Patents by Inventor Robert Eric Fitzgerald
Robert Eric Fitzgerald has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Patent number: 10454690Abstract: Digital certificates include pointers to remote certificate information stores that maintain usage information associated with digital certificates. The pointers provide a mechanism for enabling the remote certificate information stores to be queried for usage information associated with a particular digital certificate. The usage information can be used to determine a validity of the digital certificate.Type: GrantFiled: August 4, 2017Date of Patent: October 22, 2019Assignee: Amazon Technologies, Inc.Inventors: Stefan Popoveniuc, David Ripton, Alexandr Ukrainchik, Yuk-Chung Eric Kam, Mikhail Denisenko, Robert Eric Fitzgerald, Matthew Allen Estes, Tyler Eckstein
-
Patent number: 10389709Abstract: Methods and apparatus for securing client-specified credentials at cryptographically-attested resources are described. An indication is obtained that resources deployed for execution of a compute instance of a multi-tenant computing service at an instance host of a provider network meet a client's security criteria. An encrypted representation of credentials to be used at the compute instance to implement operations on behalf of a client is received at the instance host. The credentials are extracted from the encrypted representation using a private key unique to the instance host, used for the operations, and then removed from the instance host without being saved in persistent memory.Type: GrantFiled: February 24, 2014Date of Patent: August 20, 2019Assignee: Amazon Technologies, Inc.Inventors: Nachiketh Rao Potlapally, Andrew Jeffrey Doane, Eric Jason Brandwine, Robert Eric Fitzgerald
-
Patent number: 10367646Abstract: A method and apparatus for distributing cryptographic material are disclosed. In the method and apparatus, cryptographic material is obtained and it is determined that the cryptographic material is to be made available for use by one or more computing resources. The cryptographic material is then sent to one or more secure modules, whereby a secure module of the one or more secure modules is programmatically accessible to a computing resource of the one or more computing resources and programmatic access enables the computing resource to request performance of one or more cryptographic operations using the cryptographic material while exporting the cryptographic material to the computing resource is denied.Type: GrantFiled: October 21, 2014Date of Patent: July 30, 2019Assignee: Amazon Technologies, Inc.Inventors: Todd Lawrence Cignetti, Andrew Jeffrey Doane, Stefan Popoveniuc, Matthew Allen Estes, Alexander Edward Schoof, Robert Eric Fitzgerald, Peter Zachary Bowen
-
Patent number: 10362032Abstract: Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device to a network of the customer hosted by the computing resource provider. The computing resource provider reconfigures a set of computing resources so that the devices of the customer are able to communicate with the device as if the device was in the customer's own network.Type: GrantFiled: January 23, 2018Date of Patent: July 23, 2019Assignee: Amazon Technologies, Inc.Inventors: Robert Eric Fitzgerald, Andrew J. Doane, Alexander Edward Schoof, Christopher Steven Helma, Rui Min, Matthew A. Estes, Anand Mishra
-
Patent number: 10333962Abstract: Customers of a computing resource service provider may operate one or more computing resources provided by the computing resource service provider. In addition, the customers may implement security applications and/or devices using the one or more computing resources provided by the computing resource service provider. Operational information from customer operated computing resources may be correlated with operational information from computing resources operated by the computing resource service provider or other entities and correlated threat information may be generated. Anomalous activity may be detected based at least in part on the correlated threat information.Type: GrantFiled: March 30, 2016Date of Patent: June 25, 2019Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Alexander Robin Gordon Lucas, Robert Eric Fitzgerald
-
Patent number: 10326762Abstract: Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device to a network of the customer hosted by the computing resource provider. The computing resource provider reconfigures a set of computing resources so that the devices of the customer are able to communicate with the device as if the device was in the customer's own network.Type: GrantFiled: August 22, 2016Date of Patent: June 18, 2019Assignee: Amazon Technologies, Inc.Inventors: Robert Eric Fitzgerald, Andrew J. Doane, Alexander Edward Schoof, Christopher Steven Helma, Rui Min, Matthew A. Estes, Anand Mishra
