-
1.
公开(公告)号:US20170244739A1
公开(公告)日:2017-08-24
申请号:US15592058
申请日:2017-05-10
Applicant: Amazon Technologies, Inc.
Inventor: Maarten Van Horenbeeck , Christopher Michael Anderson , Katharine Nicole Harrison , Matthew Ryan Jezorek , Jon Arron McClintock , Tushaar Sethi
IPC: H04L29/06 , G06N99/00 , H04L12/721
Abstract: Techniques described and suggested herein include various systems and methods for determining risk levels associated with transiting data, and routing portions of the data in accordance with the determined risk levels. For example, a risk analyzer may apply risk classifiers to transiting data to determine overall risk levels of some or all of the transiting data. A traffic router may route transiting data according to determined risk profiles for the data. A sandbox may be implemented to compare, for a given input, expected and observed outputs for a subset of transiting data, so as to determine risk profiles associated with at least the subset.
-
公开(公告)号:US11711390B1
公开(公告)日:2023-07-25
申请号:US17721150
申请日:2022-04-14
Applicant: Amazon Technologies, Inc.
Inventor: Maarten Van Horenbeeck , Christopher Michael Anderson , Katharine Nicole Harrison , Matthew Ryan Jezorek , Jon Arron McClintock , Tushaar Sethi
CPC classification number: H04L63/1425 , G06N20/00 , H04L45/70 , H04L63/1433
Abstract: Techniques described and suggested herein include various systems and methods for determining risk levels associated with transiting data, and routing portions of the data in accordance with the determined risk levels. For example, a risk analyzer may apply risk classifiers to transiting data to determine overall risk levels of some or all of the transiting data. A traffic router may route transiting data according to determined risk profiles for the data. A sandbox may be implemented to compare, for a given input, expected and observed outputs for a subset of transiting data, so as to determine risk profiles associated with at least the subset.
-
公开(公告)号:US11042869B1
公开(公告)日:2021-06-22
申请号:US14503324
申请日:2014-09-30
Applicant: Amazon Technologies, Inc.
Inventor: Matthew Ryan Jezorek , Scott Kenneth Bishop , Brenda Renee' Campbell , Darren Ernest Canavor , Scott Donald Gregory , Jesper Mikael Johansson , David James Kane-Parry , Eric Michael Laird , Brian Young Lee , Ido Mittelman , Gregory Branchek Roth , James Arthur Wilson
Abstract: A payment object service receives a request from a giver to associate a payment amount to an object. The request includes one or more images of the object and recipient information, which the payment object service uses to determine whether the association between these images and the information is unique. If the association is unique, the payment object service updates a database to associate the payment amount to the object and enable redemption of the payment amount. When the payment object service receives a request to redeem at least a portion of the payment amount, the payment object service may use one or more images and recipient information obtained from the request to verify that the images and information together correspond to the object. Once the redemption is complete, the payment object service may update the database to specify the current remaining payment amount.
-
公开(公告)号:US11025642B1
公开(公告)日:2021-06-01
申请号:US15934419
申请日:2018-03-23
Applicant: Amazon Technologies, Inc.
Inventor: Matthew Ryan Jezorek , Jason Cetina , Paul Clarke , Douglas Allan Peabody , Matthew Michael Sommer
Abstract: An electronic message delivery service receives a request to transmit an electronic message to a recipient. In response to the request, the electronic message delivery service determines first information from the electronic message usable to uniquely identify the electronic message. The electronic message delivery service obtains, based at least in part on the first information and a cryptographic key, cryptographic information that can be inserted into the electronic message. The electronic message delivery service inserts the cryptographic information and second information usable to validate at least a portion of the electronic message with the cryptographic information into the electronic message. The electronic message is transmitted to the recipient.
-
公开(公告)号:US09756058B1
公开(公告)日:2017-09-05
申请号:US14500532
申请日:2014-09-29
Applicant: Amazon Technologies, Inc.
Inventor: Matthew Ryan Jezorek , Maarten Van Horenbeeck , Richie Lai
CPC classification number: H04L63/1416 , G06F21/51 , G06F21/64 , H04L61/1511 , H04L63/10 , H04L63/123 , H04L63/14 , H04L63/1408 , H04L67/42
Abstract: Techniques for analyzing access to a network-based document may be provided. For example, the network-based document may be configured for direct access from client device. Based on an access of a client device to the network-based document, information associated with this access may be recorded. The information may be analyzed to determine whether a condition associated with the direct access may be violated. An issue may be detected with the client device access based on a determination that the condition may be violated.
