Cross-region cache of regional sessions

    公开(公告)号:US10277569B1

    公开(公告)日:2019-04-30

    申请号:US14958888

    申请日:2015-12-03

    Abstract: Techniques for using short-term session credentials across regions are described herein. A first request for resources generated using a short-term session credentials and digitally signed with a digital signature. The request is generated in a first region and received in a second region. In response to the request, a second request is generated in the second region to validate the first request. A new session token that is usable in the second region is generated and returned to the second region. The new session token can then be used in the second region to fulfill the first request.

    ASYMMETRIC SESSION CREDENTIALS
    9.
    发明申请

    公开(公告)号:US20180145835A1

    公开(公告)日:2018-05-24

    申请号:US15875995

    申请日:2018-01-19

    Abstract: Techniques for using short-term credentials using asymmetric session keys are described herein. A request for a short-term credential is received that is digitally signed with a different credential. In response to the request, short-term credential data is generated and populated with a public session key corresponding to a private session key. The short-term credential data is then encrypted with a session encryption key to produce the short-term credential token, which can then be used by the requester as a short-term credential for subsequent requests.

    Scaling events for hosting hierarchical data structures

    公开(公告)号:US11086531B2

    公开(公告)日:2021-08-10

    申请号:US16575258

    申请日:2019-09-18

    Abstract: Scaling events may be detected for hosting hierarchical data structures. Scaling events may be detected to modify the capacity of a data store for hierarchical data structures to handle changing write workloads, read workloads, or storage capacity. Hierarchical data structures may be moved from one group of storage hosts to another group of storage hosts according to a filtered snapshot that includes the hierarchical data structures to be moved that is provided to the destination storage hosts. Changes made to the hierarchical data structures made at the source storage hosts during the move can be applied to the filtered snapshot so that the hierarchical data structures may be made available at the destination storage hosts inclusive of the changes.

Patent Agency Ranking