Patents by Inventor John Byron Cook
John Byron Cook has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240314134Abstract: Methods, systems, and computer-readable media for analysis of role reachability with transitive tags are disclosed. An access control analyzer determines a graph including nodes and edges. The nodes represent roles in a provider network hosting resources. The roles are associated with access control policies granting or denying access to individual resources. One or more of the access control policies grant or deny access based (at least in part) on key-value attributes. The access control analyzer determines, based (at least in part) on a role reachability analysis of the graph, whether a first role can assume a second role using role assumption steps for a particular state of the attributes. The attributes may include transitive attributes that persist during the role assumption steps.Type: ApplicationFiled: May 24, 2024Publication date: September 19, 2024Applicant: Amazon Technologies, Inc.Inventors: John Byron Cook, Neha Rungta, Carsten Varming, Daniel George Peebles, Daniel Kroening, Alejandro Naser Pastoriza
-
Patent number: 12034727Abstract: Methods, systems, and computer-readable media for analysis of role reachability with transitive tags are disclosed. An access control analyzer determines a graph including nodes and edges. The nodes represent roles in a provider network hosting resources. The roles are associated with access control policies granting or denying access to individual resources. One or more of the access control policies grant or deny access based (at least in part) on key-value attributes. The access control analyzer determines, based (at least in part) on a role reachability analysis of the graph, whether a first role can assume a second role using role assumption steps for a particular state of the attributes. The attributes may include transitive attributes that persist during the role assumption steps.Type: GrantFiled: December 11, 2020Date of Patent: July 9, 2024Assignee: Amazon Technologies, Inc.Inventors: John Byron Cook, Neha Rungta, Carsten Varming, Daniel George Peebles, Daniel Kroening, Alejandro Naser Pastoriza
-
Publication number: 20240202545Abstract: Techniques are described for providing a SAT-based solver for a quantifier-free theory of strings and bit vectors. The solver can be used by an automated reasoning service of a cloud provider network to analyze policies and the consequences of policies. The solver reduces an input formula to a Boolean satisfiability problem by encoding the input formula into an equisatisfiable propositional formula, where the satisfiability of the equisatisfiable propositional formula is determined by a SAT solver. Rather than using a traditional DPLL(T) style algorithm, the solver described herein bounds the length of variables in an input formula and reduces the problem to a single formula, which can then be solved using incremental SAT solving. The solver can be used independently or as part of a portfolio of solvers used to determine the satisfiability or unsatisfiability of certain formula corresponding, e.g., to questions about users' policies within a cloud provider network.Type: ApplicationFiled: December 15, 2022Publication date: June 20, 2024Applicant: Amazon Technologies, Inc.Inventors: Kevin LOTZ, Bruno DUTERTRE, John Byron COOK, Amit GOEL, Robert JONES, Benjamin KIESL-REITER, Soon Ho KONG, Rupak MAJUMDAR
-
Patent number: 11861409Abstract: Techniques are described for efficiently distributing across multiple computing resources satisfiability modulo theories (SMT) queries expressed in propositional logic with string variables. As part of the computing-related services provided by a cloud provider network, many cloud providers also offer identity and access management services, which generally help users to control access and permissions to the services and resources (e.g., compute instances, storage resources, etc.) obtained by users via a cloud provider network. By using resource policies, for example, users can granularly control which identities are able to access specific resources associated with the users' accounts and how those identities can use the resources. The ability to efficiently distribute the analysis of SMT queries expressed in propositional logic with string variables among any number of separate computing resources (e.g., among separate processes, compute instances, containers, etc.Type: GrantFiled: March 31, 2021Date of Patent: January 2, 2024Assignee: Amazon Technologies, Inc.Inventors: John Byron Cook, Andres Philipp Noetzli, Neha Rungta, Jingmei Hu
-
Patent number: 11797317Abstract: A software development process may support a transition from unverifiable, legacy code to verifiable code that is provably correct by construction. A behavioral model may be developed for legacy software that includes various behavioral criteria. Then, source code implemented in a verifiable language may be verified using the behavioral model to perform verification. Once the source code is complete and verified, a new verified implementation may be compiled. The verified implementation may then be executed, along with the legacy software, to identify differences in behavior which are fed back into the behavioral model and subsequently into the new source code. This process may then be iterated with the verifiable code being deployable once behavioral differences are resolved.Type: GrantFiled: December 10, 2021Date of Patent: October 24, 2023Assignee: Amazon Technologies, Inc.Inventors: Sean McLaughlin, Tongtong Xiang, Matthias Schlaipfer, Neha Rungta, Serdar Tasiran, John Byron Cook, Michael William Whalen
