Assessing and reporting security risks of an application program interface

    公开(公告)号:US10757139B1

    公开(公告)日:2020-08-25

    申请号:US15195957

    申请日:2016-06-28

    Abstract: A security service of a computing resource service provider provides security scores for application program interfaces (APIs) and other security information to an API marketplace or other endpoints. The security score may be based at least in part on component information associated with computing resources implementing the API. The security service may obtain access to the computing resources and collect various components from the computing resources. The components may then be used to determine a security score of an API offered from consumption on the API marketplace. The security service may then publish the security score to the API marketplace or other endpoint.

    Preventing persistent storage of cryptographic information using signaling
    15.
    发明授权
    Preventing persistent storage of cryptographic information using signaling 有权
    使用信令防止密码信息的持久存储

    公开(公告)号:US09235714B1

    公开(公告)日:2016-01-12

    申请号:US14078351

    申请日:2013-11-12

    Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. Signaling methods are used to notify virtual machine instances of serialization events in order to prevent keying material from being stored persistently.

    Abstract translation: 组织使用服务提供商的计算机硬件资源和服务维护和生成大量敏感信息。 此外,需要能够通过使用密钥加密数据并销毁密钥来安全而快速地删除大量的数据。 为确保远程存储的信息得到保护并能够进行安全删除,组织使用的加密密钥在串行化操作期间应防止持久存储。 信令方法用于通知序列化事件的虚拟机实例,以防止密钥材料被永久存储。

    Secure data destruction in a distributed environment using key protection mechanisms
    16.
    发明授权
    Secure data destruction in a distributed environment using key protection mechanisms 有权
    使用关键保护机制在分布式环境中安全的数据销毁

    公开(公告)号:US09231923B1

    公开(公告)日:2016-01-05

    申请号:US14078360

    申请日:2013-11-12

    Abstract: Organizations maintain and generate large amounts of sensitive information using computer hardware resources and services of a service provider. Furthermore, there is a need to be able to delete large amounts of data securely and quickly by encrypting the data with a key and destroying the key. To ensure that information stored remotely is secured and capable of secure deletion, cryptographic keys used by the organization should be prevented from being persistently stored during serialization operations. If the keys used to encrypt the data have not been exposed during serialization operation, they may be deleted or destroyed enabling the destruction of data encrypted with the keys.

    Abstract translation: 组织使用服务提供商的计算机硬件资源和服务维护和生成大量敏感信息。 此外,需要能够通过使用密钥加密数据并销毁密钥来安全而快速地删除大量的数据。 为确保远程存储的信息得到保护并能够进行安全删除,组织使用的加密密钥在串行化操作期间应防止持久存储。 如果用于加密数据的密钥在序列化操作期间未被暴露,则可能会删除或破坏数据,从而能够销毁使用密钥加密的数据。

    AUTHENTICATION OF VIRTUAL MACHINE IMAGES USING DIGITAL CERTIFICATES

    公开(公告)号:US20230099597A1

    公开(公告)日:2023-03-30

    申请号:US18076097

    申请日:2022-12-06

    Abstract: A vendor of virtual machine images accesses a virtual computer system service to upload a digitally signed virtual machine image to a data store usable by customers of the virtual computer system service to select an image for creating a virtual machine instance. If a digital certificate is uploaded along with the virtual machine image, the virtual computer system service may determine whether the digital certificate has been trusted for use. If the digital certificate has been trusted for use, the virtual computer system service may use a public cryptographic key to decrypt a hash signature included with the image to obtain a first hash value. The service may additionally apply a hash function to the image itself to obtain a second hash value. If the two hash values match, then the virtual machine image may be deemed to be authentic.

    AUTHENTICATION OF VIRTUAL MACHINE IMAGES USING DIGITAL CERTIFICATES

    公开(公告)号:US20200326972A1

    公开(公告)日:2020-10-15

    申请号:US16914116

    申请日:2020-06-26

    Abstract: A vendor of virtual machine images accesses a virtual computer system service to upload a digitally signed virtual machine image to a data store usable by customers of the virtual computer system service to select an image for creating a virtual machine instance. If a digital certificate is uploaded along with the virtual machine image, the virtual computer system service may determine whether the digital certificate has been trusted for use. If the digital certificate has been trusted for use, the virtual computer system service may use a public cryptographic key to decrypt a hash signature included with the image to obtain a first hash value. The service may additionally apply a hash function to the image itself to obtain a second hash value. If the two hash values match, then the virtual machine image may be deemed to be authentic.

Patent Agency Ranking