-
公开(公告)号:US10382213B1
公开(公告)日:2019-08-13
申请号:US15250709
申请日:2016-08-29
Applicant: Amazon Technologies, Inc.
Inventor: Mark Edward Rafn , Ashutosh Thakur , Rameez Loladia , James Christopher Sorenson, III , Christoph Saalfeld
IPC: H04L9/32
Abstract: A technology is provided for certificate authentication for registering a certificate in computing service environment. A request may be received to register a certificate authority (CA) certificate. A registration token associated with a customer account in a service provider environment may be generated to enable association of the customer account with the CA certificate and to authenticate a registration of the CA certificate. The registration token may be sent to a requester desiring to register the CA certificate. A verification certificate that contains the registration token and that is signed by a certificate authority (CA) of the CA certificate and the CA certificate that is signed by the CA may be received to register the CA certificate with the customer account within a service provider environment The CA certificate is persisted with the service provider environment after verifying the registration token is associated with the customer account and the CA certificate is signed by the CA.
-
公开(公告)号:US12003505B2
公开(公告)日:2024-06-04
申请号:US17113858
申请日:2020-12-07
Applicant: Amazon Technologies, Inc.
Inventor: Ramkishore Bhattacharyya , Rameez Loladia , William Alexander Stevenson , Ashutosh Thakur , Rodrigo Diaz Martin , Andrew John Kiggins , Xin Yi Liu
CPC classification number: H04L63/0861 , H04L9/3242 , H04L9/3247 , H04L63/0442 , H04L63/06 , H04L63/061 , H04L63/0807
Abstract: Systems and methods are disclosed herein for enforcing digital signature on a token useable by a network-addressable device to invoke service calls on services of a service provider. A device platform service of the service provider may receive service calls from the network-addressable device and cause one or more operations to be performed by other services of the service provider in response to receiving a notification that the request is authentic. An authentication service analyses a fingerprint associated with a request submitted by the device and determines whether it is a match to a fingerprint generated from cryptographic authentication information provided by the user in connection with registering the network-addressable device.
-
公开(公告)号:US11552946B2
公开(公告)日:2023-01-10
申请号:US16852220
申请日:2020-04-17
Applicant: Amazon Technologies, Inc.
Inventor: Ramkishore Bhattacharyya , Amit J. Mhatre , Ashutosh Thakur , Atulya S. Beheray , Rameez Loladia
Abstract: A network protocol provides mutual authentication of network-connected devices that are parties to a communication channel in environments where the amount of memory and processing power available to the network-connected devices is constrained. When a new device is added to a network, the device contacts a registration service and provides authentication information that proves the authenticity of the device. After verifying the authenticity of the device, the registration service generates a token that can be used to by the device to authenticate with other network entities, and provides the token to the device. The registration service publishes the token using a directory service. When the device connects to another network entity, the device provides the token to the other network entity, and the other network entity authenticates the device by verifying the token using the directory service.
-
公开(公告)号:US10382203B1
公开(公告)日:2019-08-13
申请号:US15359506
申请日:2016-11-22
Applicant: Amazon Technologies, Inc.
Inventor: Rameez Loladia , Ashutosh Thakur , Julian Embry Herwitz
Abstract: A three-way pairing handshake may include an internet-of-things (IoT) service sending an encrypted token to an IoT device in response to a request for a token from that IoT device. The encrypted token may store a service managed client identifier and a device identifier. The IoT device may share the encrypted token with a companion application on a mobile device. In turn, the companion application sends a pairing request to the IoT service which includes the encrypted token, along with a copy of the device identifier and the client identifier. The IoT service may validate the pairing request by decrypting the encrypted token included in the pairing request and verifying that the device identifier and the client identifier recovered from the decrypted token matches the device identifier and client identifier received in the pairing request.
-
公开(公告)号:US20210092115A1
公开(公告)日:2021-03-25
申请号:US17113858
申请日:2020-12-07
Applicant: Amazon Technologies, Inc.
Inventor: Ramkishore Bhattacharyya , Rameez Loladia , William Alexander Stevenson , Ashutosh Thakur , Rodrigo Diaz Martin , Andrew John Kiggins , Xin Yi Liu
Abstract: Systems and methods are disclosed herein for enforcing digital signature on a token useable by a network-addressable device to invoke service calls on services of a service provider. A device platform service of the service provider may receive service calls from the network-addressable device and cause one or more operations to be performed by other services of the service provider in response to receiving a notification that the request is authentic. An authentication service analyses a fingerprint associated with a request submitted by the device and determines whether it is a match to a fingerprint generated from cryptographic authentication information provided by the user in connection with registering the network-addressable device.
