-
公开(公告)号:US09705920B1
公开(公告)日:2017-07-11
申请号:US14227845
申请日:2014-03-27
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Dominique Imjya Brezinski , Jesper Mikael Johansson , Jon Arron McClintock , James Connelly Petts
CPC classification number: H04L63/20 , G06F21/14 , G06F21/54 , G06F21/55 , H04L63/1491
Abstract: Disclosed are various embodiments for active data, such as active decoy data. The active decoy data includes instructions that, when executed by a particular device, cause the particular computing device to determine whether the particular computing device is a target computing device. The particular computing device initiates a predefined action in response to determining that the particular computing device is not the target computing device. The approaches described herein may also be useful in wrapping and distributing digital content.
-
公开(公告)号:US20170177902A1
公开(公告)日:2017-06-22
申请号:US15446434
申请日:2017-03-01
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
CPC classification number: H04L63/1491 , G06F21/60 , G06F21/6245 , G06F21/64 , H04L63/1416
Abstract: A method and apparatus for deterring exfiltration of data from are provided. In the method and apparatus, it is determined that data is to be inflated. A request for access to data is received and data responsive to the request is retrieved. Spurious data is also generated and provided together with the responsive data in response to the request.
-
公开(公告)号:US09661011B1
公开(公告)日:2017-05-23
申请号:US14574306
申请日:2014-12-17
Applicant: Amazon Technologies, Inc.
Inventor: Maarten Van Horenbeeck , Christopher Michael Anderson , Katharine Nicole Harrison , Matthew Ryan Jezorek , Jon Arron McClintock , Tushaar Sethi
IPC: H04L29/06 , H04L12/721
CPC classification number: H04L63/1425 , G06N99/005 , H04L45/70 , H04L63/1433
Abstract: Techniques described and suggested herein include various systems and methods for determining risk levels associated with transiting data, and routing portions of the data in accordance with the determined risk levels. For example, a risk analyzer may apply risk classifiers to transiting data to determine overall risk levels of some or all of the transiting data. A traffic router may route transiting data according to determined risk profiles for the data. A sandbox may be implemented to compare, for a given input, expected and observed outputs for a subset of transiting data, so as to determine risk profiles associated with at least the subset.
-
公开(公告)号:US09606983B1
公开(公告)日:2017-03-28
申请号:US14470886
申请日:2014-08-27
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Darren Ernest Canavor , Jesper Mikael Johansson
CPC classification number: G06F17/2765 , G06F3/0481 , G06F17/2276 , G06F17/271 , G06F17/2735 , G06F17/2755 , G06F17/28 , G06F17/2881 , G06F17/30386
Abstract: A mechanism is provided for representing information, such as binary sequence, in a manner that is easier to read and less likely to generate errors when interacted with by human. A dictionary is seeded with two or more set of words, the words being selected from distinct categories. Symbols may be created by combining words from the distinct categories. A mapping of symbols to corresponding values may then be generated. The generated mapping may be used to translate bit values to symbols and symbols to bit values.
-
公开(公告)号:US09537888B1
公开(公告)日:2017-01-03
申请号:US13858505
申请日:2013-04-08
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Jesper Mikael Johansson , Andrew Jay Roths
CPC classification number: H04L63/0254 , G08B21/18 , H04L41/06 , H04L63/0281 , H04L63/1425 , H04L63/1441 , H04L63/145 , H04L67/28
Abstract: Disclosed are various embodiments for malware detection by way of proxy servers. In one embodiment, a proxy server application generates a browsing history for client devices based at least in part on proxied network resource requests received from the client devices. The proxy server application determines that at least one of the client devices is affected by malware. The proxy server application determines a source of the malware based at least in part on the browsing history or telemetry data received from the client devices. An action is implemented in response to determining the source of the malware.
Abstract translation: 公开了通过代理服务器进行恶意软件检测的各种实施例。 在一个实施例中,代理服务器应用程序至少部分地基于从客户端设备接收的代理的网络资源请求,为客户机设备生成浏览历史。 代理服务器应用程序确定至少有一个客户端设备受到恶意软件的影响。 代理服务器应用程序至少部分地基于从客户端设备接收的浏览历史或遥测数据来确定恶意软件的源。 响应确定恶意软件的来源而实施一个动作。
-
公开(公告)号:US20160280371A1
公开(公告)日:2016-09-29
申请号:US14671224
申请日:2015-03-27
Applicant: Amazon Technologies, Inc.
