Custom access controls
    3.
    发明授权

    公开(公告)号:US10771586B1

    公开(公告)日:2020-09-08

    申请号:US13854669

    申请日:2013-04-01

    Abstract: Methods and systems for implementing custom access controls are disclosed. A first task is added to a first workflow. A first role is generated for the first workflow. The first role comprises a first set of one or more permissions for using one or more computing resources. The one or more permissions in the first role are selected based on the first task. The first task is performed using the one or more computing resources in accordance with the first role.

    Security mechanism evaluation service
    4.
    发明授权
    Security mechanism evaluation service 有权
    安全机制评估服务

    公开(公告)号:US09425966B1

    公开(公告)日:2016-08-23

    申请号:US13826888

    申请日:2013-03-14

    Abstract: Methods and apparatus for a security mechanism evaluation service are disclosed. A storage medium stores program instructions that when executed on a processor define a programmatic interface enabling a client to submit an evaluation request for a security mechanism. On receiving an evaluation request from a client indicating a particular security mechanism using public-key encryption, the instructions when executed, identify resources of a provider network to be used to respond. The instructions, when executed, provide to the client, one or more of: (a) a trustworthiness indicator for a certificate authority that issued a public-key certificate in accordance with the particular security mechanism; (b) a result of a syntax analysis of the public-key certificate; or (c) a vulnerability indicator for a key pair.

    Abstract translation: 公开了用于安全机制评估服务的方法和装置。 存储介质存储当在处理器上执行时定义编程接口的程序指令,使得客户端能够提交对安全机制的评估请求。 在从客户端接收到指示使用公钥加密的特定安全机制的评估请求时,执行指令时,识别要用于响应的提供商网络的资源。 指令在执行时向客户提供以下一个或多个:(a)根据特定安全机制发布公钥证书的认证机构的可信赖性指示符; (b)公钥证书的语法分析结果; 或(c)密钥对的漏洞指示符。

    Versioned access controls
    5.
    发明授权

    公开(公告)号:US10346626B1

    公开(公告)日:2019-07-09

    申请号:US13854679

    申请日:2013-04-01

    Abstract: Methods and systems for implementing versioned access controls are disclosed. A first task is added to a first workflow with a first version of a default role. A second version of the default role is generated after the first task is added. A second task is added to a second workflow with the second version of the default role. The first version and the second version each comprise one or more permissions for using one or more computing resources. The first task is performed using the permissions in the first version of the default role. The second task is performed using the permissions in the second version of the default role.

Patent Agency Ranking