Location-aware security configuration of peripheral devices

    公开(公告)号:US10027678B1

    公开(公告)日:2018-07-17

    申请号:US15084367

    申请日:2016-03-29

    Abstract: Provided are systems and methods for location-aware security configuration of peripheral devices. In various implementations, a location-aware peripheral device comprises an interface and a configuration engine. The interface may communicatively couple the peripheral device to a computing system. The configuration engine may be configured to, upon powering on in the computing system, detect a characteristic of the computing system. In some implementations, the configuration engine may further select a trust level for the computing system. In some implementations, selecting a trust level may include using the detected characteristic to identify a profile stored on the peripheral device. The profile may describe a pre-determined computing system. The configuration engine may further be configured to program the peripheral device with a configuration that is associated with the selected trust level. The configuration may program a feature of the peripheral device.

    HOST ATTESTATION
    332.
    发明申请
    HOST ATTESTATION 审中-公开

    公开(公告)号:US20180181756A1

    公开(公告)日:2018-06-28

    申请号:US15389771

    申请日:2016-12-23

    Abstract: A service provider provides virtual computing services using a fleet of one or more host computer systems. Each of the host computer systems may be equipped with a trusted platform module (“TPM”). The service provider, the host computer systems, and the virtual computing environments generate attestations that prove the integrity of the system. The attestations are signed with a one-time-use cryptographic key that is verifiable against the public keys of the service provider, a host computer system, and a virtual computing environment. The public key of the host computer system is integrated into a hash tree that links the public key of the host computer system to the public key of the service provider. The public key of the virtual computing environment is signed using a one-time-use graphic key issued to the host computer system that hosts the virtual computing environment.

    Virtualized computing resource scheduler

    公开(公告)号:US09992139B1

    公开(公告)日:2018-06-05

    申请号:US14040464

    申请日:2013-09-27

    CPC classification number: G06Q10/107 H04L51/12 H04L51/18

    Abstract: A technology to schedule a virtualized computing resource is described. A scheduling request electronic message is received. The scheduling request electronic message has a resource identifier, an action and a trigger condition. The scheduling request is authenticated by verifying a sender of the scheduling request is on an approved list defined for the virtualized computing resource, using an electronic challenge sent to a requestor of the scheduling request electronic message. An action is performed on the virtualized computing resource referenced by the resource identifier when the trigger condition is met.

    VIRTUAL SERVICE PROVIDER ZONES
    335.
    发明申请

    公开(公告)号:US20180025168A1

    公开(公告)日:2018-01-25

    申请号:US15712043

    申请日:2017-09-21

    Abstract: A service proxy services as an application programming interface proxy to a service, which may involve data storage. When a request to store data is received by the service proxy, the service proxy encrypts the data and stores the data in encrypted form at the service. Similarly, when a request to retrieve data is received by the service proxy, the service proxy obtains encrypted data from the service and decrypts the data. The data may be encrypted using a key that is kept inaccessible to the service.

    TRUSTED-CODE GENERATED REQUESTS
    338.
    发明申请

    公开(公告)号:US20170279855A1

    公开(公告)日:2017-09-28

    申请号:US15619979

    申请日:2017-06-12

    Abstract: Custom policies are definable for use in a system that enforces policies. A user, for example, may author a policy using a policy language and transmit the system through an application programming interface call. The custom policies may specify conditions for computing environment attestations that are provided with requests to the system. When a custom policy applies to a request, the system may determine whether information in the attestation is sufficient for the request to be fulfilled.

    Using transient processing containers for security authorization

    公开(公告)号:US09756050B1

    公开(公告)日:2017-09-05

    申请号:US14669636

    申请日:2015-03-26

    CPC classification number: H04L47/70 H04L63/102

    Abstract: Authorization decisions can be made in a resource environment using authorization functions which can be provided by customers, third parties, or other such entities. The functions can be implemented using virtual machine instances with one or more transient compute containers. This compute capacity can be preconfigured with certain software and provided using existing compute capacity assigned to a customer, or capacity invoked from a warming pool, to execute the appropriate authorization function. The authorization function can be a lambda function that takes in context and generates the appropriate security functionality inline. The utilization of ephemeral compute capacity enables the functionality to be provided on demand, without requiring explicit naming or identification, and can enable cause state information to be maintained for a customer.

Patent Agency Ranking