Modifying provisioned throughput capacity for data stores according to cache performance

    公开(公告)号:US10025718B1

    公开(公告)日:2018-07-17

    申请号:US15195884

    申请日:2016-06-28

    Abstract: Modifications to throughput capacity provisioned at a data store for servicing access requests to the data store may be performed according to cache performance metrics. A cache that services access requests to the data store may be monitored to collected and evaluate cache performance metrics. The cache performance metrics may be evaluated with respect to criteria for triggering different throughput modifications. In response to triggering a throughput modification, the throughput capacity for the data store may be modified according to the triggered throughput modification. In some embodiments, the criteria for detecting throughput modifications may be determined and modified based on cache performance metrics.

    Metadata-based verification of artifact quality policy compliance

    公开(公告)号:US09813450B1

    公开(公告)日:2017-11-07

    申请号:US14623414

    申请日:2015-02-16

    CPC classification number: H04L63/20 G06F21/577 G06F2221/033

    Abstract: An automated quality compliance verifier QCV identifies a quality control policy to be implemented for artifacts in a repository. The QCV determines one or more artifact metadata categories, including at least one category indicating an activity status (such as recent or ongoing use) of the artifacts. Metadata entries for at least the activity status category are obtained for a first and a second artifact. Based on an analysis of the metadata entries, the QCV assigns a higher priority to a first policy violation detection operation (PVDO) for the first artifact than to a second PVDO for the second artifact. Based on a result of the first PVDO, the QCV initiates one or more responsive actions.

    Identifying false positives in malicious domain data using network traffic data logs

    公开(公告)号:US10924503B1

    公开(公告)日:2021-02-16

    申请号:US15993216

    申请日:2018-05-30

    Abstract: Systems, methods, and computer-readable media are disclosed for systems and methods for identifying false positives in malicious domain data using network traffic data logs. Example methods may include determining a first domain name identifier in a set of domain name identifiers classified as malicious, determining a first IP address associated with the first domain name identifier, and determining first virtual private cloud (VPC) flow log data that corresponds to historical network traffic associated with the first IP address. Certain methods may include determining second VPC flow log data that corresponds to historical network traffic associated with a second IP address that is classified as non-malicious, determining, using the first VPC flow log data and the second VPC flow log data, that the first VPC flow log data is non-malicious, and determining that the first domain name identifier is to be classified as non-malicious.

    END-TO-END CHANGE TRACKING FOR TRIGGERING WEBSITE SECURITY REVIEW

    公开(公告)号:US20190377883A1

    公开(公告)日:2019-12-12

    申请号:US16548733

    申请日:2019-08-22

    Abstract: An end-to-end request path associated with an application frontend is determined. A change to a service in the end-to-end request path is identified. A weight value to associate with the change is determined based at least in part on the characteristics of the change. The weight value is aggregated with weight values associated with other code changes is obtained from aggregating the weight value with the weight values of other code changes to produce a collective weight of the code changes. A security review is determined to be triggered based at least in part on the collective weight reaching a value relative to a threshold.

    MODIFYING PROVISIONED THROUGHPUT CAPACITY FOR DATA STORES ACCORDING TO CACHE PERFORMANCE

    公开(公告)号:US20180322066A1

    公开(公告)日:2018-11-08

    申请号:US16035461

    申请日:2018-07-13

    Abstract: Modifications to throughput capacity provisioned at a data store for servicing access requests to the data store may be performed according to cache performance metrics. A cache that services access requests to the data store may be monitored to collected and evaluate cache performance metrics. The cache performance metrics may be evaluated with respect to criteria for triggering different throughput modifications. In response to triggering a throughput modification, the throughput capacity for the data store may be modified according to the triggered throughput modification. In some embodiments, the criteria for detecting throughput modifications may be determined and modified based on cache performance metrics.

    Leveraging transport-layer cryptographic material

    公开(公告)号:US09781081B1

    公开(公告)日:2017-10-03

    申请号:US14874248

    申请日:2015-10-02

    Abstract: A client application cryptographically protects application data using an application-layer cryptographic key. The application-layer cryptographic key is derived from cryptographic material provided by a cryptographically protected network connection. The client exchanges the cryptographically protected application data with a service application via the cryptographically protected network connection. The client and service applications acquire matching application-layer cryptographic keys by leveraging shared secrets negotiated as part of establishing the cryptographically protected network connection. The shared secrets may include information that is negotiated as part of establishing a TLS session such as a pre-master secret, master secret, or session key. The application-layer cryptographic keys may be derived in part by applying a key derivation function, a one-way function or a cryptographic hash function to the shared secret information.

    Service-to-service digital path tracing
    18.
    发明授权
    Service-to-service digital path tracing 有权
    服务到服务数字路径跟踪

    公开(公告)号:US09559849B1

    公开(公告)日:2017-01-31

    申请号:US14490465

    申请日:2014-09-18

    Abstract: A service receives from a sender service a digital message and a corresponding trace, which includes an ordered set of digital signatures of one or more services that participated in causing the service to receive the digital message. The trace may further specify an ordering of the one or more services, which may be generated according to the order of participation of these one or more services. The service may compare the received trace to recorded message paths to determine whether the ordering specified within the trace is valid. If the ordering is valid, the service may use one or more digital certificates to further verify the digital signatures included within the trace. If the service determines that these digital signatures are also valid, the service may process the message.

    Abstract translation: 服务从发送者服务接收数字消息和对应的跟踪,其包括参与使服务接收数字消息的一个或多个服务的有序数字签名集合。 跟踪可以进一步指定可以根据这些一个或多个服务的参与顺序生成的一个或多个服务的顺序。 服务可以将接收的跟踪与记录的消息路径进行比较,以确定跟踪中指定的排序是否有效。 如果订购有效,则服务可以使用一个或多个数字证书来进一步验证包含在跟踪内的数字签名。 如果服务确定这些数字签名也是有效的,则服务可以处理消息。

    Preventing leakage of cookie data
    20.
    发明授权

    公开(公告)号:US11095647B2

    公开(公告)日:2021-08-17

    申请号:US16265414

    申请日:2019-02-01

    Abstract: Disclosed are various embodiments for preventing the unintended leakage of cookie data. In one embodiment, a browser application stores cookie data from a first network site having a high-level domain in a client computing device. A classification is assigned to a second network site having the high-level domain. The cookie data is sent to the second network site based at least in part on the classification rather than the default behavior of the browser application.

Patent Agency Ranking