-
公开(公告)号:US20200159555A1
公开(公告)日:2020-05-21
申请号:US16196723
申请日:2018-11-20
Applicant: Amazon Technologies, Inc.
Inventor: Anthony Nicholas Liguori , Matthew Shawn Wilson
IPC: G06F9/455 , G06F9/50 , G06F12/109 , H04L12/46
Abstract: A request to launch a compute instance is received at a control plane of a provider network. At an outbound command communicator, an indication that a compute instance is to be established at a target host at a client premise is obtained. A first address is associated with the target host at the control plane and also assigned to the communicator. A message with a second address within a first network of the client premise as a destination is transmitted. The message comprises a command to establish the compute instance at the target host. The first address is assigned to the target host within a second network of the client premise. Processing of the command at the target host results in establishment of a compute instance.
-
公开(公告)号:US10412191B1
公开(公告)日:2019-09-10
申请号:US15085787
申请日:2016-03-30
Applicant: Amazon Technologies, Inc.
Abstract: A trusted co-processor can provide a hardware-based observation point into the operation of a host machine owned by a resource provider or other such entity. The co-processor can be installed via a peripheral card on a fast bus, such as a PCI bus, on the host machine. The provider can provide the customer with expected information that the customer can verify through a request to an application programming interface (API) of the card, and after the customer verifies the information the customer can take logical ownership of the card and lock out the provider. The card can then function as a trusted but limited environment that is programmable by the customer. The customer can subsequently submit verification requests to the API to ensure that the host has not been unexpectedly modified or is otherwise operating as expected.
-
公开(公告)号:US10382195B2
公开(公告)日:2019-08-13
申请号:US15603317
申请日:2017-05-23
Applicant: Amazon Technologies, Inc.
Inventor: Eric Jason Brandwine , David R. Richardson , Matthew Shawn Wilson , Ian Paul Nowland , Anthony Nicholas Liguori , Brian William Barrett
Abstract: Generally described, physical computing devices in a virtual network can be configured to host a number of virtual machine instances. The physical computing devices can be operably coupled with offload devices. In accordance with an aspect of the present disclosure, a security component can be incorporated into an offload device. The security component can be a physical device including a microprocessor and storage. The security component can include a set of instructions configured to validate an operational configuration of the offload device or the physical computing device to establish that they are configured in accordance with a secure or trusted configuration. In one example, a first security component on the offload device can validate the operational computing environment on the offload device and a second security component on the physical computing device can validate the operational computing environment on the physical computing device.
-
公开(公告)号:US10268612B1
公开(公告)日:2019-04-23
申请号:US15275168
申请日:2016-09-23
Applicant: Amazon Technologies, Inc.
Inventor: Nafea Bshara , Mark Bradley Davis , Matthew Shawn Wilson , Uwe Dannowski , Yaniv Shapira , Adi Habusha , Anthony Nicholas Liguori
IPC: G06F13/30 , G06F13/40 , G06F3/06 , G06F12/0891 , G06F13/28
Abstract: Disclosed herein are techniques for migrating data from a source memory range to a destination memory while data is being written into the source memory range. An apparatus includes a control logic configured to receive a request for data migration and initiate the data migration using a direct memory access (DMA) controller, while the source memory range continues to accept write operations. The apparatus also includes a tracking logic coupled to the control logic and configured to track write operations performed to the source memory range while data is being copied from the source memory range to the destination memory. The control logic is further configured to initiate copying data associated with the tracked write operations to the destination memory.
-
公开(公告)号:US10169591B2
公开(公告)日:2019-01-01
申请号:US14960553
申请日:2015-12-07
Applicant: Amazon Technologies, Inc.
Inventor: Matthew John Campagna , Gregory Alan Rubin , Eric Jason Brandwine , Matthew Shawn Wilson , Cristian M. Ilac
Abstract: A tiered credentialing approach provides assurance to customers having virtual machines running in a remote environment that the virtual images for these machines are in a pristine state and running in a trusted execution environment. The environment can be divided into multiple subsystems, each having its own cryptographic boundary, secure storage, and trusted computing capabilities. A trusted, limited subsystem can handle the administrative tasks for virtual machines running on the main system of a host computing device. The limited system can receive a certificate from a certificate authority, and can act as a certificate authority to provide credentials to the main system. Upon an attestation request, the subsystems can provide attestation information using the respective credentials as well as the certificate chain. An entity having the appropriate credentials can determine the state of the system from the response and verify the state is as expected.
