USE OF FREEFORM METADATA FOR ACCESS CONTROL
    282.
    发明申请
    USE OF FREEFORM METADATA FOR ACCESS CONTROL 有权
    使用FREEFORM元数据进行访问控制

    公开(公告)号:US20140208414A1

    公开(公告)日:2014-07-24

    申请号:US13747224

    申请日:2013-01-22

    CPC classification number: G06F21/6218 G06F2221/2149

    Abstract: Approaches are described for security and access control for computing resources. Various embodiments utilize metadata, e.g., tags that can be applied to one or more computing resources (e.g., virtual machines, host computing devices, applications, databases, etc.) to control access to these and/or other computing resources. In various embodiments, the tags and access control policies described herein can be utilized in a multitenant shared resource environment.

    Abstract translation: 描述了用于计算资源的安全和访问控制的方法。 各种实施例利用元数据,例如可以应用于一个或多个计算资源(例如,虚拟机,主机计算设备,应用程序,数据库等)的标签来控制对这些和​​/或其他计算资源的访问。 在各种实施例中,本文描述的标签和访问控制策略可以在多租户共享资源环境中使用。

    Managing allocation of computing capacity
    283.
    发明授权
    Managing allocation of computing capacity 有权
    管理计算能力的分配

    公开(公告)号:US08667499B2

    公开(公告)日:2014-03-04

    申请号:US13946943

    申请日:2013-07-19

    CPC classification number: H04L43/04 G06F9/505

    Abstract: Systems and methods are described for managing requests for computing capacity from a provider of computing resources. The computing resources may include program execution capabilities, data storage or management capabilities, network bandwidth, etc. In some implementations, user requests are probabilistically denied or granted while some computing resources are still available. By denying some requests or granting only some, the rate of computing resource usage can be reduced, thus preserving some capacity for a longer period of time. In one embodiment, the capacity can be provided to clients based on client priority, provided to clients with reserved resources, provided to clients probabilistically, sold on a spot market, or allocated in some other fashion.

    Abstract translation: 描述了用于管理来自计算资源提供商的计算能力请求的系统和方法。 计算资源可以包括程序执行能力,数据存储或管理能力,网络带宽等。在一些实现中,在某些计算资源仍然可用的情况下,概率地拒绝或授予用户请求。 通过拒绝一些请求或仅授予一些请求,可以减少计算资源使用率,从而在较长时间内保留一些容量。 在一个实施例中,可以基于客户端优先级向客户端提供容量,提供给具有预留资源的客户端,概率地提供给客户,在现货市场上出售或以某种其他方式分配。

    Automated configuration change of virtual machines in a computing node group

    公开(公告)号:US12238165B2

    公开(公告)日:2025-02-25

    申请号:US18403626

    申请日:2024-01-03

    Abstract: Techniques are described for providing managed computer networks, such as for managed virtual computer networks overlaid on one or more other underlying computer networks. In some situations, the techniques include facilitating replication of a primary computing node that is actively participating in a managed computer network, such as by maintaining one or more other computing nodes in the managed computer network as replicas, and using such replica computing nodes in various manners. For example, a particular managed virtual computer network may span multiple broadcast domains of an underlying computer network, and a particular primary computing node and a corresponding remote replica computing node of the managed virtual computer network may be implemented in distinct broadcast domains of the underlying computer network, with the replica computing node being used to transparently replace the primary computing node in the virtual computer network if the primary computing node becomes unavailable.

    Detecting anomalous I/O patterns indicative of ransomware attacks

    公开(公告)号:US12086250B1

    公开(公告)日:2024-09-10

    申请号:US17548261

    申请日:2021-12-10

    CPC classification number: G06F21/566 G06F13/20 G06F2213/40 G06F2221/034

    Abstract: Techniques are described for monitoring and analyzing input/output (I/O) messages for patterns indicative of ransomware attacks affecting computer systems of a cloud provider, and for performing various remediation actions to mitigate data loss once a potential ransomware attack is detected. The monitoring of I/O activity for such patterns is performed at least in part by I/O proxy devices coupled to computer systems of a cloud provider network, where an I/O proxy device is interposed in the I/O path between guest operating systems running on a computer system and storage devices to which I/O messages are destined. An I/O proxy device can analyze I/O messages for patterns indicative of potential ransomware attacks by monitoring for anomalous I/O patterns which may, e.g., be indicative of a malicious process attempting to encrypt or otherwise render in accessible a significant portion of one or more storage volumes as part of a ransomware attack.

    Virtual provisioning with implementation resource boundary awareness

    公开(公告)号:US11842208B2

    公开(公告)日:2023-12-12

    申请号:US17460718

    申请日:2021-08-30

    Abstract: Virtual resources may be provisioned in a manner that is aware of, and respects, underlying implementation resource boundaries. A customer of the virtual resource provider may specify that particular virtual resources are to be implemented with implementation resources that are dedicated to the customer. Dedicating an implementation resource to a particular customer of a virtual resource provider may establish one or more information barriers between the particular customer and other customers of the virtual resource provider. Implementation resources may require transition procedures, including custom transition procedures, to enter and exit dedicated implementation resource pools. Costs corresponding to active and inactive implementation resources in a dedicated pools associated with a particular customer may be accounted for, and presented to, the customer in a variety of ways including explicit, adjusted per customer and adjusted per type of virtual resource and/or implementation resource.

    Managing virtual computing testing
    290.
    发明授权

    公开(公告)号:US11522896B2

    公开(公告)日:2022-12-06

    申请号:US14574183

    申请日:2014-12-17

    Abstract: Systems, methods, and interfaces for the management of virtual machine instances and other programmatically controlled networks are provided. The hosted virtual networks are configured in a manner such that a virtual machine manager of the virtual network may monitor activity such as user requests, network traffic, and the status and execution of various virtual machine instances to determine possible security assessments. Aspects of the virtual network may be assessed for vulnerabilities at varying levels of granularity and sophistication when a suspicious event or triggering activity is detected. Illustrative embodiments of the systems and methods may be implemented on a virtual network overlaid on one or more intermediate physical networks that are used as a substrate network.

Patent Agency Ranking