QUORUM-BASED ACCESS MANAGEMENT
    1.
    发明申请

    公开(公告)号:US20190268342A1

    公开(公告)日:2019-08-29

    申请号:US16406783

    申请日:2019-05-08

    Abstract: A quorum-based access mechanism can require multiple entities to provide credentials over a determined period of time in order to obtain access to one or more resources in an electronic environment. This can include receiving a request that is signed by multiple signatories, or receiving multiple requests within a determined period that are each signed by a respective and authorized signatory. In some embodiments the receiving of a primary request causes notifications to be sent to other potential signatories, and a specified or minimum number must respond timely with a signed request to have the access granted. The quorum-based access mechanism can function as an additional authorization layer sitting in front of more conventional authorization and authentication mechanisms. In some embodiments a quorum token can be passed with the request, whereby resources in the environment can make access determinations based on the information in the token.

    Robust data tagging
    4.
    发明授权

    公开(公告)号:US11328073B1

    公开(公告)日:2022-05-10

    申请号:US16407517

    申请日:2019-05-09

    Abstract: Users are authorized to access tagged metadata in a provider network. A revision control and binding mechanism may be applied to tagged metadata that is added or modified by the user. A recommendation pertaining to security and compliance for the computing resource may be determined based on an analysis of the computing resource, scoring criteria, and data pertaining to customer and system data.

    Quorum-based access management
    5.
    发明授权

    公开(公告)号:US10291622B1

    公开(公告)日:2019-05-14

    申请号:US15070915

    申请日:2016-03-15

    Abstract: A quorum-based access mechanism can require multiple entities to provide credentials over a determined period of time in order to obtain access to one or more resources in an electronic environment. This can include receiving a request that is signed by multiple signatories, or receiving multiple requests within a determined period that are each signed by a respective and authorized signatory. In some embodiments the receiving of a primary request causes notifications to be sent to other potential signatories, and a specified or minimum number must respond timely with a signed request to have the access granted. The quorum-based access mechanism can function as an additional authorization layer sitting in front of more conventional authorization and authentication mechanisms. In some embodiments a quorum token can be passed with the request, whereby resources in the environment can make access determinations based on the information in the token.

    Quorum-based access management
    6.
    发明授权

    公开(公告)号:US11019068B2

    公开(公告)日:2021-05-25

    申请号:US16406783

    申请日:2019-05-08

    Abstract: A quorum-based access mechanism can require multiple entities to provide credentials over a determined period of time in order to obtain access to one or more resources in an electronic environment. This can include receiving a request that is signed by multiple signatories, or receiving multiple requests within a determined period that are each signed by a respective and authorized signatory. In some embodiments the receiving of a primary request causes notifications to be sent to other potential signatories, and a specified or minimum number must respond timely with a signed request to have the access granted. The quorum-based access mechanism can function as an additional authorization layer sitting in front of more conventional authorization and authentication mechanisms. In some embodiments a quorum token can be passed with the request, whereby resources in the environment can make access determinations based on the information in the token.

    Security threat based auto scaling

    公开(公告)号:US10050999B1

    公开(公告)日:2018-08-14

    申请号:US14862052

    申请日:2015-09-22

    Abstract: Technology is described for auto scaling computing resources in response to a cyber-attack in a service provider environment. The computing resources in the service provider environment may be detected as being exposed to the cyber-attack. A security scaling action may be performed in the service provider environment that mitigates the cyber-attack. The security scaling action to be performed may be determined by a security threat mitigation service that operates in the service provider environment. A performance of the security scaling action in the service provider environment may be initiated.

    Supplying regulatory compliance evidence for a service provider environment

    公开(公告)号:US09967285B1

    公开(公告)日:2018-05-08

    申请号:US14864777

    申请日:2015-09-24

    CPC classification number: H04L63/20 G06F17/30312 G06F17/30914 H04L63/1433

    Abstract: Technology is described for supplying regulatory compliance evidence for a virtual computing service provider. A request is received for providing regulatory compliance evidence for a service provided by a virtual computing service provider. A statistical analysis of subject matter relating to the request using machine learning is provided. The subject matter associated with the request is categorized. The categorized subject matter is mapped to a control list, maintained for compliance regulations, that is mapped to the regulatory compliance evidence. A confidence level for the regulatory compliance evidence is developed according to historical data relating to previously provided regulatory compliance evidence. A response, having both the regulatory compliance evidence associated with the request and the regulatory confidence level, is provided with a set of digital signatures. An authenticated user feedback response is provided indicating an accuracy level that the response matches the request for developing the confidence level.

    Security recommendation engine
    9.
    发明授权
    Security recommendation engine 有权
    安全推荐引擎

    公开(公告)号:US09386033B1

    公开(公告)日:2016-07-05

    申请号:US14482753

    申请日:2014-09-10

    Abstract: Users are authorized to access tagged metadata in a provider network. A revision control and binding mechanism may be applied to tagged metadata that is added or modified by the user. A recommendation pertaining to security and compliance for the computing resource may be determined based on an analysis of the computing resource, scoring criteria, and data pertaining to customer and system data.

    Abstract translation: 用户有权访问提供商网络中标记的元数据。 版本控制和绑定机制可以应用于用户添加或修改的标记元数据。 可以基于对计算资源的分析,评分标准和与客户和系统数据有关的数据来确定关于计算资源的安全性和合规性的建议。

    Security appliance provisioning
    10.
    发明授权

    公开(公告)号:US10484331B1

    公开(公告)日:2019-11-19

    申请号:US15195758

    申请日:2016-06-28

    Abstract: A technology is provided for security appliance provisioning. In one example, a method includes providing a variety of types of physical security appliances in a service provider environment. A selection may be received identifying a selected security appliance from among the variety of types of physical security appliances for use in a customer virtual infrastructure within the service provider environment. The selected security appliance may be provisioned for use at an edge location of the customer virtual infrastructure. The selected security appliance may be configured to enforce a security policy defined for the customer virtual infrastructure.

Patent Agency Ranking