VIRTUAL RESOURCE COST TRACKING WITH DEDICATED IMPLEMENTATION RESOURCES

    公开(公告)号:EP2622504A4

    公开(公告)日:2018-01-17

    申请号:EP11832978

    申请日:2011-09-21

    申请人: AMAZON TECH INC

    摘要: Virtual resources may be provisioned in a manner that is aware of, and respects, underlying implementation resource boundaries. A customer of the virtual resource provider may specify that particular virtual resources are to be implemented with implementation resources that are dedicated to the customer. Dedicating an implementation resource to a particular customer of a virtual resource provider may establish one or more information barriers between the particular customer and other customers of the virtual resource provider. Implementation resources may require transition procedures, including custom transition procedures, to enter and exit dedicated implementation resource pools. Costs corresponding to active and inactive implementation resources in a dedicated pools associated with a particular customer may be accounted for, and presented to, the customer in a variety of ways including explicit, adjusted per customer and adjusted per type of virtual resource and/or implementation resource.

    FEDERATED KEY MANAGEMENT
    7.
    发明公开
    FEDERATED KEY MANAGEMENT 审中-公开
    联邦密钥管理

    公开(公告)号:EP2957065A4

    公开(公告)日:2016-10-12

    申请号:EP14751612

    申请日:2014-02-07

    申请人: AMAZON TECH INC

    IPC分类号: H04L9/32 H04L9/08

    摘要: A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information is authentic. The information may include information that identifies a holder of a key needed for processing the request, where the holder of the key can be the system or another, possibly third party, system. Requests to decrypt data may be processed to ensure that a certain amount of time passes before access to the decrypted data is provided, thereby providing an opportunity to cancel such requests and/or otherwise mitigate potential security breaches.

    USE OF FREEFORM METADATA FOR ACCESS CONTROL
    9.
    发明公开
    USE OF FREEFORM METADATA FOR ACCESS CONTROL 审中-公开
    VERWENDUNG VON FREIFORMMETADATEN ZUR ZUGANGSKONTROLLE

    公开(公告)号:EP2948840A4

    公开(公告)日:2016-09-14

    申请号:EP14743205

    申请日:2014-01-22

    申请人: AMAZON TECH INC

    IPC分类号: G06F7/04 G06F21/62

    CPC分类号: G06F21/6209 G06F21/6218

    摘要: Approaches are described for security and access control for computing resources. Various embodiments utilize metadata, e.g., tags that can be applied to one or more computing resources (e.g., virtual machines, host computing devices, applications, databases, etc.) to control access to these and/or other computing resources. In various embodiments, the tags and access control policies described herein can be utilized in a multitenant shared resource environment.

    摘要翻译: 描述了用于计算资源的安全和访问控制的方法。 各种实施例利用元数据,例如可以应用于一个或多个计算资源(例如,虚拟机,主机计算设备,应用程序,数据库等)的标签来控制对这些和​​/或其他计算资源的访问。 在各种实施例中,本文描述的标签和访问控制策略可以在多租户共享资源环境中使用。

    TECHNIQUES FOR PROTECTING AGAINST DENIAL OF SERVICE ATTACKS NEAR THE SOURCE
    10.
    发明公开
    TECHNIQUES FOR PROTECTING AGAINST DENIAL OF SERVICE ATTACKS NEAR THE SOURCE 审中-公开
    方法保护免受拒绝服务攻击靠近源

    公开(公告)号:EP2659353A4

    公开(公告)日:2017-04-12

    申请号:EP11853877

    申请日:2011-12-19

    申请人: AMAZON TECH INC

    IPC分类号: G06F9/00 H04L29/06

    CPC分类号: H04L63/1458 H04L63/1416

    摘要: Systems and methods protect against denial of service attacks. Remotely originated network traffic addressed to one or more network destinations is routed through one or more locations. One or more of the locations may be geographically proximate to a source of a denial of service attack. One or more denial of service attack mitigation strategies is applied to portions of the network traffic received at the one or more locations. Network traffic not blocked pursuant to the one or more denial of service attack mitigation strategies is dispatched to its intended recipient. Dispatching the unblocked network traffic to its intended recipient may include the use of one or more private channels and/or one or more additional denial of service attack mitigation strategies.