PROVIDING ACCESS TO REMOTE NETWORKS VIA EXTERNAL ENDPOINTS

    公开(公告)号:US20180288059A1

    公开(公告)日:2018-10-04

    申请号:US15997330

    申请日:2018-06-04

    Abstract: Systems and methods for providing access to a remote network via an external endpoint are provided. A client establishes a secure connection between an external endpoint and a remote network. Transmissions from clients to the external endpoint are supplemented with additional information regarding handling within the remote network, and then transmitted to an internal endpoint within the remote network. The internal endpoint processes the transmission based on the supplemental information and returns a response to the external endpoint. A response is then returned to the client. Access policies may be created by authorized users to establish processing of client transmissions. These policies may be stored and enforced by the internal endpoint or the external endpoint.

    Volume cryptographic key management

    公开(公告)号:US10078754B1

    公开(公告)日:2018-09-18

    申请号:US14035735

    申请日:2013-09-24

    CPC classification number: G06F21/602 G06F21/78 G06F2221/2107 H04L9/088

    Abstract: Techniques for providing cryptographic keys for encrypted system volumes on machine instances in virtualized and/or distributed systems are described herein. At a time after detecting the requirement for a cryptographic key by a virtual machine instance, one or more computer system entities within a computer system invoke one or more computer system capabilities at least to create one or more virtual hardware devices capable of representing or providing appropriate cryptographic keys. The virtual hardware devices are connected to the machine instance under the control of the computer system so that the encrypted system volumes may be used. After the cryptographic key is no longer needed, it is detached from the machine instance.

    Service manifests
    43.
    发明授权

    公开(公告)号:US10067781B2

    公开(公告)日:2018-09-04

    申请号:US14887088

    申请日:2015-10-19

    Abstract: Generally described, aspects of the present disclosure relate to for managing the configuration and security policies of hosted virtual machine networks. Hosted virtual machine networks are configured in a manner such that a virtual machine manager component can establish service manifests that correspond to information required by the virtual machine network from a user/customer. The virtual machine manager component can also publish in the service manifests contractual information, such as security risk assessments, that are deemed to have been provided and accepted by the user/customer in instantiating virtual machine networks. If the processed service manifest information remains valid, a substrate network process requests or independently instantiate services or components in accordance with the configuration information and security risk information included in the processed service manifest.

    Providing access to remote networks via external endpoints

    公开(公告)号:US09992203B2

    公开(公告)日:2018-06-05

    申请号:US15093403

    申请日:2016-04-07

    Abstract: Systems and methods for providing access to a remote network via an external endpoint are provided. A client establishes a secure connection between an external endpoint and a remote network. Transmissions from clients to the external endpoint are supplemented with additional information regarding handling within the remote network, and then transmitted to an internal endpoint within the remote network. The internal endpoint processes the transmission based on the supplemental information and returns a response to the external endpoint. A response is then returned to the client. Access policies may be created by authorized users to establish processing of client transmissions. These policies may be stored and enforced by the internal endpoint or the external endpoint.

    Packet authentication and encryption in virtual networks

    公开(公告)号:US09876773B1

    公开(公告)日:2018-01-23

    申请号:US14949225

    申请日:2015-11-23

    Abstract: Systems and methods provide logic for distributing cryptographic keys in a physical network comprising a plurality of physical nodes. In one implementation, a computer-implemented method is provided for distributing cryptographic keys in a physical network. The method includes receiving information mapping a virtual network address of a virtual node to a physical network address of a physical node. The virtual node may be associated with a virtual network hosted by the physical node, and the received mapping information identifies a virtual network address of the node and the physical network address of the node. The mapping service transmits a current version of a cryptographic key and an identifier of the current version to the physical node.

    Enhanced browsing using CDN routing capabilities

    公开(公告)号:US09871850B1

    公开(公告)日:2018-01-16

    申请号:US14311167

    申请日:2014-06-20

    Abstract: An edge node of a content delivery network (CDN) service receives a representation of a browsing request from a client-side component of a split-browser service (SBS). The SBS includes a browsing engine implemented at a provider network. The edge node determines whether content retrieval analysis of the browsing request is to be performed at the edge node. In response to a determination that content retrieval analysis of the browsing request is not to be performed at the edge node, the edge node uses a routing knowledge base of the CDN service to identify a network route to the SBS browsing engine and transmits the representation of the browsing request via the identified network route to the SBS browsing engine for content retrieval and related processing.

    Transparent policies
    50.
    发明授权

    公开(公告)号:US09854001B1

    公开(公告)日:2017-12-26

    申请号:US14225300

    申请日:2014-03-25

    CPC classification number: H04L63/20

    Abstract: A system enforces policies in connection with requests to access resources. Users are provided the ability to obtain information about the policies the system enforces. Some of the users have associated restrictions such that, when those users request information about the policies, the information provided is incomplete. The information provided may lack information about one or more policies that apply to the users.

Patent Agency Ranking