-
公开(公告)号:US10810055B1
公开(公告)日:2020-10-20
申请号:US15842616
申请日:2017-12-14
Applicant: Amazon Technologies, Inc.
Inventor: David Walker
Abstract: Calls, such as API calls to a resource provider environment, can be modeled and evaluated using a shadow environment before executing the call in an actual target environment. Such an approach ensures that any changes made as a result of executing the call will not cause the actual environment to be out of compliance with any relevant rules or regulations. Changes may typically be reflected in a configuration management database. A shadow copy of this database can be generated, and the call can first be modeled in this shadow copy. Shadow log entries including results of the processing can be generated and evaluated. If the changes would be compliant then the call can be transmitted to the actual API endpoint for the target environment, where the API call can be executed.
-
公开(公告)号:US10972580B1
公开(公告)日:2021-04-06
申请号:US15839565
申请日:2017-12-12
Applicant: Amazon Technologies, Inc.
Inventor: Bertram U. Dorn , David Walker
Abstract: A system intercepts, at an application programming interface (API) gateway, a request for access to a computing resource and obfuscates metadata associated with the request. The metadata is obfuscated by at least encrypting the metadata to generate encrypted metadata. The API gateway further generates a second request to include the encrypted metadata. The second request is then used to access the computing resource in response to the first request such that when the computing resource is accessed, the metadata associated with the computing resource is encrypted.
-
公开(公告)号:US20210044590A1
公开(公告)日:2021-02-11
申请号:US16941121
申请日:2020-07-28
Applicant: Amazon Technologies, Inc.
Inventor: David Walker , Bertram Dorn
Abstract: Approaches provide for mandatory access controls and account identification masking controls in an electronic environment. For example, a customer can configure a client device to access an API gateway which acts as a proxy for a resource in a resource provider environment. Requests for resources or services can be redirected to the API gateway. A registered function may be triggered when the request is received and may filter the request. After filtering, the request can be forwarded on to the actual API endpoint to access the requested resource. From the client's perspective, the resource is being accessed directly, and from the resource's perspective, it is being accessed by the proxy. This layer of indirection enables data to be protected preemptively, rather than waiting for an undesirable condition to exist and then reactively attending to the issue. Additionally, log data may be redacted and/or masked automatically as it is created, protecting sensitive data before it is accessible to administrators or other users.
-
公开(公告)号:US10740151B1
公开(公告)日:2020-08-11
申请号:US16113629
申请日:2018-08-27
Applicant: Amazon Technologies, Inc.
Inventor: Ryan Washington , Joe W. Pate , David Walker , Scott Conrad , Mikhail Sosonkin , Matthew Evans , Nathan Kevin McCarthy , Hugo Gabignon , Victor Chin , Joel Naomi Cornett , Joshua Stephen Du Lac
Abstract: Systems, methods, and computer-readable media are disclosed for systems and methods for parallelized forensic analysis using cloud-based servers. Example methods may include generating a first request for one or more notifications in a notification queue, where the one or more notifications include a first notification indicative of a first data input at a datastore, determining a first data type of the first data input, and generating a second notification indicative of the first data type. Some example methods may include determining that a first software component is subscribed to notifications for the first data type, sending the second notification to the first software component, determining a first output of the first software component, where the first output comprises a set of extracted data from the first data input, and sending the set of extracted data to the datastore.
-
公开(公告)号:US10481963B1
公开(公告)日:2019-11-19
申请号:US15197700
申请日:2016-06-29
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: David Walker
Abstract: A system for servicing a request in a distributed computing environment includes a plurality of computing devices configurable to implement a first compute instance group. The first instance group includes a first plurality of compute instances of a provider network. One or more of the computing devices is configured to implement a first network device that is configured to receive a first service request from a client directed to an application and to provide the first service request to each of the first plurality of compute instances. The application is run on each of the first plurality of compute instances.
-
公开(公告)号:US10922152B2
公开(公告)日:2021-02-16
申请号:US16291819
申请日:2019-03-04
Applicant: Amazon Technologies, Inc.
