-
公开(公告)号:US20180314713A1
公开(公告)日:2018-11-01
申请号:US15669824
申请日:2017-08-04
Applicant: Amazon Technologies, Inc.
Inventor: Amaan Ahmed Penangwala , Scott Anthony Plant , Richa Sehgal , Kevin Gillett , Borislav Andruschuk , Stephen Joseph Oakley , Arun Ponniah Sethuramalingam , Noah Eisner
IPC: G06F17/30
Abstract: A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.
-
公开(公告)号:US09747297B2
公开(公告)日:2017-08-29
申请号:US14494143
申请日:2014-09-23
Applicant: Amazon Technologies, Inc.
Inventor: Amaan Ahmed Penangwala , Scott Anthony Plant , Richa Sehgal , Kevin Gillett , Borislav Andruschuk , Stephen Joseph Oakley , Arun Ponniah Sethuramalingam , Noah Eisner
IPC: G06F17/30
CPC classification number: G06F17/30174
Abstract: A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.
-
公开(公告)号:US09800584B1
公开(公告)日:2017-10-24
申请号:US15341895
申请日:2016-11-02
Applicant: Amazon Technologies, Inc.
Inventor: Borislav Andruschuk , Kevin Fowler
CPC classification number: H04L63/101 , G06F21/6209 , G06F21/6218 , H04L63/10 , H04L63/104 , H04L63/20
Abstract: Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, “lazy evaluation” approach to access control is described in which an effective access control list for a computing resource is determined after a request is received from a user to access the resource. When resources are shared, access control policies are created and stored in association with the shared resource but are not stored in association with hierarchically related lower-level resources. When an access request for a resource is received, access control policies are collected for levels of a computing resource hierarchy that are higher than the hierarchy level of the resource. An effective access control list is determined based on permissions specified in the collected access control policies. The effective access control list represents an effective propagation of access control policies of higher hierarchy levels to the computing resource.
-
公开(公告)号:US20160085769A1
公开(公告)日:2016-03-24
申请号:US14494143
申请日:2014-09-23
Applicant: Amazon Technologies, Inc.
Inventor: Amaan Ahmed Penangwala , Scott Anthony Plant , Richa Sehgal , Kevin Gillett , Borislav Andruschuk , Stephen Joseph Oakley , Arun Ponniah Sethuramalingam , Noah Eisner
IPC: G06F17/30
CPC classification number: G06F17/30174
Abstract: A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.
Abstract translation: 在远程和本地文件系统中同步共享文件夹和文件的方法包括确定远程和本地文件系统状态。 远程文件系统状态包括用于共享文件夹,共享子文件夹,共享文件,共享子级文件和共享快捷方式的远程实例的远程哈希值。 本地文件系统状态包括共享文件夹,共享子文件夹,共享文件,共享子级文件和共享快捷方式的本地实例的本地哈希值。 该方法还包括比较远程文件系统状态和本地文件系统状态,以确定远程文件系统状态和本地文件系统状态之间的散列值的任何差异,并同步任何共享文件夹,共享子文件夹或共享文件 在远程文件系统状态和本地文件系统和远程文件系统中的本地文件系统状态具有不同的值。
-
公开(公告)号:US10482067B2
公开(公告)日:2019-11-19
申请号:US15669824
申请日:2017-08-04
Applicant: Amazon Technologies, Inc.
Inventor: Amaan Ahmed Penangwala , Scott Anthony Plant , Richa Sehgal , Kevin Gillett , Borislav Andruschuk , Stephen Joseph Oakley , Arun Ponniah Sethuramalingam , Noah Eisner
IPC: G06F17/30 , G06F16/178 , G06F16/13
Abstract: A method of synchronizing shared folders and files within a remote and local file system includes determining a remote and local file system state. The remote file system state includes remote hash values for remote instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The local file system state includes a local hash values for local instances of shared folders, shared sub-folders, shared files, shared sub-level files, and shared shortcuts. The method also includes comparing the remote file system state and the local file system state to determine any differences in the hash values within the remote file system state and the local file system state and synchronizing any shared folder, shared sub-folder, or shared file having a differing value in the remote file system state and the local file system state across the local file system and the remote file system.
-
公开(公告)号:US10154039B1
公开(公告)日:2018-12-11
申请号:US15706349
申请日:2017-09-15
Applicant: Amazon Technologies, Inc.
Inventor: Borislav Andruschuk , Kevin Fowler
Abstract: Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, “lazy evaluation” approach to access control is described in which an effective access control list for a computing resource is determined after a request is received from a user to access the resource. When resources are shared, access control policies are created and stored in association with the shared resource but are not stored in association with hierarchically related lower-level resources. When an access request for a resource is received, access control policies are collected for levels of a computing resource hierarchy that are higher than the hierarchy level of the resource. An effective access control list is determined based on permissions specified in the collected access control policies. The effective access control list represents an effective propagation of access control policies of higher hierarchy levels to the computing resource.
-
7.
公开(公告)号:US09516028B1
公开(公告)日:2016-12-06
申请号:US14453368
申请日:2014-08-06
Applicant: Amazon Technologies, Inc.
Inventor: Borislav Andruschuk , Kevin Fowler
CPC classification number: H04L63/101 , G06F21/6209 , G06F21/6218 , H04L63/10 , H04L63/104 , H04L63/20
Abstract: Access control for shared computing resources in a hierarchical system is provided herein. An as-needed, “lazy evaluation” approach to access control is described in which an effective access control list for a computing resource is determined after a request is received from a user to access the resource. When resources are shared, access control policies are created and stored in association with the shared resource but are not stored in association with hierarchically related lower-level resources. When an access request for a resource is received, access control policies are collected for levels of a computing resource hierarchy that are higher than the hierarchy level of the resource. An effective access control list is determined based on permissions specified in the collected access control policies. The effective access control list represents an effective propagation of access control policies of higher hierarchy levels to the computing resource.
Abstract translation: 本文提供了分层系统中共享计算资源的访问控制。 描述了访问控制的“懒惰评估”方法,其中在从用户接收到访问资源的请求之后,确定用于计算资源的有效访问控制列表。 当共享资源时,与共享资源相关联地创建和存储访问控制策略,但不与层级相关的较低级资源相关联地存储。 当接收到对资源的访问请求时,针对高于资源层级的计算资源层次结构的级别收集访问控制策略。 基于收集的访问控制策略中指定的权限确定有效的访问控制列表。 有效的访问控制列表表示将较高级别级别的访问控制策略有效传播到计算资源。
-
-
-
-
-
-