The method includes collecting, by a processing device, raw data corresponding to a user action, converting, by the processing device, the raw data to features, wherein the features represent characteristics of a human user or a malicious code acting as if it were the human user, and comparing, by the processing device, at least one of the features against a corresponding portion of a characteristic model to differentiate the human user from the malicious code acting as if it were the human user.. ... Akamai Technologies Inc

Server initiated multipath content delivery

Described herein are—among other things—systems, methods, and apparatus for accelerating and increasing the reliability of content delivery by serving objects redundantly over multiple paths from multiple servers. In preferred embodiments, the decision to use such multipath delivery is made on the server side. ... Akamai Technologies Inc

Systems and methods for demultiplexing and multiplexing multimedia streams that have spurious elementary streams

Described herein are systems, methods and apparatus for demultiplexing and multiplexing multimedia streams where one or more of the underlying elementary streams appears intermittently, that is, one or more particular elementary streams are “spurious”. Typically, a multiplexed multimedia stream contains elementary streams for video, audio and ancillary data. ... Akamai Technologies Inc

05/24/18 / #20180146010

Providing forward secrecy in a terminating tls connection proxy

An infrastructure delivery platform provides a rsa proxy service as an enhancement to the tls/ssl protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server. ... Akamai Technologies Inc

05/24/18 / #20180145946

Peer-to-peer connection establishment using turn

A relay service enables two peers attempting to communicate with one another to each connect to a publicly-accessible relay server, which servers are associated with an overlay network and are selected by a directory service. After end-to-end connectivity is established, preferably the hosts communicate with each other by relaying data packets via the overlay network relay servers. ... Akamai Technologies Inc

05/10/18 / #20180131748

Mechanism for distinguishing between content to be served through first or second delivery channels

Described herein are methods, apparatus and systems for selectively delivering content through one of two communication channels, one being origin to client and the other being from or through a cdn to client. Thus a client may choose to request content from a cdn and/or from an origin server. ... Akamai Technologies Inc

04/19/18 / #20180109559

Detecting device masquerading in application programming interface (api) transactions

This disclosure describes a technique to determine whether a client computing device accessing an api is masquerading its device type (i.e., pretending to be a device that it is not). To this end, and according to this disclosure, the client performs certain processing requested by the server to reveal its actual processing capabilities and thereby its true device type, whereupon—once the server learns the true nature of the client device —it can take appropriate actions to mitigate or prevent further damage. ... Akamai Technologies Inc

04/19/18 / #20180109489

Content delivery network (cdn) content server request handling mechanism with metadata framework support

To serve content through a content delivery network (cdn), the cdn must have some information about the identity, characteristics and state of its target objects. Such additional information is provided in the form of object metadata, which according to the invention can be located in the request string itself, in the response headers from the origin server, in a metadata configuration file distributed to cdn servers, or in a per-customer metadata configuration file. ... Akamai Technologies Inc

03/29/18 / #20180091631

Systems and methods for writing prioritized http/2 data to a socket buffer

This patent document describes, among other things, improved methods and systems for managing h2 data writes to a socket in the context of prioritized http v2 (“h2”) streams. Properly respecting the different priorities of h2 streams is important. ... Akamai Technologies Inc

03/29/18 / #20180091578

Dynamically populated manifests and manifest-based prefetching

Described herein are, among other things, systems and methods for generating and using manifests in delivering web content, and for using such manifests for prefetching. Manual and automated generation of manifests are disclosed. ... Akamai Technologies Inc

03/29/18 / #20180091472

Provisioning tool for a content delivery network (cdn)

A tool that allows a cdn customer, partner, or other authorized entity to create a dns canonical name (cname) on the content delivery network without having to contact the content delivery network service provider directly.. . ... Akamai Technologies Inc

03/29/18 / #20180089327

Methods and apparatus for accelerating content authored for multiple devices

Disclosed herein are systems, methods, and apparatus for improving the delivery of web content that has been authored for multiple devices. In certain embodiments, an intermediary device such as a proxy server determines the characteristics of a client device requesting multi-device content, obtains and examines the multi-device content, and in view of the particular requesting client device removes portions that are irrelevant for that device. ... Akamai Technologies Inc

03/15/18 / #20180077058

Traffic on-boarding for acceleration through out-of-band security authenticators

A traffic on-boarding method is operative at an acceleration server of an overlay network. It begins at the acceleration server when that server receives an assertion generated by an identity provider (idp), the idp having generated the assertion upon receiving an authentication request from a service provider (sp), the sp having generated the authentication request upon receiving from a client a request for a protected resource. ... Akamai Technologies Inc

