-
公开(公告)号:US10379894B1
公开(公告)日:2019-08-13
申请号:US15277878
申请日:2016-09-27
Applicant: AMAZON TECHNOLOGIES, INC.
IPC: G06F9/455 , G06F21/50 , G06F21/51 , G06F21/52 , G06F21/55 , G06F21/56 , G06F21/64 , H04L29/06 , G06F21/57
Abstract: A lineage-based trust for machine images that are derived from another may be established to validate a machine within the lineage before it is used to launch a virtual machine. An offspring machine image may be derived from a parent machine image through modifications made to the parent machine. Further, an integrity metric may be computed for each such modification and a data structure may be provided through which the parent and offspring machine images can be linked. When a customer of a provider network requests a virtual machine to be launched using a specified machine image, the specified machine image is loaded on to a host computer and validated using the associated integrity metrics before the virtual machine is launched.
-
公开(公告)号:US10296750B1
公开(公告)日:2019-05-21
申请号:US14482680
申请日:2014-09-10
Applicant: Amazon Technologies, Inc.
Inventor: Hart Matthew Rossman
Abstract: Users are authorized to access tagged metadata in a provider network. A revision control and binding mechanism may be applied to tagged metadata that is added or modified by the user. A recommendation pertaining to security and compliance for the computing resource may be determined based on an analysis of the computing resource, scoring criteria, and data pertaining to customer and system data.
-
公开(公告)号:US09712535B1
公开(公告)日:2017-07-18
申请号:US15191354
申请日:2016-06-23
Applicant: Amazon Technologies, Inc.
Inventor: Hart Matthew Rossman
CPC classification number: H04L63/10 , G06F8/71 , G06F9/45558 , G06F2009/45562 , G06F2009/45587 , H04L41/0893 , H04L63/1433 , H04L63/20 , H04L67/2804 , H04L67/306 , H04L67/327
Abstract: Users are authorized to access tagged metadata in a provider network. A revision control and binding mechanism may be applied to tagged metadata that is added or modified by the user. A recommendation pertaining to security and compliance for the computing resource may be determined based on an analysis of the computing resource, scoring criteria, and data pertaining to customer and system data.
-
-