-
公开(公告)号:US11310251B2
公开(公告)日:2022-04-19
申请号:US16670411
申请日:2019-10-31
Applicant: Amazon Technologies, Inc.
Inventor: Maarten Van Horenbeeck , Christopher Michael Anderson , Katharine Nicole Harrison , Matthew Ryan Jezorek , Jon Arron McClintock , Tushaar Sethi
Abstract: Techniques described and suggested herein include various systems and methods for determining risk levels associated with transiting data, and routing portions of the data in accordance with the determined risk levels. For example, a risk analyzer may apply risk classifiers to transiting data to determine overall risk levels of some or all of the transiting data. A traffic router may route transiting data according to determined risk profiles for the data. A sandbox may be implemented to compare, for a given input, expected and observed outputs for a subset of transiting data, so as to determine risk profiles associated with at least the subset.
-
公开(公告)号:US11228614B1
公开(公告)日:2022-01-18
申请号:US16043817
申请日:2018-07-24
Applicant: Amazon Technologies, Inc.
Inventor: Jessica Erin Clark , Matthew Ryan Jezorek , Matthew Michael Sommer
Abstract: Disclosed are various embodiments providing automated management of security operations centers. In one embodiment, a correlation and decision engine correlates event data generated by a plurality of monitoring services with a plurality of alerts generated by a plurality of threat intelligence services. The engine then adjusts at least one rule of one or more threat intelligence services with respect to at least one event based at least in part on a corresponding frequency of at least one of the plurality of alerts meeting a threshold, where the adjusted alert(s) are associated with the event(s).
-
公开(公告)号:US09960975B1
公开(公告)日:2018-05-01
申请号:US14533905
申请日:2014-11-05
Applicant: Amazon Technologies, Inc.
Inventor: Maarten Van Horenbeeck , Matthew Ryan Jezorek
CPC classification number: H04L43/06 , G06F21/55 , H04L43/04 , H04L63/1416 , H04L63/1441
Abstract: Techniques for analyzing a dataset may be provided. For example, a configuration file may be accessed. The dataset may be analyzed based on a condition identified in the configuration file. A report may be generated and transmitted based on the analysis. Another report generated based on an analysis of another dataset according to another configuration file may be accessed. The dataset may be further analyzed based on this report to determine if a reported observation may also be associated with the dataset. If so, a confirmation may be generated and transmitted.
-
公开(公告)号:US09426171B1
公开(公告)日:2016-08-23
申请号:US14500869
申请日:2014-09-29
Applicant: Amazon Technologies, Inc.
Inventor: Matthew Ryan Jezorek , Maarten Van Horenbeeck , Richie Lai
CPC classification number: H04L63/1433 , H04L51/12 , H04L61/1511 , H04L63/1441 , H04L67/02 , H04L67/42
Abstract: Techniques for analyzing access to a network-based resource may be provided. For example, a client record associated with the access to the network-based resource over a network may be compared to a provider record. The client record may indicate an address of the network based resource and can be received from a computing resource. The provider record can also indicate the address and can be received from a trusted computing resource. Based on the comparison, an issue associated with the access to the network-based resource over the network may be detected.
Abstract translation: 可以提供用于分析对基于网络的资源的访问的技术。 例如,可以将通过网络对基于网络的资源的访问相关联的客户端记录与供应商记录进行比较。 客户记录可以指示基于网络的资源的地址并且可以从计算资源接收。 提供商记录还可以指示地址并且可以从可信计算资源接收。 基于比较,可以检测到通过网络对基于网络的资源的访问相关联的问题。
-
公开(公告)号:US10511619B2
公开(公告)日:2019-12-17
申请号:US15592058
申请日:2017-05-10
Applicant: Amazon Technologies, Inc.
Inventor: Maarten Van Horenbeeck , Christopher Michael Anderson , Katharine Nicole Harrison , Matthew Ryan Jezorek , Jon Arron McClintock , Tushaar Sethi
IPC: H04L29/06 , G06N20/00 , H04L12/721
Abstract: Techniques described and suggested herein include various systems and methods for determining risk levels associated with transiting data, and routing portions of the data in accordance with the determined risk levels. For example, a risk analyzer may apply risk classifiers to transiting data to determine overall risk levels of some or all of the transiting data. A traffic router may route transiting data according to determined risk profiles for the data. A sandbox may be implemented to compare, for a given input, expected and observed outputs for a subset of transiting data, so as to determine risk profiles associated with at least the subset.
-
-
-
-
-
-
-
-
-