-
公开(公告)号:US10019567B1
公开(公告)日:2018-07-10
申请号:US14223399
申请日:2014-03-24
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
Abstract: A method and apparatus for encoding security codes are provided. In the method and apparatus a first code, which may be an erroneous code, is compared to a set of codes to identify a code portion. The code portion may be identified as contributing to inducing erroneous entry of the first code. The likelihood associated with issuing a second code including the code portion may be updated to negatively bias issuing the second code.
-
公开(公告)号:US20180183601A1
公开(公告)日:2018-06-28
申请号:US15389991
申请日:2016-12-23
Applicant: Amazon Technologies, Inc.
Inventor: Matthew John Campagna , Nicholas Alexander Allen , Gregory Alan Rubin
CPC classification number: H04L9/3247 , G06F21/602 , G06F2221/2103 , H04L9/3239 , H04L63/1441
Abstract: A proof-of-work system where a first party (e.g., a client computer system) may request access to a computing resource. A second party (e.g., a service provider) may determine a challenge that may be provided to the first party. A valid solution to the challenge may be generated and provided for the request to be fulfilled. The challenge may include a message and a seed, such that the seed may be used at least in part to cryptographically derive information that may be used to generate a solution to the challenge. A hash tree may be generated as of generating the solution.
-
公开(公告)号:US09998392B1
公开(公告)日:2018-06-12
申请号:US14180301
申请日:2014-02-13
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
IPC: G06F15/173 , H04L12/911
CPC classification number: H04L47/70
Abstract: Techniques for making placement decisions for the placement of components within a computer network are described herein. A simplified representation of the computer network is used to determine a candidate placement solution based on a representation of placement requests. Constrained machine locations and constraints on the connections are used to iteratively determine placement locations based on perturbations to those constraints.
-
公开(公告)号:US09985987B1
公开(公告)日:2018-05-29
申请号:US14981737
申请日:2015-12-28
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
CPC classification number: H04L63/1491 , G06F17/30424 , G06F17/30554 , H04L63/08
Abstract: The disclosure relates to provisioning honeypot computing services using a simulation state database to simulate a set of computing resources. One example includes a system that receives a mutating request associated with honeypot credentials, updates a simulation state database associated with the honeypot credentials at least based on the mutating request and generates a simulated mutating response based at least on the simulation state database that simulates a response to the mutating request. The system can also receive a query request associated with the honeypot credentials, query the simulation state database at least based on the query request, and generate a simulated query response based at least on the simulation state database that simulates a response to the query request.
-
公开(公告)号:US09900152B2
公开(公告)日:2018-02-20
申请号:US15018209
申请日:2016-02-08
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
CPC classification number: H04L9/0891 , H04L9/0894
Abstract: Techniques for improving the security and availability of cryptographic key systems are described herein. A graph representation of a network of cryptographic key servers is created with vertices representing the servers and edges representing connections between pairs of servers. As cryptographic key events are received, the graph is used to locate the appropriate servers upon which to perform the operations associated with the events. In the event that the network requires repairing, the graph is first repaired obeying any constraints on the graph and then the network is updated to reflect alterations to the graph.
-
公开(公告)号:US09811459B1
公开(公告)日:2017-11-07
申请号:US14305894
申请日:2014-06-16
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
CPC classification number: G06F12/0246 , G06F9/321 , G06F2212/1044 , G06F2212/7201
Abstract: Non-volatile devices may be configured such that a clear operation on a single bit clears an entire block of bits. The representation of particular data structures may be optimized to reduce the number of clear operations required to store the representation in non-volatile memory. A data schema may indicate that a data structure of an application may be optimized for storage in non-volatile memory. A translation layer may convert an application level representation of a data value associated with the data structure to an optimized storage representation of the data value before storing the optimized storage representation of the data value in non-volatile memory.
-
公开(公告)号:US09747028B1
公开(公告)日:2017-08-29
申请号:US14106615
申请日:2013-12-13
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
IPC: G06F3/06
CPC classification number: G06F3/0604 , G06F3/0653 , G06F3/0671 , G06F9/5016 , G06F11/34 , G06F12/023 , G06F12/0253 , G06F2212/1016 , G06F2212/1044 , G06F2212/152 , G06F2212/502
Abstract: Techniques for addressing performance degradation when a computer system is in a memory constrained state while running one or more applications are described herein. While executing, a computer system may monitor system memory and record one or more tracked sample types and may use the collection of tracked sample types to aggregate memory size equivalents to the tracked sample types and calculate a simulated memory pressure. The simulated memory pressure may be applied to the system by allocating memory from a memory manager, thereby reducing memory pressure.
-
公开(公告)号:US09734309B1
公开(公告)日:2017-08-15
申请号:US14223830
申请日:2014-03-24
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
CPC classification number: G06F21/31 , G06F21/604 , G06F21/6218 , G06F21/629 , H04L63/101 , H04L63/102 , H04L63/104 , H04L63/105 , H04L63/20
Abstract: Techniques for assigning roles to users within a computing system are described herein. A matrix representation of a probabilistic assignment of roles to users is created based at least in part on existing permissions. The matrix representation is then iteratively perturbed and the resulting perturbation is evaluated using an objective function, with perturbation decisions based at least in part on making the objective function converge to a threshold value. When the solution converges, the resulting assignment matrix may be used to assign roles to users.
-
公开(公告)号:US20170195444A1
公开(公告)日:2017-07-06
申请号:US15464102
申请日:2017-03-20
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
IPC: H04L29/08 , G06F21/60 , H04L29/12 , H04L29/06 , H04L12/741 , H04L12/715
CPC classification number: H04L67/28 , G06F21/606 , H04L45/64 , H04L45/74 , H04L61/103 , H04L61/25 , H04L63/0281 , H04L63/0428 , H04L63/0471 , H04L63/08
Abstract: A communication to a network location is detected at a computing device. The communication is transmitted to the network location in a manner dependent at least in part on whether the network location is at the computing device or at a different computing device.
-
公开(公告)号:US20170195443A1
公开(公告)日:2017-07-06
申请号:US15464096
申请日:2017-03-20
Applicant: Amazon Technologies, Inc.
Inventor: Nicholas Alexander Allen
IPC: H04L29/08 , H04L29/06 , H04L12/715 , H04L29/12 , H04L12/741
CPC classification number: H04L67/28 , G06F21/606 , H04L45/64 , H04L45/74 , H04L61/103 , H04L61/25 , H04L63/0281 , H04L63/0428 , H04L63/0471 , H04L63/08
Abstract: A communication to a network location is detected at a computing device. The communication to the network location is encrypted dependent at least in part on whether the network location is at a different computing device from the computing device.
-
-
-
-
-
-
-
-
-