Inventor: Darren Ernest Canavor , Varadarajan Gopalakrishnan , Jesper Mikael Johansson , Jon Arron McClintock , Brandon William Porter , Andrew Jay Roths
CPC classification number: B64C39/024 , B64C2201/141 , B64C2201/146 , G05D1/104 , G06Q10/00 , H04L9/3247 , H04L9/3263 , H04L9/3268 , H04L9/3297 , H04L63/0823 , H04L63/12 , H04L2209/80 , H04L2209/84 , H04W12/04 , H04W12/06 , H04W12/10
Abstract: An unmanned vehicle determines how to perform a task based at least in part on a message received from another unmanned vehicle. At a later time, the unmanned vehicle detects that the other unmanned vehicle has become untrusted. The unmanned vehicle recalculates how to perform the task such that the recalculation is independent of any messages from the other unmanned vehicle. The unmanned vehicle may also transmit messages to other unmanned vehicles to provide notification of untrustworthiness of the other unmanned vehicle.
Abstract translation: 至少部分地基于从另一无人车接收到的消息,无人驾驶车辆确定如何执行任务。 以后,无人驾驶车辆检测到其他无人驾驶车辆已经不受信任。 无人驾驶车辆重新计算如何执行任务,使得重新计算独立于来自其他无人驾驶车辆的任何消息。 无人驾驶车辆还可以向其他无人驾驶车辆发送消息,以提供其他无人驾驶车辆的不可信度的通知。
-
公开(公告)号:US09436335B1
公开(公告)日:2016-09-06
申请号:US14502859
申请日:2014-09-30
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Nathan David Scherer , Darren Ernest Canavor , Daniel Wade Hitchcock , Jesper Mikael Johansson , Jon Arron McClintock , Gregory Branchek Roth , Andrew Jay Roths
CPC classification number: G06F3/044 , G01R27/2605 , G06F3/0202 , G06F3/023 , G06F3/0412 , G06F3/0416 , G06F3/04886 , G06F21/36 , G06F2203/04111
Abstract: Described in this disclosure is an input transformative device having an input side and an output side. The input transformative device may be configured to transfer a touch input at an input location on the input side to one or more output locations on the output side. The output side of the input transformative device may be positioned proximate to a touch sensor of a user device. The touch sensor may then detect the touch input of the user as occurring at the one or more output locations, rather than the input location. Interconnection between the input side and the output side may be predetermined and used to secure user input to the touch sensor. The interconnection pattern of inputs to outputs of the input transformative device may be fixed or reconfigurable. In some implementations, input using the input transformative device may be used to authenticate the user.
Abstract translation: 在本公开中描述的是具有输入侧和输出侧的输入变换装置。 输入变换装置可以被配置为将输入侧的输入位置处的触摸输入传送到输出侧的一个或多个输出位置。 输入变换设备的输出侧可以位于用户设备的触摸传感器附近。 然后,触摸传感器可以将用户的触摸输入检测为在一个或多个输出位置而不是输入位置发生。 输入侧和输出侧之间的互连可以是预定的并且用于确保用户对触摸传感器的输入。 输入变换装置的输出的输入的互连图形可以是固定的或可重构的。 在一些实现中,可以使用输入变换设备的输入来认证用户。
-
公开(公告)号:US09426139B1
公开(公告)日:2016-08-23
申请号:US14673609
申请日:2015-03-30
Applicant: Amazon Technologies, Inc.
CPC classification number: H04W12/06 , G06F21/40 , G06F21/554 , G06F2221/2103 , H04L63/08 , H04L63/083 , H04L63/0861 , H04L63/102 , H04L63/107 , H04L2463/082
Abstract: The present disclosure relates to multifactor-based authentication systems. Multifactor authentication occurs during a communication session in response to detecting a trigger event, such as an anomalous condition. Historical metrics, such as performance metrics (e.g., rendering speeds), behavioral metrics (e.g., click-stream behavior), environmental metrics (e.g., noise), etc., can be used as a baseline to compare against metrics for a current communication session. An anomalous condition, such as a current session metric exceeding a threshold, can result in an authentication service transmitting a multifactor authentication request.
Abstract translation: 本公开涉及基于多因素的认证系统。 响应于检测到诸如异常状况的触发事件,在通信会话期间发生多因素认证。 可以将诸如性能指标(例如渲染速度),行为度量(例如,点击流行为),环境指标(例如噪声)等的历史指标用作与当前通信的指标进行比较的基准 会话 诸如当前会话度量超过阈值的异常状况可能导致认证服务发送多方认证请求。
-
-
-
-
-
-
-