Per request computer system instances

    公开(公告)号:US11068309B2

    公开(公告)日:2021-07-20

    申请号:US16505579

    申请日:2019-07-08

    Abstract: As requests are received, virtual computer systems are provisioned to process the requests. The virtual computer systems may be configured without various components typically implemented by virtual computer systems, such as traditional operating systems, network interfaces and the like. Application images for the virtual computer systems are configured so that execution of the applications can begin soon after provisioning, with minimal overhead the provisioning process contributing relatively little to any latency in processing the request.

    DATA STORAGE OPTIMIZATION FOR NON-VOLATILE MEMORY

    公开(公告)号:US20200167276A1

    公开(公告)日:2020-05-28

    申请号:US16780107

    申请日:2020-02-03

    Abstract: Non-volatile devices may be configured such that a clear operation on a single bit clears an entire block of bits. The representation of particular data structures may be optimized to reduce the number of clear operations required to store the representation in non-volatile memory. A data schema may indicate that a data structure of an application may be optimized for storage in non-volatile memory. A translation layer may convert an application level representation of a data value associated with the data structure to an optimized storage representation of the data value before storing the optimized storage representation of the data value in non-volatile memory.

    Merkle signature scheme tree expansion

    公开(公告)号:US10608824B1

    公开(公告)日:2020-03-31

    申请号:US15402063

    申请日:2017-01-09

    Abstract: A first public key is generated based at least in part on a first plurality of signing keys and a second public key is generated based at least in part on a second plurality of signing keys. The signing keys may be used to generate digital signatures. The second public key may be made available to verify a digital signature generated using a signing key from the second plurality of signing keys. In some cases, a first Merkle tree may be formed by the first public key and the first plurality of signing keys, and a second Merkle tree may be formed by the second public key, the first public key, and the second plurality of signing keys.

    Role-based access control assignment

    公开(公告)号:US10606987B2

    公开(公告)日:2020-03-31

    申请号:US15414498

    申请日:2017-01-24

    Abstract: A first probability that indicates a probability that a user is associated with a role is determined, with the first probability having a first score. The first probability is perturbed to determine a second probability having a second score. The second score is evaluated against the first score to determine that the second probability indicates a more optimal probability of the user being associated with the role than the first probability. The role is assigned to the user based at least in part on the second score.

    HYPERVISOR SUPPORTED SECRETS COMPARTMENT
    95.
    发明申请

    公开(公告)号:US20200076607A1

    公开(公告)日:2020-03-05

    申请号:US16666245

    申请日:2019-10-28

    Abstract: A secret is securely maintained on a virtualized computer system by configuring a specialized virtual machine to manage and maintain the secret on behalf of an application. When the application requests access to the secret, a controlling domain, in combination with the specialized virtual machine, validates that the application is authorized to make the request and that the application has not been compromised prior to making the request. If the request is validated, the controlling domain and the specialized virtual machine fulfill the request by providing the application with access to the secret.

    Latency-based detection of covert routing

    公开(公告)号:US10574682B2

    公开(公告)日:2020-02-25

    申请号:US16186807

    申请日:2018-11-12

    Abstract: A method and apparatus for detecting covert routing is disclosed. In the method and apparatus, data addressed to a remote computer system are forwarded over a first network path, whereby the data is associated with a computer system of a plurality of computer systems. Further, a plurality of first network performance metrics is obtained. A likelihood of covert routing is determined based at least in part on the plurality of first network performance metrics.

    Data storage optimization for non-volatile memory

    公开(公告)号:US10552312B2

    公开(公告)日:2020-02-04

    申请号:US15689282

    申请日:2017-08-29

    Abstract: Non-volatile devices may be configured such that a clear operation on a single bit clears an entire block of bits. The representation of particular data structures may be optimized to reduce the number of clear operations required to store the representation in non-volatile memory. A data schema may indicate that a data structure of an application may be optimized for storage in non-volatile memory. A translation layer may convert an application level representation of a data value associated with the data structure to an optimized storage representation of the data value before storing the optimized storage representation of the data value in non-volatile memory.

    PER REQUEST COMPUTER SYSTEM INSTANCES
    99.
    发明申请

    公开(公告)号:US20190332368A1

    公开(公告)日:2019-10-31

    申请号:US16505579

    申请日:2019-07-08

    Abstract: As requests are received, virtual computer systems are provisioned to process the requests. The virtual computer systems may be configured without various components typically implemented by virtual computer systems, such as traditional operating systems, network interfaces and the like. Application images for the virtual computer systems are configured so that execution of the applications can begin soon after provisioning, with minimal overhead the provisioning process contributing relatively little to any latency in processing the request.

    Identifying kernel data structures
    100.
    发明授权

    公开(公告)号:US10452421B2

    公开(公告)日:2019-10-22

    申请号:US15422315

    申请日:2017-02-01

    Abstract: Execution state information corresponding to an instantiated virtual machine are retrieved. A score to indicate a target memory location is able to be determined based at least in part on a source memory location is computed based at least in part on the execution state information. The score and the target memory location are indicated.

Patent Agency Ranking