-
公开(公告)号:US10862883B1
公开(公告)日:2020-12-08
申请号:US15728341
申请日:2017-10-09
Applicant: Amazon Technologies, Inc.
Inventor: Ramkishore Bhattacharyya , Rameez Loladia , William Alexander Stevenson , Ashutosh Thakur , Rodrigo Diaz Martin , Andrew John Kiggins , Xin Yi Liu
Abstract: Systems and methods are disclosed herein for enforcing digital signature on a token useable by a network-addressable device to invoke service calls on services of a service provider. A device platform service of the service provider may receive service calls from the network-addressable device and cause one or more operations to be performed by other services of the service provider in response to receiving a notification that the request is authentic. An authentication service analyses a fingerprint associated with a request submitted by the device and determines whether it is a match to a fingerprint generated from cryptographic authentication information provided by the user in connection with registering the network-addressable device.
-
公开(公告)号:US20180278607A1
公开(公告)日:2018-09-27
申请号:US15466659
申请日:2017-03-22
Applicant: Amazon Technologies, Inc.
CPC classification number: H04L63/0876 , H04L41/0893 , H04L61/1588 , H04L63/0823 , H04L67/303 , H04W4/70 , H04W12/06
Abstract: A technology is described for resolving device credentials for a device. An example method may include receiving device credentials for management by a service provider. The device credentials may include authentication credentials and a device policy document that specifies permissions used to authorize resource actions requested by the device. In response to receiving a message requesting that a resource perform a resource action associated with the device, the device may be authenticated using the authentication credentials, and the resource action may be authorized using the permissions specified in the device policy document.
-
公开(公告)号:US12095725B2
公开(公告)日:2024-09-17
申请号:US15466659
申请日:2017-03-22
Applicant: Amazon Technologies, Inc.
IPC: G06F7/04 , H04L9/40 , H04L41/0893 , H04L61/4588 , H04L67/303 , H04W4/70 , H04W12/06 , H04W12/069
CPC classification number: H04L61/4588 , H04L41/0893 , H04L63/0823 , H04L63/0876 , H04L67/303 , H04W4/70 , H04W12/068 , H04W12/069
Abstract: A technology is described for resolving device credentials for a device. An example method may include receiving device credentials for management by a service provider. The device credentials may include authentication credentials and a device policy document that specifies permissions used to authorize resource actions requested by the device. In response to receiving a message requesting that a resource perform a resource action associated with the device, the device may be authenticated using the authentication credentials, and the resource action may be authorized using the permissions specified in the device policy document.
-
公开(公告)号:US20230142978A1
公开(公告)日:2023-05-11
申请号:US18094096
申请日:2023-01-06
Applicant: Amazon Technologies, Inc.
Inventor: Ramkishore Bhattacharyya , Amit J. Mhatre , Ashutosh Thakur , Atulya S. Beheray , Rameez Loladia
CPC classification number: H04L63/0869 , H04L9/14 , H04L9/3013 , H04L9/3247 , H04L63/061
Abstract: A network protocol provides mutual authentication of network-connected devices that are parties to a communication channel in environments where the amount of memory and processing power available to the network-connected devices is constrained. When a new device is added to a network, the device contacts a registration service and provides authentication information that proves the authenticity of the device. After verifying the authenticity of the device, the registration service generates a token that can be used to by the device to authenticate with other network entities, and provides the token to the device. The registration service publishes the token using a directory service. When the device connects to another network entity, the device provides the token to the other network entity, and the other network entity authenticates the device by verifying the token using the directory service.
-
公开(公告)号:US10554636B2
公开(公告)日:2020-02-04
申请号:US16186425
申请日:2018-11-09
Applicant: Amazon Technologies, Inc.
Inventor: Ramkishore Bhattacharyya , Amit J. Mhatre , Ashutosh Thakur , Atulya S. Beheray , Rameez Loladia
Abstract: A lightweight network protocol provides mutual authentication and encryption of a communication channel in environments where the amount of computing resources available to the networked devices is constrained. When a new device is added to a network, the device contacts a registration service and provides information that is published via a device directory. The network entity locates the device via information provided by the device directory, and establishes an encrypted network connection with the device. A shared secret is established between the device and the network entity using a key-exchange protocol. Consecutive messages that are sent or received are encrypted or decrypted with a sequence of cryptographic keys generated based at least in part on the shared secret. Key-exchange parameters are added to message exchanges between the device and the network entity to facilitate regenerating the shared secret.
-
-
-
-
-
-
-
-
-