US 12,316,673 B1
Fleet-migration based network compatibility analysis
Christoph Saalfeld, Seattle, WA (US); Travis Davidson Bybee, Seattle, WA (US); Alexandra Elizabeth Baoboe Lee, Seattle, WA (US); Eeshan Shreeram Thakar, Seattle, WA (US); Artem Zhurid, Bellevue, WA (US); and Shijia Yang, Seattle, WA (US)
Assigned to Amazon Technologies, Inc., Seattle, WA (US)
Filed by Amazon Technologies, Inc., Seattle, WA (US)
Filed on Dec. 16, 2022, as Appl. No. 18/067,601.
Int. Cl. H04L 9/40 (2022.01); H04L 67/1036 (2022.01)
CPC H04L 63/166 (2013.01) [H04L 67/1036 (2013.01)] 21 Claims
OG exemplary drawing
 
1. A computer-implemented method comprising:
obtaining, at a computing system, requests to initiate secure network connections with the computing system from individual client devices;
dividing the requests among at least two sets of endpoints within the computing system, wherein a first set of endpoints, of the at least two sets implements a first version of a cryptographic protocol, and wherein a second set of endpoints, of the at least two sets, implements a second version of the cryptographic protocol;
at the first set of endpoints:
receiving a first portion of the requests;
implementing the first version of the cryptographic protocol with respect to the first portion of the requests; and
generating first data reflecting whether implementing the first version of the cryptographic protocol with respect to the first portion of the requests resulted in successful secure network connections between the computing system and individual client devices requesting to initiate the secure network connections;
at the second set of endpoints:
receiving a second portion of the requests;
implementing the second version of the cryptographic protocol with respect to the second portion of the requests; and
generating second data reflecting whether implementing the second version of the cryptographic protocol with respect to the second portion of the requests resulted in successful secure network connections between the computing system and individual client devices requesting to initiate the secure network connections;
comparing the first data and the second data to identify one or more client devices, of the individual client devices, that successfully created a secure network connection to the computing system using the first version of the cryptographic protocol and that did not successfully create a secure network connection to the computing system using the second version of the cryptographic protocol; and
output a notification indicating expected incompatibility of the one or more client devices with the second version of the cryptographic protocol.