-
Patent number: 10320750Abstract: Customers of a computing resource service provider may operate one or more computing resources, provided by the computing resource service provider, within a virtual network. The customers may request network scans of the computing resources with the virtual network. Scanning packets may be generated and encapsulated to ensure delivery to an appropriate destination within the virtual network. The information in the scanning packet may appear to be generated by a source within the virtual network.Type: GrantFiled: March 30, 2016Date of Patent: June 11, 2019Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Alexander Robin Gordon Lucas, Robert Eric Fitzgerald
-
Patent number: 10223538Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secure and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. A variety of methods may be used to protect access to keying material and prevent the keying material from being stored persistently.Type: GrantFiled: November 12, 2013Date of Patent: March 5, 2019Assignee: Amazon Technologies, Inc.Inventors: Todd Lawrence Cignetti, Robert Eric Fitzgerald, Andrew J. Doane, Eric Jason Brandwine
-
Patent number: 10178077Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations.Type: GrantFiled: June 6, 2017Date of Patent: January 8, 2019Assignee: Amazon Technologies, Inc.Inventors: Todd Lawrence Cignetti, Eric Jason Brandwine, Robert Eric Fitzgerald, Andrew J. Doane
-
Patent number: 10178119Abstract: Customers of a computing resource service provider may operate one or more computing resource provided by the computing resource service provider. In addition, the customers may implement security applications and/or devices using the one or more computing resources provided by the computing resource service provider. Operational information from customer operated computing resources may be correlated with operational information from computing resources operated by the computing resource service provider or other entities and correlated threat information may be generated. Anomalous activity may be detected based at least in part on the correlated threat information.Type: GrantFiled: March 30, 2016Date of Patent: January 8, 2019Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Robert Eric Fitzgerald, Alexander Robin Gordon Lucas
-
Patent number: 10148675Abstract: A computing resource service provider may provide customers with a block-level forensics service. Volume images of computing resource associated with customer may be generated and provided to the block-level forensics service. The block-level forensics service or component thereof may generate a volume based at least in part on the volume image and may perform forensics analysis of the volume. A result of the forensic analysis may be provided to the customer.Type: GrantFiled: March 30, 2016Date of Patent: December 4, 2018Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Alexander Robin Gordon Lucas, Robert Eric Fitzgerald
-
Patent number: 10142290Abstract: Customers of a computing resource service provider may utilize computing resources of the computing resources service provided to implement one or more computer systems. Furthermore, the customer may cause a host-based firewall to be executed by the one or more computer systems. The host-based firewall may collect network traffic information. The customer may then be provided with the network traffic information and be prompted to provide decisions associated with the network traffic information. The decisions may be used to generate a set of rules which may be enforced by the host-based firewall.Type: GrantFiled: March 30, 2016Date of Patent: November 27, 2018Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Robert Eric Fitzgerald, Alexander Robin Gordon Lucas
-
Patent number: 10127388Abstract: Techniques are disclosed for mitigating against registering a domain name that is confusingly similar to a pre-existing domain name, possibly for the purpose of fooling users. In embodiments, a domain name is presented for registration. The domain name is rendered as an image, and optical character recognition is performed on the image to extract the rendered text. This extracted text is compared against a list of domain names for which confusingly similar domain names cannot be registered, and when the extracted text matches a domain name in this list of domain names, registration of the domain name is denied.Type: GrantFiled: August 26, 2014Date of Patent: November 13, 2018Assignee: Amazon Technologies, Inc.Inventors: Stefan Popuveniuc, Peter Zachary Bowen, Alexander Edward Schoof, Andrew Jeffrey Doane, Todd Lawrence Cignetti, Robert Eric Fitzgerald
