-
公开(公告)号:US09699219B2
公开(公告)日:2017-07-04
申请号:US15237505
申请日:2016-08-15
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Brian Irl Pratt
CPC classification number: H04L63/205 , G06F21/60 , G06F21/602 , H04L9/3247 , H04L63/126 , H04L63/18 , H04L63/20 , H04L2463/062
Abstract: A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the customer to the first service. To process the request, the second service evaluates one or more policies to determine whether fulfillment of the request is allowed by policy associated with the customer. The one or more policies may state one or more conditions on one or more services that played a role in submission of the request. If determined that the policy allows fulfillment of the request, the second service fulfills the request.
-
公开(公告)号:US09680872B1
公开(公告)日:2017-06-13
申请号:US14225249
申请日:2014-03-25
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Eric Jason Brandwine
CPC classification number: H04L63/20 , G06F21/33 , G06F21/44 , G06F21/57 , G06F21/64 , H04L9/0825 , H04L9/0897 , H04L9/32 , H04L9/3213 , H04L9/3263 , H04L63/0823 , H04L63/205
Abstract: Custom policies are definable for use in a system that enforces policies. A user, for example, may author a policy using a policy language and transmit the system through an application programming interface call. The custom policies may specify conditions for computing environment attestations that are provided with requests to the system. When a custom policy applies to a request, the system may determine whether information in the attestation is sufficient for the request to be fulfilled.
-
公开(公告)号:US09645847B1
公开(公告)日:2017-05-09
申请号:US14733834
申请日:2015-06-08
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth
CPC classification number: G06F9/45558 , G06F9/45533 , G06F9/461 , G06F9/4868 , G06F2009/45575
Abstract: A virtual machine is suspended as a result of receiving a request for suspending a plurality of virtual machines, and, for each virtual machine of the plurality, obtaining a first snapshot of an exemplary virtual machine, obtaining a second snapshot of the virtual machine, determining a set of changes based on the second snapshot and the first snapshot, storing the set of changes in persistent storage in association with the virtual machine, and terminating the virtual machine. The system and method further including receiving a request for restoring the plurality of virtual machines to corresponding previous states, and, for each virtual machine of the plurality, obtaining the first snapshot of the exemplary virtual machine, obtaining the second snapshot of the virtual machine, and restoring the virtual machine to a previous state based on the second snapshot.
-
公开(公告)号:US20170118216A1
公开(公告)日:2017-04-27
申请号:US15398604
申请日:2017-01-04
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth
IPC: H04L29/06
CPC classification number: H04L63/10 , H04L63/0227 , H04L63/0272 , H04L63/101 , H04L63/20 , H04L67/02 , H04L67/10 , H04L67/1097 , H04L67/42
Abstract: Approaches are described for allowing an access control policy to specify that a substitute operation be executed when a request for access matches certain conditions specified in the access control policy (e.g., when the identity of the requestor matches a specified identity in the policy). For example, the access control may specify that a substitute result should be provided to a requestor in response to a request for access or a substitute request should be executed instead of executing the received request and the results of the substitute request should be provided to the requestor in response to the request. The substitute result or the result of the substitute request may appear to the requestor as though their original request for access succeeded but the content of the result may be different than what would have been generated if the access control policy allowed the request to proceed.
-
公开(公告)号:US20170093581A1
公开(公告)日:2017-03-30
申请号:US15376451
申请日:2016-12-12
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Eric Jason Brandwine , Brian Irl Pratt
Abstract: A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information is authentic. The information may include information that identifies a holder of a key needed for processing the request, where the holder of the key can be the system or another, possibly third party, system. Requests to decrypt data may be processed to ensure that a certain amount of time passes before access to the decrypted data is provided, thereby providing an opportunity to cancel such requests and/or otherwise mitigate potential security breaches.
-
公开(公告)号:US09602288B1
公开(公告)日:2017-03-21
申请号:US14672029
申请日:2015-03-27
Applicant: Amazon Technologies, Inc.
Inventor: Andrew Paul Mikulski , Gregory Branchek Roth , Matthew John Campagna
CPC classification number: H04L63/1433 , G06F21/577 , G06F21/602 , H04L9/088 , H04L9/3247 , H04L9/3252
Abstract: A system records use of values used in cryptographic algorithms where the values are subject to uniqueness constraints. As new values are received, the system checks whether violations of a unique constraint has occurred. If a violation occurs, the system performs actions to mitigate potential compromise caused by exploitation of a vulnerability caused by violation of the uniqueness constraint.
-
公开(公告)号:US09584517B1
公开(公告)日:2017-02-28
申请号:US14476532
申请日:2014-09-03
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Aaron Douglas Dokey , Eric Jason Brandwine , Nathan Bartholomew Thomas
CPC classification number: H04L63/10 , G06F21/53 , G06F21/602 , G06F21/6209 , H04L63/0442 , H04L67/34
Abstract: Methods and systems for instantiating an enclave according to a request, the enclave being instantiated at a determined location of a set of locations in a computing environment of a computing resource service provider hosting a set of computing resources. The enclave further being instantiated with executable code specified by a customer for processing network traffic in accordance with the executable code in a computing environment.
