Log in
Enquire now
‌

US Patent 10462116 Detection of data exfiltration

Patent 10462116 was granted and assigned to Amazon on October, 2019 by the United States Patent and Trademark Office.

OverviewStructured DataIssuesContributors

Contents

Is a
Patent
Patent
0

Patent attributes

Patent Applicant
Amazon
Amazon
0
Current Assignee
Amazon
Amazon
0
Patent Jurisdiction
United States Patent and Trademark Office
United States Patent and Trademark Office
0
Patent Number
104621160
Patent Inventor Names
Muhammad Wasiq0
Darren Ernest Canavor0
Jesper Mikael Johansson0
Jon Arron McClintock0
Nima Sharifi Mehr0
Date of Patent
October 29, 2019
0
Patent Application Number
148552980
Date Filed
September 15, 2015
0
Patent Citations
‌
US Patent 10091222 Detecting data exfiltration as the data exfiltration occurs or after the data exfiltration occurs
Patent Citations Received
‌
US Patent 11947682 ML-based encrypted file classification for identifying encrypted data movement
0
‌
US Patent 10958664 Method of performing integrity verification between client and server and encryption security protocol-based communication method of supporting integrity verification between client and server
‌
US Patent 11303653 Network threat detection and information security using machine learning
‌
US Patent 11778037 Concurrent TLS data streams using a single handshake
‌
US Patent 11381604 Resilient self-detection of malicious exfiltration of sensitive data
‌
US Patent 11451550 System for automated electronic data exfiltration path identification, prioritization, and remediation
‌
US Patent 11895155 Resilient self-detection of malicious exfiltration of sensitive data
0
‌
US Patent 11907393 Enriched document-sensitivity metadata using contextual information
0
Patent Primary Examiner
‌
Techane Gergiso
0
Patent abstract

The present document describes systems and methods that detect unauthorized transmission of data from internal networks to remote service providers, even when the transmission occurs over an encrypted connection. An exfiltration monitor is configured to monitor encrypted communications between clients within an internal network and a remote service provider. In various implementations, the exfiltration monitor associates the encrypted connections with account information, and applies exfiltration policies to the connections based at least in part on the associated account information. In additional implementations, the exfiltration monitor is provided with cryptographic keys that facilitate packet inspection of the encrypted connections. In many situations, the exfiltration monitor can use this information to discern between authorized use of a remote service, and unauthorized data exfiltration to the remote service.

Timeline

No Timeline data yet.

Further Resources

Title
Author
Link
Type
Date
No Further Resources data yet.

References

Find more entities like US Patent 10462116 Detection of data exfiltration

Use the Golden Query Tool to find similar entities by any field in the Knowledge Graph, including industry, location, and more.
Open Query Tool
Access by API
Golden Query Tool
Golden logo

Company

  • Home
  • Press & Media
  • Blog
  • Careers
  • WE'RE HIRING

Products

  • Knowledge Graph
  • Query Tool
  • Data Requests
  • Knowledge Storage
  • API
  • Pricing
  • Enterprise
  • ChatGPT Plugin

Legal

  • Terms of Service
  • Enterprise Terms of Service
  • Privacy Policy

Help

  • Help center
  • API Documentation
  • Contact Us
By using this site, you agree to our Terms of Service.