-
公开(公告)号:US10587617B2
公开(公告)日:2020-03-10
申请号:US15620593
申请日:2017-06-12
Applicant: Amazon Technologies, Inc.
Abstract: A method and apparatus for device authentication are provided. In the method and apparatus, authentication data for a first device is received. The first device is then authenticated based at least in part on demonstrated access to authentication data prior to broadcast of the authentication data. One or more actions may be taken in response to the authentication of the first device based at least in part on the demonstrated access to the authentication data.
-
公开(公告)号:US10511619B2
公开(公告)日:2019-12-17
申请号:US15592058
申请日:2017-05-10
Applicant: Amazon Technologies, Inc.
Inventor: Maarten Van Horenbeeck , Christopher Michael Anderson , Katharine Nicole Harrison , Matthew Ryan Jezorek , Jon Arron McClintock , Tushaar Sethi
IPC: H04L29/06 , G06N20/00 , H04L12/721
Abstract: Techniques described and suggested herein include various systems and methods for determining risk levels associated with transiting data, and routing portions of the data in accordance with the determined risk levels. For example, a risk analyzer may apply risk classifiers to transiting data to determine overall risk levels of some or all of the transiting data. A traffic router may route transiting data according to determined risk profiles for the data. A sandbox may be implemented to compare, for a given input, expected and observed outputs for a subset of transiting data, so as to determine risk profiles associated with at least the subset.
-
公开(公告)号:US20190268358A1
公开(公告)日:2019-08-29
申请号:US16408186
申请日:2019-05-09
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
IPC: H04L29/06
Abstract: Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system responds to the attacks by analyzing the behavior of the attacker, relating that behavior to one or more attack profiles and creating a simulated environment to respond to the attack based in part on the attack profiles. The simulated environment responds to the attack by communicating with the attacker.
-
公开(公告)号:US10262161B1
公开(公告)日:2019-04-16
申请号:US14580023
申请日:2014-12-22
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Darren Ernest Canavor , Harsha Ramalingam , George Nikolaos Stathakopoulos
IPC: G06F21/71
Abstract: Techniques described and suggested herein include the use of transformation parameters, such as mathematical and/or cryptographic operations, to permute various aspects of executables so as to control executable code authorized to run on one or more hosts. For example, a set of transformation parameters, such as a mathematical operation and a specified value upon which the mathematical operation may operate, are associated with a host or group of hosts. The set of transformation parameters may be applied to one or more runtime-related numerical locations associated with an executable that is intended to run on the specified hosts. At runtime, appropriately encoded executables are decoded by the specified hosts and operate normally, while differently encoded or unencoded executables are inoperable by the specified hosts.
-
公开(公告)号:US10248532B1
公开(公告)日:2019-04-02
申请号:US14855139
申请日:2015-09-15
Applicant: Amazon Technologies, Inc.
Inventor: Muhammad Wasiq , Jon Arron McClintock
Abstract: Methods, systems, and computer-readable media for implementing sensitive data usage detection using static analysis are disclosed. A specification of one or more operations exposed by a service in a service-oriented system is obtained from a repository. The names of the one or more operations are determined in the specification. The names of one or more parameters of the one or more operations are determined in the specification. The names of the one or more operations and the names of the one or more parameters are checked against a dictionary of sensitive terms. One or more sensitive operations are determined among the one or more operations. One or more consumers of the one or more sensitive operations are determined.
-
公开(公告)号:US10243747B2
公开(公告)日:2019-03-26
申请号:US15874822
申请日:2018-01-18
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Jesper Mikael Johansson , Jon Arron McClintock
Abstract: A manufacturer of computing equipment may generate a signature for computing equipment by measuring various attributes of the computing equipment, such as the impedance across circuits included in the computing equipment. Verification equipment may be provided to a recipient of the computing equipment. The verification equipment may be configured to generate a signature of the computing equipment over a physical connection between the verification equipment and the computing equipment. A determination may be made whether the computing equipment has been tamper with based at least in part on the signature generated by the manufacturer and the signature generated by the recipient.
-
公开(公告)号:US10187362B1
公开(公告)日:2019-01-22
申请号:US14745610
申请日:2015-06-22
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , John Clark Coonley Duksta , Katharine Nicole Harrison , Matthew Ryan Jezorek , Brian Young Lee , Maarten Van Horenbeeck
Abstract: A method and system are provided that create a limited use secure environment (LSE) image such as a limited use operating system installation that can be booted from a removable medium (e.g. CD or flash drive). The limited use secure environment is a limited purpose OS, web browser, etc. that prevents undesired activities. When the limited use secure environment boots, it initiates a pairing operation in which a pairing code and user credentials are conveyed to an authorization server. Once the pairing code and credentials are confirmed, a provisioning service provides configuration credentials to the limited use secure environment to enable the limited use secure environment to establish a secure connection through a gateway to resources of interest.
-
118.
公开(公告)号:US10135862B1
公开(公告)日:2018-11-20
申请号:US14959618
申请日:2015-12-04
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
IPC: H04L29/06
Abstract: Disclosed are various embodiments for testing the security incident response of an organization through automated injection of a known indicator of compromise. A stream of event data generated by a network monitoring system of an organization is received. The stream of event data is modified to include data embodying a fabricated indicator of compromise. The stream of event data that has been modified is then provided to an intrusion detection system of the organization. Metrics are then generated that assess the response of the organization to the fabricated indicator of compromise.
-
公开(公告)号:US10114960B1
公开(公告)日:2018-10-30
申请号:US14220880
申请日:2014-03-20
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Tushaar Sethi , Maarten Van Horenbeeck
Abstract: Techniques for detecting access to computer system data by applications running on a computer system are described herein. Data access event log entries are recorded, the log entries including one or more metadata items associated with how the computer system application accessed the computer system data. The log entries are analyzed using correlations with other computer system events and, if improper access is detected, one or more operations relating to the type of data accessed and the type of violation are performed to mitigate the improper data access.
-
公开(公告)号:US10089650B1
公开(公告)日:2018-10-02
申请号:US13945745
申请日:2013-07-18
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock
IPC: G06Q30/02
Abstract: Method and systems for providing universal event reminders in place of advertisements by leveraging advertisement retargeting. Information about a reminder event and a registered interest associated with the reminder event is received from a browser utilized by a user. The user's browser is then directed to provide the registered interest and information about accessing the reminder to an advertising service. In response to receiving a request for content from the browser, the request for content being generated in response to the browser receiving information about accessing the reminder from the advertising service, serving to the browser the reminder.
-
-
-
-
-
-
-
-
-