-
公开(公告)号:US12119997B1
公开(公告)日:2024-10-15
申请号:US18211875
申请日:2023-06-20
Applicant: Amazon Technologies, Inc.
Inventor: Abhinav A Agshikar , Ankur Goenka , Bhavya Gupta , Atul Agarwal , Manish Kumar Shukla
IPC: H04L41/0897
CPC classification number: H04L41/0897
Abstract: A scaling system is disclosed. The scaling system scales services for a high velocity event. To manage the scaling, a hierarchy of instruction routing network nodes is generated. The instruction routing network nodes provide scaling instructions to some of the services for the HVE. Some of the instruction routing network nodes generate or forward scaling instructions to down hierarchy instruction routing network nodes.
-
公开(公告)号:US11381584B1
公开(公告)日:2022-07-05
申请号:US16562347
申请日:2019-09-05
Applicant: Amazon Technologies, Inc.
Inventor: Anand Victor , Ramnath R. Iyer , David Edouard Louis Robert , Ankur Goenka , Zhengqiang Xu , Keshav Aswathnarayana Narsipur , Kyle B. Peterson
Abstract: A customer in a computing resource service provider environment provisions a virtual machine instance configured with access to sensitive data in a secure storage facility. The virtual machine instance is provisioned specifically to generate reports using a subset of the sensitive data to satisfy different reporting requirements associated with governing entities and agencies. After generating the reports, the virtual machine instance is then removed from the computing resource service environment such that the sensitive data is inaccessible.
-
公开(公告)号:US11356453B1
公开(公告)日:2022-06-07
申请号:US16562356
申请日:2019-09-05
Applicant: Amazon Technologies, Inc.
Inventor: Anand Victor , Ramnath R. Iyer , David Edouard Louis Robert , Ankur Goenka , Zhengqiang Xu , Keshav Aswathnarayana Narsipur , Kyle B. Peterson
Abstract: A plurality of virtual machines instances are instantiated and configured to use a subset of sensitive data to generate reports such that the reports can be visually inspected by authorized personnel or entities for potential abnormalities. After completion of the inspection, the virtual machine instances are then deleted such that the sensitive data that were used to generate the reports become inaccessible.
-
-