A portion of the disclosure of this patent document contains material which is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by any-one of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
The present invention generally relates to a cloud-based firewall system and service, including in particular such systems and services implemented on in edge-computing or other distributed computing systems.
Distributed computer systems are known in the art. One such distributed computer system is a “content delivery network” or “CDN” that is operated and managed by a service provider. The service provider typically provides the service on behalf of third parties. A “distributed system” of this type typically refers to a collection of autonomous computers linked by a network or networks, together with the software, systems, protocols and techniques designed to facilitate various services, such as content delivery or the support of outsourced site infrastructure. Typically, “content delivery” means the storage, caching, or transmission of content, streaming media and applications on behalf of content providers, including ancillary technologies used therewith including, without limitation, DNS request handling, provisioning, data monitoring and reporting, content targeting, personalization, and business intelligence. Typically, the term “outsourced site infrastructure” means the distributed systems and associated technologies that enable an entity to operate and/or manage a third party's Web site infrastructure, in whole or in part, on the third party's behalf.
In a known system, such as shown in
The distributed computer system may also include other infrastructure, such as a distributed data collection system 108 that collects usage and other data from the edge servers, aggregates that data across a region or set of regions, and passes that data to other back-end systems 110, 112, 114 and 116 to facilitate monitoring, logging, alerts, billing, management and other operational and administrative functions. Distributed network agents 118 monitor the network as well as the server loads and provide network, traffic and load data to a DNS query handling mechanism 115, which is authoritative for content domains being managed by the CDN. A distributed data transport mechanism 120 may be used to distribute control information (e.g., metadata to manage content, to facilitate load balancing, and the like) to the edge servers. More about the distribution of control information in a CDN can be found in U.S. Pat. No. 7,240,100, the disclosure of which is hereby incorporated by reference in its entirety.
As illustrated in
Client machines 122 include conventional personal computers, laptops, other digital data processing devices. Client machines also include mobile clients, which may include any a variety of mobile devices, often referred to as smart-phones or personal digital assistants (PDAs).
A CDN edge server is configured to provide one or more extended content delivery features, preferably on a domain-specific, customer-specific basis, preferably using configuration files that are distributed to the edge servers using a configuration system. A given configuration file preferably is XML-based and includes a set of content handling rules and directives that facilitate one or more advanced content handling features. The configuration file may be delivered to the CDN edge server via the data transport mechanism. U.S. Pat. No. 7,111,057, the disclosure of which is incorporated herein by reference, illustrates a useful infrastructure for delivering and managing edge server content control information, such as that for controlling file purge requests.
The CDN may include a storage subsystem (NetStorage), such as described in U.S. Pat. No. 7,472,178, the disclosure of which is incorporated herein by reference.
The CDN may operate a server cache hierarchy (Cache-H) to provide intermediate caching of customer content; one such cache hierarchy subsystem is described in U.S. Pat. No. 7,376,716, the disclosure of which is incorporated herein by reference.
For live streaming delivery, the CDN may include a delivery subsystem, such as described in U.S. Pat. No. 7,296,082, the disclosure of which is incorporated herein by reference.
The CDN may provide secure content delivery among a client browser, edge server and customer origin server in the manner described in U.S. Publication No. 2004/0093419 and/or U.S. Pat. No. 7,363,361, the disclosures of which are both incorporated herein by reference. Secure content delivery as described therein enforces SSL-based links between the client and the edge server process, on the one hand, and between the edge server process and an origin server process, on the other hand. This enables an SSL-protected web page and/or components thereof to be delivered via the edge server.
Disclosed herein is a cloud-based firewall system and service that protects customer origin sites from attacks, leakage of confidential information, and other security threats. Such a firewall system and service may be implemented in conjunction with a content delivery network (CDN) having a plurality of distributed content servers.
For example, in one illustrative embodiment of the invention, there is provided a method of content delivery in a CDN operated by a content delivery network service provider (CDNSP) on behalf of participating content providers. The participating content providers identify content to be delivered over the CDN. The content delivery method involves receiving first firewall settings from a first participating content provider that specify how a firewall is to operate with respect to requests for content identified by that first participating content provider for delivery over the CDN. Other, potentially different, firewall settings are received from a second participating content provider that specify how a firewall is to operate with respect to requests for content identified by that second participating content provider for delivery over the CDN. The settings are sent to various content servers in the CDN in a metadata configuration file, or other form. At one of those content servers, there is received a first request for content identified by the participating content provider for delivery over the CDN. The content server evaluates the first request using a firewall configured with the one or more first firewall settings. A second request is received for content identified by the second participating content provider for delivery over the CDN. The second request is evaluated using a firewall configured with the one or more second firewall settings.
