System and method for recognizing malicious credential guessing attacks
    21.
    发明授权
    System and method for recognizing malicious credential guessing attacks 有权
    识别恶意凭据猜测攻击的系统和方法

    公开(公告)号:US09276919B1

    公开(公告)日:2016-03-01

    申请号:US13940625

    申请日:2013-07-12

    Abstract: In certain embodiments, a system having a memory and a processor. The memory is operable to store a credential verifier associated with a user account and a counter. The processor is coupled to the memory and the memory includes executable instructions that cause the system to receive a first authentication attempt and increment the counter if validation of the first authentication attempt against the credential verifier fails. The instructions also cause the system to receive a second authentication attempt and increment the counter only if validation of the second authentication attempt against the credential verifier fails and the second authentication attempt is distinct from the first authentication attempt.

    Abstract translation: 在某些实施例中,具有存储器和处理器的系统。 存储器可操作地存储与用户帐户和计数器相关联的凭证验证器。 处理器耦合到存储器,并且存储器包括可执行指令,其使得系统接收第一认证尝试,并且如果针对证书验证器的第一认证尝试的验证失败则递增计数器。 指令还使得系统接收第二认证尝试,并且只有当对证书验证者的第二认证尝试的验证失败并且第二认证尝试与第一认证尝试不同时才递增计数器。

    Managing use of software components

    公开(公告)号:US12051096B2

    公开(公告)日:2024-07-30

    申请号:US16532267

    申请日:2019-08-05

    CPC classification number: G06Q30/06

    Abstract: Techniques are described for facilitating use of software components by software applications in a configurable manner. In some situations, the software components are fee-based components that are made available by providers of the components for use by others in exchange for fees defined by the components providers, and in at least some situations, the software components may have various associated restrictions or other non-price conditions related to their use. The described techniques facilitate use of such software components by software applications in a configured manner. Furthermore, in at least some situation, the execution of such software applications is managed by an application deployment system that controls and tracks the execution of the software application on one or more computing nodes, including to manage the execution of any software components that are part of the software application.

    Optimized deployment based upon customer locality

    公开(公告)号:US11604667B2

    公开(公告)日:2023-03-14

    申请号:US16671627

    申请日:2019-11-01

    Abstract: The deployment of content and computing resources for implementing a distributed software application can be optimized based upon customer location. The volume and geographic origin of incoming requests for a distributed software application are determined. Based upon the volume and geographic origin of the incoming requests, content and/or one or more instances of the distributed software application may be deployed to a geographic region generating a significant volume of requests for the distributed software application. Content and/or instances of a distributed software application might also be speculatively deployed to a geographic region in an attempt to optimize the performance, cost, or other attribute of a distributed software application.

    Managing deletion of data in a data storage system

    公开(公告)号:US10762044B2

    公开(公告)日:2020-09-01

    申请号:US14981700

    申请日:2015-12-28

    Abstract: In certain embodiments, a system comprises a memory and a processor communicatively coupled to the memory. The memory includes executable instructions that upon execution cause the system to generate, at a first time, a first snapshot capturing data stored in storage units of a storage device. The executable instructions upon execution cause the system to receive an indication to delete at least a portion of the data in the storage units and captured by the first snapshot, and to mark, in response to receiving the indication, the one or more storage units that store the at least a first portion of the data as available. The executable instructions upon execution cause the system to generate, at a second time subsequent to the first time, a second snapshot that omits the one or more storage units marked as available.

    OPTIMIZED DEPLOYMENT BASED UPON CUSTOMER LOCALITY

    公开(公告)号:US20200065132A1

    公开(公告)日:2020-02-27

    申请号:US16671627

    申请日:2019-11-01

    Abstract: The deployment of content and computing resources for implementing a distributed software application can be optimized based upon customer location. The volume and geographic origin of incoming requests for a distributed software application are determined. Based upon the volume and geographic origin of the incoming requests, content and/or one or more instances of the distributed software application may be deployed to a geographic region generating a significant volume of requests for the distributed software application. Content and/or instances of a distributed software application might also be speculatively deployed to a geographic region in an attempt to optimize the performance, cost, or other attribute of a distributed software application.

    Conditioned use of certificates
    27.
    发明授权

    公开(公告)号:US10210510B1

    公开(公告)日:2019-02-19

    申请号:US15692678

    申请日:2017-08-31

    Abstract: Identity certificates such as SSL certificates can be issued in such a way that their use can be disabled upon short notice. In one embodiment, private signing information associated with a certificate is used by an infrastructure service on behalf of an entity, without making the private signing information accessible to the entity. In another embodiment, short-term certificates are dynamically issued to an application based on a previous certificate authorization.

    COMPUTER-IMPLEMENTED OBJECT MANAGEMENT VIA TAGS

    公开(公告)号:US20180067951A1

    公开(公告)日:2018-03-08

    申请号:US15804889

    申请日:2017-11-06

    CPC classification number: G06F16/122 G06F16/907 G06F16/951

    Abstract: Systems and methods are provided for managing objects. In one implementation, a computer-implemented method is provided. The method includes receiving a query comprising a tag and executing the query. An object identifier is retrieved from a data table, based on the tag. The method further returns a result of the query. The result includes the object identifier that was retrieved from the data table. The method further performing an action related to an object having the retrieved object identifier.

    Resource placement templates for virtual networks

    公开(公告)号:US09641450B1

    公开(公告)日:2017-05-02

    申请号:US13936097

    申请日:2013-07-05

    Abstract: With the advent of virtualization technologies, networks and routing for those networks can now be simulated using commodity hardware. For example, virtualization technologies can be adapted to allow a single physical computing machine to be shared among multiple virtual networks by providing one or more virtual machines simulated in software by the single physical computing machine, with each virtual machine acting as a distinct logical computing system. In addition, as routing can be accomplished through software, additional network setup flexibility can be provided to the virtual network in comparison with hardware-based routing. In some implementations, virtual network setup can be abstracted through the use of resource placement templates, allowing users to create virtual networks compliant with a customer's networking policies without necessarily having knowledge of what those policies are.

    Deploying updates to an application during periods of off-peak demand
    30.
    发明授权
    Deploying updates to an application during periods of off-peak demand 有权
    在非高峰需求期间部署到应用程序的更新

    公开(公告)号:US09235401B2

    公开(公告)日:2016-01-12

    申请号:US14518768

    申请日:2014-10-20

    CPC classification number: G06F8/65 G06F9/45533 H04L67/10

    Abstract: Update preferences might be utilized to specify that an update to an application should not be applied until the demand for the application falls below a certain threshold. Demand for the application is monitored. The update to the application is applied when the actual demand for the application falls below the specified threshold. The threshold might be set such that updates are deployed during the off-peak periods of demand encountered during a regular demand cycle, such as a diurnal, monthly, or yearly cycle.

    Abstract translation: 可以使用更新偏好来指定在应用程序的需求下降到特定阈值之前不应用应用程序的更新。 对应用程序的需求进行监控。 当应用程序的实际需求低于指定阈值时,应用对应用程序的更新。 可以设置阈值,使得在正常需求周期(例如昼夜,每月或每年周期)遇到的需求的非高峰期期间部署更新。

Patent Agency Ranking