Activity
-
I'm pumped too Panos :0 -- I love our new Echo line-up and I'm so proud of the team!
I'm pumped too Panos :0 -- I love our new Echo line-up and I'm so proud of the team!
Liked by Stephen Schmidt
-
Autonomous security testing isn't theoretical - it's finding critical vulnerabilities in production systems today. XBOW discovered CVE-2025-8868, a…
Autonomous security testing isn't theoretical - it's finding critical vulnerabilities in production systems today. XBOW discovered CVE-2025-8868, a…
Liked by Stephen Schmidt
Experience & Education
Patents
-
Maintaining Cryptographically Verifiable Data Share Traces for Services of a Provider Network
Issued 12432064
This patent relates to aggregating trace information for testing data share permission compliance in a cloud provider. Because cloud providers have large numbers of services, movement of data subject to sharing permissions between these services is difficult to verify for proving correct permission enforcement. Traces are obtained using an encoded token to discover the movement of data across different services and verify correct application of permissions for the data (e.g., allowing for data…
This patent relates to aggregating trace information for testing data share permission compliance in a cloud provider. Because cloud providers have large numbers of services, movement of data subject to sharing permissions between these services is difficult to verify for proving correct permission enforcement. Traces are obtained using an encoded token to discover the movement of data across different services and verify correct application of permissions for the data (e.g., allowing for data to be combined or used with other data). Then the traces are aggregated in a cryptographically verifiable format and provided upon request to various client applications. In this way, tools to verify data sharing compliance or various other client applications that may make use of trace information can obtain access to a centralized repository of data movements and compliance evidence for a cloud provider.
-
Providing Access to Configurable Private Computer Networks
Issued 12432110
This patent relates to a service that provides an interface for configuring private networks (e.g., VPCs) within a provider network and is a continuation of the original patent family relating to VPCs. A request is received via the interface to configure network addresses for a client’s private network. The service also provides am interface for configuring access of instances within a private network to a remote resource service. The private network may be configured to associate an identifier…
This patent relates to a service that provides an interface for configuring private networks (e.g., VPCs) within a provider network and is a continuation of the original patent family relating to VPCs. A request is received via the interface to configure network addresses for a client’s private network. The service also provides am interface for configuring access of instances within a private network to a remote resource service. The private network may be configured to associate an identifier that represents the remote resource service with an indicated network address for an instance within the private network, so that communications sent to the remote resource service via the indicated network address to access a resource of the remote resource service are modified to include an indication of the identifier for use by the remote resource service in identifying the namespace. This may be used, for example, in configuring a VPN connection between the VPC and a client site.
Other inventorsSee patent -
Providing Access to Configurable Private Computer Networks
Issued 11831496
This patent relates to a service that provides an interface for configuring private networks (e.g., VPCs) within a provider network. A request is received via the interface to configure network addresses for a client’s private network. The service also provides am interface for configuring access of instances within a private network to a remote resource service. The private network may be configured to associate an identifier that represents the remote resource service with an indicated…
This patent relates to a service that provides an interface for configuring private networks (e.g., VPCs) within a provider network. A request is received via the interface to configure network addresses for a client’s private network. The service also provides am interface for configuring access of instances within a private network to a remote resource service. The private network may be configured to associate an identifier that represents the remote resource service with an indicated network address for an instance within the private network, so that communications sent to the remote resource service via the indicated network address to access a resource of the remote resource service are modified to include an indication of the identifier for use by the remote resource service in identifying the namespace. This may be used, for example, in configuring a VPN connection between the VPC and a client site.
Other inventorsSee patent -
Service defense techniques
Issued US 11,055,425
A request to access a computing resource of a computing resource service provider is determined to be associated with specious data previously generated by the computing resource service provider. Information about an entity associated with the request is determined from the request. The information is provided to a breach detection system as notification of a potential attack against the computing resource service provider.
