-
公开(公告)号:US10284670B1
公开(公告)日:2019-05-07
申请号:US15176097
申请日:2016-06-07
Applicant: Amazon Technologies, Inc.
Inventor: Kyle Michael Roche , David Craig Yanacek
Abstract: A network-connected device service receives a request to establish a communications session with a network-connected device. In response to the request, the service transmits a second request to a container service to invoke a software container instance that can be used to establish the communications session with the network-connected device. The network-connected device service receives a notification from the container instance indicating whether the communications session has been established. If so, the service provides an indication to a controlling device that the session has been established. This enables the controlling device to submit commands executable by the network-connected device to the service, which provides the commands to the container instance and, hence, to the network-connected device.
-
公开(公告)号:US10257288B2
公开(公告)日:2019-04-09
申请号:US14570900
申请日:2014-12-15
Applicant: Amazon Technologies, Inc.
Inventor: Wei Xiao , David Alan Lutz , Timothy Andrew Rath , Maximiliano Maccanti , Miguel Mascarenhas Filipe , David Craig Yanacek
Abstract: A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. The system may determine whether it is operating in an overloaded or underloaded state based on a current work throughput rate, a target work throughput rate, a maximum request rate, or an actual request rate, and may dynamically adjust the maximum request rate in response. For example, if the maximum request rate is being exceeded, the maximum request rate may be raised or lowered, dependent on the current work throughput rate. If the target or committed work throughput rate is being exceeded, but the maximum request rate is not being exceeded, a lower maximum request rate may be proposed. Adjustments to the maximum request rate may be made using multiple incremental adjustments. Service request tokens may be added to a leaky token bucket at the maximum request rate.
-
3.
公开(公告)号:US09817703B1
公开(公告)日:2017-11-14
申请号:US14096948
申请日:2013-12-04
Applicant: Amazon Technologies, Inc.
Inventor: Mark Ryland , Alexander Slutsker , David Craig Yanacek
CPC classification number: G06F9/52
Abstract: A compute cluster including multiple compute nodes may implement distributed lock management using conditional updates to a distributed key value data store. It may be determined, at one or more compute nodes of a compute cluster, that particular lock is available based on a respective lock entry for the particular lock maintained in a lock manager table at a key value data store. The key value data store may be configured to perform conditional write requests for updates to data store at the key value, and may maintain data according to a distributed durability scheme. Compute nodes that determine that a lock is available may send a conditional write request to the key value data store in order to acquire the particular lock. The compute node that acquired the particular lock may be identified based on the successfully completed conditional write request to the respective lock entry.
-
公开(公告)号:US20170308559A1
公开(公告)日:2017-10-26
申请号:US15645900
申请日:2017-07-10
Applicant: Amazon Technologies, Inc.
Inventor: Khawaja Salman Shams , Prashant Pandey , Swaminathan Sivasubramanian , Omer Ahmed Zaki , David Craig Yanacek , Johanna S. Olson , Hendrik de Kock , Johnny Ying Wu
IPC: G06F17/30
CPC classification number: G06F17/30578 , G06F17/30569
Abstract: A remote distributed data store may be configured to process data updates received through invocation of a common API with reference to a common schema. A local data store may also be configured to process updates through the common API with reference to the common schema. Updates to the local data store may be mapped from the local data store schema to the common schema, and applied to the distributed data store. Updates to the distributed data store may be mapped from the common schema to the local data store schema. User identity may be verified to limit data synchronization to authorized users.
-
公开(公告)号:US09559900B1
公开(公告)日:2017-01-31
申请号:US13917307
申请日:2013-06-13
Applicant: Amazon Technologies, Inc.
Inventor: Adam Douglas Morley , David Craig Yanacek
IPC: G06F15/177 , H04L12/24
CPC classification number: H04L41/0806 , H04L41/0893 , H04L41/5051 , H04L67/2842
Abstract: Methods and apparatus for dedicated endpoint instances for network-accessible services are disclosed. The number of dedicated endpoint instances to be established to direct work requests of a given client to back-end nodes of a service may be determined. Configuration policies for the instances, including one or more policies related to caching, authentication, redundancy, durability, availability, and/or load balancing, may also be determined. Configuration of the instances may be initiated, and an indication that the endpoint or endpoints have been configured may be provided to the client.
Abstract translation: 公开了用于网络可访问服务的专用端点实例的方法和装置。 可以确定要建立的用于将给定客户端的工作请求定向到服务的后端节点的专用端点实例的数量。 还可以确定实例的配置策略,包括与缓存,认证,冗余,持久性,可用性和/或负载平衡相关的一个或多个策略。 可以启动实例的配置,并且可以向客户端提供端点或端点已被配置的指示。
-
公开(公告)号:US09262505B2
公开(公告)日:2016-02-16
申请号:US13897232
申请日:2013-05-17
Applicant: Amazon Technologies, Inc.
