Peripheral device enabling virtualized computing service extensions

    公开(公告)号:US11563799B2

    公开(公告)日:2023-01-24

    申请号:US17371772

    申请日:2021-07-09

    Abstract: A peripheral device includes one or more processors and a memory storing program instructions that when executed implement an extension manager of a virtualized computing service. The extension manager establishes a secure network channel for communications between the peripheral device, which is located at a premise external to a provider network, and a data center of the provider network. The extension manager assigns a network address of the substrate network of the service to a hardware server at the external premise. The substrate address is also assigned to an extension traffic intermediary at the data center. In response to a command directed to the virtualized computing service, one or more compute instance configuration operations are performed at the hardware server.

    PROVIDING ACCESS TO CONFIGURABLE PRIVATE COMPUTER NETWORKS

    公开(公告)号:US20220217040A1

    公开(公告)日:2022-07-07

    申请号:US17705188

    申请日:2022-03-25

    Abstract: Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.

    Providing access to configurable private computer networks

    公开(公告)号:US11290320B2

    公开(公告)日:2022-03-29

    申请号:US16938999

    申请日:2020-07-26

    Abstract: Techniques are described for providing users with access to computer networks, such as to enable users to interact with a remote configurable network service in order to create and configure computer networks that are provided by the configurable network service for use by the users. Computer networks provided by the configurable network service may be configured to be private computer networks that are accessible only by the users who create them, and may each be created and configured by a client of the configurable network service to be an extension to an existing computer network of the client, such as a private computer network extension to an existing private computer network of the client. If so, secure private access between an existing computer network and new computer network extension that is being provided may be enabled using one or more VPN connections or other private access mechanisms.

    Using an I/O proxy device to filter I/O messages in a computer system

    公开(公告)号:US11216391B1

    公开(公告)日:2022-01-04

    申请号:US16015090

    申请日:2018-06-21

    Abstract: Techniques are described for the creation and use of input/output (I/O) filters used to perform actions relative to I/O requests passing through an I/O proxy device of a computer system. A computer system includes one or more hardware processing elements (for example, one or more central processing units (CPUs), graphics processing units (GPUs), or other types of processing elements), one or more data storage devices (for example, hard-disk drives, solid-state drives (SSDs), network-accessible block storage devices, and so forth), and an I/O proxy device that is interposed between at least one of the hardware processing elements and at least one of the one or more data storage devices. The interposition of an I/O proxy device between hardware processing elements and data storage devices enables the I/O proxy device to participate in the I/O data path, for example, to receive I/O messages and to perform various actions relative to such messages.

    Resource locators with keys
    199.
    发明授权

    公开(公告)号:US11146538B2

    公开(公告)日:2021-10-12

    申请号:US16171227

    申请日:2018-10-25

    Abstract: Requests are pre-generated to include a cryptographic key to be used in fulfilling the requests. The requests may be encoded in uniform resource locators and may include authentication information to enable a service provider to whom the requests are submitted to determine whether the requests are authorized. The requests may be passed to various entities who can then submit the requests to the service provider. The service provider, upon receipt of a request, can verify the authentication information and fulfill the request using a cryptographic key encoded in the request.

    Enforceable launch configurations
    200.
    发明授权

    公开(公告)号:US11075913B1

    公开(公告)日:2021-07-27

    申请号:US16566592

    申请日:2019-09-10

    Abstract: Users intending to launch instances or otherwise access virtual resources in a multi-tenant environment can specify a launch configuration. For each type of instance or each type of user, at least one launch configuration is created that includes parameters and values to be used in instantiating an instance of that type, the values being optimized for the current environment and type of instance. Launch configurations can be optimized for different types of users, such as to account for security credentials and access levels. Such an approach enables users to launch instances by contacting the resource provider directly without need for a proxy, which can function as a choke point under heavy load. The use of an appropriate launch configuration can be enforced for any type of user at any level, such as at the sub-net level, by modifying a request that does not specify an appropriate launch configuration.

Patent Agency Ranking