-
公开(公告)号:US20170134348A1
公开(公告)日:2017-05-11
申请号:US15410450
申请日:2017-01-19
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Eric Jason Brandwine , Brian Irl Pratt
CPC classification number: H04L63/0471 , G06F21/602 , G06F21/6218 , G06F2221/2101 , H04L9/0894 , H04L9/3242 , H04L9/3247 , H04L63/045 , H04L63/08 , H04L67/1097 , H04L2209/76
Abstract: A distributed computing environment utilizes a cryptography service. The cryptography service manages keys securely on behalf of one or more entities. The cryptography service is configured to receive and respond to requests to perform cryptographic operations, such as encryption and decryption. The requests may originate from entities using the distributed computing environment and/or subsystems of the distributed computing environment.
-
公开(公告)号:US20160285625A1
公开(公告)日:2016-09-29
申请号:US15179827
申请日:2016-06-10
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren
CPC classification number: H04L9/083 , G06F21/6209 , H04L9/0822 , H04L9/0825 , H04L9/0894 , H04L9/14 , H04L63/0435 , H04L63/06
Abstract: A request to perform one or more operations using a second key that is inaccessible to a customer of a computing resource service provider is received from the customer, with the request including information that enables the computing resource service provider to select the second key from other keys managed on behalf of customers of the computing resource service provider. A first key, and in addition to the first key, an encrypted first key, is provided to the customer. Data encrypted under the first key is received from the customer. The encrypted first key and the data encrypted under the first key is caused to be stored in persistent storage, such that accessing the data, in plaintext form, from the persistent storage requires use of both a third key and the second key that is inaccessible to the customer.
Abstract translation: 从客户接收到使用第二密钥执行一个或多个操作的请求,该第二密钥对于计算资源服务提供者的客户无法访问,该请求包括使得计算资源服务提供商能够从其他密钥中选择第二密钥的信息 代表计算资源服务提供商的客户管理。 第一个密钥,除了第一个密钥,加密的第一个密钥,被提供给客户。 从客户那里收到第一个密钥加密的数据。 使加密的第一密钥和在第一密钥下加密的数据被存储在永久存储器中,使得以明文形式从永久存储器访问数据需要使用无法访问的第三密钥和第二密钥 客户。
-
公开(公告)号:US12107897B1
公开(公告)日:2024-10-01
申请号:US17735017
申请日:2022-05-02
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Eric Jason Brandwine , Matthew James Wren
IPC: H04L9/40
CPC classification number: H04L63/20 , H04L63/0471 , H04L63/06
Abstract: A system comprises a data storage service includes a web service interface operating as a proxy to the data storage service. Data obtained at the data storage service is analyzed by one or more criteria of a data loss prevention policy, the data is encrypted by a key that is inaccessible to a remote service, and then the encrypted data is transmitted to the remote service.
-
公开(公告)号:US11695555B2
公开(公告)日:2023-07-04
申请号:US16869423
申请日:2020-05-07
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Eric Jason Brandwine , Brian Irl Pratt
CPC classification number: H04L9/088 , H04L9/0618 , H04L9/0643 , H04L9/0891 , H04L9/14 , H04L9/30 , H04L9/321 , H04L9/3247
Abstract: A system uses information submitted in connection with a request to determine if and how to process the request. The information may be electronically signed by a requestor using a key such that the system processing the request can verify that the requestor has the key and that the information is authentic. The information may include information that identifies a holder of a key needed for processing the request, where the holder of the key can be the system or another, possibly third party, system.
-
公开(公告)号:US11431757B2
公开(公告)日:2022-08-30
申请号:US16880886
申请日:2020-05-21
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Brian Irl Pratt
Abstract: A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the customer to the first service. To process the request, the second service evaluates one or more policies to determine whether fulfillment of the request is allowed by policy associated with the customer. The one or more policies may state one or more conditions on one or more services that played a role in submission of the request. If determined that the policy allows fulfillment of the request, the second service fulfills the request.
-
公开(公告)号:US11323479B2
公开(公告)日:2022-05-03
申请号:US16046582
申请日:2018-07-26
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Eric Jason Brandwine , Matthew James Wren
Abstract: A system comprises a data storage service includes a web service interface operating as a proxy to the data storage service. Data obtained at the data storage service is analyzed by one or more criteria of a data loss prevention policy, the data is encrypted by a key that is inaccessible to a remote service, and then the encrypted data is transmitted to the remote service.
-
公开(公告)号:US11036869B2
公开(公告)日:2021-06-15
申请号:US15173523
申请日:2016-06-03
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Eric Jason Brandwine , Brian Irl Pratt
Abstract: A security module securely manages keys. The security module is usable to implement a cryptography service that includes a request processing component. The request processing component responds to requests by causing the security module to perform cryptographic operations that the request processing component cannot perform due to a lack of access to appropriate keys. The security module may be a member of a group of security modules that securely manage keys. Techniques for passing secret information from one security module to the other prevent unauthorized access to secret information.
-
公开(公告)号:US20200287942A1
公开(公告)日:2020-09-10
申请号:US16880886
申请日:2020-05-21
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Brian Irl Pratt
Abstract: A first service submits a request to a second service on behalf of a customer of a service provider. The request may have been triggered by a request of the customer to the first service. To process the request, the second service evaluates one or more policies to determine whether fulfillment of the request is allowed by policy associated with the customer. The one or more policies may state one or more conditions on one or more services that played a role in submission of the request. If determined that the policy allows fulfillment of the request, the second service fulfills the request.
-
公开(公告)号:US10601789B2
公开(公告)日:2020-03-24
申请号:US15823450
申请日:2017-11-27
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Matthew James Wren , Eric Jason Brandwine , Brian Irl Pratt
Abstract: A plurality of devices are each operable to provide information that is usable for to prove authorization with any of the other devices. The devices may have common access to a cryptographic key. A device may use the cryptographic key to encrypt a session key and provide both the session key and the encrypted session key. Requests to any of the devices can include the encrypted session key and a digital signature generated using the session key. In this manner, a device that receives the request can decrypt the session key and use the decrypted session key to verify the digital signature.
-
公开(公告)号:US20180359282A1
公开(公告)日:2018-12-13
申请号:US16046582
申请日:2018-07-26
Applicant: Amazon Technologies, Inc.
Inventor: Gregory Branchek Roth , Eric Jason Brandwine , Matthew James Wren
IPC: H04L29/06
CPC classification number: H04L63/20 , H04L63/0471 , H04L63/06
Abstract: A system comprises a data storage service includes a web service interface operating as a proxy to the data storage service. Data obtained at the data storage service is analyzed by one or more criteria of a data loss prevention policy, the data is encrypted by a key that is inaccessible to a remote service, and then the encrypted data is transmitted to the remote service.
-
-
-
-
-
-
-
-
-