Context-based access controls
    11.
    发明授权

    公开(公告)号:US10482231B1

    公开(公告)日:2019-11-19

    申请号:US14862060

    申请日:2015-09-22

    Abstract: A system includes access controls that allow or deny a request based at least in part on a context associated with the request. A service receives a request from a client, and forwards information that describes the request and the context of the request to a context management service. The context management service determines whether the request should be allowed by querying a set of context validation plugins. Each context validation plugin analyzes particular characteristics of a request's context, and based at least in part on the request's context, indicates to the context management service that the request should be allowed or denied. If a quorum of the context validation plugins indicate to the context management service that the request should be allowed, the context management service indicates to the service that the request is allowed within the provided context.

    PORTABLE NETWORK INTERFACES FOR AUTHENTICATION AND LICENSE ENFORCEMENT

    公开(公告)号:US20180197122A1

    公开(公告)日:2018-07-12

    申请号:US15917085

    申请日:2018-03-09

    CPC classification number: G06Q10/06 G06Q10/00 G06Q10/0631 G06Q2220/00

    Abstract: Methods and apparatus for portable network interfaces to manage authentication and license enforcement. A system may include a plurality of resource instances including a producer instance configured to implement a network-accessible service, and an authentication coordinator. The coordinator may assign an interface record to the service, wherein the interface record comprises an IP address and a set of security properties. The coordinator may configure the security properties to allow a client to request an attachment of the interface record to a selected resource instance, such that the selected resource instance is enabled to transmit network messages from the IP address using one or more physical network interfaces of the selected resource instance. The producer resource instance initiates authentication operations for the service, including at least one authentication operation based on the IP address of the interface record.

    Providing instance availability information
    13.
    发明授权
    Providing instance availability information 有权
    提供实例可用性信息

    公开(公告)号:US09306814B1

    公开(公告)日:2016-04-05

    申请号:US13732993

    申请日:2013-01-02

    CPC classification number: H04L47/76 H04L41/085 H04L41/22 H04L43/0805

    Abstract: A distributed execution environment provides instances of computing resources for customer use, such as instances of data processing resources, data storage resources, database resources, and networking resources. Data is collected from systems internal to and external to the distributed execution environment. Some or all of the data is utilized to compute instance availability information for instances of computing resources provided by the distributed execution environment. The instance availability information might then be provided to customers and other users of the distributed execution environment. Various types of actions might be taken in a manual or automated way based upon the computed instance availability information.

    Abstract translation: 分布式执行环境提供用于客户使用的计算资源的实例,例如数据处理资源的实例,数据存储资源,数据库资源和网络资源。 数据从分布式执行环境内部和外部的系统收集。 部分或全部数据用于计算由分布式执行环境提供的计算资源的实例的实例可用性信息。 然后可以将实例可用性信息提供给分布式执行环境的客户和其他用户。 可以基于所计算的实例可用性信息以手动或自动的方式采取各种类型的动作。

    MANAGING PRIVATE USE OF PROGRAM EXECUTION CAPACITY
    14.
    发明申请
    MANAGING PRIVATE USE OF PROGRAM EXECUTION CAPACITY 审中-公开
    管理计划执行能力的私人使用

    公开(公告)号:US20150121400A1

    公开(公告)日:2015-04-30

    申请号:US14584808

    申请日:2014-12-29

    CPC classification number: G06F9/466 G06F9/5072 G06Q20/085

    Abstract: Techniques are described for managing execution of programs, including using excess program execution capacity of one or more computing systems. For example, a private pool of excess computing capacity may be maintained for a user based on unused dedicated program execution capacity allocated for that user, with the private pool of excess capacity being available for priority use by that user. Such private excess capacity pools may further in some embodiments be provided in addition to a general, non-private excess computing capacity pool that is available for use by multiple users, optionally including users who are associated with the private excess capacity pools. In some such situations, excess computing capacity may be made available to execute programs on a temporary basis, such that the programs executing using the excess capacity may be terminated at any time if other preferred use for the excess capacity arises.