-
公开(公告)号:US20180165455A1
公开(公告)日:2018-06-14
申请号:US15377991
申请日:2016-12-13
Applicant: Amazon Technologies, Inc.
Inventor: Anthony Nicholas Liguori , Jason Alexander Harland , Matthew Shawn Wilson , Nafea Bshara , Ziv Harel , Darin Lee Frink
Abstract: Disclosed herein are techniques for maintaining a secure execution environment on a server. In one embodiment, the server includes a non-volatile memory storing firmware, a programmable security logic coupled to the non-volatile memory, an adapter device coupled to the programmable security logic, and a processor communicatively coupled to the non-volatile memory via the programmable security logic. The adapter device and/or the programmable security logic can verify the firmware in the non-volatile memory while holding the processor and/or a baseboard management controller (BMC) in power reset, release the processor and the BMC from reset to boot the processor and the BMC after the firmware is verified, and then disable communications between the processor and the BMC and deny at least some requests to write to the non-volatile memory by the processor or the BMC.
-
公开(公告)号:US09940123B1
公开(公告)日:2018-04-10
申请号:US14983459
申请日:2015-12-29
Applicant: Amazon Technologies, Inc.
Inventor: Hani Ayoub , Nafea Bshara , Matthew Shawn Wilson , Clint Joseph Sbisa , Barak Wasserstrom , Brian William Barrett , Ronen Shitrit , Anthony Nicholas Liguori
CPC classification number: G06F8/65 , G06F8/654 , G06F8/656 , G06F13/4282
Abstract: Techniques for updating code of a device may be described. In an example, bus may connect the device to a management entity. The device may run a first version of the code. A second version of the code may be available from memory. The device may access the second version from the memory, stop running the first version of the code, and start running the second version of the code without restarting the management entity or the device.
-
公开(公告)号:US09928207B1
公开(公告)日:2018-03-27
申请号:US14869107
申请日:2015-09-29
Applicant: Amazon Technologies, Inc.
Inventor: Adi Habusha , Nafea Bshara , Itay Poleg , Erez Izenberg , Guy Nakibly , Matthew Shawn Wilson
CPC classification number: G06F13/4282 , G06F13/385 , G06F13/4022 , G06F13/404 , G06F13/4221
Abstract: Provided are systems and methods for generating transactions with a configurable port. In some implementations, a peripheral device is provided. The peripheral device comprises a configurable port. In some implementations, the configurable port may be configured to receive a first transaction. In these implementations, the first transactions may include an address. The address may include a transaction attribute. In some implementations, the configurable port may extract the transaction attribute and a transaction address from the address. The configurable port may further generate a second transaction that includes the transaction attribute and the transaction address. The configurable port may also transmit the second transaction.
-
公开(公告)号:US09898601B2
公开(公告)日:2018-02-20
申请号:US15643408
申请日:2017-07-06
Applicant: Amazon Technologies, Inc.
CPC classification number: G06F21/55 , G06F9/45533 , G06F9/468 , G06F9/5077 , G06F21/53
Abstract: Techniques are described for allocating resources to a task from a shared hardware structure. A plurality of tasks may execute on a processor, wherein the processor may include one or more processing cores and each task may include a plurality of computer executable instructions. In accordance with one technique for allocating resources to a task from a shared hardware structure amongst multiple tasks, aspects of the disclosure describe assigning a first identifier to a first task from the plurality of tasks, associating a portion of the shared hardware resource with the first identifier, and restricting access and/or observability for computer executable instructions executed from any other task than the first task to the portion of the hardware resource associated with the first identifier.
-
公开(公告)号:US09712503B1
公开(公告)日:2017-07-18
申请号:US14666225
申请日:2015-03-23
Applicant: Amazon Technologies, Inc.
Inventor: Khaja Ehteshamuddin Ahmed , Diwakar Gupta , Matthew Shawn Wilson
IPC: H04L29/06
CPC classification number: H04L63/0435 , H04L63/062 , H04L63/0823 , H04L63/0876
Abstract: Technology for migration of a computing instance is provided. In one example, a method may include receiving instructions to initiate migration of the computing instance from a first host to a second host. A first message for sending to the first host may be generated which includes instructions to send data representing the computing instance to the second host. The first message may further include encryption information for use in deriving at least one key for encrypting communications to the second host from the first host. A second message for sending to the second host may be generated which includes instructions to receive the data representing the computing instance from the first host. The second message may further include information for use in deriving at least one key for decrypting communications from the first host. The first and second messages may be sent to the respective first and second hosts.
-
-
-
-
-
-
-
-
-