-
PROVIDING ACCESS TO CONFIGURABLE PRIVATE COMPUTER NETWORKS
Issued US 10,728,089
This patent relates to a service that provides an interface for configuring private networks (e.g., VPCs) within a cloud provider network. Customers can use the interface to configure network addresses for their private network. Customers can also use the interface for configuring access of instances within a private network to a remote resource service. The private network may be configured to associate an identifier that represents the remote resource service with an indicated network address…
This patent relates to a service that provides an interface for configuring private networks (e.g., VPCs) within a cloud provider network. Customers can use the interface to configure network addresses for their private network. Customers can also use the interface for configuring access of instances within a private network to a remote resource service. The private network may be configured to associate an identifier that represents the remote resource service with an indicated network address for an instance within the private network, so that communications sent to the remote resource service via the indicated network address to access a resource of the remote resource service are modified to include an indication of the identifier for use by the remote resource service in identifying the namespace. This may be used, for example, in configuring a VPN connection between the VPC and a client site.
-
Service Defense Techniques
Issued US 10,346,623
A computing resource service provider may operate one or more services configured to provide customers with access to computing resources. Attackers may attempt to exfiltrate customer data from the one or more services. In order to prevent attackers from obtaining customer data the one or more services may provide specious data in response to an attack. The attack may be detected based at least in part on a set of triggers that indicate a likelihood of attack. The specious data may be…
A computing resource service provider may operate one or more services configured to provide customers with access to computing resources. Attackers may attempt to exfiltrate customer data from the one or more services. In order to prevent attackers from obtaining customer data the one or more services may provide specious data in response to an attack. The attack may be detected based at least in part on a set of triggers that indicate a likelihood of attack. The specious data may be configured to appear to the attacker as authentic customer data and/or that the attack is successful. Additionally, the specious data may be detectable by the one or more service, enabling the one or more service to collect additional data corresponding to the attack and/or attacker.
-
Managing computing resource usage for standards compliance
Issued US 10,104,127
Systems and methods are provided for configuring and monitoring computing resources of an entity for compliance with one or more standards. In one implementation, a server receives one or more identifiers of one or more standards and determines a plurality of configuration settings for the computing resources of the entity, based on the received one or more identifiers. The plurality of configuration settings comply with the one or more standards. The computing resources of the entity are…
Systems and methods are provided for configuring and monitoring computing resources of an entity for compliance with one or more standards. In one implementation, a server receives one or more identifiers of one or more standards and determines a plurality of configuration settings for the computing resources of the entity, based on the received one or more identifiers. The plurality of configuration settings comply with the one or more standards. The computing resources of the entity are configured according to the plurality of configuration settings. The server detects an event related to the computing resources. The detected event and the plurality of configuration settings are evaluated for compliance with the one or more standards. A determination is made whether the entity is compliant with the one or more standards, based on the evaluation, and an action is taken, based on the determination.
-
Managing virtual computing nodes using isolation and migration techniques
Issued US 9,959,132
Systems and method for the management of virtual machine instances are provided. A network data transmission analysis system can use contextual information in the execution of virtual machine instances to isolate and migrate virtual machine instances onto physical computing devices. The contextual information may include information obtained in observing the execution of virtual machines instances, information obtained from requests submitted by users, such as system administrators. Still…
Systems and method for the management of virtual machine instances are provided. A network data transmission analysis system can use contextual information in the execution of virtual machine instances to isolate and migrate virtual machine instances onto physical computing devices. The contextual information may include information obtained in observing the execution of virtual machines instances, information obtained from requests submitted by users, such as system administrators. Still further, the network data transmission analysis system can also include information collection and retention for identified virtual machine instances.
Other inventorsSee patent -
Standards Compliance for Computing Data
Issued US 9,621,584
Systems and methods are provided for configuring and monitoring computing resources of an entity for compliance with one or more standards. In one implementation, a server receives one or more identifiers of one or more standards and determines a plurality of configuration settings for the computing resources of the entity, based on the received one or more identifiers. The plurality of configuration settings comply with the one or more standards. The computing resources of the entity are…
Systems and methods are provided for configuring and monitoring computing resources of an entity for compliance with one or more standards. In one implementation, a server receives one or more identifiers of one or more standards and determines a plurality of configuration settings for the computing resources of the entity, based on the received one or more identifiers. The plurality of configuration settings comply with the one or more standards. The computing resources of the entity are configured according to the plurality of configuration settings. The server detects an event related to the computing resources. The detected event and the plurality of configuration settings are evaluated for compliance with the one or more standards. A determination is made whether the entity is compliant with the one or more standards, based on the evaluation, and an action is taken, based on the determination.
