Host attestation
    81.
    发明授权

    公开(公告)号:US10229270B2

    公开(公告)日:2019-03-12

    申请号:US15389771

    申请日:2016-12-23

    Abstract: A service provider provides virtual computing services using a fleet of one or more host computer systems. Each of the host computer systems may be equipped with a trusted platform module (“TPM”). The service provider, the host computer systems, and the virtual computing environments generate attestations that prove the integrity of the system. The attestations are signed with a one-time-use cryptographic key that is verifiable against the public keys of the service provider, a host computer system, and a virtual computing environment. The public key of the host computer system is integrated into a hash tree that links the public key of the host computer system to the public key of the service provider. The public key of the virtual computing environment is signed using a one-time-use graphic key issued to the host computer system that hosts the virtual computing environment.

    Configuration updates for access-restricted hosts

    公开(公告)号:US10122533B1

    公开(公告)日:2018-11-06

    申请号:US14969876

    申请日:2015-12-15

    Abstract: A host machine operated for a specific purpose can have restricted access to other components in a multi-tenant environment in order to provide for the security of the host machine. The access restriction can prevent the host machine from obtaining updates to critical system-level configurations, but such information can be obtained through a signed command received to an API for the host machine. The command can be signed by a quorum of operators, and the host machine can be configured to verify the signatures and the quorum before processing the command. The host machine can store the updates to ephemeral storage as well as persistent storage, such that upon a reboot or power cycle the host machine can operate with current configuration data.

    KEY EXPORT TECHNIQUES
    87.
    发明申请
    KEY EXPORT TECHNIQUES 审中-公开
    主要出口技术

    公开(公告)号:US20170006018A1

    公开(公告)日:2017-01-05

    申请号:US14675614

    申请日:2015-03-31

    Abstract: A computer system performs cryptographic operations as a service. The computer system is configured to allow users of the service to maintain control of their respective cryptographic material. The computer system uses inaccessible cryptographic material to encrypt a user's cryptographic material in a token that is then provided to the user. The user is unable to access a plaintext copy of the cryptographic material in the token, but can provide the token back to the service to cause the service to decrypt and use the cryptographic material.

    Abstract translation: 计算机系统作为服务执行加密操作。 计算机系统被配置为允许服务的用户保持对它们各自的密码材料的控制。 计算机系统使用不可访问的加密材料来加密随后提供给用户的令牌中的用户的加密材料。 用户无法访问令牌中的加密材料的明文副本,但可以将令牌提供给服务以使服务解密并使用加密材料。

    Efficient use of keystreams
    89.
    发明授权

    公开(公告)号:US11570158B2

    公开(公告)日:2023-01-31

    申请号:US16430003

    申请日:2019-06-03

    Abstract: Performing cryptographic operations such as encryption and decryption may be computationally expensive. In some contexts, initialization vectors and keystreams operable to perform encryption operations are generated and stored in a repository, and later retrieved for use in performing encryption operations. Multiple devices in a distributed system can each generate and store a subset of a larger set of keystreams.

    Key export techniques
    90.
    发明授权

    公开(公告)号:US11374916B2

    公开(公告)日:2022-06-28

    申请号:US16673703

    申请日:2019-11-04

    Abstract: A computer system performs cryptographic operations as a service. The computer system is configured to allow users of the service to maintain control of their respective cryptographic material. The computer system uses inaccessible cryptographic material to encrypt a user's cryptographic material in a token that is then provided to the user. The user is unable to access a plaintext copy of the cryptographic material in the token, but can provide the token back to the service to cause the service to decrypt and use the cryptographic material.

Patent Agency Ranking