Managing security in isolated network environments

    公开(公告)号:US11496519B1

    公开(公告)日:2022-11-08

    申请号:US16699320

    申请日:2019-11-29

    Abstract: Security can be provided for data stored using resources that are deployed in an environment managed by a third party. Physical and logical detection mechanisms can be used to monitor various security aspects, and the resulting security data can be used to identify potential threats to these resources. In some embodiments, suspicious activity can cause resources such as data servers to be automatically and remotely rebooted such that keys stored in volatile memory on those data servers will be lost from those servers, such that an attacker will be unable to decrypt data stored on those servers. Once a determination of safety is made, the keys can be provided to the respective data servers such that data operations can resume.

    Chaining virtual machines
    6.
    发明授权

    公开(公告)号:US11366681B2

    公开(公告)日:2022-06-21

    申请号:US16366998

    申请日:2019-03-27

    Abstract: A request to perform a workflow is received. A first instance is caused to be instantiated to perform a first portion of the workflow. First information and a handle associated with a second snapshot is received from the first instance. The first information is processed to produce a first result. A second instance is caused to be instantiated based on the handle to perform a second portion of the workflow. Second information is received from the second instance. The second information is processed to produce a second result, and an operation is performed dependent at least on the first result or the second result.

    CONTINUATION WORKFLOWS
    10.
    发明申请

    公开(公告)号:US20200310845A1

    公开(公告)日:2020-10-01

    申请号:US16366976

    申请日:2019-03-27

    Abstract: A first instance is caused to execute software code to perform a first portion of a workflow in response to receipt of a workflow request, and performance of the first portion results in submission of an operation request to an entity. A resume workflow request is received from the entity, where the resume workflow request includes a handle to a snapshot that corresponds to a state of execution of the software code and a response to the operation request to the entity. Using the handle to the snapshot and the response to the operation request, a second instance is caused to execute the software code from the first state to perform a second portion of the workflow. A workflow result is received from an instance that executes a last portion of the workflow, and the workflow is provided result in response to the workflow request.

Patent Agency Ranking