In related embodiments, in a method as described above, evaluation of the first request using a firewall configured with the one or more first firewall settings involves testing the first request against one or more criteria. Evaluation of the second request can proceed similarly. If criteria are met, an action can be taken, such as denying the request, generating an alert, modifying the request, stopping processing the request, and logging the request.
The firewall settings can include IP addresses for which a particular action is taken, e.g., traffic from particular IP addresses may be blocked, or traffic from those addresses may be allowed with all other traffic blocked. Hence, the firewall may apply security at the application layer (to HTTP requests, and others), the network layer, and/or other layers.
In another illustrative embodiment of the invention, there is provided a method of content delivery in a CDN which involves receiving a first firewall configuration and second firewall configuration (e.g., each with one or more firewall settings) from a participating content provider. The participating content provider also specifies usage criteria that set forth whether the first firewall configuration is to be used for evaluating a content request, and usage criteria that set forth whether the second firewall configuration is to be used for evaluating a content request. The usage criteria may take into account such characteristics as a domain name in a request, subdomain in a request, URL of a request, content type requested, file name of requested content, file extension of requested content.
Continuing the foregoing example, these settings and usage criteria are sent to the content servers in the CDN. At one of content servers, a request is received for content of the participating content provider. Based on the request and the first firewall usage configuration criteria, the content server determines whether the first firewall configuration is to be used, and if so, evaluates the request using a firewall configured with the first firewall configuration. Based on the request and the second firewall usage configuration criteria, the content server determines whether the second firewall configuration is to be used, and if so, evaluates the request using a firewall configured with the second firewall configuration. Additional features and characteristics are set forth throughout this disclosure.
The invention will be more fully understood from the following detailed description taken in conjunction with the accompanying drawings, in which:
The following detailed description sets forth embodiments to provide an overall understanding of the principles of the structure, function, and use of the methods and systems disclosed herein. The methods and systems described herein and illustrated in the accompanying drawings are non-limiting examples; the scope of the present invention is defined solely by the claims. The features described or illustrated in connection with one exemplary embodiment may be combined with the features of other embodiments. Such modifications and variations are intended to be included within the scope of the present invention. All patents, publications and references cited herein are expressly incorporated herein by reference in their entirety.
The methods and systems disclosed herein may be implemented in a distributed computer system, e.g., a content delivery network (“CDN”) as illustrated in
Client machines 322 desiring content from the origin server 306 are directed to one of the content servers 302. The requests (e.g., an HTTP or HTTPS request) are examined at the network edge by the firewalls 302a, which are configured to examine the traffic for attacks, leakage of information, or other kinds of security risks. Requests that pass the firewalls 302a are processed normally, with the requested content being served from content server's 302 cache, or being retrieved by the content server 302 from the origin server 306 for delivery to the client machine 322, or otherwise dealt with. Requests that are identified as attacks or other security threats (such as those from attacker machine 324) trigger the firewall 302 to take certain action, e.g., blocking the request, logging it for alert, or otherwise. Hence, threats are identified and blocked or otherwise addressed by the system 300 closer to the source and before reaching the origin server 306, offloading that burden from the origin server 306. In the case where the servers 302 are located at the network “edges”, the firewalls 302a address those threats at the network edge. It should be noted that the origin server 306 may employ its own centralized firewall, intrusion detection/protection system, or other security system, in addition to the firewall system deployed on the content servers 302.
Although the CDN provider can configure the firewalls 302a (e.g., with a default setting or otherwise), the system 300 allows the content provider associated with the origin server 306, as a customer of the CDN, to configure the firewall settings that will apply to requests for content of that content provider.
Because the firewall module is implemented in multiple ghost processes throughout the CDN, the solution illustrated in
By implementing the subject matter described herein in a distributed network such as a CDN, a CDN service provider provides a firewall managed service. The service provides a scalable edge defense system for blocking, among other things, Web application attacks in the cloud. The firewall service provides CDN customers with a unique approach to easily and economically defend their Web applications. With no hardware to manage or maintain, CDN customers manage their own security rule set through the CDN service provider's customer (extranet) portal. Additionally, the firewall service helps enable Payment Card Industry (PCI) Data Security Standard compliance. The infrastructure is shared across multiple CDN customers, but each customer can provision and manage its own firewall to protect against attacks.
