-
公开(公告)号:US09152808B1
公开(公告)日:2015-10-06
申请号:US13849772
申请日:2013-03-25
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Jesper Mikael Johansson , James Connelly Petts , Dominique Imjya Brezinski
CPC classification number: G06F21/62 , H04L63/1416 , H04L63/1441 , H04L63/1491 , H04L63/30
Abstract: Disclosed are various embodiments for obtaining policy data specifying decoy data eligible to be inserted within a response to an access of a data store. The decoy data is detected in the response among a plurality of non-decoy data based at least upon the policy data. An action associated with the decoy data is initiated in response to the access of the data store meeting a configurable threshold.
Abstract translation: 公开了用于获得策略数据的各种实施例,该策略数据指定在对数据存储的访问的响应中有资格插入的诱饵数据。 至少基于策略数据,在多个非诱饵数据之间的响应中检测诱饵数据。 响应于满足可配置阈值的数据存储的访问,启动与诱饵数据相关联的动作。
-
公开(公告)号:US20160019395A1
公开(公告)日:2016-01-21
申请号:US14872880
申请日:2015-10-01
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Jesper Mikael Johansson , James Connelly Petts , Dominique Imjya Brezinski
CPC classification number: G06F21/62 , H04L63/1416 , H04L63/1441 , H04L63/1491 , H04L63/30
Abstract: Disclosed are various embodiments for obtaining policy data specifying decoy data eligible to be inserted within a response to an access of a data store. The decoy data is detected in the response among a plurality of non-decoy data based at least upon the policy data. An action associated with the decoy data is initiated in response to the access of the data store meeting a configurable threshold.
Abstract translation: 公开了用于获得策略数据的各种实施例,该策略数据指定在对数据存储的访问的响应中有资格插入的诱饵数据。 至少基于策略数据,在多个非诱饵数据之间的响应中检测诱饵数据。 响应于满足可配置阈值的数据存储的访问,启动与诱饵数据相关联的动作。
-
公开(公告)号:US10187428B2
公开(公告)日:2019-01-22
申请号:US15618419
申请日:2017-06-09
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Dominique Imjya Brezinski , Jesper Mikael Johansson , Jon Arron McClintock , James Connelly Petts
Abstract: Disclosed are various embodiments for active data that tracks usage. The active data includes instructions that are executable by a computing device. The computing device is scanned to identify characteristics of the computing device. The characteristics of the computing device are utilized to determine whether the usage of the active data is authorized. Data is transmitted to a network service, including identifying information for the particular computing device and data that identifies a deployment of the active data.
-
公开(公告)号:US09990507B2
公开(公告)日:2018-06-05
申请号:US14872880
申请日:2015-10-01
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Jesper Mikael Johansson , James Connelly Petts , Dominique Imjya Brezinski
CPC classification number: G06F21/62 , H04L63/1416 , H04L63/1441 , H04L63/1491 , H04L63/30
Abstract: Disclosed are various embodiments for obtaining policy data specifying decoy data eligible to be inserted within a response to an access of a data store. The decoy data is detected in the response among a plurality of non-decoy data based at least upon the policy data. An action associated with the decoy data is initiated in response to the access of the data store meeting a configurable threshold.
-
公开(公告)号:US09705920B1
公开(公告)日:2017-07-11
申请号:US14227845
申请日:2014-03-27
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Dominique Imjya Brezinski , Jesper Mikael Johansson , Jon Arron McClintock , James Connelly Petts
CPC classification number: H04L63/20 , G06F21/14 , G06F21/54 , G06F21/55 , H04L63/1491
Abstract: Disclosed are various embodiments for active data, such as active decoy data. The active decoy data includes instructions that, when executed by a particular device, cause the particular computing device to determine whether the particular computing device is a target computing device. The particular computing device initiates a predefined action in response to determining that the particular computing device is not the target computing device. The approaches described herein may also be useful in wrapping and distributing digital content.
-
-
-
-