Other inventorsSee patent -
Providing access to configurable private computer networks
Issued US 9,521,037
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a…
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.
Other inventorsSee patent -
Approaches for restricting access to data
Issued US 9,514,324
A computer-implemented method includes restricting access to customer data to certain geographic regions authorized by the customer. The restriction can be managed by associating policy information with the customer data that identifies the geographic regions authorized by the customer. Resources attempting to access the customer data can evaluate the policy information associated with the customer data with respect to the geographic location in which the resource is located to determine…
A computer-implemented method includes restricting access to customer data to certain geographic regions authorized by the customer. The restriction can be managed by associating policy information with the customer data that identifies the geographic regions authorized by the customer. Resources attempting to access the customer data can evaluate the policy information associated with the customer data with respect to the geographic location in which the resource is located to determine whether the resource is permitted to access the customer data. The restriction can also be managed by encrypting the customer data with a cryptographic key that corresponds to the customer and/or the authorized geographic regions.
-
Providing and accessing data in a standard-compliant manner
Issued US 9,432,407
In certain embodiments, a computer-implemented method includes receiving intercepted data associated with a first entity. The intercepted data may be intercepted in response to a request for information from a second entity. The method may include converting the intercepted data from a first format to a second format, the second format compliant with a standard for providing intercepted data to the second entity. The method may include storing, in one or more memory units, the intercepted…
In certain embodiments, a computer-implemented method includes receiving intercepted data associated with a first entity. The intercepted data may be intercepted in response to a request for information from a second entity. The method may include converting the intercepted data from a first format to a second format, the second format compliant with a standard for providing intercepted data to the second entity. The method may include storing, in one or more memory units, the intercepted communication data in the second format. The one or more memory units may be part of a subset of a plurality of computing resources designated for use by the first entity. The method may include storing audit data providing a record of a chain of custody of the intercepted communication data. The method may include providing access to a portion of the stored intercepted communication data in the second format to the second entity.
Other inventorsSee patent -
Managing virtual computing nodes
Issued US 9384029
Systems and method for the management of virtual machine instances are provided. A network data transmission analysis system can use contextual information in the execution of virtual machine instances to isolate and migrate virtual machine instances onto physical computing devices. The contextual information may include information obtained in observing the execution of virtual machines instances, information obtained from requests submitted by users, such as system administrators. Still…
Systems and method for the management of virtual machine instances are provided. A network data transmission analysis system can use contextual information in the execution of virtual machine instances to isolate and migrate virtual machine instances onto physical computing devices. The contextual information may include information obtained in observing the execution of virtual machines instances, information obtained from requests submitted by users, such as system administrators. Still further, the network data transmission analysis system can also include information collection and retention for identified virtual machine instances.
Other inventorsSee patent -
Managing virtual computing nodes using isolation and migration techniques
Issued US 9104458
A system for managing virtual machine instances comprising: a processor; a first computing device, the first computing device hosting at least one virtual machine instance associated with a first set of virtual machine instances and at least one virtual machine instance associated with a second set of virtual machine instances, wherein a virtual machine instance is associated with a set of virtual machine instances by an affiliation to one of a plurality of users; a second computing device, the…
A system for managing virtual machine instances comprising: a processor; a first computing device, the first computing device hosting at least one virtual machine instance associated with a first set of virtual machine instances and at least one virtual machine instance associated with a second set of virtual machine instances, wherein a virtual machine instance is associated with a set of virtual machine instances by an affiliation to one of a plurality of users; a second computing device, the second computing device hosting at least one virtual machine instance associated with the first set of virtual machine instances; and a system manager executed on the processor, wherein the system manager is configured to: determine an event based at least partly on a detected activity associated with execution of one or more of the first set of virtual machine instances; in response to the determined event, prevent instantiation of an additional virtual machine instance not associated with the first set of virtual machine instances on the first computing device hosting the at least one virtual machine instance associated with the first set of virtual machine instances; initiate the additional virtual machine instance on another computing device not hosting one or more of the first set of virtual machine instances; migrate virtual machine instances not associated with the one or more of the first set of virtual machine instances from the first computing device; initiate a new virtual machine instance associated with the first set of virtual machine instances on the first computing device; and migrate the at least one virtual machine instance associated with the one or more of the first set of virtual machine instances from the second computing device to the first computing device.