    Abstract translation: 描述了用于管理程序的执行的技术,包括使用一个或多个计算系统的多余的程序执行能力。 例如,可以基于为该用户分配的未使用的专用程序执行能力为用户维护过剩计算能力的专用池,其中超额容量的专用池可供该用户优先使用。 在一些实施例中,还可以提供这样的私人额外容量池,除了可供多个用户使用的一般非私有额外计算能力池之外,可选地包括与私有额外容量池相关联的用户。 在某些这种情况下,可以使临时计算能力可用于执行程序,使得如果出现超额容量的其他优选使用,则可以随时终止使用过剩容量执行的程序。

    Managing use of program execution capacity

    公开(公告)号:US12229077B2

    公开(公告)日:2025-02-18

    申请号:US17169240

    申请日:2021-02-05

    Abstract: Techniques are described for managing execution of programs. In some situations, program execution is managed for multiple users using excess program execution capacity of one or more computing systems. In some such situations, excess or otherwise unused program execution capacity may be made available to execute programs on a temporary basis, such that the programs executing using the excess program execution capacity may be terminated at any time if other preferred use for the excess program execution capacity arises. The excess program execution capacity may in some situations be provided in conjunction with other dedicated program execution capacity that is allocated to particular users, such as to use unused dedicated capacity of some users as excess capacity for other users. In some situations, the techniques are used in conjunction with a fee-based program execution service that executes multiple programs on behalf of multiple users of the service.

    Trust-based resource allocation
    17.
    发明授权

    公开(公告)号:US10275267B1

    公开(公告)日:2019-04-30

    申请号:US13657714

    申请日:2012-10-22

    Abstract: Methods and systems for provisioning computing resource instances among implementation resources based on trust to reduce interference between computing resource instances implemented by the same implementation resources. In an embodiment, a trust rating is determined for a computing resource instance based at least in part on one or more trust factors. The suitability of an implementation resource to implement the given computing resource instance may be evaluated based at least in part on the trust rating of the computing resource instance and a trust rating of the implementation resource. In some embodiments, the trust rating of the implementation resource may be predefined or based on trust ratings of computing resource instances that are currently implemented by the implementation resource. An implementation resource may be selected to implement the computing resource instance based at least in part on its suitability thus determined.

    Managing private use of program execution capacity

    公开(公告)号:US10114668B2

    公开(公告)日:2018-10-30

    申请号:US14584808

    申请日:2014-12-29

    Abstract: Techniques are described for managing execution of programs, including using excess program execution capacity of one or more computing systems. For example, a private pool of excess computing capacity may be maintained for a user based on unused dedicated program execution capacity allocated for that user, with the private pool of excess capacity being available for priority use by that user. Such private excess capacity pools may further in some embodiments be provided in addition to a general, non-private excess computing capacity pool that is available for use by multiple users, optionally including users who are associated with the private excess capacity pools. In some such situations, excess computing capacity may be made available to execute programs on a temporary basis, such that the programs executing using the excess capacity may be terminated at any time if other preferred use for the excess capacity arises.

    Virtual computing instance migration

    公开(公告)号:US09870268B2

    公开(公告)日:2018-01-16

    申请号:US13959550

    申请日:2013-08-05

    CPC classification number: G06F9/5044 G06F9/4856 G06F9/505 G06F9/5088

    Abstract: A customer submits a set of preferences including hardware specifications for instantiating a virtual machine instance. The virtual machine instance may be instantiated in a physical host computer system that does not conform to the set of preferences. The virtual computer system service may be configured to evaluate the specifications of the available physical host computer systems to determine whether any of the available physical host computer systems conform to the set of preferences. Accordingly, the virtual computer system service may further evaluate the available physical host computer systems to determine whether available physical host computer systems comprise available slots for instantiating the existing virtual machine instance. If the one or more available physical host computer systems have available slots, the virtual computer system service may migrate the existing virtual machine instance to an available physical host computer system in order to fulfill the customer request.

Patent Agency Ranking