-
Patent number: 11757886Abstract: Methods, systems, and computer-readable media for analysis of role reachability using policy complements are disclosed. An access control analyzer determines two nodes in a graph that potentially have a common edge. The nodes correspond to roles in a provider network, and the roles are associated with first and second access control policies that grant or deny access to resources. The access control analyzer performs a role reachability analysis that determines whether the first role can assume the second role for a particular state of one or more key-value tags. The role reachability analysis determines a third access control policy authorizing a negation of a role assumption request for the second role. The role reachability analysis performs analysis of the third access control policy with respect to a role assumption policy for the second role for the particular state of the one or more key-value tags.Type: GrantFiled: December 11, 2020Date of Patent: September 12, 2023Assignee: Amazon Technologies, Inc.Inventors: John Byron Cook, Neha Rungta, Carsten Varming, Daniel George Peebles, Daniel Kroening, Alejandro Naser Pastoriza
-
Publication number: 20230262087Abstract: Methods, systems, and computer-readable media for automated packetless network reachability analysis are disclosed. An analysis is performed of network configuration data for a network comprising a host computer. Based at least in part on the analysis, one or more ports at the host computer that are reachable from another computer are determined. Based at least in part on the analysis, one or more routes to the one or more ports are determined. A report is generated that is descriptive of the one or more ports and the one or more routes.Type: ApplicationFiled: April 25, 2023Publication date: August 17, 2023Applicant: Amazon Technologies, Inc.Inventors: Catherine Dodge, Nikhil Reddy Cheruku, John Byron Cook, Temesghen Kahsai Azene, William Jo Kocik, Sean McLaughlin, Mark Edward Stalzer, Blake Whaley, Yiwen Wu
-
Patent number: 11671442Abstract: Methods, systems, and computer-readable media for automated packetless network reachability analysis are disclosed. An analysis is performed of network configuration data for a network comprising a host computer. Based at least in part on the analysis, one or more ports at the host computer that are reachable from another computer are determined. Based at least in part on the analysis, one or more routes to the one or more ports are determined. A report is generated that is descriptive of the one or more ports and the one or more routes.Type: GrantFiled: August 27, 2021Date of Patent: June 6, 2023Assignee: Amazon Technologies, Inc.Inventors: Catherine Dodge, Nikhil Reddy Cheruku, John Byron Cook, Temesghen Kahsai Azene, William Jo Kocik, Sean McLaughlin, Mark Edward Stalzer, Blake Whaley, Yiwen Wu
-
Patent number: 11483350Abstract: Techniques for intent-based governance are described. For example, in some instances a method of receiving an indication of a change involving of one or more of code, a policy, a network configuration, or a governance requirement rule impacting a resource in a provider network for an account that is to be analyzed using one or more governance requirement rules; determining one or more governance requirement rules to evaluate for compliance after the update; evaluating the determined one or more governance requirement rules for compliance using one or more reasoning engines according to one or more policies; and making a result of the evaluating available to a user provides such governance.Type: GrantFiled: March 29, 2019Date of Patent: October 25, 2022Assignee: Amazon Technologies, Inc.Inventors: Pauline Virginie Bolignano, Tyler Bray, John Byron Cook, Andrew Jude Gacek, Kasper Søe Luckow, Andrea Nedic, Neha Rungta, Cole Schlesinger, Carsten Varming
-
Patent number: 11483317Abstract: A policy auditing service can be implemented, in accordance with at least one embodiment that obtains a set of parameters that indicates a snapshot of a policy configuration for an account, a query, and a security policy. The security policy may encode a security requirement or invariant. The policy auditing system may determine states that can be reached via mutative operations (e.g., role assumption) and use a policy analyzer service to determine whether assuming a role results in a grant of access that is at least as permissive as the security policy of the set of parameters.Type: GrantFiled: November 30, 2018Date of Patent: October 25, 2022Assignee: Amazon Technologies, Inc.Inventors: Pauline Virginie Bolignano, John Byron Cook, Andrew Jude Gacek, Kasper Luckow, Neha Rungta, Cole Schlesinger, Ian Sweet, Carsten Varming
-
