Virtual secure execution environments
    11.
    发明授权
    Virtual secure execution environments 有权
    虚拟安全执行环境

    公开(公告)号:US09442752B1

    公开(公告)日:2016-09-13

    申请号:US14476520

    申请日:2014-09-03

    CPC classification number: G06F9/45558 G06F21/53 G06F2009/45587

    Abstract: A method and system for running an additional execution environment associated with a primary execution environment, receiving a request from the primary execution environment to create the additional execution environment, and, in response to the request, creating the additional execution environment such that entities other than the primary execution environment have insufficient privileges to access the additional execution environment.

    Abstract translation: 用于运行与主执行环境相关联的附加执行环境的方法和系统,从主执行环境接收请求以创建附加执行环境,以及响应于所述请求,创建附加执行环境,使得除 主执行环境具有访问附加执行环境的权限不足。

    Securing service layer on third party hardware

    公开(公告)号:US10079681B1

    公开(公告)日:2018-09-18

    申请号:US14476533

    申请日:2014-09-03

    Abstract: Techniques for securely instantiating applications associated with computing resource service provider services on hardware that is controlled by third parties and/or customers of the computing resource service provider are described herein. A request to instantiate an application is received and fulfilled by selecting a computer system from computer systems that are controlled by a third party and/or a customer of the computing resource service provider. The computer system is selected based at least in part on the hardware capabilities of the computer system associated with instantiating a secure execution environment. The application is then instantiated within a secure execution environment operating on the computer system.

    Confidential malicious behavior analysis for virtual computing resources

    公开(公告)号:US10341355B1

    公开(公告)日:2019-07-02

    申请号:US14747988

    申请日:2015-06-23

    Abstract: A multi-tenant provider network may implement confidential data capture and analysis for virtual computing resources. Network traffic for virtual compute instances may be evaluated to identify possible malicious behavior of the virtual compute instances. In some embodiments, a stream of raw metering data for individual network communications to the virtual compute instances may be evaluated. A confidential analysis may be performed for identified virtual compute instances, evaluating confidential data utilized by the virtual compute instances for malicious software. Results of the confidential analysis may be generated according to an access policy that restricts access to the confidential data. The results may be provided to a client that is restricted from accessing the confidential data according to the access policy.

Patent Agency Ranking