Rapid deployment of computing instances

    公开(公告)号:US10324701B1

    公开(公告)日:2019-06-18

    申请号:US14832906

    申请日:2015-08-21

    Abstract: Technology for rapid deployment of computing instances from images is provided. In one example, a method may include instantiating a base computing instance and building an application layer on the base computing instance to create a modified computing instance. A machine image of the modified computing instance may be saved. The modified computing instance may be instantiated based on the machine image and a customer-defined configuration may be applied to the modified computing instance to obtain a configured computing instance.

    Managing pooled client-premise resources via provider-defined interfaces
    23.
    发明授权
    Managing pooled client-premise resources via provider-defined interfaces 有权
    通过提供商定义的接口管理池化的客户端资源

    公开(公告)号:US09485323B1

    公开(公告)日:2016-11-01

    申请号:US14034331

    申请日:2013-09-23

    Abstract: Methods and apparatus for managing pooled client-premise resources via provider-defined interfaces are described. A pool management request is received from a client via a programmatic interface implemented at a provider network, indicating at least one resource located at a data center external to the provider network. An activation status of the resource within a pool is to be managed by a service of the provider network. A network connection between an administrative resource of the service, located within the provider network, and a control module instantiated on behalf of the service at the external data center is established. A command is transmitted from the administrative resource to the control module to activate the particular resource.

    Abstract translation: 描述了通过供应商定义的接口管理池化客户端资源的方法和装置。 通过在提供商网络实现的编程接口从客户端接收池管理请求,指示位于提供商网络外部的数据中心处的至少一个资源。 池中的资源的激活状态由供应商网络的服务来管理。 建立位于提供者网络内的服务的管理资源与代表外部数据中心的服务实例化的控制模块之间的网络连接。 从管理资源向控制模块发送命令以激活特定资源。

    Salt value service
    24.
    发明授权
    Salt value service 有权
    盐价值服务

    公开(公告)号:US09246686B1

    公开(公告)日:2016-01-26

    申请号:US14307357

    申请日:2014-06-17

    Abstract: A technology is described for a salt service. An example method may include generating a salt value and a salt identifier used to reference the salt value in response to a salt value setup request. Storing the salt value in a data store where the salt value may be referenced by the salt identifier. The salt value and the salt identifier may then be provided in response to the salt value setup request to enable the salt identifier to be stored in association with a first hash value generated from the salt value and a customer password for future customer authentications. In response to an authentication request, the salt value may be retrieved from the data store and the salt value may be provided, enabling customer authentication to be performed by comparing the first hash value with a second hash value generated from the salt value and a customer password.

    Abstract translation: 描述了一种盐业务的技术。 示例性方法可以包括响应于盐值设置请求产生盐值和用于引用盐值的盐标识符。 将盐值存储在盐值可以由盐标识符引用的数据存储中。 然后可以响应于盐值设置请求提供盐值和盐标识符,以使得能够将盐标识符与从盐值生成的第一散列值和用于未来客户认证的客户密码相关联地存储。 响应于认证请求,可以从数据存储器检索盐值,并且可以提供盐值,使得可以通过将第一散列值与从盐值生成的第二散列值进行比较来执行客户认证,并且客户 密码。

    Software container recommendation service
    26.
    发明授权
    Software container recommendation service 有权
    软件容器推荐服务

    公开(公告)号:US09122562B1

    公开(公告)日:2015-09-01

    申请号:US14309517

    申请日:2014-06-19

    Abstract: A technology is described for a software container recommendation service. An example method may include collecting utilization metrics for an application hosted on a computing instance. The utilization metrics may be a measure of computing resources used by the application. The utilization metrics may be analyzed to determine a level of computing resources for the computing instance used by the application. A software container configuration for the application may be determined based at least in part on the utilization metrics when analysis of the utilization metrics indicates an underutilization of computing resources by the application. The specifications of the software container configuration may then be provided to a customer.

    Abstract translation: 软件容器推荐服务描述了一种技术。 示例性方法可以包括收集托管在计算实例上的应用的利用度量。 利用度量可以是应用程序使用的计算资源的度量。 可以分析利用度量以确定应用程序使用的计算实例的计算资源的级别。 至少部分地基于使用度量来确定用于应用的软件容器配置,当分析利用度量指示应用程序计算资源的利用不足时。 然后可以向客户提供软件容器配置的规格。

    Account recovery
    27.
    发明授权

    公开(公告)号:US11349832B2

    公开(公告)日:2022-05-31

    申请号:US16824383

    申请日:2020-03-19

    Abstract: A user-promotion process allows a service provider to grant the security roles associated with a target user account to a requester by obtaining approvals from a quorum of approving users. The quorum requirements and the identity of the approving users may be established by the target user or an account manager. Upon receiving, from a promotion candidate, a request to assume security roles of a target user, the service provider identifies the approving users from the target user's account record. Approvals are requested from the approving users, and if a quorum of approvals is received by the service provider, the promotion candidate is allowed to assume the roles of the target user. If a quorum of approvals is not received, then substitute approving users may be identified based at least in part on those approving users that did not respond to the approval request.

    Secure time service
    28.
    发明授权

    公开(公告)号:US11310208B1

    公开(公告)日:2022-04-19

    申请号:US15853556

    申请日:2017-12-22

    Abstract: Methods and apparatus for a secure time service are disclosed. A time server including a time source, a cryptographic key and a cryptographic engine is instantiated within a provider network. A time service endpoint receives a timestamp request from a client. The endpoint transmits a representation of the request to the time server, and receives, from the time server, an encryption of at least a timestamp generated using the time source. A response comprising the encryption of at least the timestamp is transmitted to the requesting client.

    Identifying attacks on file systems

    公开(公告)号:US11170104B1

    公开(公告)日:2021-11-09

    申请号:US14832899

    申请日:2015-08-21

    Abstract: Technology is described for preventing cryptovirus attacks in a computing service environment. Data patterns of both read and write operations are monitored for files during a predetermined time period. The data patterns related to the files are recorded during the monitoring. A machine learning model is constructed according to the recorded data to establish a data change probability for the plurality of files. An unexpected change is detected using the machine learning model according to the data change probability of the files having changed data. A warning notification is sent indicating the unexpected change is detected for the files.

Patent Agency Ranking