Publication number: 20220318059Abstract: Techniques are described for efficiently distributing across multiple computing resources satisfiability modulo theories (SMT) queries expressed in propositional logic with string variables. As part of the computing-related services provided by a cloud provider network, many cloud providers also offer identity and access management services, which generally help users to control access and permissions to the services and resources (e.g., compute instances, storage resources, etc.) obtained by users via a cloud provider network. By using resource policies, for example, users can granularly control which identities are able to access specific resources associated with the users' accounts and how those identities can use the resources. The ability to efficiently distribute the analysis of SMT queries expressed in propositional logic with string variables among any number of separate computing resources (e.g., among separate processes, compute instances, containers, etc.Type: ApplicationFiled: March 31, 2021Publication date: October 6, 2022Inventors: John Byron COOK, Andres Philipp NOETZLI, Neha RUNGTA, Jingmei HU
-
Patent number: 11394661Abstract: Techniques are described for using compositional reasoning techniques to perform role reachability analyses relative to collections of user accounts and roles of a cloud provider network. Delegated role-based resource management generally is a method for controlling access to resources in cloud provider networks and other distributed systems. Many cloud provider networks, for example, implement identity and access management subsystems using this approach, where the concept of “roles” is used to specify which resources can be accessed by people, software, or (recursively) by other roles. An abstraction of the role reachability analysis is provided that can be used as input to a model-checking application to reason about such role reachability questions (e.g., which roles of an organization are reachable from other roles).Type: GrantFiled: September 23, 2020Date of Patent: July 19, 2022Assignee: Amazon Technologies, Inc.Inventors: John Byron Cook, Neha Rungta, Andrew Jude Gacek, Daniel George Peebles, Carsten Varming
-
Publication number: 20220191206Abstract: Methods, systems, and computer-readable media for analysis of role reachability using policy complements are disclosed. An access control analyzer determines two nodes in a graph that potentially have a common edge. The nodes correspond to roles in a provider network, and the roles are associated with first and second access control policies that grant or deny access to resources. The access control analyzer performs a role reachability analysis that determines whether the first role can assume the second role for a particular state of one or more key-value tags. The role reachability analysis determines a third access control policy authorizing a negation of a role assumption request for the second role. The role reachability analysis performs analysis of the third access control policy with respect to a role assumption policy for the second role for the particular state of the one or more key-value tags.Type: ApplicationFiled: December 11, 2020Publication date: June 16, 2022Applicant: Amazon Technologies, Inc.Inventors: John Byron Cook, Neha Rungta, Carsten Varming, Daniel George Peebles, Daniel Kroening, Alejandro Naser Pastoriza
-
Publication number: 20220191205Abstract: Methods, systems, and computer-readable media for analysis of role reachability with transitive tags are disclosed. An access control analyzer determines a graph comprising a plurality of nodes and one or more edges. The nodes represent roles in a provider network hosting resources. The roles are associated with access control policies granting or denying access to individual resources. One or more of the access control policies grant or deny access based (at least in part) on one or more key-value attributes. The access control analyzer determines, based (at least in part) on a role reachability analysis of the graph, whether a first role can assume a second role using one or more role assumption steps for a particular state of the one or more attributes. The one or more attributes may comprise one or more transitive attributes that persist during the one or more role assumption steps.Type: ApplicationFiled: December 11, 2020Publication date: June 16, 2022Applicant: Amazon Technologies, Inc.Inventors: John Byron Cook, Neha Rungta, Carsten Varming, Daniel George Peebles, Daniel Kroening, Alejandro Naser Pastoriza
-
Publication number: 20220094643Abstract: Techniques are described for using compositional reasoning techniques to perform role reachability analyses relative to collections of user accounts and roles of a cloud provider network. Delegated role-based resource management generally is a method for controlling access to resources in cloud provider networks and other distributed systems. Many cloud provider networks, for example, implement identity and access management subsystems using this approach, where the concept of “roles” is used to specify which resources can be accessed by people, software, or (recursively) by other roles. An abstraction of the role reachability analysis is provided that can be used as input to a model-checking application to reason about such role reachability questions (e.g., which roles of an organization are reachable from other roles).Type: ApplicationFiled: September 23, 2020Publication date: March 24, 2022Inventors: John Byron COOK, Neha RUNGTA, Andrew Jude GACEK, Daniel George PEEBLES, Carsten VARMING