With the foregoing overview, the subject matter hereof will now be described in more detail.
1.0 Cloud-Based Firewall
Cloud-based Firewall (CF) is a security module for content delivery network customers. The CF module applies a rules-based evaluation of requests to scan for suspicious behavior, such as protocol violations, HTTP policy violations, request limit violations, robots, Trojan backdoors, generic attacks (such as cross-site scripting, various injection attacks, and so forth), outbound content leakage (server banners), and several other categories.
Compliance with payment card industry data security standards (PCI-DSS) requires an application firewall be used by companies who process payment card transactions to monitor and protect the origin infrastructure from the many existing web interface attacks that currently exist. The CF module can be used in conjunction with a PCI module to help customer's meet these PCI compliance requirements. The CF solution protects an origin server for requests that route through the CDN servers; an additional means of protecting the origin may be utilized as well. One such solution is described in U.S. Pat. No. 7,260,639, the disclosure of which is incorporated herein by reference.
Preferably, the Cloud Firewall is based on a set of core rules (e.g., a rule set available from Breach Security Labs, e.g., ModSecurity v1.6). ModSecurity applies a broad set of match criteria to HTTP requests to identify behaviors that can be classified as attacks, leakage of information or other kinds of security threats. The Core Rule Set defines security rules as well as configuration parameters for the Apache web server. On a high level, a security rule is an expression associated with data. The expression is usually the combination of an operator, variables and translations, which yields a Boolean. An expression can also be a logical OR or AND between other expressions, or the negation of another expression. The data for each rule consists of an identifier (or “id”), a tag, a message, a flag that tells if the request should be denied, a severity level, etc.
As noted above, preferably the firewall leverages a rule set, such as open source ModSecurity Core Rule Set supported by Breach Security, which defines common and harmful types of attacks and exploitation techniques, such as SQL Injection, Cross Site Scripting (XSS) and other Open Web Application Security Project (OWASP) Top-10 attacks. Other rule sets may be utilized.
These core rules (or a subset thereof) are converted into a metadata functional solution, with control metadata being delivered to and applied at the CDN servers in the manner described in U.S. Pat. No. 7,240,100, the disclosure of which is incorporated herein by reference. In particular, preferably the metadata is provisioned via a customer-facing extranet portal (e.g., via a Web-based user interface) and provided to the content servers within a metadata configuration file. Because the configuration file may need to change frequently (to deal with attack scenarios), preferably the CF-related metadata configuration is delivered to CDN content server processes using a dedicated and fast communication channel. See, U.S. Pat. No. 7,149,807 (the disclosure of which is incorporated herein by reference) for a useful communication infrastructure that may be used for this purpose. In some embodiments, the deployment of the configuration files throughout the distributed system can be accomplished within a short period of time, advantageously enabling real-time response to attacks.
The CF metadata configuration file should be ready for lookup when the firewall is activated on a particular content server. As will be described below in connection with
2.0 Configuration Overview
In step 404, settings for the network layer are configured. Such settings may include a designation of IP addresses to block (blacklist) or other security criteria. Settings may also include, for example, a designation of a whitelist consisting of IP addresses of hosts/networks to grant access without further inspection, or other rules based on the information received in the request for content.
A particular configuration of the firewall may be used to evaluate some requests for content, but not others. In step 406, usage of the configuration is defined. This can be accomplished by designating criteria indicating that the configuration will apply, referred to as Match Targets. For example, the settings shown
The process of configuring the firewall may also include defining rules for the transport layer (for example, the firewall may be configured to treat traffic using TCP differently than traffic using UDP or other protocols) or other networking layers. Although typically a firewall configuration will apply uniformly across content servers for a given customer, in alternate embodiments the firewalls operating on different content servers may be configured differently for the given customer.
In step 408, the configuration of the firewall is deployed to content servers in the CDN (e.g., by deploying a metadata configuration file over a communication channel, as described above).
