CHAINED SECURITY SYSTEMS
    251.
    发明申请

    公开(公告)号:US20170161505A1

    公开(公告)日:2017-06-08

    申请号:US14960553

    申请日:2015-12-07

    Abstract: A tiered credentialing approach provides assurance to customers having virtual machines running in a remote environment that the virtual images for these machines are in a pristine state and running in a trusted execution environment. The environment can be divided into multiple subsystems, each having its own cryptographic boundary, secure storage, and trusted computing capabilities. A trusted, limited subsystem can handle the administrative tasks for virtual machines running on the main system of a host computing device. The limited system can receive a certificate from a certificate authority, and can act as a certificate authority to provide credentials to the main system. Upon an attestation request, the subsystems can provide attestation information using the respective credentials as well as the certificate chain. An entity having the appropriate credentials can determine the state of the system from the response and verify the state is as expected.

    Enforceable launch configurations
    253.
    发明授权

    公开(公告)号:US09614873B1

    公开(公告)日:2017-04-04

    申请号:US14683460

    申请日:2015-04-10

    CPC classification number: H04L63/20 G06F9/44505

    Abstract: Users intending to launch instances or otherwise access virtual resources in a multi-tenant environment can specify a launch configuration. For each type of instance or each type of user, at least one launch configuration is created that includes parameters and values to be used in instantiating an instance of that type, the values being optimized for the current environment and type of instance. Launch configurations can be optimized for different types of users, such as to account for security credentials and access levels. Such an approach enables users to launch instances by contacting the resource provider directly without need for a proxy, which can function as a choke point under heavy load. The use of an appropriate launch configuration can be enforced for any type of user at any level, such as at the sub-net level, by modifying a request that does not specify an appropriate launch configuration.

    Using virtual networking devices to manage routing communications between connected computer networks
    254.
    发明授权
    Using virtual networking devices to manage routing communications between connected computer networks 有权
    使用虚拟网络设备管理连接的计算机网络之间的路由通信

    公开(公告)号:US09577876B2

    公开(公告)日:2017-02-21

    申请号:US14825006

    申请日:2015-08-12

    Abstract: Techniques are described for providing managed virtual computer networks whose configured logical network topology may have one or more virtual networking devices, such as by a network-accessible configurable network service, with corresponding networking functionality provided for communications between multiple computing nodes of a virtual computer network by emulating functionality that would be provided by the networking devices if they were physically present. The networking functionality provided for a managed computer network may include supporting a connection between that managed computer network and one or more other managed computer networks, such as via a provided virtual peering router to which each of the managed computer networks may connect, with the functionality of the virtual peering router being emulated by modules of the configurable network service without physically providing the virtual peering router, including to manage routing communications between the inter-connected managed computer networks in accordance with client-specified configuration information.

    Abstract translation: 描述了用于提供被管理的虚拟计算机网络的技术,其被配置的逻辑网络拓扑可以具有一个或多个虚拟网络设备,诸如通过网络可访问的可配置网络服务,具有为虚拟计算机网络的多个计算节点之间的通信提供的相应的网络功能 通过模拟由网络设备提供的功能,如果它们是物理存在的。 为被管理的计算机网络提供的联网功能可以包括支持该被管理计算机网络与一个或多个其他被管理的计算机网络之间的连接,诸如经由所提供的虚拟对等路由器,每个被管理的计算机网络可以连接到该虚拟对等路由器与功能 虚拟对等路由器被可配置网络服务的模块仿真,而不物理地提供虚拟对等路由器,包括根据客户端指定的配置信息来管理连接在一起的被管理计算机网络之间的路由通信。

    Data transformation policies
    255.
    发明授权
    Data transformation policies 有权
    数据转换政策

    公开(公告)号:US09519696B1

    公开(公告)日:2016-12-13

    申请号:US14149702

    申请日:2014-01-07

    CPC classification number: G06F17/30569

    Abstract: Data transformation policies specify conditions based at least in part on request features. When a request is received, features of the received request are used to determine any data transformation policies applicable to the request. When a data transformation policy applies to the request, a corresponding data transformation is applied to data responsive to the request. A response to the request comprising transformed data is provided.

    Abstract translation: 数据转换策略至少部分地根据请求功能指定条件。 当接收到请求时,接收到的请求的特征被用于确定适用于请求的任何数据转换策略。 当数据转换策略适用于该请求时,相应的数据变换被应用于响应该请求的数据。 提供对包括变换数据的请求的响应。

    Securing results of privileged computing operations
    256.
    发明授权
    Securing results of privileged computing operations 有权
    保护特权计算操作的结果

    公开(公告)号:US09503268B2

    公开(公告)日:2016-11-22

    申请号:US13746780

    申请日:2013-01-22

    Abstract: A formalized set of interfaces (e.g., application programming interfaces (APIs)) is described, that uses a security scheme, such as asymmetric (or symmetric) cryptography, in order to secure the results of privileged operations on systems such as the operating system (OS) kernel and/or the hypervisor. The interface allows a public key to be included into a request to perform a privileged operation on a hypervisor and/or kernel. The kernel and/or hypervisor use the key included in the request to encrypt the results of the privileged operation. In some embodiments, the request itself can also be encrypted, such that any intermediate parties are not able to read the parameters and other information of the request.

    Abstract translation: 描述了一组形式化的接口(例如,应用程序编程接口(API)),其使用诸如不对称(或对称)密码学的安全方案,以便保护诸如操作系统的系统上的特权操作的结果 OS)内核和/或管理程序。 该接口允许将公钥包括在对管理程序和/或内核执行特权操作的请求中。 内核和/或管理程序使用请求中包含的密钥加密特权操作的结果。 在一些实施例中,请求本身也可被加密,使得任何中间方不能读取请求的参数和其他信息。

    Disabling administrative access to computing resources

    公开(公告)号:US09432374B1

    公开(公告)日:2016-08-30

    申请号:US13974407

    申请日:2013-08-23

    CPC classification number: H04L63/10 H04L29/02 H04L41/069 H04L41/28

    Abstract: Disclosed are various embodiments for disabling administrative access to computing resources. A customer request is obtained to disable administrative access of a provider to one or more computing devices. The provider supplies computing resources of the at least one computing device to the customer. The administrative access of the provider to the computing devices is disabled in response to the request. The administrative access of the provider remains disabled until a reset of the computing devices is performed.

Patent Agency Ranking