-
Patent number: 11232015Abstract: A method for verifying source code for a program includes determining that a new version of the source code is available. One or more verification tools are determined to use for verification of the new version of the source code from a verification specification associated with the source code. A plurality of verification tasks to perform for the verification of the new version of the source code are automatically determined from the verification specification associated with the source code. The plurality of verification tasks for the new version of the source code are automatically performed using the one or more verification tools. A determination is then made as to whether the new version of the source code is verified.Type: GrantFiled: May 1, 2020Date of Patent: January 25, 2022Assignee: Amazon Technologies, Inc.Inventors: Juan Rodriguez Hortala, Neha Rungta, Mark R. Tuttle, Serdar Tasiran, Michael Tautschnig, Andrea Nedic, Carsten Varming, John Byron Cook, Sean McLaughlin
-
Publication number: 20210392157Abstract: Methods, systems, and computer-readable media for automated packetless network reachability analysis are disclosed. An analysis is performed of network configuration data for a network comprising a host computer. Based at least in part on the analysis, one or more ports at the host computer that are reachable from another computer are determined. Based at least in part on the analysis, one or more routes to the one or more ports are determined. A report is generated that is descriptive of the one or more ports and the one or more routes.Type: ApplicationFiled: August 27, 2021Publication date: December 16, 2021Applicant: Amazon Technologies, Inc.Inventors: Catherine Dodge, Nikhil Reddy Cheruku, John Byron Cook, Temesghen Kahsai Azene, William Jo Kocik, Sean McLaughlin, Mark Edward Stalzer, Blake Whaley, Yiwen Wu
-
Patent number: 11108805Abstract: Methods, systems, and computer-readable media for automated packetless network reachability analysis are disclosed. An analysis is performed of network configuration data for a network comprising a host computer. Based at least in part on the analysis, one or more ports at the host computer that are reachable from another computer are determined. Based at least in part on the analysis, one or more routes to the one or more ports are determined. A report is generated that is descriptive of the one or more ports and the one or more routes.Type: GrantFiled: June 27, 2018Date of Patent: August 31, 2021Assignee: Amazon Technologies, Inc.Inventors: Catherine Dodge, Nikhil Reddy Cheruku, John Byron Cook, Temesghen Kahsai Azene, William Jo Kocik, Sean McLaughlin, Mark Edward Stalzer, Blake Whaley, Yiwen Wu
-
Patent number: 10977111Abstract: A constraint solver service of a computing resource service provider performs evaluations of logic problems provided by the service provider's users and/or services by deploying a plurality of constraint solvers to concurrently evaluate the logic problem. Each deployed solver has, or is configured with, different characteristics and/or capabilities than the other solvers; thus, the solvers can have varying execution times and ways of finding a solution. The service may control execution of the solvers using virtual computing resources, such as by installing and configuring a solver to execute in a software container instance. The service receives solver results and delivers them according to a solution strategy such as “first received” to reduce latency or “check for agreement” to validate the solution. An interface allows the provider of the logic problem to select and configure solvers, issue commands and modifications during solver execution, select the solution strategy, and receive the solution.Type: GrantFiled: August 28, 2018Date of Patent: April 13, 2021Assignee: Amazon Technologies, Inc.Inventors: Neha Rungta, Temesghen Kahsai Azene, Pauline Virginie Bolignano, Kasper Soe Luckow, Sean McLaughlin, Catherine Dodge, Andrew Jude Gacek, Carsten Varming, John Byron Cook, Daniel Schwartz-Narbonne, Juan Rodriguez Hortala
-
Publication number: 20200314145Abstract: Techniques for intent-based governance are described. For example, in some instances a method of receiving an indication of a change involving of one or more of code, a policy, a network configuration, or a governance requirement rule impacting a resource in a provider network for an account that is to be analyzed using one or more governance requirement rules; determining one or more governance requirement rules to evaluate for compliance after the update; evaluating the determined one or more governance requirement rules for compliance using one or more reasoning engines according to one or more policies; and making a result of the evaluating available to a user provides such governance.Type: ApplicationFiled: March 29, 2019Publication date: October 1, 2020Inventors: Pauline Virginie BOLIGNANO, Tyler BRAY, John Byron COOK, Andrew Jude GACEK, Kasper Søe LUCKOW, Andrea NEDIC, Neha RUNGTA, Cole SCHLESINGER, Carsten VARMING