2.1 Configuration Files
In a preferred embodiment, the CF module involves two configuration files: (1) a CF rules configuration file that manages the application and network rules, as well as Real-Time-Reporting configuration (referred to herein as a “CF metadata configuration file” or “CF rules configuration file”). (2) Standard alternative resource locator (ARL) configuration file that manages the site's settings (referred to herein as a “master configuration file”). Alternate embodiments may not use dual configuration files or use configuration files at all.
2.2 CF Rules Configuration File
Preferably, a CDN customer who is contracted for CF has only one CF configuration file. Through the use of Firewall Instances and Match Targets, separate CF policies can be applied to different digital properties and URLs with this single file. This does provide some additional flexibility that can allow different firewall policies to be applied to different URLs on the same digital property AND allow the same firewall policy to be applied to other properties, as well. The CF rules configuration preferably contains several components:
Firewall Instances—the settings to apply to the match target.
Application Layer Controls configuration
Network Layer Controls configuration
Real-Time Reporting configuration (RTR)
Match Targets—the criteria used to determine if the Firewall instance needs to be applied.
Match targets
Firewall instance to apply
Apply Application Layer Controls
Apply Network Layer Controls
2.3 Firewall Instances
A Firewall Instance represents the grouping of enabled controls which are to be applied to a request when the specific instance is evoked based on the Match Target criteria. In one implementation, a Match Target can evoke only one Firewall Instance. The Match Targets may be processed such that the bottom match wins and the appropriate Firewall Instance is used. The Match Targets may also be processed according to a hierarchy, such that a Match Target (and associated firewall configuration) that applies to domain is trumped by a Match Target applying to a sub-domain, which is trumped by a Match Target applying to a particular content type, and so forth.
Application Layer Controls define the security criteria to be checked with each request and the action to take if the attack is identified. Possible actions are Alert (do not deny the request, only generate an alert and continue processing the HTTP request) and Deny (deny the request, resulting in a HTTP 403 response, generation of an alert, and stop processing the HTTP request). Application Layer Controls are grouped into higher level groupings for a classification of attacks, e.g., based on ModSecurity or other rulesets. Within each classification, preferably several specific detection rules exist.
Customers can choose to apply only the specific rules they choose to select and configure each rule to either alert, deny, or take other action.
Network Layer Controls define the IP restrictions, for example, that are to be applied to the site. Requests from particular IP addresses can be blocked and/or allowed, or a strict black list/white list may be applied. Multiple IP addresses may be specified using CIDR notation.
Real-Time Reporting defines the URL, through a CDN-served digital property, to which the edge server process (ghost) will POST data based on the rule(s) that were triggered. The CDN may include a server e-mail-based log delivery service (LDS) that reports data to the CDN customer. The CDN LDS may include options to add fields for W3C and Combined formats. To provide more real-time information to the CDN customer, Real-Time Reporting is used send CF specific data to customers quickly. As the data is sent as a POST, the customer can create the POST processing application to react in any way appropriate for their needs, such as either immediately generating alerts or only alert if X alerts are generated in Y minutes.
It is useful to note the distinction between activation/deactivation of a firewall instance and enabling/disabling of rules processing within that instance. Activation/deactivation should occur infrequently—only when a firewall instance is first created or deleted. Activation/deactivation controls the process of including/removing the reference to the CF data file, e.g., within a larger metadata configuration file (that may include other control information for the content server ghost process). Preferably, it involves modifying/deploying the ghost metadata file (that includes such other control information).
On the other hand, enabling/disabling of rules processing within an activated firewall instance is controlled by the a status metadata tag contained in the configuration file. Modifying/deploying a configuration file is intended to be a quicker process than modifying/deploying the ghost metadata file, preferably using a communication channel (from the portal to the content servers) that is dedicated for this purpose. In this way, enabling/disabling of rules processing can occur more frequently (if need be). Disabling causes the rules to be ignored until reactivated (the rules will still be on the content server but not executed until re-enabled). Fast delivery of firewall configuration thus preferably uses a dedicated metadata channel to carry per-customer configuration file that references the selected Core Rule Set rules and IP blocking rules for all the customer firewall instances.
2.4 Match Targets
A Match Target represents specific criteria that indicate the firewall rules should be applied. If a URL matches a Match Target, the specified Firewall Instance will be applied and the Application Layer Controls and/or the Network Layer Controls, as selected for the Match Target.
