-
公开(公告)号:US20190319785A1
公开(公告)日:2019-10-17
申请号:US15952743
申请日:2018-04-13
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Danny Wei , Lalit Jain , Varun Verma , Oscar Allen Grim Courchaine , Kristina Kraemer Brenneman , Sriram Venugopal , Arvind Chandrasekar
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating encrypted block store volumes of data from unencrypted object storage snapshots of the volumes. These encryption techniques use a special pool of servers for performing the encryption. These encryption servers are not accessible to users, and they perform encryption and pass encrypted volumes to other block store servers for user access. The encryption context for the volumes can be persisted on the encryption severs for as long as needed for encryption and not shared with the user-facing servers in order to prevent user access to encryption context.
-
公开(公告)号:US11502824B2
公开(公告)日:2022-11-15
申请号:US16909814
申请日:2020-06-23
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Danny Wei , Lalit Jain , Varun Verma , Oscar Allen Grim Courchaine , Kristina Kraemer Brenneman , Sriram Venugopal , Arvind Chandrasekar
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating encrypted block store volumes of data from unencrypted object storage snapshots of the volumes. These encryption techniques use a special pool of servers for performing the encryption. These encryption servers are not accessible to users, and they perform encryption and pass encrypted volumes to other block store servers for user access. The encryption context for the volumes can be persisted on the encryption severs for as long as needed for encryption and not shared with the user-facing servers in order to prevent user access to encryption context.
-
公开(公告)号:US20200322138A1
公开(公告)日:2020-10-08
申请号:US16909814
申请日:2020-06-23
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Danny Wei , Lalit Jain , Varun Verma , Oscar Allen Grim Courchaine , Kristina Kraemer Brenneman , Sriram Venugopal , Arvind Chandrasekar
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating encrypted block store volumes of data from unencrypted object storage snapshots of the volumes. These encryption techniques use a special pool of servers for performing the encryption. These encryption servers are not accessible to users, and they perform encryption and pass encrypted volumes to other block store servers for user access. The encryption context for the volumes can be persisted on the encryption severs for as long as needed for encryption and not shared with the user-facing servers in order to prevent user access to encryption context.
-
公开(公告)号:US10924275B1
公开(公告)日:2021-02-16
申请号:US16147000
申请日:2018-09-28
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Arvind Chandrasekar , Lalit Jain , James Pinkerton , Marc Stephen Olson , Danny Wei , Sriram Venugopal
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating multiple encrypted block store volumes of data from an unencrypted source. These encryption techniques can use a transform fleet as an intermediary use between the unencrypted source and the encrypted volumes. The transform fleet can obtain data of the volume from one or both of two sources—an object storage “snapshot” a block storage “source volume”—and can then apply the appropriate encryption key for performing the encryption of a particular volume.
-
公开(公告)号:US10728025B2
公开(公告)日:2020-07-28
申请号:US15952743
申请日:2018-04-13
Applicant: Amazon Technologies, Inc.
Inventor: Sandeep Kumar , Danny Wei , Lalit Jain , Varun Verma , Oscar Allen Grim Courchaine , Kristina Kraemer Brenneman , Sriram Venugopal , Arvind Chandrasekar
Abstract: Generally described, one or more aspects of the present application correspond to techniques for creating encrypted block store volumes of data from unencrypted object storage snapshots of the volumes. These encryption techniques use a special pool of servers for performing the encryption. These encryption servers are not accessible to users, and they perform encryption and pass encrypted volumes to other block store servers for user access. The encryption context for the volumes can be persisted on the encryption severs for as long as needed for encryption and not shared with the user-facing servers in order to prevent user access to encryption context.
-
-
-
-