Using configured application information to control use of invocable services

    公开(公告)号:US10726404B2

    公开(公告)日:2020-07-28

    申请号:US14701377

    申请日:2015-04-30

    Abstract: Techniques are described for facilitating use of invocable services by applications in a configurable manner. In at least some situations, the invocable services are Web services or other network-accessible services that are made available by providers of the services for use by others in exchange for fees defined by the service providers. The described techniques facilitate use of such invocable services by applications in a manner configured by the application providers and the service providers, including to track use of third-party invocable services by applications on behalf of end users and to allocate fees that are charged end users between the applications and the services as configured by the providers of the applications and services. In some situations, the configured pricing terms for a service specify fees for end users that differ in one or more ways from the defined fees charged by the provider of that service.

    Controlling access to services via usage models

    公开(公告)号:US10291715B1

    公开(公告)日:2019-05-14

    申请号:US14144377

    申请日:2013-12-30

    Abstract: Techniques are described for facilitating interactions between computing systems, such as in accordance with usage models that are configured for available services by the providers of the services. In some situations, the services are Web services, and an electronic Web service (“WS”) marketplace is provided via which third-party WS providers make their WSes available to third-party WS consumers who purchase access to those WSes via the electronic marketplace based on configured usage models selected by the consumers. Some or all of the one or more usage models configured for an available WS may each have associated use prices and/or non-price use conditions, and if so access to those WSes using those usage models may be provided only if a consumer requesting access provides appropriate payment and otherwise satisfies the specified use conditions for a selected usage model.

    Log streaming facilities for computing applications

    公开(公告)号:US09420068B1

    公开(公告)日:2016-08-16

    申请号:US13915562

    申请日:2013-06-11

    CPC classification number: H04L67/42 G06F17/30994

    Abstract: To facilitate log streaming in a computing cloud, application service providers may dynamically provision one or more named log streams. A file-oriented interface to log streams may be made available to a plurality of virtual computer system instances used to provide the application services. Application service providers may further dynamically provision one or more sets of log stream processing agents arranged in one or more log stream processing graphs. Particular log streams may be assigned to particular log stream processing graphs for real-time processing. Processed log streams and/or associated data may be stored for later inspection. Such provisioning and/or configuration may be performed with a unified Web-based interface.

    Service manifests
    5.
    发明授权

    公开(公告)号:US10459755B2

    公开(公告)日:2019-10-29

    申请号:US16118264

    申请日:2018-08-30

    Abstract: Generally described, aspects of the present disclosure relate to for managing the configuration and security policies of hosted virtual machine networks. Hosted virtual machine networks are configured in a manner such that a virtual machine manager component can establish service manifests that correspond to information required by the virtual machine network from a user/customer. The virtual machine manager component can also publish in the service manifests contractual information, such as security risk assessments, that are deemed to have been provided and accepted by the user/customer in instantiating virtual machine networks. If the processed service manifest information remains valid, a substrate network process requests or independently instantiate services or components in accordance with the configuration information and security risk information included in the processed service manifest.

    Data record auditing systems and methods

    公开(公告)号:US09710859B1

    公开(公告)日:2017-07-18

    申请号:US13928234

    申请日:2013-06-26

    CPC classification number: G06Q40/10 G06Q50/06

    Abstract: Systems and methods are presented for processing and auditing data records using a stream based data processing system. Data output by data center computers may be collected and used to generate data records that include values for metrics related to computer resource consumption. These data records may be inserted into a stream which can include auditors and various other processors. The auditors may determine whether any of the data records include discrepancies. A gating processor can determine which processors, if any, to provide data records that include discrepancies. Further, an amendment processor can be used to resolve discrepancies detected by the auditors. In addition, a billing processor can be used to generate bills that identify the discrepancies and include information relating to the cause and actions taken in response to the discrepancies detected in the data records.

    Resource placement templates for virtual networks

    公开(公告)号:US09641450B1

    公开(公告)日:2017-05-02

    申请号:US13936097

    申请日:2013-07-05

    Abstract: With the advent of virtualization technologies, networks and routing for those networks can now be simulated using commodity hardware. For example, virtualization technologies can be adapted to allow a single physical computing machine to be shared among multiple virtual networks by providing one or more virtual machines simulated in software by the single physical computing machine, with each virtual machine acting as a distinct logical computing system. In addition, as routing can be accomplished through software, additional network setup flexibility can be provided to the virtual network in comparison with hardware-based routing. In some implementations, virtual network setup can be abstracted through the use of resource placement templates, allowing users to create virtual networks compliant with a customer's networking policies without necessarily having knowledge of what those policies are.

    MANAGING VIRTUAL COMPUTING NODES
    9.
    发明申请
    MANAGING VIRTUAL COMPUTING NODES 审中-公开
    管理虚拟计算节点

    公开(公告)号:US20160080317A1

    公开(公告)日:2016-03-17

    申请号:US14936314

    申请日:2015-11-09

    Abstract: Systems and method are provided for using proxy addresses to manage communications sent between virtual machine networks hosted by a substrate network. In some embodiments, the substrate network may identify a communication addressed from an instantiated component of a first hosted virtual network to a first proxy component of the first hosted virtual network. The substrate network may cause the communication to be received by a second instantiated component of a second host virtual network. Specifically, the substrate network may alter a destination address of the communication from a proxy address of the first proxy component to a network address of the second instantiated component. The substrate network may also alter a source address of the communication from a network address of the first instantiated component to a proxy address of a second proxy component.

    Abstract translation: 提供了系统和方法,用于使用代理地址来管理由基板网络托管的虚拟机网络之间发送的通信。 在一些实施例中,衬底网络可以识别从第一托管虚拟网络的实例化组件寻址到第一托管虚拟网络的第一代理组件的通信。 衬底网络可以使通信由第二主机虚拟网络的第二实例组件接收。 具体地,衬底网络可以将通信的目的地地址从第一代理组件的代理地址改变为第二实例化组件的网络地址。 衬底网络还可以将通信的源地址从第一实例化组件的网络地址改变为第二代理组件的代理地址。

    MANAGING SECURE CONTENT IN A CONTENT DELIVERY NETWORK
    10.
    发明申请
    MANAGING SECURE CONTENT IN A CONTENT DELIVERY NETWORK 审中-公开
    管理内容交付网络中的安全内容

    公开(公告)号:US20150319194A1

    公开(公告)日:2015-11-05

    申请号:US14800591

    申请日:2015-07-15

    Abstract: A system, method, and computer readable medium for managing secure content by CDN service providers are provided. A network storage provider stores one or more resources on behalf of a content provider. A CDN service provider obtains client computing device requests for secure content. Based on processing first signature information, the CDN service provider determines whether the secure content is available to the client computing device. If the CDN service provider does not maintain the requested content, the CDN service provider transmits a request to the network storage provider. Based on second signature information and an identifier associated with the CDN service provider, the network storage provider processes the request based policy information associated with the identifier.

    Abstract translation: 提供了一种用于由CDN服务提供商管理安全内容的系统,方法和计算机可读介质。 网络存储提供商代表内容提供商存储一个或多个资源。 CDN服务提供商获得安全内容的客户端计算设备请求。 基于处理第一签名信息,CDN服务提供商确定安全内容是否可用于客户端计算设备。 如果CDN服务提供商不保持所请求的内容,则CDN服务提供商向网络存储提供商发送请求。 基于第二签名信息和与CDN服务提供商相关联的标识符,网络存储提供商处理与该标识符相关联的基于请求的策略信息。

Patent Agency Ranking