Match Targets require a CDN customer digital property (e.g., a customer domain, sub-domain, or the like) and at least one other standard URI match criteria: Path, Default File, and File Extensions. Once all match criteria are evaluated, the content server process (ghost) running CF will know if a firewall instance is to be applied and the controls within that instance that are to be applied.
2.5 Master Configuration File
The master metadata configuration file for the digital property has the CF module enabled through an Optional Features option before the CF rules configuration file will be used, regardless of the Match Targets.
The CF rules configuration is “inserted” into the master configuration file dynamically using a tag, such as <akamai:insert> tag. When the CF Optional Feature is enabled, the <akamai:insert> tag is inserted into the beginning of the customer site metadata (See, U.S. Pat. No. 7,240,100) with the appropriate tags to identify the CF rules configuration file. As a security requirement when the CF module is enabled, ghost to ghost (G2G) authentication is enabled.
2.6 Metadata Structure
In the example in
The following terminology can be used:
2.6.1 Metadata Controls
The CF feature is controlled with the following metadata control tags. In this embodiment, it is set in the beginning of the metadata file, before any firewall metadata is encountered.
2.6.2 Actions
Actions are defined with <security:firewall.action>, which is a listable node. The <security: firewall.action> node can contain any of these tags:
Firewall metadata is executed if the Cloud Firewall is turned on. If an action has the deny flag on, the control flow resumes after the firewall metadata. Once metadata is applied for the stage, the edge server ghost will return an error page to the user with the error status code from the action.
3.0 Firewall Request Processing
In step 902, the master configuration file for that digital property is retrieved and evaluated. The CF rules configuration (e.g., metadata in XML format or otherwise) is inserted into the master metadata configuration file using the <akamai:insert> tag. (In other embodiments, the CF rules configuration file may be evaluated separately, or other means of communicating the desired firewall configuration may be used.)
In step 904, the CF Match Targets specified in the configuration are evaluated to determine if a Firewall Instance is to be invoked. For example, the request may be tested against the Match Target criteria shown in
If the request matches a Match Target, then in steps 910-914 the firewall instance is invoked to evaluate the request against the security criteria. If the request does not meet any of the security criteria, then the request clears the firewall and continues to be processed as normal, and in accordance with other instructions in the master configuration file. (Step 916.) This processing may result in a content server in the CDN serving the requested content from its cache, or retrieving it from an origin server for delivery to the requestor.
If an enabled rule condition triggers a security condition, then the firewall takes action. The action to be taken is specified in the rules configuration file. (See,
4.0 Implementation
The clients, servers, and other devices described herein may be implemented on conventional computer systems, as modified by the teachings hereof, with the functional characteristics described above realized in software, hardware, or a combination thereof.
Software may include one or several discrete programs. Any given function may comprise part of any given module, process, execution thread, or other such programming construct. Generalizing, each function described above may be implemented as computer code, namely, as a set of computer instructions, for performing the functionality described via execution of that code using conventional means, e.g., a processor, a computer, a machine, a system, digital data processing device, or other apparatus.
Computer system 1000 includes a processor 1004 coupled to bus 1001. In some systems, multiple processor and/or processor cores may be employed. Computer system 1000 further includes a main memory 1010, such as a random access memory (RAM) or other storage device, coupled to the bus 1001 for storing information and instructions to be executed by processor 1004. A read only memory (ROM) 1008 is coupled to the bus 1001 for storing information and instructions for processor 1004. A non-volatile storage device 1006, such as a magnetic disk, solid state memory (e.g., flash memory), or optical disk, is provided and coupled to bus 1001 for storing information and instructions. Other application-specific integrated circuits (ASICs), field programmable gate arrays (FPGAs) or circuitry may be included in the computer system 1000 to perform functions described herein.
A peripheral interface 1012 communicatively couples computer system 1000 to a user display 1014 that displays the output of software executing on the computer system, and an input device 1015 (e.g., a keyboard, mouse, trackpad, touchscreen) that communicates user input and instructions to the computer system 1000. The peripheral interface 1012 may include interface circuitry, control and/or level-shifting logic for local buses such as RS-485, Universal Serial Bus (USB), IEEE 1394, or other communication links.
Computer system 1000 is coupled to a communication interface 1016 that provides a link (e.g., at a physical layer, data link layer, or otherwise) between the system bus 1001 and an external communication link. The communication interface 1016 provides a network link 1018. The communication interface 1016 may represent a Ethernet or other network interface card (NIC), a wireless interface, modem, an optical interface, or other kind of input/output interface.
