Network-controlled device management session

    公开(公告)号:US10284670B1

    公开(公告)日:2019-05-07

    申请号:US15176097

    申请日:2016-06-07

    Abstract: A network-connected device service receives a request to establish a communications session with a network-connected device. In response to the request, the service transmits a second request to a container service to invoke a software container instance that can be used to establish the communications session with the network-connected device. The network-connected device service receives a notification from the container instance indicating whether the communications session has been established. If so, the service provides an indication to a controlling device that the session has been established. This enables the controlling device to submit commands executable by the network-connected device to the service, which provides the commands to the container instance and, hence, to the network-connected device.

    System and method for throttling service requests having non-uniform workloads

    公开(公告)号:US10257288B2

    公开(公告)日:2019-04-09

    申请号:US14570900

    申请日:2014-12-15

    Abstract: A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. The system may determine whether it is operating in an overloaded or underloaded state based on a current work throughput rate, a target work throughput rate, a maximum request rate, or an actual request rate, and may dynamically adjust the maximum request rate in response. For example, if the maximum request rate is being exceeded, the maximum request rate may be raised or lowered, dependent on the current work throughput rate. If the target or committed work throughput rate is being exceeded, but the maximum request rate is not being exceeded, a lower maximum request rate may be proposed. Adjustments to the maximum request rate may be made using multiple incremental adjustments. Service request tokens may be added to a leaky token bucket at the maximum request rate.

    Distributed lock management using conditional updates to a distributed key value data store

    公开(公告)号:US09817703B1

    公开(公告)日:2017-11-14

    申请号:US14096948

    申请日:2013-12-04

    CPC classification number: G06F9/52

    Abstract: A compute cluster including multiple compute nodes may implement distributed lock management using conditional updates to a distributed key value data store. It may be determined, at one or more compute nodes of a compute cluster, that particular lock is available based on a respective lock entry for the particular lock maintained in a lock manager table at a key value data store. The key value data store may be configured to perform conditional write requests for updates to data store at the key value, and may maintain data according to a distributed durability scheme. Compute nodes that determine that a lock is available may send a conditional write request to the key value data store in order to acquire the particular lock. The compute node that acquired the particular lock may be identified based on the successfully completed conditional write request to the respective lock entry.

    Dedicated endpoints for network-accessible services
    5.
    发明授权
    Dedicated endpoints for network-accessible services 有权
    网络可访问服务的专用端点

    公开(公告)号:US09559900B1

    公开(公告)日:2017-01-31

    申请号:US13917307

    申请日:2013-06-13

    CPC classification number: H04L41/0806 H04L41/0893 H04L41/5051 H04L67/2842

    Abstract: Methods and apparatus for dedicated endpoint instances for network-accessible services are disclosed. The number of dedicated endpoint instances to be established to direct work requests of a given client to back-end nodes of a service may be determined. Configuration policies for the instances, including one or more policies related to caching, authentication, redundancy, durability, availability, and/or load balancing, may also be determined. Configuration of the instances may be initiated, and an indication that the endpoint or endpoints have been configured may be provided to the client.

    Abstract translation: 公开了用于网络可访问服务的专用端点实例的方法和装置。 可以确定要建立的用于将给定客户端的工作请求定向到服务的后端节点的专用端点实例的数量。 还可以确定实例的配置策略,包括与缓存,认证,冗余,持久性,可用性和/或负载平衡相关的一个或多个策略。 可以启动实例的配置,并且可以向客户端提供端点或端点已被配置的指示。

    Input-output prioritization for database workload
    6.
    发明授权
    Input-output prioritization for database workload 有权
    数据库工作负载的输入输出优先级

    公开(公告)号:US09262505B2

    公开(公告)日:2016-02-16

    申请号:US13897232

    申请日:2013-05-17

    CPC classification number: G06F17/30595 G06F17/30289 G06F17/30386

    Abstract: A database management system may be operated by a third-party provider that hosts the system in a datacenter and provides access to the system to end users on behalf of various entities. Limits on total capacity consumption may be imposed, but may result in service outages when capacity consumption exceeds those limits. Requests to perform operations on the system may be classified. The request classifications may be associated with policies for admitting or rejecting the request. One or more token buckets representative of capacity available to the request to perform the operation may be used to determine to admit the request and updated based on the cost of performing the operation.

    Abstract translation: 数据库管理系统可以由在数据中心中承载系统的第三方提供商来操作,并且代表各种实体向终端用户提供对系统的访问。 总容量消耗的限制可能会受到限制,但是当容量消耗超过这些限制时可能导致服务中断。 可以对在系统上执行操作的请求进行分类。 请求分类可能与允许或拒绝请求的策略相关联。 可以使用表示可用于执行操作的请求的容量的一个或多个令牌桶来确定承认请求并且基于执行操作的成本来更新。

    Fine-grained structured data store access using federated identity management

    公开(公告)号:US11762970B2

    公开(公告)日:2023-09-19

    申请号:US15431708

    申请日:2017-02-13

    Abstract: A structured data store service, such as a database service, may implement fine-grained access to data maintained at the database service using federated identity. Fine grained access requests may be received at a database service for specified data maintained for an application provider from a client of the application provider. An access credential may be also be received. Verification of the access credential may be obtained, and the database service may evaluate the fine-grained access request according to a delegation policy corresponding to the access credential to determine whether the fine-grained request is authorized. If authorized, the fine-grained access request may be service. If not authorized, the fine-grained access request may be denied. In some embodiments, multiple application clients may have the same authorization for data, such as read authorization, while another one or more application clients may have different authorization for the data, such as write authorization.

    Preconfigured device representations

    公开(公告)号:US11245579B1

    公开(公告)日:2022-02-08

    申请号:US16700999

    申请日:2019-12-02

    Abstract: Technology is described for providing preconfigured device representations in a service provider environment. A plurality of device representation parameters may be received for a device via a user account. A preconfigured device representation may be created for the device using the plurality of device representation parameters. The preconfigured device representation may be associated with the user account. The device may be registered with the service provider environment. A registration of the device may be performed when the device initially connects to the service provider environment. The registration may assign a device identifier to the device and may associate the user account with the device. The preconfigured device representation may be provided to the device after the registration of the device is completed.

    SYSTEM AND METHOD FOR THROTTLING SERVICE REQUESTS HAVING NON-UNIFORM WORKLOADS

    公开(公告)号:US20190306255A1

    公开(公告)日:2019-10-03

    申请号:US16377078

    申请日:2019-04-05

    Abstract: A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. The system may determine whether it is operating in an overloaded or underloaded state based on a current work throughput rate, a target work throughput rate, a maximum request rate, or an actual request rate, and may dynamically adjust the maximum request rate in response. For example, if the maximum request rate is being exceeded, the maximum request rate may be raised or lowered, dependent on the current work throughput rate. If the target or committed work throughput rate is being exceeded, but the maximum request rate is not being exceeded, a lower maximum request rate may be proposed. Adjustments to the maximum request rate may be made using multiple incremental adjustments. Service request tokens may be added to a leaky token bucket at the maximum request rate.

Patent Agency Ranking