-
公开(公告)号:US10476738B1
公开(公告)日:2019-11-12
申请号:US15181295
申请日:2016-06-13
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
IPC: G06F15/173 , H04L12/24 , H04L29/08 , H04L12/26
Abstract: Techniques for segmenting a network are described herein. Network locations in a network are grouped such that each group is disjoint with respect to all other groups. The grouping is based on a set of network communication event notifications. The network communication event notifications are used to determine internal and external dependencies for each group and the external and internal dependencies are used to segment the network.
-
公开(公告)号:US10466700B1
公开(公告)日:2019-11-05
申请号:US15714860
申请日:2017-09-25
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Nima Sharifi Mehr , Narasimha Rao Lakkakula
Abstract: Techniques for determining whether data associated with an autonomous/non-autonomous operation of a manned/unmanned vehicle may be trusted. For example, a first set of data may be provided from a source external to a manned/unmanned vehicle. A second set of data may be accessed. This second set may be provided from a source internal or external to the manned/unmanned vehicle and may be associated with the same autonomous/non-autonomous operation. The two sets may be compared to determine whether the first set of data may be trusted or not. If untrusted, a corrective action may be performed.
-
公开(公告)号:US10417272B1
公开(公告)日:2019-09-17
申请号:US14860508
申请日:2015-09-21
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
IPC: G06F17/30 , G06F16/44 , G06F16/955
Abstract: Described are techniques for outputting or suppressing output of network content to a user device based on content previously accessed by the user device. Correspondence between network content accessed by the user device and spoiler data determined from media content may indicate that the network content is associated with the media content. Content consumption data associated with the user device may indicate whether the user device has previously accessed the media content. The network content may be suppressed from output if the user device has not previously accessed the media content. The network content may be output to the user device if the media content has been accessed.
-
公开(公告)号:US10409995B1
公开(公告)日:2019-09-10
申请号:US15589842
申请日:2017-05-08
Applicant: Amazon Technologies, Inc.
Inventor: Muhammad Wasiq , Nima Sharifi Mehr
Abstract: A graph of interrelated computer-executable processes is obtained. That a change has occurred to one of the interrelated computer-executable processes in the graph is determined. A weight of the one of the interrelated computer-executable processes is determined based at least in part on the change. A security review of one or more of the interrelated computer-executable processes is determined to be triggered based at least in part on the weight, and the security review is triggered.
-
公开(公告)号:US20190273728A1
公开(公告)日:2019-09-05
申请号:US16410814
申请日:2019-05-13
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
Abstract: Cipher suites and/or other parameters for cryptographic protection of communications are dynamically selected to more closely match the intended uses of the sessions. A client indicates a planned use of a session to a server. The client's indication of the planned use may be explicit or implicit. The server selects an appropriate set of parameters for cryptographic protection of communications based at least in part on the indicated planned use and the client and server complete a handshake process to establish a cryptographically protected communications session to use the selected set of parameters.
-
公开(公告)号:US10382461B1
公开(公告)日:2019-08-13
申请号:US15165221
申请日:2016-05-26
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Nima Sharifi Mehr , Dominique Imjya Brezinski , Sunu Aby Mathew
IPC: H04L29/06
Abstract: Described are techniques for identifying anomalous and non-anomalous requests based on metric values determined from a request. Weights to be associated with particular metric values may be determined based on metric data for those values. The metric data may indicate a total number of accesses by requests having a particular metric value, a frequency of access, or particular access times. Based on the weight values and the metric values for the request, a security score for the request may be determined. The security score may indicate a confidence that the request is anomalous or non-anomalous. Potentially anomalous requests may be determined to be non-anomalous if the metric values correspond to known sets of metric values, determined from previous requests. In some cases, metric data may be normalized prior to use to facilitate faster queries and conserve available data storage.
-
公开(公告)号:US20190245862A1
公开(公告)日:2019-08-08
申请号:US16384866
申请日:2019-04-15
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Nima Sharifi Mehr
IPC: H04L29/06
CPC classification number: H04L63/102 , H04L63/20
Abstract: A policy management service receives a request to evaluate a provisional policy to determine the impact of implementation of the provisional policy. The policy management service evaluates an active policy against a request to access a computing resource to determine an authorization decision. The policy management service then evaluates the provisional policy against the request to access the computing resource to generate an evaluation of the provisional policy. The policy management service provides the evaluation and the authorization decision in response to the request to evaluate the provisional policy.
-
公开(公告)号:US20190081944A1
公开(公告)日:2019-03-14
申请号:US16191033
申请日:2018-11-14
Applicant: Amazon Technologies, Inc.
Inventor: Muhammad Wasiq , Aleksandrs J. Rudzitis , Nima Sharifi Mehr
IPC: H04L29/06
Abstract: Various approaches discussed herein enable validation of an application on a computing device, such as a mobile computing device, prior to that application being invoked by activation of a link in another application. Upon activation of the link in a calling application, the computing device determines a target application to be invoked in response to the activation. Sensitive or confidential data, such as login credentials, may be included in the link to be passed to the target application. By validating either the calling or the target application, the data may be safeguarded by confirming an identity of an application associated with the link.
-
公开(公告)号:US20190073253A1
公开(公告)日:2019-03-07
申请号:US16179823
申请日:2018-11-02
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
IPC: G06F11/07
Abstract: The flow of events though an event-analysis system is controlled by a number of event throttles which filter events, prioritize events and control the rate at which events are provided to event-processing components of the event-analysis system. Incoming events to the event-analysis system are associated with a profile, and a metrics engine generates metrics based on the incoming events for each profile. The flow of events to the metrics engine is controlled on a per profile basis, so that excessive generation of new metrics and new profiles is limited. If the system from which the events originate is compromised, metrics associated with compromised profiles may be frozen to avoid corrupting existing metrics. Processing of events and anomalies by analysis engines within the event-analysis system may be delayed to allow the accumulation of metrics necessary for accurate analysis.
-
公开(公告)号:US10142301B1
公开(公告)日:2018-11-27
申请号:US14489161
申请日:2014-09-17
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr , Darren Ernest Canavor , Jesper Mikael Johansson , Jon Arron McClintock , Gregory Branchek Roth , Gregory Alan Rubin
Abstract: Multiple communications that encode data are encrypted for transit from one entity to the other. An entity receiving the communications decrypts at least some of the communications to determine how to process the communications. As part of processing the communications, the entity receiving the communications provides at least some of the encrypted communications to a data storage system without reencrypting those communications.
-
-
-
-
-
-
-
-
-