Abstract translation: 用于根据请求实例化飞地的方法和系统,该飞地在承载一组计算资源的计算资源服务提供商的计算环境中的一组位置的确定位置处被实例化。 该飞地还进一步用客户指定的可执行代码实例化,以便根据计算环境中的可执行代码处理网络流量。
-
公开(公告)号:US20170054696A1
公开(公告)日:2017-02-23
申请号:US15344391
申请日:2016-11-04
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Aaron Douglas Dokey , Eric Jason Brandwine , Nathan Bartholomew Thomas
CPC classification number: H04L63/0428 , G06F21/53 , G06F21/6281 , G06F21/645 , H04L41/50 , H04L41/5054 , H04L47/70 , H04L63/083 , H04L67/02
Abstract: Techniques for hosting components of provider services within secure execution environments are described herein. Information associated with a request received at a control plane of a service is received at a secure execution environment and, based at least in part on that information, one or more tasks is determined that may be performed to respond to the request. A task of the one or more tasks is performed within the secure execution environment to generate a response to the request, the response is encrypted within the secure execution environment using a key stored within the secure execution environment and available to a component of a computer system, and the encrypted response is made available.
Abstract translation: 本文描述了在安全执行环境中托管提供商服务的组件的技术。 在安全执行环境中接收与在服务的控制平面处接收到的请求相关联的信息,并且至少部分地基于该信息确定可以执行的一个或多个任务来响应该请求。 在安全执行环境中执行一个或多个任务的任务以产生对请求的响应,使用存储在安全执行环境内的密钥在安全执行环境内对响应进行加密,并且可用于计算机系统的组件 ,并且加密的响应是可用的。
-
公开(公告)号:US09567770B1
公开(公告)日:2017-02-14
申请号:US13747320
申请日:2013-01-22
Applicant: Amazon Technologies, Inc.
Inventor: Alexander Zissis Ginos , Gregory Branchek Roth
CPC classification number: E05B27/006 , E05B17/2092 , E05B27/00 , E05B27/0071 , E05B35/001 , E05B45/10 , E05B47/00 , E05B47/063
Abstract: Pin tumbler locks are provided that include features for detecting tampering. Tampering may be detected in a number of different ways. As an example, abnormal movement of one or more of the driver pins in a pin tumbler lock can be an indication of tampering. In addition, one or more sensors can be included at the end of a keyway that detect picking or bumping beyond the length of normal key insertion. An electrical sensor can be used for detection.
Abstract translation: 提供引脚翻转锁,其中包括用于检测篡改的功能。 可以以多种不同的方式检测篡改。 作为示例,一个或多个驱动器针在销转换器锁中的异常运动可以是篡改的指示。 此外,一个或多个传感器可以包括在键槽的末端,其检测超过正常键插入长度的拾取或碰撞。 电传感器可用于检测。
-
公开(公告)号:US09563763B1
公开(公告)日:2017-02-07
申请号:US13899146
申请日:2013-05-21
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Jeffrey John Wierer
CPC classification number: G06F21/36 , G06F21/16 , G06F21/30 , G06F2221/2133
Abstract: Concepts and technologies are described herein for providing enhanced Completely Automated Public Turing tests to Tell Computers and Humans Apart (“CAPTCHAs”). According to some of the concepts and technologies disclosed herein, a CAPTCHA service may be configured to generate CAPTCHAs enhanced with watermarks and/or other enhancements. The CAPTCHA service may provide the enhanced CAPTCHAs to user services, such as Websites, Web services, and other services that utilize or are capable of utilizing CAPTCHAs as a security feature. The watermarks and/or other enhancements may contain information associated with users of the user services so that the enhanced CAPTCHAs are more difficult to break by unauthorized entities, including automated programs such as “bots.” According to other concepts and technologies disclosed herein, a CAPTCHA breaking service is provided.
Abstract translation: 这里描述了概念和技术,以提供增强的完全自动公共图灵测试来告诉计算机和人类(“CAPTCHAs”)。 根据本文公开的一些概念和技术,CAPTCHA服务可以被配置为生成利用水印和/或其他增强增强的CAPTCHAs。 CAPTCHA服务可以将增强的CAPTCHAs提供给使用或能够利用CAPTCHAs作为安全特征的用户服务,诸如网站,Web服务和其他服务。 水印和/或其他增强可以包含与用户服务的用户相关联的信息,使得增强的CAPTCHAs更难以被未经授权的实体(包括诸如“机器人”这样的自动化程序)中断。根据本文公开的其它概念和技术, 提供CAPTCHA破解服务。
-
-
-
-
-
-
-
-
-