Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Systems and methods for controlling user access to command execution

A technology for command execution and control, applied in the computer field, can solve problems such as complex tasks

Active Publication Date: 2021-10-26
AMAZON TECH INC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, as the size and scope of typical data centers and computer networks continue to grow, the task of provisioning, manipulating, and managing the associated physical computing resources becomes increasingly complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Systems and methods for controlling user access to command execution
  • Systems and methods for controlling user access to command execution
  • Systems and methods for controlling user access to command execution

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] This disclosure describes techniques for controlling network-accessible computing resources, such as computing nodes and other computing-related resources, provided by service provider environments to customers and other users. In at least some embodiments, the service provider environment may provide a user command execution interface component for use by such users, such as to provide a similar interface to a shell tool. The user command execution interface component may also maintain various licensing information for controlling a user's ability to access, use, and / or modify provided computing nodes and other computing-related resources, such as stored on those provided computing nodes and other computing-related resources External licensing information.

[0015] In at least some embodiments, a user command execution interface component can determine whether a user is authorized to execute one or more indicated commands on one or more computing nodes or other computi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This disclosure describes techniques for providing users with access to execute commands on network-accessible computing resources. In some cases, permissions are established for users to execute commands on computing nodes provided by online services, such as by maintaining various permission information external to those provided computing nodes, for use in controlling user access, use and / or Ability to modify provided compute nodes. The interface component may use such external permission information in order to determine whether a particular user is authorized to execute one or more particular commands on one or more particular compute nodes, and when authorized to initiate concurrently and independently Execute said command. The interface component can also aggregate results from each compute node executing the command before providing the results to the user.

Description

technical field [0001] The present application relates to the field of computing, and in particular, to systems and methods for controlling user access to command execution. Background technique [0002] Many companies and other organizations operate computer networks that interconnect numerous computing systems to support their operations, where the computing systems may be co-located (for example, as part of a private local area network, or "LAN"), or vice versa , located in multiple distinct geographic locations (for example, connected via one or more other private or shared intermediate networks). For example, data centers housing significant numbers of interconnected co-located computing systems have become commonplace, such as private data centers operated by or on behalf of a single organization, as well as public data centers operated by entities as a business to provide computing resources to customers. data center. Some public data center operators provide networ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/455H04L29/06
CPCG06F9/45512G06F9/45533H04L63/10H04L67/306H04L67/10G06F9/468H04L63/102G06F9/5072
Inventor 奥马尔·哈什米钟怡倩
Owner AMAZON TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products