CONTRIBUTION SIGNATURES FOR TAGGING

    公开(公告)号:US20210211304A1

    公开(公告)日:2021-07-08

    申请号:US17212915

    申请日:2021-03-25

    Abstract: A request to add tags (e.g., labels, key-value pairs, or metadata) to resources can be digitally signed by the entity making the request, such that the source can be verified and an authorization determination made for each tag. For a request involving multiple services (or entities) that can each add tags, any tag added by a service can be included in the request and digitally signed by that service. Each service processing the request can also digitally sign the request before forwarding, so that each service signs a version of the request, which includes elements signed by other services earlier in the request chain. When the request is received to a tagging service, the service ensures that every tag was digitally signed by the appropriate authorized entity or service, and validates the signatures to ensure that no data was modified or omitted, before adding the tags to the designated resource(s).

    Mechanism to manage group of resources using virtual resource containers

    公开(公告)号:US11616787B1

    公开(公告)日:2023-03-28

    申请号:US16457783

    申请日:2019-06-28

    Abstract: A set of operations is performed to cause a resource accessible to a first set of entities to also be accessible to a member of a second set of entities, where the set of operations, as a result of being executed, causes a processor to create a project to associate with a set of resources, associate a policy that controls access to the set of resources with the projects, associate the resource with the set of resources of the project, and associate the member of the second set of entities with the project. A request is obtained from the member of the second set of entities to access the resource. The member of the second set of entities is determine to be authorized to access the resource based on the policy. The member of the second set of entities is allowed to obtain access to the resource.

    Adaptive access control policies
    15.
    发明授权

    公开(公告)号:US11509658B1

    公开(公告)日:2022-11-22

    申请号:US15864976

    申请日:2018-01-08

    Abstract: A set of parameters for a set of permissions are determined based at least in part on previous requests to access a set of resources by a principal or user. The set of permissions are updated based at least in part on the set of parameters such that the set of parameters cause different requests to have different authentication requirements. The updated set of permissions is enforced to control access to computing resources such as the set of resources.

    Restoration of a data source
    16.
    发明授权

    公开(公告)号:US11042454B1

    公开(公告)日:2021-06-22

    申请号:US16197033

    申请日:2018-11-20

    Abstract: Restoring data to a data store that suffered corrupted data over a time period is disclosed. A system may provide an interface to specify a time window and filter conditions for identifying corrupted data in an object in a data store, such as, but not limited to, a corrupted NoSQL table. Corrupted data is identified by applying the filter conditions to change logs for the data object (e.g., the No SQL table) in the data store. Repair operations are determined for individual items identified via the filter conditions. Identified corrupted data for items may be corrected, from change logs or backup data in some instances (e.g., data may be deleted, or updated or replaced with data from a backup of the data store when necessary).

    Automated association of computing resources with resource creators for usage allocation

    公开(公告)号:US10277522B1

    公开(公告)日:2019-04-30

    申请号:US14555306

    申请日:2014-11-26

    Abstract: In a network-based services platform, customer resources may be automatically associated with a resource creator. Upon receipt of a request to create a computing resource, the computing resource may be created and thereafter executed within the network-based services platform. In response to the request, an entity associated with the request may be identified. In response to the identification of the entity, the computing resource may be automatically associated with the identified entity specifying the entity as the creator of the computing resource. In some embodiments, a cost of operating the resource over a period of time may be calculated, and the cost allocated to the identified entity based at least in part on the creator-to-resource association that was automatically generated upon creation of the resource. In this manner, a usage allocation report may be provided to the customer that shows the cost associated with the entity.

Patent Agency Ranking