Inventor: Jegan Chen , Charles Michael Hutchins Curran , Ross Alan Cameron Gardner , Derric L. McGarrah , Bradley Rebh , Carlin Michael Rogers, II , Syed Suhaib Sarmad Barbero , Luis Rene Sempe Sosa , David Walker
Abstract: A visual scripting system can provide support for handling event-specific messages received through an event messaging system. The messaging system can provide event messages over one or more event buses that have a determined behavior context. An event node of a visual scripting system can enable a developer to specify event handlers to detect specific types of event notifications sent on a specified event bus, as well as specific actions to be taken in response to those event notifications, such as to send additional event messages, all of which comply with the behavior context. Once the event node is configured and properties and actions defined, the corresponding script can be generated by the visual scripting system, to be complied and executed as part of a user application.
-
公开(公告)号:US10771468B1
公开(公告)日:2020-09-08
申请号:US15384044
申请日:2016-12-19
Applicant: Amazon Technologies, Inc.
Inventor: David Walker , Bertram Dorn
Abstract: Approaches provide for mandatory access controls and account identification masking controls in an electronic environment. For example, a customer can configure a client device to access an API gateway which acts as a proxy for a resource in a resource provider environment. Requests for resources or services can be redirected to the API gateway. A registered function may be triggered when the request is received and may filter the request. After filtering, the request can be forwarded on to the actual API endpoint to access the requested resource. From the client's perspective, the resource is being accessed directly, and from the resource's perspective, it is being accessed by the proxy. This layer of indirection enables data to be protected preemptively, rather than waiting for an undesirable condition to exist and then reactively attending to the issue. Additionally, log data may be redacted and/or masked automatically as it is created, protecting sensitive data before it is accessible to administrators or other users.
-
公开(公告)号:US10223176B1
公开(公告)日:2019-03-05
申请号:US15783672
申请日:2017-10-13
Applicant: Amazon Technologies, Inc.
Inventor: Jegan Chen , Charles Michael Hutchins Curran , Ross Alan Cameron Gardner , Derric McGarrah , Bradley Rebh , Carlin Michael Rogers, II , Syed Suhaib Sarmad Barbero , Luis Rene Sempe Sosa , David Walker
Abstract: A visual scripting system can provide support for handling event-specific messages received through an event messaging system. The messaging system can provide event messages over one or more event buses that have a determined behavior context. An event node of a visual scripting system can enable a developer to specify event handlers to detect specific types of event notifications sent on a specified event bus, as well as specific actions to be taken in response to those event notifications, such as to send additional event messages, all of which comply with the behavior context. Once the event node is configured and properties and actions defined, the corresponding script can be generated by the visual scripting system, to be complied and executed as part of a user application.
-
公开(公告)号:US10095549B1
公开(公告)日:2018-10-09
申请号:US14869494
申请日:2015-09-29
Applicant: Amazon Technologies, Inc.
Inventor: Sean Michael Needham , Attila Narin , David Walker
IPC: H04L12/911 , G06F9/50 , H04L29/08 , H04L29/06
Abstract: Technology is described for providing an ownership transfer service in virtual computing service environment. Computing resources under the control of one or multiple customers are stored in an ownership transfer account. Workflows based on a pre-defined set of triggers for releasing the computing resources from the ownership transfer account are established. Exclusive control over the computing resources may be transferred from the single or multiple customers to at least one of the multiple customers or to a receiving customer according to a triggering event. The exclusive control over the computing resources from one or at least one of the multiple customers is terminated upon occurrence of one of the pre-defined set of triggers or temporary control is granted based on rules such as time periods.
-
公开(公告)号:US20190196886A1
公开(公告)日:2019-06-27
申请号:US16291819
申请日:2019-03-04
Applicant: Amazon Technologies, Inc.
Inventor: Jegan Chen , Charles Michael Hutchins Curran , Ross Alan Cameron Gardner , Derric L. McGarrah , Bradley Rebh , Carlin Michael Rogers, II , Syed Suhaib Sarmad Barbero , Luis Rene Sempe Sosa , David Walker
Abstract: A visual scripting system can provide support for handling event-specific messages received through an event messaging system. The messaging system can provide event messages over one or more event buses that have a determined behavior context. An event node of a visual scripting system can enable a developer to specify event handlers to detect specific types of event notifications sent on a specified event bus, as well as specific actions to be taken in response to those event notifications, such as to send additional event messages, all of which comply with the behavior context. Once the event node is configured and properties and actions defined, the corresponding script can be generated by the visual scripting system, to be complied and executed as part of a user application.
-
-
-
-
-
-
-
-
-