The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Oct. 31, 2023

Filed:

Dec. 12, 2019
Applicant:

Amazon Technologies, Inc., Seattle, WA (US);

Inventors:

Preethi Srinivasan, Herndon, VA (US);

Sreekanth Reddy Polaka, Aldie, VA (US);

Christopher Wooram Yi, Woodbridge, VA (US);

John David Backes, Minneapolis, MN (US);

Everett Richard Anthony, Herndon, VA (US);

Aparna Nagargadde, Herndon, VA (US);

Mark Edward Stalzer, Arlington, VA (US);

Assignee:

Amazon Technologies, Inc., Seattle, WA (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06N 5/04 (2023.01); H04L 9/40 (2022.01); G06F 9/455 (2018.01);
U.S. Cl.
CPC ...
G06N 5/04 (2013.01); G06F 9/45558 (2013.01); H04L 63/1433 (2013.01); H04L 63/20 (2013.01); G06F 2009/45579 (2013.01);
Abstract

An automated security assessment service of a service provider network may identify, and notify a customer of, misconfigured VM instances that can be access (e.g., via the Internet). A scanner tool may call an automated reasoning service to identify any VM instances of a customer that can be accessed, and may receive information from the automated reasoning service that is usable to exchange packets with those identified instances. The scanner tool can use the information to send requests to the identified instances. After receiving responses from the identified instances, the scanner tool can store, in storage of a network-based storage service, and in association with a customer account of the customer, encrypted data about the results of the scan (e.g., any VM instances that are vulnerable to attackers), and this encrypted data is thereby accessible to the customer with proper decrypt permissions.


Find Patent Forward Citations

Loading…