Network link 1018 provides data communication through one or more networks to other devices. Such devices include other computer systems that are part of a local area network (LAN) 1026. Furthermore, the network link 1018 provides a link, via an internet service provider (ISP) 1020, to the Internet 1022. In turn, the Internet 1022 may provide a link to other computing systems such as a remote server 1030 and/or a remote client 1031. Network link 1018 and such networks may transmit data using packet-switched, circuit-switched, or other data-transmission approaches.
In operation, the computer system 1000 may implement the functionality described herein as a result of the processor executing code. Such code is typically read from or provided by a non-transitory computer-readable medium, such as memory 1010, ROM 1008, or storage device 1006. Other forms of non-transitory computer-readable media include disks, tapes, magnetic media, CD-ROMs, optical media, RAM, PROM, EPROM, and EEPROM. Any other non-transitory computer-readable medium may also be employed. Executing code may also be read from network link 1018 (e.g., following temporary storage in an interface buffer, local memory, or other circuitry).
This application is a continuation of U.S. application Ser. No. 13/896,995, filed May 17, 2013, which is a continuation of U.S. application Ser. No. 12/965,188, filed Dec. 10, 2010 (now U.S. Pat. No. 8,458,769), which claims the benefit of priority of U.S. Provisional Application No. 61/285,958, filed Dec. 12, 2009, the disclosures of all of which are hereby incorporated by reference.
Number | Name | Date | Kind |
---|---|---|---|
6170012 | Coss et al. | Jan 2001 | B1 |
6832321 | Barrett et al. | Dec 2004 | B1 |
7155487 | Yau | Dec 2006 | B2 |
7159031 | Larkin et al. | Jan 2007 | B1 |
7260639 | Afergan et al. | Aug 2007 | B2 |
7296292 | Chang | Nov 2007 | B2 |
7373416 | Kagan | May 2008 | B2 |
7478429 | Lyon | Jan 2009 | B2 |
7730536 | Pasko et al. | Jun 2010 | B2 |
7996538 | Kikkawa | Aug 2011 | B2 |
8099588 | Massimiliano | Jan 2012 | B2 |
8122493 | Drako | Feb 2012 | B2 |
8225377 | Maffione et al. | Jul 2012 | B2 |
8225400 | Pacella et al. | Jul 2012 | B2 |
8346907 | Kagan | Jan 2013 | B2 |
8346960 | Van der Merwe et al. | Jan 2013 | B2 |
8458769 | Dilley | Jun 2013 | B2 |
8589685 | Moon | Nov 2013 | B2 |
8661056 | Brooks, et al. | Feb 2014 | B1 |
8839427 | Morrow et al. | Sep 2014 | B2 |
8949459 | Scholl | Feb 2015 | B1 |
9350706 | Glenn et al. | May 2016 | B1 |
9432385 | Kustarz et al. | Aug 2016 | B2 |
20060075084 | Lyon et al. | Apr 2006 | A1 |
20080159165 | Takara et al. | Jul 2008 | A1 |
20080225720 | Khemani et al. | Sep 2008 | A1 |
20080276304 | Maffione et al. | Nov 2008 | A1 |
20090119776 | Palnitkar et al. | May 2009 | A1 |
20090178131 | Hudis et al. | Jun 2009 | A1 |
20090288163 | Jacobson et al. | Nov 2009 | A1 |
20110054644 | Baek et al. | Mar 2011 | A1 |
20110099622 | Lee et al. | Apr 2011 | A1 |
20110126287 | Yoo et al. | May 2011 | A1 |
20110252469 | Cho et al. | Oct 2011 | A1 |
20110282997 | Prince et al. | Nov 2011 | A1 |
Number | Date | Country |
---|---|---|
1836402 | Sep 2006 | CN |
02054699 | Jul 2002 | WO |
Entry |
---|
Chinese Application No. 201380022058.7, 1st Office Action dated Nov. 14, 2016, 32 pages. |
CN Application No. 201080055156.X, 2nd Office Action dated Feb. 5, 2015, 8 pages including English translation. |
EU Application 10836803.6, Supplementary European Search Report, dated Sep. 28, 2016, 8 pages. |
OWASP web page of Mar. 9, 2011—Web Application Firewall, downloaded on Oct. 20, 2015, 3 pages; available at https://www.owasp.org/index.php?title=Web_Application_Firewall&oldid=106507. |