Other inventorsSee patent -
Providing Access to Configurable Private Computer Networks
Issued US 8,578,003
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a…
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.
-
Providing access to configurable private computer networks
Issued US 8,230,050
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a…
Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.
Other inventorsSee patent
More activity by Stephen
-
There’s more great stuff to watch than ever before, yet finding something you’ll love is still too hard. Excited to announce the new Fire TV Omni,…
There’s more great stuff to watch than ever before, yet finding something you’ll love is still too hard. Excited to announce the new Fire TV Omni,…
Liked by Stephen Schmidt
-
Ever wondered how we built Terra Security's partnerships with companies like Amazon Web Services (AWS), CrowdStrike and NVIDIA? I had the pleasure…
Ever wondered how we built Terra Security's partnerships with companies like Amazon Web Services (AWS), CrowdStrike and NVIDIA? I had the pleasure…
Liked by Stephen Schmidt
-
Excited to give AWS customers access to Claude Sonnet 4.5. This latest model from Anthropic sets new standards for performance, especially for coding…
Excited to give AWS customers access to Claude Sonnet 4.5. This latest model from Anthropic sets new standards for performance, especially for coding…
Liked by Stephen Schmidt
-
Last week, Amy Herzog and I spent some time in London and closed out our visit with an Ask Me Anything session with our local teams. It was wonderful…
Last week, Amy Herzog and I spent some time in London and closed out our visit with an Ask Me Anything session with our local teams. It was wonderful…
Shared by Stephen Schmidt
-
Two significant milestones for Amazon Project Kuiper this week. First, the team showed successful tests of our Kuiper network, delivering 1+ Gbps…
Two significant milestones for Amazon Project Kuiper this week. First, the team showed successful tests of our Kuiper network, delivering 1+ Gbps…
Liked by Stephen Schmidt
-
6,700 feet up as Atlas V launches from pad 41 with more Kuiper internet satellites headed to Amazon’s LEO constellation. Beautiful morning on…
6,700 feet up as Atlas V launches from pad 41 with more Kuiper internet satellites headed to Amazon’s LEO constellation. Beautiful morning on…
Liked by Stephen Schmidt
-
⚡️XBOW just uncovered a new zero-day in Apache Druid: CVE-2025-27888, a Server-Side Request Forgery (SSRF) vulnerability. XBOW's process mirrored…
⚡️XBOW just uncovered a new zero-day in Apache Druid: CVE-2025-27888, a Server-Side Request Forgery (SSRF) vulnerability. XBOW's process mirrored…
Liked by Stephen Schmidt
-
Launching exactly on time at the opening of the window this morning, United Launch Alliance propels Amazon's Project Kuiper to enhance broadband…
Launching exactly on time at the opening of the window this morning, United Launch Alliance propels Amazon's Project Kuiper to enhance broadband…
Liked by Stephen Schmidt
-
Every business deserves access to strong cybersecurity, regardless of its size. We've heard from countless small business owners who want better…
Every business deserves access to strong cybersecurity, regardless of its size. We've heard from countless small business owners who want better…
Shared by Stephen Schmidt
-
What an incredible way to mark the start of my second year at Amazon Web Services (AWS)! I was given the incredible opportunity to moderate a 90…
What an incredible way to mark the start of my second year at Amazon Web Services (AWS)! I was given the incredible opportunity to moderate a 90…
Liked by Stephen Schmidt
-
Wow. I've waited many years for this moment: today, Zoox has officially launched its service in Las Vegas. 🎉 When I joined Zoox in 2019, I knew…
Wow. I've waited many years for this moment: today, Zoox has officially launched its service in Las Vegas. 🎉 When I joined Zoox in 2019, I knew…
Liked by Stephen Schmidt
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content