-
11.
公开(公告)号:US09350748B1
公开(公告)日:2016-05-24
申请号:US14108222
申请日:2013-12-16
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
IPC: H04L29/06
CPC classification number: H04L63/1408 , H04L63/1433 , H04L63/1491
Abstract: Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system responds to the attacks by modifying the behavior of the computer system. The behavior of the computer system is modified so that responses to communications requests to ports on the computer system are altered, presenting the attacker with an altered representation of the computer system and thereby delaying or frustrating the attack and the attacker.
Abstract translation: 本文描述了通过检测和响应对计算机系统的攻击来提高计算机系统安全性的技术。 计算机系统监视来自外部系统的通信请求,并且作为检测对计算机系统的一个或多个攻击的结果,计算机系统通过修改计算机系统的行为来响应攻击。 修改计算机系统的行为,以便改变对计算机系统上的端口的通信请求的响应,使攻击者具有改变的计算机系统的表示,从而延迟或挫败攻击和攻击者。
-
公开(公告)号:US10587594B1
公开(公告)日:2020-03-10
申请号:US14494520
申请日:2014-09-23
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Darren Ernest Canavor , Jesper Mikael Johansson , George Nikolaos Stathakopoulos
Abstract: A service provider or service of the service provider may generate authentication information based on information provided by a user. The information provided by the user may include a selection of a media object, information indicating a segment of the media object, and an indication of an action to be performed by the user. This information may be saved by the service provider and used at some point in time later to determine whether to provide access to restricted computing resources based at least in part on an authentication claim provided by the user. The authentication claim may be generated by a computing device operated by the user and may include information corresponding to the media object, the indicated segment of the media object, and the action performed by the user.
-
公开(公告)号:US10298598B1
公开(公告)日:2019-05-21
申请号:US14108238
申请日:2013-12-16
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
IPC: H04L29/06
Abstract: Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system responds to the attacks by analyzing the behavior of the attacker, relating that behavior to one or more attack profiles and creating a simulated environment to respond to the attack based in part on the attack profiles. The simulated environment responds to the attack by communicating with the attacker.
-
公开(公告)号:US09792424B1
公开(公告)日:2017-10-17
申请号:US14490497
申请日:2014-09-18
Applicant: Amazon Technologies, Inc.
CPC classification number: G06F21/40 , G06F21/64 , G10H1/00 , G10H2210/031 , G10H2250/215 , H04L29/06755 , H04L2209/38
Abstract: A service receives a request from a user of a group of users to perform one or more operations requiring group authentication in order for the operations to be performed. In response, the service provides a first user of the group with a musical seed and an ordering of the group of users. Each user of the group applies a transformation algorithm to the seed to create an authentication claim. The service receives this claim and determines, based at least in part on the ordering of the group of users, an ordered set of transformations, which are used to create a reference audio signal. If the received claim matches the reference audio signal, the service enables performance of the requested one or more operations.
-
公开(公告)号:US20170289156A1
公开(公告)日:2017-10-05
申请号:US15620593
申请日:2017-06-12
Applicant: Amazon Technologies, Inc.
CPC classification number: H04L63/0876 , G06Q20/40 , H04L63/08 , H04L63/0853 , H04L63/0884 , H04L63/126
Abstract: A method and apparatus for device authentication are provided. In the method and apparatus, authentication data for a first device is received. The first device is then authenticated based at least in part on demonstrated access to authentication data prior to broadcast of the authentication data. One or more actions may be taken in response to the authentication of the first device based at least in part on the demonstrated access to the authentication data.
-
公开(公告)号:US20170132064A1
公开(公告)日:2017-05-11
申请号:US15414491
申请日:2017-01-24
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Tushaar Sethi , George Nikolaos Stathakopoulos
CPC classification number: G06F11/0757 , G06F11/00 , G06F11/0706 , G06F11/0721 , G06F11/0754 , G06F11/0775 , G06F11/3003 , G06F11/3051 , G06F11/3068 , G06F11/34 , G06F11/3419 , H04L67/303
Abstract: A monitoring service receives, from a variety of hardware components of a set of computer systems, binary signals indicative of operation of these components. The monitoring service determines, based at least in part on these signals, a set of beat frequencies for pairings of hardware components of the set of computer systems. The monitoring service uses this set of beat frequencies, as well as information included in a profile for the set of computer systems, to determine whether there is any indication of anomalous behavior in operation of the set of computer systems. If so, the monitoring service generates one or more alerts indicating the anomalous behavior.