OWASP, Web Application Firewall, Sep. 15, 2015, downloaded on Oct. 20, 2015, 1 page; available at https://www.owasp.org/index.php/Web_Application_Firewall. |
Barath Raghavan et al., Cloud Control With Distributed Rate Limiting, SIGCOMM'07, Aug. 27-31, 2007, Kyoto, Japan, pp. 337-348. |
IDS Transmittal Letter and Communication Under MPEP § 609.02, submitted with this SB/08, May 18, 2017. |
Prolexic Technologies, product sheet entitled: DDOS Mitigation Service, 2006, 4 pages. |
Letter titled “Notice Submitted Under MPEP 2001.06(c): Information From Related Litigation,”, for Akamai Technologiesv. Limelight Networks, District Court for the District of Massachusetts, Case No. 1:16-cv-10253-GAO and Case No. 1:16-cv-12624-GAO, Letter submitted with this SB/08 form and dated Nov. 21, 2017, 2 pages. |
“Limelight Networks, Inc.'S Preliminary Invalidity Contentions”, served by Limelight Networks Aug. 11, 2017 in U.S. District Court for the District of Massachusetts, Case No. 1:16-cv-10253-Gao and Case No. 1:16-cv-12624-GAO, Akamai Technologies v. Limelight Networks, 43 pages. |
“Exhibit C.1: Preliminary Invalidity Chart for U.S. Pat. No. 8,458,769 Based on U.S. Pat. No. 8,661,056 Alone or in Combination with the Knowledge of One of Ordinary Skill”, Exhibit to Limelight Networks, Inc.'S Preliminary Invalidity Contentions, served by Limelight Networks Aug. 11, 2017 in US District Court for the District of Massachusetts, Case No. 1:16-cv-10253-Gao and Case No. 1:16-cv-12624-Gao, Akamai Technologies v. Limelight Networks, 71 pages. |
“Exhibit C.2: Preliminary Invalidity Chart for U.S. Pat. No. 8,458,769 Based on U.S. Pat. No. 6,832,321 in Combination with the Knowledge of One of Ordinary Skill and/or U.S. Pat. No. 7,260,639”, Exhibit to Limelight Networks, Inc.'S Preliminary Invalidity Contentions served by Limelight Networks Aug. 11, 2017 in US District Court for the District of Massachusetts, Case No. 1:16-cv-10253-GAO and Case No. 1:16-cv-12624-Gao, Akamai Technologies v. Limelight Networks, 71 pages. |
“Exhibit C.3: Preliminary Invalidity Chart for U.S. Pat. No. 8,458,769 Based on U.S. Pat. No. 7,730,536 Alone or in Combination with the Knowledge of One of Ordinary Skill and/or U.S. Pat. No. 6,832,321”, Exhibit to Limelight Networks, Inc.'S Preliminary Invalidity Contentions served by Limelight Networks Aug. 11, 2017 in US District Court for the District of Massachusetts, Case No. 1:16-cv-10253-GAO and Case No. 1:16-cv-12624-GAO, Akamai Technologies v. Limelight Networks, 70 pages. |
“Petition for Inter Partes Review filed by Limelight Networks against claims of U.S. Pat. No. 8458769”, IPR Case No. 2018-00359, filed Dec 22, 2017, with exhibits 1001-1006 (document upload in Part1 and Part2, 502 pages total). |
Notice Submitted Under MPEP 2001.06(c): Information From Related Proceedings, letter submitted herewith, Mar. 28, 2018. |
Patent Owners Preliminary Response Pursuant to 37 CFR 42.107 in IPR for U.S. Pat. No. 8458769, filed Mar. 28, 2018, 33 pages. |
Applicant letter of Aug. 22, 2017, filed in response to Supplementary European Search Report (EESR) dated Sep. 28, 2016 in EU Application 10836803.6 (EESR itself previously cited in May 19, 2017 IDS in this case). |
Number | Date | Country | |
---|---|---|---|
20160373411 A1 | Dec 2016 | US |
Number | Date | Country | |
---|---|---|---|
61285958 | Dec 2009 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 13896995 | May 2013 | US |
Child | 14998187 | US | |
Parent | 12965188 | Dec 2010 | US |
Child | 13896995 | US |