Abstract:
Systems and methods for determining trust when interacting with online resources are described, including requesting a secure connection with an online resource; receiving a certificate from the online resource, wherein the certificate is signed by a chain of at least one certificate authority (CA) with the last CA in the chain being a root CA; determining that the root CA is an entity root CA without determining whether the root CA is a third-party root CA, wherein the entity root CA is associated with an entity certificate issued to an entity and the entity is associated with a score; determining whether the score is equal to or greater than a threshold; and, if the score is equal to or greater than the threshold, establishing the secure connection with the online resource.
Abstract:
This document describes methods and systems by which a data storage service migrates a volume of stored data from an unencrypted format to an encrypted format while still permitting user access to the data. The encryption process uses migration markers to identify records that have undergone the encryption process. When migration is complete, the service removes the migration markers and retains the encrypted data in a data storage facility.
Abstract:
A cloud computing service implements a method of securing customer data from access to only authorized administrative elements that are part of the cloud computing service. The service defines a set of access policies for the data, such that each access policy includes a permitted action. When the service receives a request to access the customer data, the request may include an access credential and originate from an administrative element within the cloud computing service. The service will verify the access credential and use the access credential to identify one of the access policies. The service will then identify a permitted action that is associated with the identified access policy and return a data access token to the administrative element. The data access token permits the administrative element to perform the identified permitted action on the customer data.
Abstract:
A method and/or system for reliable content recommendations may include receiving, from an electronic device, a request for one or more content recommendations. An indicator associated with the electronic device may be determined. A history of interactions, wherein the interactions may be associated with the indicator, may also be determined. One or more entity root certificates may be determined based on the history of interactions. Based on the one or more entity root certificates, one or more entities may be determined. One or more recommended content items may be determined, where the one or more recommended content items may be associated with the one or more entities. Content recommendation data may be communicated, to the electronic device, where the content recommendation data may comprises data related to the one or more recommended content items.
Abstract:
A method includes gathering a plurality of instances of online activity associated with a user, analyzing the plurality of instances of online activity to determine a characteristic that is likely to correspond to a profile attribute of the user and generating a profile enrichment suggestion for the user based on the determined characteristic.
Abstract:
A method of authorizing a transaction may include receiving, by a hosted service from a client device, a request to access an account and determining whether a user of the client device is permitted to access the account. The method may include, in response to determining that the user is permitted to access the account, receiving, from the client device, a request to initiate a transaction, determining whether the transaction is a long-lived transaction, in response to determining that the transaction is a long-lived transaction, creating a transaction credential associated with the long-lived transaction, and determining, based at least in part on the transaction credential, whether the execution of the long-lived transaction is authorized.
Abstract:
A method of controlling access to one or more data resources may include receiving, from a client device by an authentication server device, a request to access a data resource. The request may include a job identifier associated with a job. The method may include transmitting, by the authentication server device to a scheduling server device, the job identifier, receiving, by the authentication server device from the scheduling server device, job information associated with the job, determining, by the authentication server device, whether at least a portion of the job information satisfies an access policy associated with the data resource, and granting the job access to the data resource in response to the at least a portion of the job information satisfying the access policy.
Abstract:
An encrypted resource is stored in association with an access control list. A request to retrieve the resource is received. The wrapped key and the authentication credentials are sent, from the application server system, to a key server system. An unencrypted version of the resource encryption key is received from the key server system if the key server system determines that the authentication credentials correspond to a user in the group of users identified by the group identifier. The stored encrypted resource is decrypted using the received unencrypted version of the resource encryption key to generate an unencrypted version of the resource. The unencrypted version of the resource is sent, from the application server system, to the client application.
Abstract:
A storage service receives a binary large object (blob) for storage, and the service creates first and second sets of data chunks from the blob. The chunks in the first set together equal the blob, and the service uses one or more encryption keys to encrypt each of the data chunks in the first set. The chunks in the second set also together equal the blob. The service assigns a message authentication code (MAC) to each data chunk in the second set. The service stores the encrypted data chunks in one or more data stores, and it stores the encryption keys and the MACs as metadata in a metadata memory.
Abstract:
A storage service receives a binary large object (blob) for storage, and the service creates first and second sets of data chunks from the blob. The chunks in the first set together equal the blob, and the service uses one or more encryption keys to encrypt each of the data chunks in the first set. The chunks in the second set also together equal the blob. The service assigns a message authentication code (MAC) to each data chunk in the second set. The service stores the encrypted data chunks in one or more data stores, and it stores the encryption keys and the MACs as metadata in a metadata memory.