-
公开(公告)号:US11782731B1
公开(公告)日:2023-10-10
申请号:US16208367
申请日:2018-12-03
Applicant: Amazon Technologies, Inc.
Inventor: Yang Lin , Himanshu Agrawal , Colin Stone , Prasad Renake , Murali Rathinasamy
CPC classification number: G06F9/4451 , G06F9/45558 , G06F9/485 , G06F2009/45579
Abstract: Methods, systems, and computer-readable media for persisting user settings for non-persistent application streaming environments are disclosed. An application streaming service may receive a selection of an application for a user and assign a compute instance to the user. An agent provided by the compute instance obtains a storage location of a user settings file associated with the user (e.g., based on use of the application during a previous session). The agent downloads the user settings file from the storage location to the compute instance and mounts the user settings file at a file system location associated with an execution environment of the compute instance. The application is executed and the user settings file is updated during use of the application. In response to termination of the session, the agent uploads the updated user settings file to a storage location. The user settings file is not persisted on the compute instance.
-
公开(公告)号:US11586721B1
公开(公告)日:2023-02-21
申请号:US17007949
申请日:2020-08-31
Applicant: Amazon Technologies, Inc.
Inventor: Himanshu Agrawal , Yang Lin , Chenghsien Jason Lu , Ameya Sadashiv Potadar , Prasad Renake
Abstract: Techniques for secure remote access of computing resources are described herein. In some examples, when a client requests to access a computing resource, a computing service may generate a first password value for the computing resource and transmit the first password value to the client. The client may then generate and transmit key data for entry of the first password value back to the computing service. The client may generate and transmit the key data on the user's behalf, without requiring any activation or selection of keys by the user. Upon receiving the key data, the computing service may enter the first password value into the computing resource, thereby allowing the client to access the computing resource. The computing service may detect the accessing of the computing resource and may change the first password value to a second password value.
-