Akamai Technologies, Inc.
METHODS AND SYSTEM FOR HIGH VOLUME PROVISIONING PROGRAMMABLE LOGIC DEVICES WITH COMMON AND UNIQUE DATA PORTIONS

Last updated:

Abstract:

Among other things, this document describes systems, devices, and methods for responding to the detection of tampering with a remotely deployed computer, such as a server in a network data center. In one embodiment, the computer can be equipped with various tamper detection mechanisms, such as proximity sensors or circuitry triggered when the server's case is opened and/or internal components are moved or altered. Tamper detection can invoke an automated trust revocation mechanism. When tampering is detected, the computer hardware can automatically prevents access to, and/or use of, a previously stored authentication key. Consequently, the computer cannot authenticate to a remote entity, such as a network operations center and/or another computer in a distributing computing system. In some embodiments, the computer remains operable so that administrators can communicate with the server and/or extract information therefrom, although the computer will be treated as entrusted.

Status:
Application
Type:

Utility

Filling date:

17 Apr 2018

Issue date:

17 Oct 2019