Patents by Inventor Nachiketh Rao Potlapally

Nachiketh Rao Potlapally has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 9049232
    Abstract: Methods and apparatus for a configurable-quality random data service are disclosed. A method includes implementing programmatic interfaces enabling a determination of respective characteristics of random data to be delivered to one or more clients of a random data service of a provider network. The method includes implementing security protocols for transmission of random data to the clients, including a protocol for transmission of random data to trusted clients at devices within the provider network. The method further includes obtaining, on behalf of a particular client and in accordance with the determined characteristics, random data from one or more servers of the provider network, and initiating a transmission of the random data directed to a destination associated with the particular client.
    Type: Grant
    Filed: February 28, 2013
    Date of Patent: June 2, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Nachiketh Rao Potlapally, Donald Lee Bailey, Jr., Andrew Paul Mikulski, Robert Eric Fitzgerald
  • Patent number: 9037854
    Abstract: A privileged cryptographic service is described, such as a service running in system management mode (SMM). The privileged service is operable to store and manage cryptographic keys and/or other security resources in a multitenant remote program execution environment. The privileged service can receive requests to use the cryptographic keys and issue responses to these requests. In addition, the privileged service can measure the hypervisor at runtime (e.g., either periodically or in response to the requests) in an attempt to detect evidence of tampering with the hypervisor. Because the privileged service is operating in system management mode that is more privileged than the hypervisor, the privileged service can be robust against virtual machine escape and other hypervisor attacks.
    Type: Grant
    Filed: January 22, 2013
    Date of Patent: May 19, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Gregory Branchek Roth, Nachiketh Rao Potlapally
  • Patent number: 8943588
    Abstract: Various embodiments describe a website analyzer that can be used for the automatic identification of unauthorized or malicious websites. A website analyzer can include heuristics for automatically identifying a collection of behaviors typical of unauthorized websites. Some embodiments automatically scan content hosted across server computers in a virtual environment and proactively identify potentially malicious websites. The embodiments can also be used to automatically scan content on public networks, such as the Internet. In particular embodiments, the website analyzer can include a semantic analysis engine and a link analysis engine. The semantic analysis engine can use the tag-level structure of HTML pages to formulate metrics which define similarity of web page content. The link analysis engine can compare the structure of embedded URIs and scripts to define metrics which quantify the difference of links between an authorized site and a potentially malicious site.
    Type: Grant
    Filed: September 20, 2012
    Date of Patent: January 27, 2015
    Assignee: Amazon Technologies, Inc.
    Inventors: Brian L. Speegle, Nachiketh Rao Potlapally
  • Publication number: 20150007175
    Abstract: Approaches to enable the configuration of computing resources for executing virtual machines on behalf of users to be cryptographically attested to or verified. When a user requests a virtual machine to be provisioned, an operator of the virtualized computing environment can initiate a two phase launch of the virtual machine. In the first phase, the operator provisions the virtual machine on a host computing device and obtains cryptographic measurements of the software and/or hardware resources on the host computing device. The operator may then provide those cryptographic measurements to the user that requested the virtual machine. If the user approves the cryptographic measurements, the operator may proceed with the second phase and actually launch the virtual machine on the host. In some cases, operator may compare the cryptographic measurements to a list of approved measurements to determine whether the host computing device is acceptable for hosting the virtual machine.
    Type: Application
    Filed: July 1, 2013
    Publication date: January 1, 2015
    Inventors: Nachiketh Rao Potlapally, Eric Jason Brandwine, Matthew Shawn Wilson