Inventor: David Craig Yanacek , Bjorn Patrick Swift , Wei Xiao , Kiran-Kumar Muniswamy-Reddy , Miguel Mascarenhas Filipe , Yijun Lu
IPC: G06F17/30
CPC classification number: G06F17/30595 , G06F17/30289 , G06F17/30386
Abstract: A database management system may be operated by a third-party provider that hosts the system in a datacenter and provides access to the system to end users on behalf of various entities. Limits on total capacity consumption may be imposed, but may result in service outages when capacity consumption exceeds those limits. Requests to perform operations on the system may be classified. The request classifications may be associated with policies for admitting or rejecting the request. One or more token buckets representative of capacity available to the request to perform the operation may be used to determine to admit the request and updated based on the cost of performing the operation.
Abstract translation: 数据库管理系统可以由在数据中心中承载系统的第三方提供商来操作,并且代表各种实体向终端用户提供对系统的访问。 总容量消耗的限制可能会受到限制,但是当容量消耗超过这些限制时可能导致服务中断。 可以对在系统上执行操作的请求进行分类。 请求分类可能与允许或拒绝请求的策略相关联。 可以使用表示可用于执行操作的请求的容量的一个或多个令牌桶来确定承认请求并且基于执行操作的成本来更新。
-
公开(公告)号:US11762970B2
公开(公告)日:2023-09-19
申请号:US15431708
申请日:2017-02-13
Applicant: Amazon Technologies, Inc.
Inventor: David Craig Yanacek , Prashant Pandey
IPC: G06F16/176 , G06F21/33 , G06F21/62 , H04L9/40
CPC classification number: G06F21/335 , G06F16/1767 , G06F16/1774 , G06F21/6218 , H04L63/0815
Abstract: A structured data store service, such as a database service, may implement fine-grained access to data maintained at the database service using federated identity. Fine grained access requests may be received at a database service for specified data maintained for an application provider from a client of the application provider. An access credential may be also be received. Verification of the access credential may be obtained, and the database service may evaluate the fine-grained access request according to a delegation policy corresponding to the access credential to determine whether the fine-grained request is authorized. If authorized, the fine-grained access request may be service. If not authorized, the fine-grained access request may be denied. In some embodiments, multiple application clients may have the same authorization for data, such as read authorization, while another one or more application clients may have different authorization for the data, such as write authorization.
-
公开(公告)号:US11245579B1
公开(公告)日:2022-02-08
申请号:US16700999
申请日:2019-12-02
Applicant: Amazon Technologies, Inc.
Abstract: Technology is described for providing preconfigured device representations in a service provider environment. A plurality of device representation parameters may be received for a device via a user account. A preconfigured device representation may be created for the device using the plurality of device representation parameters. The preconfigured device representation may be associated with the user account. The device may be registered with the service provider environment. A registration of the device may be performed when the device initially connects to the service provider environment. The registration may assign a device identifier to the device and may associate the user account with the device. The preconfigured device representation may be provided to the device after the registration of the device is completed.
-
公开(公告)号:US20210185740A1
公开(公告)日:2021-06-17
申请号:US17182004
申请日:2021-02-22
Applicant: Amazon Technologies, Inc.
Inventor: Kyle Michael Roche , David Craig Yanacek
Abstract: A network-connected device service receives a request to establish a communications session with a network-connected device. In response to the request, the service transmits a set of electronic messages to the network-connected device through an access point of the network-connected device to establish the communications session. The network-connected device service receives a notification from the network-connected device indicating whether the communications session has been established. If so, the service provides an indication to a controlling device that the session has been established. This enables the controlling device to submit commands executable by the network-connected device to the service, which provides the commands to the network-connected device through the access point.
-
公开(公告)号:US20190306255A1
公开(公告)日:2019-10-03
申请号:US16377078
申请日:2019-04-05
Applicant: Amazon Technologies, Inc.
Inventor: Wei Xiao , David Alan Lutz , Timothy Andrew Rath , Maximiliano Maccanti , Miguel Mascarenhas Filipe , David Craig Yanacek
Abstract: A system that provides services to clients may receive and service requests, various ones of which may require different amounts of work. The system may determine whether it is operating in an overloaded or underloaded state based on a current work throughput rate, a target work throughput rate, a maximum request rate, or an actual request rate, and may dynamically adjust the maximum request rate in response. For example, if the maximum request rate is being exceeded, the maximum request rate may be raised or lowered, dependent on the current work throughput rate. If the target or committed work throughput rate is being exceeded, but the maximum request rate is not being exceeded, a lower maximum request rate may be proposed. Adjustments to the maximum request rate may be made using multiple incremental adjustments. Service request tokens may be added to a leaky token bucket at the maximum request rate.
-
-
-
-
-
-
-
-
-