-
Patent number: 10079842Abstract: A computing resource service provider may provide customers with a block-level forensics service. Logical volumes associated a customer may be used to instantiate computing resources provided by a computing resource service provide for use by the customer. The block-level forensics service or component thereof may monitor the logical volume based at least in part on a log generated as a result of the logical volume being implemented as a log-structured storage system. Operations to the log may be collected by the block-level forensics service and malicious activity may be detected based at least in part on operations to the log.Type: GrantFiled: March 30, 2016Date of Patent: September 18, 2018Assignee: Amazon Technologies, Inc.Inventors: Eric Jason Brandwine, Robert Eric Fitzgerald, Alexander Robin Gordon Lucas
-
Publication number: 20180152448Abstract: Devices, such as hardware security modules, are provided as a service. A customer of a computing resource provider is able to request the addition of a device to a network of the customer hosted by the computing resource provider. The computing resource provider reconfigures a set of computing resources so that the devices of the customer are able to communicate with the device as if the device was in the customer's own network.Type: ApplicationFiled: January 23, 2018Publication date: May 31, 2018Inventors: Robert Eric Fitzgerald, Andrew J. Doane, Alexander Edward Schoof, Christopher Steven Helma, Rui Min, Matthew A. Estes, Anand Mishra
-
Publication number: 20180084032Abstract: Methods and apparatus for a computing infrastructure for configurable-quality random data are disclosed. A storage medium stores program instructions that when executed on a processor designate some servers of a provider network as members of a pool of producers of random data usable by random data consumers. The instructions, when executed, determine a subset of the pool to be used to supply a collection of random data intended for a random data consumer, and one or more sources of random phenomena to be used to generate the collection of random data. The instructions, when executed, initiate a transmission of the collection of random data directed to the random data consumer.Type: ApplicationFiled: November 13, 2017Publication date: March 22, 2018Applicant: Amazon Technologies, Inc.Inventors: Nachiketh Rao Potlapally, Andrew Paul Mikulski, Donald Lee Bailey, JR., Robert Eric Fitzgerald
-
Publication number: 20180069844Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. If the keys used to encrypt the data have not been exposed during serialization operation, they may be deleted or destroyed enabling the destruction of data encrypted with the keys.Type: ApplicationFiled: July 10, 2017Publication date: March 8, 2018Inventors: Todd Lawrence Cignetti, Andrew J. Doane, Eric Jason Brandwine, Robert Eric Fitzgerald
-
Patent number: 9819727Abstract: Methods and apparatus for a computing infrastructure for configurable-quality random data are disclosed. A storage medium stores program instructions that when executed on a processor designate some servers of a provider network as members of a pool of producers of random data usable by random data consumers. The instructions, when executed, determine a subset of the pool to be used to supply a collection of random data intended for a random data consumer, and one or more sources of random phenomena to be used to generate the collection of random data. The instructions, when executed, initiate a transmission of the collection of random data directed to the random data consumer.Type: GrantFiled: February 28, 2013Date of Patent: November 14, 2017Assignee: Amazon Technologies, Inc.Inventors: Nachiketh Rao Potlapally, Andrew Paul Mikulski, Donald Lee Bailey, Jr., Robert Eric Fitzgerald
-
Publication number: 20170272417Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations.Type: ApplicationFiled: June 6, 2017Publication date: September 21, 2017Inventors: Todd Lawrence Cignetti, Eric Jason Brandwine, Robert Eric Fitzgerald, Andrew J. Doane
-
Patent number: 9705855Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. If the keys used to encrypt the data have not been exposed during serialization operation, they may be deleted or destroyed enabling the destruction of data encrypted with the keys.Type: GrantFiled: December 28, 2015Date of Patent: July 11, 2017Assignee: Amazon Technologies, Inc.Inventors: Todd Lawrence Cignetti, Andrew J. Doane, Eric Jason Brandwine, Robert Eric Fitzgerald