-
公开(公告)号:US10581919B2
公开(公告)日:2020-03-03
申请号:US15953262
申请日:2018-04-13
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Bharath Mukkati Prakash , Ashish Rangole , Nima Sharifi Mehr , Jeffrey John Wierer , Kunal Chadha , Chenxi Zhang , Hardik Nagda , Kai Zhao
Abstract: A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.
-
公开(公告)号:US09514099B1
公开(公告)日:2016-12-06
申请号:US14293118
申请日:2014-06-02
Applicant: Amazon Technologies, Inc.
Inventor: Raymond Robert Ringhiser , Dylan J. Proulx , Bharath Mukkati Prakash , Scot A. Marvin , Benjamin C. Bernard , Paul Lynn Plummer , Gregory L. Bowen , Stephen J. Matlock
CPC classification number: G06F17/211 , G06F17/2229 , G06F17/2247 , G06F17/2288 , G06F17/30011
Abstract: Disclosed are various embodiments for a documentation system. Documentation topics for publishing in a node are received from a client. Embodiments of the disclosure determine whether the documentation topic has been assigned a topic identifier. Topic identifiers are assigned if the documentation topic has not been assigned a topic identifier and the documentation topic is assigned to at least one node in the documentation system. The documentation topics are stored in a data store and the topic identifiers are transmitted to the client. The topics are then published in at least one node of the documentation system.
Abstract translation: 公开了用于文件系统的各种实施例。 从客户端收到用于在节点中发布的文档主题。 本公开的实施例确定文档主题是否已经被分配了主题标识符。 如果尚未为文档主题分配主题标识符并将文档主题分配给文档系统中的至少一个节点,则会分配主题标识符。 文档主题存储在数据存储中,主题标识符被传送到客户端。 然后,这些主题将在文档系统的至少一个节点上发布。
-
公开(公告)号:US10567388B1
公开(公告)日:2020-02-18
申请号:US15087007
申请日:2016-03-31
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Jeffrey John Wierer , Nima Sharifi Mehr , Ashish Rangole , Kunal Chadha , Bharath Mukkati Prakash , Radu Mihai Berciu , Kai Zhao , Hardik Nagda , Chenxi Zhang
Abstract: A policy/resource decommissioning service determines whether a resource has been inactive for a period of time greater than at least one period of time threshold for decommissioning. If the resource has been inactive greater than a first period of time threshold, the service disables the resource such that requests to access the resource are denied. If the resource has been inactive for a period of time greater than a second threshold, longer than the first period of time threshold, the service archives the resource. The service deletes the resource if the inactivity period of the resource is greater than a third period of time threshold, where the third period of time threshold is longer than the first and the second period of time thresholds.
-
公开(公告)号:US10397236B1
公开(公告)日:2019-08-27
申请号:US15376335
申请日:2016-12-12
Applicant: Amazon Technologies, Inc.
Inventor: Kunal Chadha , Zaher Dannawi , Bharath Mukkati Prakash , Hardik Nagda , Anirudh Mattur Radhakrishna , Ashish Rangole , Chenxi Zhang
Abstract: A customer's resources are protected from malicious or accidental deletion or termination. In some embodiments anomaly detection is used for identifying suspicious activities, which is combined with options to restore previously deleted resources. To define and detect anomalies, resource profiles are generated indicative of how resources are being used, and user profiles of how users use resources of the compute service provider. Instead of immediately deleting a resource, a temporary marker can be placed on the resource. The temporary marker blocks attempts to access the resource just as if the resource was deleted. However, the resource can easily be recovered by simply removing the marker. When a deletion event is identified as anomalous, an alert is generated to the customer. Upon receiving the alert, customers can opt to restore the resource that has been deleted, which will remove the marker.
-
公开(公告)号:US20180234462A1
公开(公告)日:2018-08-16
申请号:US15953262
申请日:2018-04-13
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Bharath Mukkati Prakash , Ashish Rangole , Nima Sharifi Mehr , Jeffrey John Wierer , Kunal Chadha , Chenxi Zhang , Hardik Nagda , Kai Zhao
IPC: H04L29/06
Abstract: A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.
-
公开(公告)号:US09948681B1
公开(公告)日:2018-04-17
申请号:US15087014
申请日:2016-03-31
Applicant: Amazon Technologies, Inc.
Inventor: William Frederick Hingle Kruse , Bharath Mukkati Prakash , Ashish Rangole , Nima Sharifi Mehr , Jeffrey John Wierer , Kunal Chadha , Chenxi Zhang , Hardik Nagda , Kai Zhao
Abstract: A computing resource service receives a request to access the service and perform various actions. In response to the request, the computing resource service obtains a set of active policies that are applicable to the request. As a result of the service determining that the set of active policies fail to provide sufficient permissions for fulfillment of the request, the service determines if an enforcement policy is available that is applicable to the request. The service evaluates the request using the enforcement policy such that if the enforcement policy includes permissions sufficient for fulfillment of the request, the request is fulfilled.
-
公开(公告)号:US20240223618A1
公开(公告)日:2024-07-04
申请号:US18604379
申请日:2024-03-13
Applicant: Amazon Technologies, Inc.
Inventor: Jacob A. Kjelstrup , Bharath Mukkati Prakash , Brigid Ann Johnson , Ujjwal Rajkumar Pugalia
CPC classification number: H04L63/205 , G06N20/00 , H04L63/105
Abstract: Methods, systems, and computer-readable media for auto-tuning permissions using a learning mode are disclosed. A plurality of access requests to a plurality of services and resources by an application are determined during execution of the application in a learning mode in a pre-production environment. The plurality of services and resources are hosted in a multi-tenant provider network. A subset of the services and resources that were used by the application during the learning mode are determined. An access control policy is generated that permits access to the subset of the services and resources used by the application during the learning mode. The access control policy is attached to a role associated with the application to permit access to the subset of the services and resources in a production environment.
-
公开(公告)号:US11968241B1
公开(公告)日:2024-04-23
申请号:US16453931
申请日:2019-06-26
Applicant: Amazon Technologies, Inc.
Inventor: Jacob A. Kjelstrup , Bharath Mukkati Prakash , Brigid Ann Johnson , Ujjwal Rajkumar Pugalia
CPC classification number: H04L63/205 , G06N20/00 , H04L63/105
Abstract: Methods, systems, and computer-readable media for auto-tuning permissions using a learning mode are disclosed. A plurality of access requests to a plurality of services and resources by an application are determined during execution of the application in a learning mode in a pre-production environment. The plurality of services and resources are hosted in a multi-tenant provider network. A subset of the services and resources that were used by the application during the learning mode are determined. An access control policy is generated that permits access to the subset of the services and resources used by the application during the learning mode. The access control policy is attached to a role associated with the application to permit access to the subset of the services and resources in a production environment.
-
-
-
-
-
-
-