-
公开(公告)号:US20190268358A1
公开(公告)日:2019-08-29
申请号:US16408186
申请日:2019-05-09
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
IPC: H04L29/06
Abstract: Techniques for improving computer system security by detecting and responding to attacks on computer systems are described herein. A computer system monitors communications requests from external systems and, as a result of detecting one or more attacks on the computer system, the computer system responds to the attacks by analyzing the behavior of the attacker, relating that behavior to one or more attack profiles and creating a simulated environment to respond to the attack based in part on the attack profiles. The simulated environment responds to the attack by communicating with the attacker.
-
公开(公告)号:US10262161B1
公开(公告)日:2019-04-16
申请号:US14580023
申请日:2014-12-22
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Darren Ernest Canavor , Harsha Ramalingam , George Nikolaos Stathakopoulos
IPC: G06F21/71
Abstract: Techniques described and suggested herein include the use of transformation parameters, such as mathematical and/or cryptographic operations, to permute various aspects of executables so as to control executable code authorized to run on one or more hosts. For example, a set of transformation parameters, such as a mathematical operation and a specified value upon which the mathematical operation may operate, are associated with a host or group of hosts. The set of transformation parameters may be applied to one or more runtime-related numerical locations associated with an executable that is intended to run on the specified hosts. At runtime, appropriately encoded executables are decoded by the specified hosts and operate normally, while differently encoded or unencoded executables are inoperable by the specified hosts.
-
33.
公开(公告)号:US10135862B1
公开(公告)日:2018-11-20
申请号:US14959618
申请日:2015-12-04
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
IPC: H04L29/06
Abstract: Disclosed are various embodiments for testing the security incident response of an organization through automated injection of a known indicator of compromise. A stream of event data generated by a network monitoring system of an organization is received. The stream of event data is modified to include data embodying a fabricated indicator of compromise. The stream of event data that has been modified is then provided to an intrusion detection system of the organization. Metrics are then generated that assess the response of the organization to the fabricated indicator of compromise.
-
公开(公告)号:US10122727B2
公开(公告)日:2018-11-06
申请号:US14882881
申请日:2015-10-14
Applicant: Amazon Technologies, Inc.
Abstract: Disclosed are various embodiments for a social networking behavior-based identity system that employs social networking data that a user has elected to share through an opt-in procedure. First social networking data is stored in association with a user identity. An assertion of the user identity is received from a client after the first social networking data is stored. Second social networking data is received in response to receiving the assertion of the user identity. An identity confidence level as to whether the user identity belongs to a user at the client is generated based at least in part on a comparison of the second social networking data with the first social networking data.
-
公开(公告)号:US20180032716A1
公开(公告)日:2018-02-01
申请号:US15730560
申请日:2017-10-11
Applicant: Amazon Technologies, Inc.
CPC classification number: G06F21/40 , G06F21/64 , G10H1/00 , G10H2210/031 , G10H2250/215 , H04L29/06755 , H04L2209/38
Abstract: A service receives a request from a user of a group of users to perform one or more operations requiring group authentication in order for the operations to be performed. In response, the service provides a first user of the group with an image seed and an ordering of the group of users. Each user of the group applies a transformation algorithm to the seed to create an authentication claim. The service receives this claim and determines, based at least in part on the ordering of the group of users, an ordered set of transformations, which are used to create a reference image file. If the received claim matches the reference image file, the service enables performance of the requested one or more operations.
-
公开(公告)号:US09747455B1
公开(公告)日:2017-08-29
申请号:US14561044
申请日:2014-12-04
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
CPC classification number: H04L63/1441 , G06F21/6227
Abstract: Data of an organization or other entity may be protected using active data objects. The data may be storage in a storage system maintained by the organization or a separate organization. The data storage system may receive request for data, if the request violates one or more constraint conditions, the storage system may provide in response to the received request active data. The active data may include executable code that, when executed by a computer system, causes depletion of one or more resources used by a computer system executing the code.
-
公开(公告)号:US20170236176A1
公开(公告)日:2017-08-17
申请号:US15583874
申请日:2017-05-01
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Donald Lloyd Kaufman , Joshua Brandon Kilpatrick , George Nikolaos Stathakopoulos
CPC classification number: G06Q30/0613 , G06Q10/06311 , H04M3/5233 , H04M3/5235 , H04M2250/12
Abstract: A customer submits a request for assistance to a customer service. Accordingly, the customer service may access a customer database to obtain one or more customer preferences that can be used to select a service representative. If the customer database does not include these preferences, the customer service may utilize one or more customer attributes to calculate these one or more customer preferences. Subsequently, the customer service may access a service representative database and select a service representative based at least in part on the one or more customer preferences. The customer service may transmit the request to the selected service representative to enable the service representative to assist the customer.
-
公开(公告)号:US20170177902A1
公开(公告)日:2017-06-22
申请号:US15446434
申请日:2017-03-01
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , George Nikolaos Stathakopoulos
CPC classification number: H04L63/1491 , G06F21/60 , G06F21/6245 , G06F21/64 , H04L63/1416
Abstract: A method and apparatus for deterring exfiltration of data from are provided. In the method and apparatus, it is determined that data is to be inflated. A request for access to data is received and data responsive to the request is retrieved. Spurious data is also generated and provided together with the responsive data in response to the request.
-
公开(公告)号:US09426139B1
公开(公告)日:2016-08-23
申请号:US14673609
申请日:2015-03-30
Applicant: Amazon Technologies, Inc.
CPC classification number: H04W12/06 , G06F21/40 , G06F21/554 , G06F2221/2103 , H04L63/08 , H04L63/083 , H04L63/0861 , H04L63/102 , H04L63/107 , H04L2463/082
Abstract: The present disclosure relates to multifactor-based authentication systems. Multifactor authentication occurs during a communication session in response to detecting a trigger event, such as an anomalous condition. Historical metrics, such as performance metrics (e.g., rendering speeds), behavioral metrics (e.g., click-stream behavior), environmental metrics (e.g., noise), etc., can be used as a baseline to compare against metrics for a current communication session. An anomalous condition, such as a current session metric exceeding a threshold, can result in an authentication service transmitting a multifactor authentication request.
Abstract translation: 本公开涉及基于多因素的认证系统。 响应于检测到诸如异常状况的触发事件,在通信会话期间发生多因素认证。 可以将诸如性能指标(例如渲染速度),行为度量(例如,点击流行为),环境指标(例如噪声)等的历史指标用作与当前通信的指标进行比较的基准 会话 诸如当前会话度量超过阈值的异常状况可能导致认证服务发送多方认证请求。
-
-
-
-
-
-
-
-