03/08/18 / #20180069797

Virtual private network (vpn)-as-a-service with load-balanced tunnel endpoints

A mechanism to facilitate a private network (vpn)-as-a-service, preferably within the context of an overlay ip routing mechanism implemented within an overlay network. The overlay provides delivery of packets end-to-end between overlay network appliances positioned at the endpoints. ... Akamai Technologies Inc

03/08/18 / #20180069702

Providing single sign-on (sso) in disjoint networks with non-overlapping authentication protocols

A method of enabling single sign-on (sso) access to an application executing in an enterprise, wherein authorized, secure access to specific enterprise applications are facilitated via an enterprise-based connector. In response to successful authentication of an end user via a first authentication method, a credential associated with the successful authentication is encrypted to generate an encrypted user token. ... Akamai Technologies Inc

03/01/18 / #20180060286

Progressive consolidation of web page resources

Described herein are systems, method and devices for modifying web pages to enhance their performance. In certain non-limiting embodiments, improved resource consolidation techniques are described, which are sometimes referred to herein as ‘progressive’ consolidation. ... Akamai Technologies Inc

02/08/18 / #20180041599

Systems and methods for controlling cacheability and privacy of objects

Described herein are systems, devices, and methods for content delivery on the internet. In certain non-limiting embodiments, a caching model is provided that can support caching for indefinite time periods, potentially with infinite or relatively long time-to-live values, yet provide prompt updates when the underlying origin content changes. ... Akamai Technologies Inc

02/08/18 / #20180041544

Security policy editor

A shared computing infrastructure has associated therewith a portal application through which users access the infrastructure and provision one or more services, such as content storage and delivery. The portal comprises a security policy editor, a web-based configuration tool that is intended for use by customers to generate and apply security policies to their media content. ... Akamai Technologies Inc

02/01/18 / #20180034930

Content delivery network request handling mechanism with cached control information

Described herein are improved systems, methods, and devices for delivering and managing metadata in a distributed computing platform such as a content delivery network (cdn) so as to configure content servers to handle client requests. The teachings hereof provide, among other things, scalable and configurable solutions for delivering and managing metadata, preferably by leveraging dynamically obtained control information. ... Akamai Technologies Inc

02/01/18 / #20180034633

Cryptographic material sharing among entities with no direct trust relationship or connectivity

A mechanism to share cryptographic material across entities that may not have a direct trust relationship between or among each other, or no network connectivity, or some combination thereof, but where participating entities do share a trust relationship (or trusted connection(s)) with a common entity, sometimes referred to herein as a “conduit” entity. This technique enables such entities to leverage their trust relationship with a common “conduit” entity to share cryptographic material between or among themselves.. ... Akamai Technologies Inc

01/25/18 / #20180027089

Systems and methods for caching content with notification-based invalidation

Described herein are systems, devices, and methods for content delivery on the internet. In certain non-limiting embodiments, a caching model is provided that can support caching for indefinite time periods, potentially with infinite or relatively long time-to-live values, yet provide prompt updates when the underlying origin content changes. ... Akamai Technologies Inc

01/25/18 / #20180027087

Assessment of content delivery services using performance measurements from within an end user client application

A system for measuring and monitoring performance of online content is provided. In one embodiment, the system includes an intermediary device, such as a web proxy, that receives client requests for content, such as requests for web pages. ... Akamai Technologies Inc

01/18/18 / #20180020082

Scalable content delivery network request handling mechanism with support for dynamically-obtained content policies

Described herein are improved systems, methods, and devices for delivering and managing metadata in a distributed computing platform such as a content delivery network (cdn) so as to configure content servers to handle client requests. The teachings hereof provide, among other things, scalable and configurable solutions for delivering and managing metadata, preferably by leveraging dynamically obtained control information. ... Akamai Technologies Inc

01/04/18 / #20180007117

Multi-domain configuration handling in an edge network server

An internet infrastructure delivery platform operated by a provider enables http-based service to identified third parties at large scale. The platform provides this service to one or more cloud providers. ... Akamai Technologies Inc

12/28/17 / #20170374125

Mechanism for distinguishing between content to be served through first or second delivery channels

Described herein are methods, apparatus and systems for selectively delivering content through one of two communication channels, one being origin to client and the other being from or through a cdn to client. Thus a client may choose to request content from a cdn and/or from an origin server. ... Akamai Technologies Inc

12/14/17 / #20170359227

Internet address structure analysis, and applications thereof

An analysis system automates ip address structure discovery by deep analysis of sample ipv6 addresses using a set of computational methods, namely, information-theoretic analysis, machine learning, and statistical modeling. The system receives a sample set of ip addresses, computes entropies, discovers and mines address segments, builds a network model of address segment inter-dependencies, and provides a graphical display with various plots and tools to enable a network analyst to navigate and explore the exposed ipv6 address structure. ... Akamai Technologies Inc

