-
公开(公告)号:US11582221B1
公开(公告)日:2023-02-14
申请号:US16582708
申请日:2019-09-25
Applicant: Amazon Technologies, Inc.
Inventor: Rohit Raj , Rachit Jain , Dan Popick
Abstract: The present disclosure relates to generating a passphrase for an encrypted volume by at least cryptographically combing the first cryptographic key and the shared secret. Where the shared secret is split into a plurality of shares and a first number of the plurality of shares is greater than a second number of the plurality of shares and the second number of the plurality of shares is required to reconstruct the shared secret.
-
公开(公告)号:US11546335B2
公开(公告)日:2023-01-03
申请号:US16586742
申请日:2019-09-27
Applicant: Amazon Technologies, Inc.
Inventor: Rachit Jain , Sulay Shah , Conor Cahill , Praveen Akinapally , Ian Leung , Rohit Raj , Brigid Johnson
IPC: H04L29/06 , H04L9/40 , G06F16/182
Abstract: Techniques for managing permissions to cloud-based resources with session-specific attributes are described. A first request to create a first session to permit access to resources of a provider network is received under an assumed role. The first request is permitted based on an evaluation of a rule associated with the role. Session data including a user-specified attribute included with the first request is generated. A second request to perform an action with a resource hosted by the provider network is received. The user-specified attribute is obtained from the session data based at least in part on the second request. The second request is permitted based on an evaluation of another rule with the user-specified attribute.
-
公开(公告)号:US11042454B1
公开(公告)日:2021-06-22
申请号:US16197033
申请日:2018-11-20
Applicant: Amazon Technologies, Inc.
Inventor: Rachit Jain , Rohit Raj , Ian Leung , Harshad Vasant Kulkarni
Abstract: Restoring data to a data store that suffered corrupted data over a time period is disclosed. A system may provide an interface to specify a time window and filter conditions for identifying corrupted data in an object in a data store, such as, but not limited to, a corrupted NoSQL table. Corrupted data is identified by applying the filter conditions to change logs for the data object (e.g., the No SQL table) in the data store. Repair operations are determined for individual items identified via the filter conditions. Identified corrupted data for items may be corrected, from change logs or backup data in some instances (e.g., data may be deleted, or updated or replaced with data from a backup of the data store when necessary).
-
-