-
公开(公告)号:US10375067B2
公开(公告)日:2019-08-06
申请号:US15675605
申请日:2017-08-11
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Gregory Alan Rubin
Abstract: A client and server negotiate a secure communication channel using a pre-shared key where the server, at the time the negotiation initiates, lacks access to the pre-shared key. The server obtains the pre-shared key from another server that shares a secret with the client. A digital signature or other authentication information generated by the client may be used to enable the other server to determine whether to provide the pre-shared key.
-
公开(公告)号:US10348759B2
公开(公告)日:2019-07-09
申请号:US15874771
申请日:2018-01-18
Applicant: Amazon Technologies, Inc.
Inventor: Hassan Sultan , John Schweitzer , Donald Lee Bailey, Jr. , Gregory Branchek Roth , Nachiketh Rao Potlapally
Abstract: A graph of a plurality of resources in a computing environment is generated, with the graph associating a first resource of the plurality with a second resource of the plurality. Based at least in part on measurements obtained at a point in a test computing environment that corresponds to a point in the computing environment, a graph representing the relationship between the first resource and the second resource is generated. A threat model identifying potential risks to the computing environment is created from the graph.
-
公开(公告)号:US20190207942A1
公开(公告)日:2019-07-04
申请号:US16297421
申请日:2019-03-08
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren
IPC: H04L29/06
CPC classification number: H04L63/10 , H04L63/0428 , H04L63/08 , H04L63/108 , H04L63/20
Abstract: Policy changes are propagated to access control devices of a distributed system. The policy changes are given immediate effect without having to wait for the changes to propagate through the system. A token comprises the policy change and can be provided in connection with access requests. Before an access control device has received a propagated policy change, the access control device can evaluate a token provided in connection with a request to determine, consistent with the policy change, whether to fulfill the request.
-
公开(公告)号:US10320790B1
公开(公告)日:2019-06-11
申请号:US14475306
申请日:2014-09-02
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Graeme David Baer , Jacques Daniel Thomas , Nicholas Andrew Gochenaur
Abstract: Functionality is disclosed herein for providing temporary access to a resource. A software product that is executing in response to a request from a customer may access one or more resources of a software provider. The resources that may be accessed by a software product may be identified within an access policy. The customer is prevented from accessing the resource when the software product is not executing.
-
公开(公告)号:US10313364B2
公开(公告)日:2019-06-04
申请号:US15048823
申请日:2016-02-19
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Nicholas Alexander Allen
Abstract: Source information for requests submitted to a system are classified to enable differential handling of requests over a session whose source information changes over the session. For source information (e.g., an IP address) classified as fixed, stronger authentication may be required to fulfill requests when the source information changes during the session. Similarly, for source information classified as dynamic, source information may be allowed to change without requiring the stronger authentication.
-
公开(公告)号:US10313312B2
公开(公告)日:2019-06-04
申请号:US15462604
申请日:2017-03-17
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Eric Jason Brandwine , Brian Irl Pratt
Abstract: A plurality of devices, having common access to a first key under which a set of data objects used by the plurality of devices are encrypted, is caused to replace the first key with a second key by at least causing a device of the plurality of devices to encrypt a subset of the set of data objects that are not selected for electronic shredding, allow access to a data object of the subset regardless of whether the data object is encrypted using the first key or the second key. At a time after the data object becomes accessible by using the second key, each of the plurality of devices is verified have common access to the second key, and the plurality of devices is caused to lose access to the first key.
-
公开(公告)号:US10250382B2
公开(公告)日:2019-04-02
申请号:US15888765
申请日:2018-02-05
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth
IPC: H04L9/08
Abstract: A cryptography service allows for management of cryptographic keys in multiple environments. The service allows for specification of policies applicable to cryptographic keys, such as what cryptographic algorithms should be used in which contexts. The cryptography service, upon receiving a request for a key, may provide a referral to another system to obtain the key.
-
公开(公告)号:US10230730B2
公开(公告)日:2019-03-12
申请号:US15851564
申请日:2017-12-21
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren
IPC: H04L29/06
Abstract: Policy changes are propagated to access control devices of a distributed system. The policy changes are given immediate effect without having to wait for the changes to propagate through the system. A token encodes the policy change and can be provided in connection with access requests. Before an access control device has received a propagated policy change, the access control device can evaluate a token provided in connection with a request to determine, consistent with the policy change, whether to fulfill the request.
-
公开(公告)号:US10230705B1
公开(公告)日:2019-03-12
申请号:US14658276
申请日:2015-03-16
Applicant: Amazon Technologies, Inc.
Inventor: Preyas Joshi , Darren Ernest Canavor , Daniel Wade Hitchcock , Jesper Mikael Johansson , Jon Arron McClintock , Gregory Branchek Roth
IPC: H04L29/06
Abstract: Disclosed are various embodiments for verifying the authenticity of machine-readable identifiers, such as quick response (QR) codes or other identifiers. After data is received corresponding to a machine-readable identifier, environmental data may be acquired with respect to an environment of the machine-readable identifier. The authenticity of the machine-readable identifier may be verified based at least in part on the environmental data. In some embodiments, a verification request may be sent to a trusted authority.
-
公开(公告)号:US10210341B2
公开(公告)日:2019-02-19
申请号:US13765239
申请日:2013-02-12
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Eric Jason Brandwine , Brian Irl Pratt
Abstract: A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information is authentic. The information may include information that identifies a holder of a key needed for processing the request, where the holder of the key can be the system or another, possibly third party, system. Requests to decrypt data may be processed to ensure that a certain amount of time passes before access to the decrypted data is provided, thereby providing an opportunity to cancel such requests and/or otherwise mitigate potential security breaches.
-
-
-
-
-
-
-
-
-