12/07/17 / #20170353437

Filtering tls connection requests using tls extension and federated tls tickets

A system to deliver an application, hosted by a private application provider, over a network to a user device comprising: an application delivery system that includes, a frontend network interface that includes at least one first traffic director (ftd) instance; a network security interface that includes a plurality of traffic processing server (tps) instances; a backend network interface that includes at least one backend traffic director (btd) instance; and at least one agent that is associated with the application and that is disposed within the private application provider system; wherein a federated tls ticket is used to filter tls connection requests received by an ftd instance; and wherein a tls extension is used to filter tls connection requests received by a btd instance. . ... Akamai Technologies Inc

11/30/17 / #20170346738

Preventing tcp from becoming too conservative too quickly

A technique that addresses the problem of a tcp connection's throughput being very vulnerable to early losses implements a pair of controls around ssthresh. A first control is a loss forgiveness mechanism that applies to the first n-loss events by the tcp connection. ... Akamai Technologies Inc

11/09/17 / #20170324796

Stream handling using an intermediate format

A method of delivering a live stream is implemented within a content delivery network (cdn) and includes the high level functions of recording the stream using a recording tier, and playing the stream using a player tier. The step of recording the stream includes a set of sub-steps that begins when the stream is received at a cdn entry point in a source format. ... Akamai Technologies Inc

10/26/17 / #20170310726

Stream-based data deduplication using directed cyclic graphs to facilitate on-the-wire compression

Stream-based data deduplication is provided in a multi-tenant shared infrastructure but without requiring “paired” endpoints having synchronized data dictionaries. Data objects processed by the dedupe functionality are treated as objects that can be fetched as needed. ... Akamai Technologies Inc

10/12/17 / #20170293748

Intrusion detection on computing devices

A non-transitory computer readable storage medium including instructions that, when executed by a computing system, cause the computing system to perform operations. The operations include collecting, by a processing device, raw data regarding a user action. ... Akamai Technologies Inc

09/28/17 / #20170279916

Content delivery network (cdn) cold content handling

A method of content delivery in a content delivery network (cdn), where the cdn is deployed, operated and managed by a content delivery network service provider (cdnsp). The cdn comprises a set of content servers and a domain name system (dns). ... Akamai Technologies Inc

08/24/17 / #20170244682

Caching content securely within an edge environment, with pre-positioning

A technique to cache content securely within edge network environments, even within portions of that network that might be considered less secure than what a customer desires, while still providing the acceleration and off-loading benefits of the edge network. The approach ensures that customer confidential data (whether content, keys, etc.) are not exposed either in transit or at rest. ... Akamai Technologies Inc

08/24/17 / #20170244681

Terminating ssl connections without locally-accessible private keys

An internet infrastructure delivery platform (e.g., operated by a service provider) provides an rsa proxy “service” as an enhancement to the ssl protocol that off-loads the decryption of the encrypted pre-master secret (epms) to an external server. Using this service, instead of decrypting the epms “locally,” the ssl server proxies (forwards) the epms to an rsa proxy server component and receives, in response, the decrypted pre-master secret. ... Akamai Technologies Inc

08/24/17 / #20170244680

Caching content securely within an edge environment

A technique to cache content securely within edge network environments, even within portions of that network that might be considered less secure than what a customer desires, while still providing the acceleration and off-loading benefits of the edge network. The approach ensures that customer confidential data (whether content, keys, etc.) are not exposed either in transit or at rest. ... Akamai Technologies Inc

08/24/17 / #20170244665

Provisioning tool for a content delivery network (cdn)

A tool that allows a cdn customer, partner, or other authorized entity to create a dns canonical name (cname) on the content delivery network without having to contact the content delivery network service provider directly.. . ... Akamai Technologies Inc

08/17/17 / #20170235954

Detecting non-human users on computer systems

A method including collecting, by a processing device, raw data regarding an input to fill a form field. The method further includes converting, by the processing device, the raw data to test data, wherein the test represents behavioral characteristics of the entry of the input. ... Akamai Technologies Inc

08/10/17 / #20170230331

Correlating nameserver ipv6 and ipv4 addresses

Nameserver addresses are correlated in a multi-tier name server hierarchy comprising a first level authority for a domain, and one or more second level authorities to which the first level authority delegates with respect to a particular sub-domain associated with the domain. Preferably, the first level authority is ipv4-based and at least one second level authority is ipv6-based. ... Akamai Technologies Inc

