-
公开(公告)号:US11076002B1
公开(公告)日:2021-07-27
申请号:US16908289
申请日:2020-06-22
Applicant: Amazon Technologies, Inc.
Inventor: Rahul Kishore Saraf , Joseph Jabril Hooper , Prasad Renake , Vinothkumar Narasimhan , Murali Rathinasamy , Zishen Hu , Naveen Mahadevaiah
Abstract: A first subdomain name may be generated based at least in part on first session parameters associated with a first streaming session. A first subdomain of a domain may be formed, wherein the first subdomain has the first subdomain name. A first authorization cookie for the first streaming session may be stored at the first subdomain. A second subdomain name may be generated based at least in part on the second session parameters associated with a second streaming session. A second subdomain of the same domain may be formed, wherein the second subdomain has the second subdomain name. A second authorization cookie for the second streaming session may be stored at the second subdomain.
-
公开(公告)号:US10783235B1
公开(公告)日:2020-09-22
申请号:US15587015
申请日:2017-05-04
Applicant: Amazon Technologies, Inc.
Inventor: Himanshu Agarwal , Yang Lin , Chenghsien Jason Lu , Ameya Sadashiv Potadar , Prasad Renake
Abstract: Techniques for secure remote access of computing resources are described herein. In some examples, when a client requests to access a computing resource, a computing service may generate a first password value for the computing resource and transmit the first password value to the client. The client may then generate and transmit key data for entry of the first password value back to the computing service. The client may generate and transmit the key data on the user's behalf, without requiring any activation or selection of keys by the user. Upon receiving the key data, the computing service may enter the first password value into the computing resource, thereby allowing the client to access the computing resource. The computing service may detect the accessing of the computing resource and may change the first password value to a second password value.
-
公开(公告)号:US11782731B1
公开(公告)日:2023-10-10
申请号:US16208367
申请日:2018-12-03
Applicant: Amazon Technologies, Inc.
Inventor: Yang Lin , Himanshu Agrawal , Colin Stone , Prasad Renake , Murali Rathinasamy
CPC classification number: G06F9/4451 , G06F9/45558 , G06F9/485 , G06F2009/45579
Abstract: Methods, systems, and computer-readable media for persisting user settings for non-persistent application streaming environments are disclosed. An application streaming service may receive a selection of an application for a user and assign a compute instance to the user. An agent provided by the compute instance obtains a storage location of a user settings file associated with the user (e.g., based on use of the application during a previous session). The agent downloads the user settings file from the storage location to the compute instance and mounts the user settings file at a file system location associated with an execution environment of the compute instance. The application is executed and the user settings file is updated during use of the application. In response to termination of the session, the agent uploads the updated user settings file to a storage location. The user settings file is not persisted on the compute instance.
-
公开(公告)号:US11586721B1
公开(公告)日:2023-02-21
申请号:US17007949
申请日:2020-08-31
Applicant: Amazon Technologies, Inc.
Inventor: Himanshu Agrawal , Yang Lin , Chenghsien Jason Lu , Ameya Sadashiv Potadar , Prasad Renake
Abstract: Techniques for secure remote access of computing resources are described herein. In some examples, when a client requests to access a computing resource, a computing service may generate a first password value for the computing resource and transmit the first password value to the client. The client may then generate and transmit key data for entry of the first password value back to the computing service. The client may generate and transmit the key data on the user's behalf, without requiring any activation or selection of keys by the user. Upon receiving the key data, the computing service may enter the first password value into the computing resource, thereby allowing the client to access the computing resource. The computing service may detect the accessing of the computing resource and may change the first password value to a second password value.
-
公开(公告)号:US11528301B1
公开(公告)日:2022-12-13
申请号:US16917560
申请日:2020-06-30
Applicant: Amazon Technologies, Inc.
Inventor: Rahul Kishore Saraf , Prasad Renake , Joseph Jabril Hooper , Prabhu Shanmukham Ganesh , Vinothkumar Narasimhan
Abstract: Disclosed are system architectures and techniques for securely embedding private content via dynamically-set security policy. A streaming service stores associations of particular streaming content with security policies that each specify domains allowed to initiate streaming from the streaming service. Requests for the streaming content are received from user-agents. The streaming service identifies respective security policies associated with each of the streaming content indicated by each of the requests and dynamically sets each security policy in a response. The responses are transmitted back to the user-agent where the security policy is enforced. In some instances, the streaming service is an application streaming service that hosts respective applications for different entities for streaming application content, and the security policies specify domains allowed to initiate application streaming from the application streaming service for the corresponding hosted application. A configuration interface for configuring the permitted domains and other features is also disclosed.
-
-
-
-