VIRTUAL SERVICE AUTHORIZATION
    72.
    发明申请

    公开(公告)号:US20220029993A1

    公开(公告)日:2022-01-27

    申请号:US17173584

    申请日:2021-02-11

    Abstract: A computing resource service provides flexible configuration of authorization rules. A set of authorization rules which define whether fulfillment of requests. The set of authorization rules are applied to a request of a first type which is mapped to a request of a second type. The request of the second type is used for fulfillment of the request of the first type when the authorization rules so allow.

    Revocable stream ciphers for upgrading encryption in a shared resource environment

    公开(公告)号:US10735186B2

    公开(公告)日:2020-08-04

    申请号:US16204391

    申请日:2018-11-29

    Abstract: Encryption of data across an environment, such as a shared resource environment, can be updated using keys generated using one or more revocable stream cipher algorithms. Data stored in the environment can be encrypted under a first key, or other such secret. When it is desired to update the encryption, a second key can be generated under which the data is to be re-encrypted. Instead of distributing the second key, a revocable stream cipher generator can generate an intermediate key based on the first and second keys, that when processed with the first key will produce the second key. Such an approach enables data to be re-encrypted under the second key without distributing the second key. Further, the unencrypted data will not be exposed in the process. In some embodiments, the re-encryption can be performed on an as-needed basis in order to reduce processing requirements.

    Latency-managed task processing
    78.
    发明授权

    公开(公告)号:US10579422B2

    公开(公告)日:2020-03-03

    申请号:US15285376

    申请日:2016-10-04

    Abstract: A method and apparatus for managing backlogged tasks are disclosed. In the method and apparatus, upon receiving a task pertaining to a requestor group, a number of outstanding tasks associated with the requestor group is determined and the task is submitted for processing if the number of outstanding tasks is within an allowable range. If the number of outstanding tasks is outside of the allowable range, take one or more actions may be taken, which may include rejecting the request.

    Trusted-code generated requests
    80.
    发明授权

    公开(公告)号:US10511633B2

    公开(公告)日:2019-12-17

    申请号:US15619979

    申请日:2017-06-12

    Abstract: Custom policies are definable for use in a system that enforces policies. A user, for example, may author a policy using a policy language and transmit the system through an application programming interface call. The custom policies may specify conditions for computing environment attestations that are provided with requests to the system. When a custom policy applies to a request, the system may determine whether information in the attestation is sufficient for the request to be fulfilled.

Patent Agency Ranking