08/03/17 / #20170223149

Hybrid http and udp content delivery

A hybrid http/udp delivery protocol provides significant improvements for delivery of video and other content over a network, such as an overlay. The approach is especially useful to address problems (e.g., slow startup times, rebuffering, and low bitrates) for http-based streaming. ... Akamai Technologies Inc

07/13/17 / #20170199988

Extending data confidentiality into a player application

In a content protection scheme, and in response to a request for a content segment received by a server, the server generates and associates with the segment a message that confers entitlement to a session-specific key from which one or more decryption keys may be derived. The decryption keys are useful to decrypt the segment at runtime as it is about to be rendered by a player. ... Akamai Technologies Inc

07/06/17 / #20170195237

Distributed quality-of-service (qos) mechanism in an overlay network having edge regions

The techniques herein provide for enhanced overlay network-based transport of traffic, such as ipsec traffic, e.g., to and from customer branch office locations, facilitated through the use of the internet-based overlay routing infrastructure. This disclosure describes a method of managing and enforcing quality-of-service (qos) in an internet-based overlay network shared by a set of content provider customer entities. ... Akamai Technologies Inc

07/06/17 / #20170195217

Distributed quality-of-service (qos) in an overlay network using capacity enforcement

The techniques herein provide for enhanced overlay network-based transport of traffic, such as ipsec traffic, e.g., to and from customer branch office locations, facilitated through the use of the internet-based overlay routing infrastructure. This disclosure in particular describes a method of managing and enforcing quality-of-service (qos) in an internet-based overlay network shared by a set of content provider customer entities. ... Akamai Technologies Inc

07/06/17 / #20170195161

Overlay network ingress edge region selection

This disclosure relates to enhanced overlay network-based transport of traffic to and from customer branch office locations, facilitated through the use of the internet-based overlay routing. A method of selecting an ingress edge region of the overlay network begins by mapping a service hostname to an ikev2 destination of an outer ipsec tunnel associated with a first overlay network edge. ... Akamai Technologies Inc

06/15/17 / #20170170973

Uniquely identifying and securely communicating with an appliance in an uncontrolled network

A service consumer that utilizes a cloud-based access service provided by a service provider has associated therewith a network that is not capable of being controlled by the service provider. An enterprise connector is supported in this uncontrolled network, preferably as an appliance-based solution. ... Akamai Technologies Inc

04/27/17 / #20170116607

Method and system for handling sensitive data in a content delivery network

Using cryptographic techniques, sensitive data is protected against disclosure in the event of a compromise of a content delivery network (cdn) edge infrastructure. These techniques obviate storage and/or transfer of such sensitive data, even with respect to payment transactions that are being authorized or otherwise enabled from cdn edge servers.. ... Akamai Technologies Inc

04/27/17 / #20170116349

Creation and delivery of pre-rendered web pages for accelerated browsing

The process of rendering web pages can be significantly improved with a content delivery system that pre-renders web content for a client device. A web page “program” can be pre-executed and the result delivered to a requesting client device, rather than or before sending a traditional set of web page components, such as a markup language document, cascading style sheets, embedded objects. ... Akamai Technologies Inc

04/20/17 / #20170111665

Multiple bitrate format-agnostic streaming architecture

Delivering a content stream within a content delivery network (cdn) includes recording the stream using a recording tier, and playing the stream using a player tier. For a live stream, recording the stream begins when the stream is received at a cdn entry point in a source format. ... Akamai Technologies Inc

04/20/17 / #20170111464

Http-based stream delivery

Live stream delivery within a content delivery network (cdn) includes recording the stream using a recording tier, and playing the stream using a player tier. Recording begins when the stream is received in a source format. ... Akamai Technologies Inc

04/20/17 / #20170111334

Providing forward secrecy in a terminating tls connection proxy

An infrastructure delivery platform provides a rsa proxy service as an enhancement to the tls/ssl protocol to off-load, from an edge server to an external cryptographic server, the decryption of an encrypted pre-master secret. The technique provides forward secrecy in the event that the edge server is compromised, preferably through the use of a cryptographically strong hash function that is implemented separately at both the edge server and the cryptographic server. ... Akamai Technologies Inc

04/20/17 / #20170111314

Peer-to-peer connection establishment using turn

A relay service enables two peers attempting to communicate with one another to each connect to a publicly-accessible relay server, which servers are associated with an overlay network and are selected by a directory service. After end-to-end connectivity is established, preferably the hosts communicate with each other by relaying data packets via the overlay network relay servers. ... Akamai Technologies Inc

04/20/17 / #20170111179

Providing forward secrecy in a terminating ssl/tls connection proxy using ephemeral diffie-hellman key exchange

