Feedback received from users regarding potential problems with an application, service, or other source of electronic content can be configured to include additional information that help triangulate the source of the problem. Content provided by third parties can be combined with content from a primary provider, but the primary provider often will be unable to determine the precise instance of third party content that a user received that might have posed a problem for the user, as may relate to malware or another such issue. By configuring feedback submissions from users to automatically include identifying information, and by logging session data for various users, a content provider can analyze and filter the data to determine likely sources of the problem, and deactivate or otherwise address those sources. Further, the content provider can analyze the information to locate any users likely to have been exposed to the same third party content.
Disclosed are various embodiments for determining a source of malware. At least one embodiment of a method includes receiving browsing data from a plurality of client devices, the data being sent by the plurality of client devices, in response to a determination of malware on the plurality of client devices and determining, from the browsing data, a source for the malware. Further, some embodiments include determining whether the source for the malware is associated with a predetermined network site and in response to determining that the source of the malware is associated with a predetermined network site, preventing download of at least a portion of the predetermined network site.
David Erdmann - Edmonds WA, US Joseph P. Pinsky - Brier WA, US
Assignee:
Amazon Technologies, Inc. - Reno NV
International Classification:
G01C 21/00
US Classification:
701519, 701468, 705333
Abstract:
Disclosed are various embodiments for predicting a future location of a mobile user. A recent location of a mobile user is received. Past location data for the mobile user is retrieved from storage. A future location of the mobile user is predicted based at least in part on the recent location and on the past location data. The prediction is provided in response to a query or by subscription.
Techniques For Identifying Sources Of Unauthorized Code
Techniques described and suggested herein include systems and methods for identifying potential sources of infections of devices by unauthorized code. In an embodiment, network traffic is logged. A plurality of computing devices that include unauthorized code is identified. The logged traffic is used to identify information sources accessed by the identified affected devices. The identified information sources may be refined. Refinement of the identified information sources may include excluding information sources that have been accessed by uninfected devices. A user interface that allows a user to further refine the identified information sources may be provided.
Feedback Mechanisms Providing Contextual Information
Feedback received from users regarding potential problems with an application, service, or other source of electronic content can be configured to include additional information that help triangulate the source of the problem. Content provided by third parties can be combined with content from a primary provider, but the primary provider often will be unable to determine the precise instance of third party content that a user received that might have posed a problem for the user, as may relate to malware or another such issue. By configuring feedback submissions from users to automatically include identifying information, and by logging session data for various users, a content provider can analyze and filter the data to determine likely sources of the problem, and deactivate or otherwise address those sources. Further, the content provider can analyze the information to locate any users likely to have been exposed to the same third party content.
David Erdmann - Edmonds WA, US Joseph C. Lee - Seattle WA, US Adam Carlson - Seattle WA, US Richard N. Anton - Issaquah WA, US Michael Wayne Smith - Mill Creek WA, US Richard J. Winograd - Seattle WA, US
International Classification:
G06Q 30/00 G06F 3/048
US Classification:
705 1454, 715760
Abstract:
Third parties are prevented from obtaining proprietary information that a content provider might not want to expose. Targeting data used to enable a selection service to select targeted or supplemental content can be passed as an anchor in a uniform resource locator or stored in a parent file for a page. A second file can reside in an inline frame (iFrame) on the page that is able to pull the targeting data from the parent page, if in the same domain, or parse the parameters from the data in the anchor. The targeting data can be submitted to a selection service, which can return parameters specifying content or a type of supplemental content to be displayed. The request submitted to a supplemental content provider can come from a nested iFrame in a separate domain, such that the targeting data or source of the parent file cannot be obtained through the nested iFrame.
Googleplus
David Erdmann
Work:
Coach, Inc. - Sales Associate (10) Calvin Klein - Floor Supervisor (5-6)
Education:
Freedom High School - Degree, Valencia Community College
David Erdmann
Lived:
Seattle, WA Ottawa, ON, Canada Austin, TX Waterloo, ON, Canada