-
公开(公告)号:US10567388B1
公开(公告)日:2020-02-18
申请号:US15087007
申请日:2016-03-31
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Jeffrey John Wierer , Nima Sharifi Mehr , Ashish Rangole , Kunal Chadha , Bharath Mukkati Prakash , Radu Mihai Berciu , Kai Zhao , Hardik Nagda , Chenxi Zhang
Abstract: A policy/resource decommissioning service determines whether a resource has been inactive for a period of time greater than at least one period of time threshold for decommissioning. If the resource has been inactive greater than a first period of time threshold, the service disables the resource such that requests to access the resource are denied. If the resource has been inactive for a period of time greater than a second threshold, longer than the first period of time threshold, the service archives the resource. The service deletes the resource if the inactivity period of the resource is greater than a third period of time threshold, where the third period of time threshold is longer than the first and the second period of time thresholds.
-
公开(公告)号:US10397236B1
公开(公告)日:2019-08-27
申请号:US15376335
申请日:2016-12-12
Applicant: Amazon Technologies, Inc.
Inventor: Kunal Chadha , Zaher Dannawi , Bharath Mukkati Prakash , Hardik Nagda , Anirudh Mattur Radhakrishna , Ashish Rangole , Chenxi Zhang
Abstract: A customer's resources are protected from malicious or accidental deletion or termination. In some embodiments anomaly detection is used for identifying suspicious activities, which is combined with options to restore previously deleted resources. To define and detect anomalies, resource profiles are generated indicative of how resources are being used, and user profiles of how users use resources of the compute service provider. Instead of immediately deleting a resource, a temporary marker can be placed on the resource. The temporary marker blocks attempts to access the resource just as if the resource was deleted. However, the resource can easily be recovered by simply removing the marker. When a deletion event is identified as anomalous, an alert is generated to the customer. Upon receiving the alert, customers can opt to restore the resource that has been deleted, which will remove the marker.
-
公开(公告)号:US11922938B1
公开(公告)日:2024-03-05
申请号:US17532586
申请日:2021-11-22
Applicant: Amazon Technologies, Inc.
Inventor: Yaser Khan , Piyush Kandpal , Ritesh Patel , Mark Lawrence , Srinivas Palla , Ashish Rangole , Jason Wang
CPC classification number: G10L15/22 , G10L13/02 , G10L15/1815 , G10L15/30 , G10L15/32 , G10L2015/223
Abstract: A multi-assistant speech-processing system that centrally determines multiple execution plans to respond to a user input. A central component determines whether a particular input should be processed using a requested assistant or a different assistant or should be terminated. Assistant handoff may be determined based on system policies as well as user input-specific data. A ranked list of execution options may be supplemented by augmented data corresponding to messages to a user. The system may attempt to execute plans in the ranked order until a plan succeeds.
-
公开(公告)号:US10986131B1
公开(公告)日:2021-04-20
申请号:US14574308
申请日:2014-12-17
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Ashish Rangole
Abstract: Techniques for generating access control policy warnings and suggestions are disclosed herein. An access control policy change specifying changes to one or more permissions associated with the access control policy is received and, based on a set of requests for access associated with the access control policy, an access control policy warning is produced which specifying an indication of whether or not the changes to the one or more permissions should be permitted.
-
公开(公告)号:US20190073488A1
公开(公告)日:2019-03-07
申请号:US16056322
申请日:2018-08-06
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Ashish Rangole
Abstract: A record of usage data is obtained, with the record sampled according to a sampling rate from a set of usage data records, with the record specifying a request to access a resource of a computing resource service provider, with the request indicating a set of permissions, and with the sampling rate being based at least in part on a criterion associated with the request. The record is aggregated, based at least in part on a permission of the set of permissions, with at least another record sampled according to the sampling rate from the set of usage data records to produce a set of aggregated usage records and at least a portion of the set of aggregated usage records is provided.
-
公开(公告)号:US10043030B1
公开(公告)日:2018-08-07
申请号:US14615347
申请日:2015-02-05
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Ashish Rangole
Abstract: Techniques for large-scale authorization data collection and aggregation are disclosed herein. An authorization data service may first receive a set of usage data records, may next aggregate the set of usage data records to reduce the number of usage data records, may next store the aggregated set of usage data records in a usage data repository, and may next provide subsets of the aggregated set of usage data records in response to an application processing request to inform policy decisions associated with a computer system.
-
公开(公告)号:US10771330B1
公开(公告)日:2020-09-08
申请号:US15684416
申请日:2017-08-23
Applicant: Amazon Technologies, Inc.
Inventor: Ashish Rangole
Abstract: A technology is described for generating and modifying tunable parameter settings for use with a distributed application. An example method may include providing a first set of tunable parameter settings for a distributed application, where the first set of tunable parameter settings may be selected based at least in part on historical data associated with similar distributed applications. Performance metrics and implementation attributes associated with the distributed application may then be collected during a time period. The performance metrics and the implementation attributes collected may be input to a machine learning model configured to output a second set of tunable parameter settings for the distributed application, and the second set of tunable parameter settings may be provided for use with the distributed application, where performance of the distributed application may be better as compared to a performance using the first set of tunable parameter settings.
-
公开(公告)号:US20180234462A1
公开(公告)日:2018-08-16
申请号:US15953262
申请日:2018-04-13
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Bharath Mukkati Prakash , Ashish Rangole , Nima Sharifi Mehr , Jeffrey John Wierer , Kunal Chadha , Chenxi Zhang , Hardik Nagda , Kai Zhao
IPC: H04L29/06
Abstract: A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.
-
公开(公告)号:US09948681B1
公开(公告)日:2018-04-17
申请号:US15087014
申请日:2016-03-31
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Bharath Mukkati Prakash , Ashish Rangole , Nima Sharifi Mehr , Jeffrey John Wierer , Kunal Chadha , Chenxi Zhang , Hardik Nagda , Kai Zhao
Abstract: A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.
-
公开(公告)号:US09800466B1
公开(公告)日:2017-10-24
申请号:US14738762
申请日:2015-06-12
Applicant: Amazon Technologies, Inc.
Inventor: Ashish Rangole
CPC classification number: H04L41/0823 , G06F11/00 , H04L41/5009 , H04L41/5064 , H04L41/5096
Abstract: A technology is described for generating and modifying tunable parameter settings for use with a distributed application. An example method may include providing a first set of tunable parameter settings for a distributed application, where the first set of tunable parameter settings may be selected based at least in part on historical data associated with similar distributed applications. Performance metrics and implementation attributes associated with the distributed application may then be collected during a time period. The performance metrics and the implementation attributes collected may be input to a machine learning model configured to output a second set of tunable parameter settings for the distributed application, and the second set of tunable parameter settings may be provided for use with the distributed application, where performance of the distributed application may be better as compared to a performance using the first set of tunable parameter settings.
-
-
-
-
-
-
-
-
-