An infrastructure delivery platform provides a proxy service as an enhancement to the tls/ssl protocol to off-load to an external server the generation of a digital signature, the digital signature being generated using a private key that would otherwise have to be maintained on a terminating server. Using this service, instead of digitally signing (using the private key) “locally,” the terminating server proxies given public portions of ephemeral key exchange material to the external server and receives, in response, a signature validating the terminating server is authorized to continue with the key exchange. ... Akamai Technologies Inc

04/20/17 / #20170109797

Server-side detection and mitigation of client-side content filters

A server-side technique to detect and mitigate client-side content filtering, such as ad blocking. In operation, the technique operates on a server-side of a client-server communication path to provide real-time detect the existence of a client filter (e.g., an ad blocker plug-in) through transparent request exchanges, and then to mitigate (defeat) that filter through one or operations designed to modify the html response body or otherwise obscure urls. ... Akamai Technologies Inc

04/13/17 / #20170104786

Splicing into an active tls session without a certificate or private key

An origin server selectively enables an intermediary (e.g., an edge server) to shunt into and out of an active tls session that is on-going between a client and the origin server. The technique allows for selective pieces of a data stream to be delegated from an origin to the edge server for the transmission (by the edge server) of authentic cached content, but without the edge server having the ability to obtain control of the entire stream or to decrypt arbitrary data after that point. ... Akamai Technologies Inc

03/16/17 / #20170078453

Scalable content delivery network request handling mechanism to support a request processing layer

Described herein are systems, devices, and methods for content delivery on the internet. In certain non-limiting embodiments, a caching model is provided that can support caching for indefinite time periods, potentially with infinite or relatively long time-to-live values, yet provide prompt updates when the underlying origin content changes. Described herein are improved systems, methods, and devices for delivering and managing metadata in a distributed computing platform such as a content delivery network (cdn) so as to configure content servers to handle client requests. The teachings hereof provide, among other things, scalable and configurable solutions for delivering and managing metadata, preferably by leveraging dynamically obtained control information. ... Akamai Technologies Inc

03/02/17 / #20170060952

System and methods for leveraging an object cache to monitor network traffic

According to non-limiting embodiments disclosed herein, the functionality of an object cache in a server can be extended to monitor and track web traffic, and in particular to perform rate accounting on selected web traffic. As the server communicates with clients (e.g., receiving http requests and responding to those requests), the server can use its existing object cache storage and existing object cache services to monitor web traffic by recording how often a client makes a particular request in the object cache and/or other data about the requests. ... Akamai Technologies Inc

02/23/17 / #20170054683

Secure application delivery system with dial out and associated method

A system is provided to deliver an application, hosted by a private application provider system, over a network to a user device, comprising: an application delivery system that includes a first network interface, a network security interface and a second network interface; wherein the network security interface is configured to determine whether a user or device request for access to an application is valid, and in response to determining that the user or device request for access to the first application is valid, to send the user or device request to the application agent.. . ... Akamai Technologies Inc

02/23/17 / #20170050190

Efficiently sanitizing a solid state drive (ssd)

A low-cost, portable, destructive sanitization method for solid state drives (ssds) is provided. Preferably, an ssd is destroyed by disintegration within a given time period (approximately 30 minutes or less) using a blending device operating at a given peak power, e.g., greater than 450 w. ... Akamai Technologies Inc

02/09/17 / #20170041424

Key resource prefetching using front-end optimization (feo) configuration

Front-end optimization (feo) configuration information is leveraged to identify “key” resources required to load other pages on a site, and to automatically cause key resources to be prefetched to a server, and to the browser. In this approach, an feo analyzer uses knowledge of configured optimization templates to determine the key resources required to load pages for each template. ... Akamai Technologies Inc

01/19/17 / #20170019626

Frame-rate conversion in a distributed computing system

Described herein are, among other things, distributed processing methods and systems for frame rate conversion. In an embodiment, a transcoding management machine manages a distributed transcoding process, creating a plurality of video segments and assigning the video segments across a set of distributed transcoding resources for frame rate conversion. ... Akamai Technologies Inc

01/05/17 / #20170006077

Stream-based data deduplication with cache synchronization

Stream-based data deduplication is provided in a multi-tenant shared infrastructure but without requiring “paired” endpoints having synchronized data dictionaries. Data objects processed by the dedupe functionality are treated as objects that can be fetched as needed. ... Akamai Technologies Inc








ARCHIVE: New 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009



###

This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. Freshpatents.com is not affiliated or associated with Akamai Technologies Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Akamai Technologies Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by FreshPatents.com

###