-
公开(公告)号:US09591023B1
公开(公告)日:2017-03-07
申请号:US14537637
申请日:2014-11-10
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
CPC classification number: H04L63/1491 , G06F21/60 , G06F21/6245 , G06F21/64 , H04L63/1416
Abstract: A method and apparatus for deterring exfiltration of data from are provided. In the method and apparatus, it is determined that data is to be inflated. A request for access to data is received and data responsive to the request is retrieved. Spurious data is also generated and provided together with the responsive data in response to the request.
Abstract translation: 提供了一种用于阻止从中提取数据的过滤的方法和装置。 在该方法和装置中,确定数据将被充气。 接收到访问数据的请求,并且检索响应于请求的数据。 还产生杂散数据,并响应于请求与响应数据一起提供。
-
18.
公开(公告)号:US09558053B1
公开(公告)日:2017-01-31
申请号:US14752445
申请日:2015-06-26
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Tushaar Sethi , George Nikolaos Stathakopoulos
CPC classification number: G06F11/0757 , G06F11/00 , G06F11/0706 , G06F11/0721 , G06F11/0754 , G06F11/0775 , G06F11/3003 , G06F11/3051 , G06F11/3068 , G06F11/34 , G06F11/3419 , H04L67/303
Abstract: A monitoring service receives, from a variety of hardware components of a set of computer systems, binary signals indicative of operation of these components. The monitoring service determines, based at least in part on these signals, a set of beat frequencies for pairings of hardware components of the set of computer systems. The monitoring service uses this set of beat frequencies, as well as information included in a profile for the set of computer systems, to determine whether there is any indication of anomalous behavior in operation of the set of computer systems. If so, the monitoring service generates one or more alerts indicating the anomalous behavior.
Abstract translation: 监视服务从一组计算机系统的各种硬件组件接收指示这些组件的操作的二进制信号。 该监视服务至少部分地基于这些信号确定用于该组计算机系统的硬件组件的配对的一组拍频。 监视服务使用这组拍频,以及包括在该组计算机系统的简档中的信息,以确定在该组计算机系统的操作中是否存在任何异常行为的指示。 如果是这样,监控服务会产生一个或多个警报,指示异常行为。
-
公开(公告)号:US09310982B1
公开(公告)日:2016-04-12
申请号:US14185793
申请日:2014-02-20
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
IPC: G06F3/0482 , G06F3/0484
CPC classification number: G06F3/011 , G06Q30/0241 , G06Q50/01
Abstract: Content corresponding to a literary work, movie, audio presentation, or other media is provided to a computing device associated with a user. Immersive content related to the content may be communicated to a computing device and presented to the user at times when the content is not being consumed. The formatting, communicational modes, apparent source, subject matter, or other aspects of the immersive content may correspond to the preferences or other information provided by the user. In this way, user engagement with a story or other media may be stimulated or enhanced when the user is not actively consuming the primary content.
Abstract translation: 与文学作品,电影,音频呈现或其他媒体对应的内容被提供给与用户相关联的计算设备。 与内容相关的沉浸性内容可以传达给计算设备,并且在内容未被消费的时候呈现给用户。 沉浸式内容的格式化,通信模式,明显的来源,主题或其他方面可以对应于用户提供的偏好或其他信息。 以这种方式,当用户不主动消费主要内容时,可以刺激或增强与故事或其他媒体的用户参与。
-
公开(公告)号:US10574697B1
公开(公告)日:2020-02-25
申请号:US14623241
申请日:2015-02-16
Applicant: Amazon Technologies, Inc.
IPC: H04L29/06
Abstract: Disclosed are various embodiments for providing a honeypot environment in response to incorrect security credentials being provided. An authentication request for an account to log into an application is received from a client. It is determined that the authentication request specifies an incorrect security credential for the account. The client is then provided with access to a honeypot environment in response to the authentication request. The honeypot environment is configured to mimic a successful login to the application via the account.
-
-
-
-
-
-
-
-
-