Backlogged computing work exchange
    22.
    发明授权

    公开(公告)号:US10366358B1

    公开(公告)日:2019-07-30

    申请号:US14577693

    申请日:2014-12-19

    Abstract: A method and apparatus for providing a backlogged computing work exchange are provided. In the method and apparatus, a computer system receives a request, whereby satisfaction of the request requires enqueuing computing work, The computer system determines a queued computing work quota of a plurality of queued computing work quotas for use in enqueuing the computing work and submits the request for execution, whereby the request is associated with a second client and the queued computing work quota of the plurality of queued computing work quotas is associated with a first client different from the second client.

    Variable access to time block information

    公开(公告)号:US10339503B1

    公开(公告)日:2019-07-02

    申请号:US13655338

    申请日:2012-10-18

    Abstract: Access to calendar data indicating the state of time blocks is varied according to visibility conditions associated with at least some of the time blocks. Parameters for a meeting are used to determine a state in which to indicate a block of time, which may conflict with the meeting. The state may be either an occupied or unoccupied state.

    Cryptographic key escrow
    25.
    发明授权

    公开(公告)号:US10263792B2

    公开(公告)日:2019-04-16

    申请号:US15652161

    申请日:2017-07-17

    Abstract: An escrow platform is described that can be used to enable access to devices. The escrow platform can be used to sign cryptographic network protocol challenges on behalf of clients so that the secrets used to sign cryptographic network protocol challenges do not have to be exposed to the clients. The escrow platform can store or control access to private keys, and the corresponding public keys can be stored on respective target platforms. A client can attempt to access a target platform and in response the target platform can issue a challenge. The client platform can send the challenge to the escrow platform, which can use the corresponding private key to sign the challenge. The signed challenge can be sent back to the client, which can forward it to the target platform. The target platform can verify the expected private key and grant access.

    Secure management of information using a security module

    公开(公告)号:US10211977B1

    公开(公告)日:2019-02-19

    申请号:US13765283

    申请日:2013-02-12

    Abstract: A security module securely manages keys. The security module is usable to implement a cryptography service that includes a request processing component. The request processing component responds to requests by causing the security module to perform cryptographic operations that the request processing component cannot perform due to a lack of access to appropriate keys. The security module may be a member of a group of security modules that securely manage keys. Techniques for passing secret information from one security module to the other prevent unauthorized access to secret information.

    Multiple authority data security and access

    公开(公告)号:US10090998B2

    公开(公告)日:2018-10-02

    申请号:US15179827

    申请日:2016-06-10

    Abstract: A request to perform one or more operations using a second key that is inaccessible to a customer of a computing resource service provider is received from the customer, with the request including information that enables the computing resource service provider to select the second key from other keys managed on behalf of customers of the computing resource service provider. A first key, and in addition to the first key, an encrypted first key, is provided to the customer. Data encrypted under the first key is received from the customer. The encrypted first key and the data encrypted under the first key is caused to be stored in persistent storage, such that accessing the data, in plaintext form, from the persistent storage requires use of both a third key and the second key that is inaccessible to the customer.

Patent Agency Ranking