-
公开(公告)号:US12184647B2
公开(公告)日:2024-12-31
申请号:US18058198
申请日:2022-11-22
Applicant: Amazon Technologies, Inc.
Inventor: Sujan Bolisetti , Shovan Kumar Das , Jessica Kira Szmajda , Harshit Kumar Tiwari , Bashuman Deb , Stephen A. Saville
IPC: H04L9/40
Abstract: Systems and methods are provided for creating and running an instance of a dynamic access control system (DACS). Trust providers may be defined in a trust broker of the DACS such that trust information associated with the trust providers can be used to create a custom data structure. Resources and resource groups may be defined in the DACS. Policies may be configured or coded in the DACS to map the custom data structure to recourses or resources groups. Additionally, policies may be configured or coded in the DACS to route the data structure and request to network segments or shared with other parties.
-
公开(公告)号:US20240171573A1
公开(公告)日:2024-05-23
申请号:US18058198
申请日:2022-11-22
Applicant: Amazon Technologies, Inc.
Inventor: Sujan Bolisetti , Shovan Kumar Das , Jessica Kira Szmajda , Harshit Kumar Tiwari , Bashuman Deb , Stephen A. Saville
IPC: H04L9/40
CPC classification number: H04L63/0876 , H04L63/101 , H04L63/105
Abstract: Systems and methods are provided for creating and running an instance of a dynamic access control system (DACS). Trust providers may be defined in a trust broker of the DACS such that trust information associated with the trust providers can be used to create a custom data structure. Resources and resource groups may be defined in the DACS. Policies may be configured or coded in the DACS to map the custom data structure to recourses or resources groups. Additionally, policies may be configured or coded in the DACS to route the data structure and request to network segments or shared with other parties.
-
公开(公告)号:US11190504B1
公开(公告)日:2021-11-30
申请号:US15598185
申请日:2017-05-17
Applicant: Amazon Technologies, Inc.
Inventor: Malcolm Russell Ah Kun , Uday Bheema , Ankur Goyal , Chao Li , Alexey A. Nikitin , Himesh Pandya , Prasanna Subash , Zhenghong Sun , Nathan Bartholomew Thomas , Harshit Kumar Tiwari , Venkatesh Velaga , Lihao Wang , Brian Scott Waters , Jeffery David Wells , Anand Krishnamoorthy
Abstract: A computer server controls access to a hosted service using digital certificates that are requested from each client attempting to access the service. When a particular client accesses the hosted service, the host service requests a digital certificate from the particular client and issues a challenge message. The particular client signs the challenge message and provides a client digital certificate to the hosted service. The hosted service confirms that the signature on the challenge message matches the client digital certificate, and that the client digital certificate is signed by a trusted entity. Trusted entities are defined by an administrator by uploading, to the hosted service, one or more trusted digital certificates associated with a trusted entities. Using the trusted digital certificates, the hosted service confirms that the digital certificate provided by the particular client is signed by at least one of the trusted entities.
-
-