TECHNIQUES FOR CREDENTIAL GENERATION
    41.
    发明申请
    TECHNIQUES FOR CREDENTIAL GENERATION 有权
    证明产生的技术

    公开(公告)号:US20140196130A1

    公开(公告)日:2014-07-10

    申请号:US14204124

    申请日:2014-03-11

    CPC classification number: H04L63/08 G06F21/44 H04L9/3247 H04L63/10 H04L63/20

    Abstract: Systems and methods for managing credentials distribute the credentials to subsets of a set of collectively managed computing resources. The collectively managed computing resources may include one or more virtual machine instances. The credentials distributed to the computing resources may be used by the computing resources to perform one or more actions. Actions may include performing one or more functions in connection with configuration, management, and/or operation of the one or more resources, and/or access of other computing resources. The ability to use credentials may be changed based at least in part on the occurrence of one or more events.

    Abstract translation: 用于管理凭据的系统和方法将凭证分发到一组共同管理的计算资源的子集。 共同管理的计算资源可以包括一个或多个虚拟机实例。 分配给计算资源的证书可以被计算资源用于执行一个或多个动作。 操作可以包括执行与一个或多个资源的配置,管理和/或操作有关的一个或多个功能,和/或其他计算资源的访问。 至少部分地基于一个或多个事件的发生来改变使用凭证的能力。

    Portable network interfaces for authentication and license enforcement

    公开(公告)号:US12242985B2

    公开(公告)日:2025-03-04

    申请号:US17711790

    申请日:2022-04-01

    Abstract: Methods and apparatus for portable network interfaces to manage authentication and license enforcement. A system may include a plurality of resource instances including a producer instance configured to implement a network-accessible service, and an authentication coordinator. The coordinator may assign an interface record to the service, wherein the interface record comprises an IP address and a set of security properties. The coordinator may configure the security properties to allow a client to request an attachment of the interface record to a selected resource instance, such that the selected resource instance is enabled to transmit network messages from the IP address using one or more physical network interfaces of the selected resource instance. The producer resource instance initiates authentication operations for the service, including at least one authentication operation based on the IP address of the interface record.

    Storage service supporting data transformations

    公开(公告)号:US11860855B1

    公开(公告)日:2024-01-02

    申请号:US15632260

    申请日:2017-06-23

    CPC classification number: G06F16/2379 G06F16/22

    Abstract: A storage service is configured to receive one or more instructions specifying transformations that are to be applied to data sets stored by the storage service when the data sets are made available outside of particular storage locations within the storage service. In response to triggering events that make the data sets available outside of the particular storage locations, the storage services causes the transformations to be performed on the data sets prior to the data sets being accessible at one or more destination locations outside of the particular storage locations where the data sets are stored. In some embodiments, the transformations are performed on hardware included in the storage service or are performed on external hardware at the direction of the storage service.

    Enforceable launch configurations
    47.
    发明授权

    公开(公告)号:US11075913B1

    公开(公告)日:2021-07-27

    申请号:US16566592

    申请日:2019-09-10

    Abstract: Users intending to launch instances or otherwise access virtual resources in a multi-tenant environment can specify a launch configuration. For each type of instance or each type of user, at least one launch configuration is created that includes parameters and values to be used in instantiating an instance of that type, the values being optimized for the current environment and type of instance. Launch configurations can be optimized for different types of users, such as to account for security credentials and access levels. Such an approach enables users to launch instances by contacting the resource provider directly without need for a proxy, which can function as a choke point under heavy load. The use of an appropriate launch configuration can be enforced for any type of user at any level, such as at the sub-net level, by modifying a request that does not specify an appropriate launch configuration.

    TECHNIQUES FOR CREDENTIAL GENERATION
    50.
    发明申请

    公开(公告)号:US20190036901A1

    公开(公告)日:2019-01-31

    申请号:US16152132

    申请日:2018-10-04

    Abstract: A plurality of virtual computing resources is detected to have been provisioned. Credentials are distributed to the plurality of virtual computing resources. A credentials map that maps the credentials to the plurality of virtual computing resources is updated. The credentials for the plurality of virtual computing resources are activated to enable the plurality of virtual computing resources to use the credentials to authenticate to a second computer system that manages a resource service, with the credentials being inaccessible to resources of the resource service. A virtual computing resource of the plurality of virtual computing resources is detected to been deprovisioned, and the credentials for the virtual computing resource are deactivated.

Patent Agency Ranking