Robust data tagging
First Claim
Patent Images
1. A computer-implemented method for managing computing resources in a multi-tenant web services platform, the method comprising:
- receiving a request for data pertaining to computing resources of the multi-tenant web services platform;
determining an identity associated with the request and verifying that the identity is authorized to view tagged metadata associated with the data;
verifying integrity of the tagged metadata;
allowing the verified identity to view, add, or modify verified tagged metadata associated with the data;
applying a revision history, version control, and binding scheme to the added or modified tagged metadata, wherein the revision history, version control, and binding scheme maintain information regarding the access to the tagged metadata by authorized identities; and
allowing other identities to view, add, and modify the tagged metadata by verifying the other identities'"'"' authority to view, add, and modify the tagged metadata while maintaining the revision history, version control, and binding scheme to newly added or modified tagged metadata.
1 Assignment
0 Petitions
Accused Products
Abstract
Users are authorized to access tagged metadata in a provider network. A revision control and binding mechanism may be applied to tagged metadata that is added or modified by the user. A recommendation pertaining to security and compliance for the computing resource may be determined based on an analysis of the computing resource, scoring criteria, and data pertaining to customer and system data.
-
Citations
20 Claims
-
1. A computer-implemented method for managing computing resources in a multi-tenant web services platform, the method comprising:
-
receiving a request for data pertaining to computing resources of the multi-tenant web services platform; determining an identity associated with the request and verifying that the identity is authorized to view tagged metadata associated with the data; verifying integrity of the tagged metadata; allowing the verified identity to view, add, or modify verified tagged metadata associated with the data; applying a revision history, version control, and binding scheme to the added or modified tagged metadata, wherein the revision history, version control, and binding scheme maintain information regarding the access to the tagged metadata by authorized identities; and allowing other identities to view, add, and modify the tagged metadata by verifying the other identities'"'"' authority to view, add, and modify the tagged metadata while maintaining the revision history, version control, and binding scheme to newly added or modified tagged metadata. - View Dependent Claims (2, 3)
-
-
4. A system configured to allocate computing resources to customers of a provider network, the system comprising:
-
at least one memory having stored therein computer instructions that, upon execution by one or more processors of the system, at least cause the system to; verify that a process is authorized to access tagged metadata associated with computing resources of a provider network, wherein the tagged metadata is access restricted to authorized processes and wherein the tagged metadata is cryptographically bound; allowing the requesting process to access the tagged metadata; and applying a revision control mechanism to tagged metadata that is added or modified by the requesting process by maintaining revision control information regarding access to the tagged metadata by authorized processes. - View Dependent Claims (5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium having stored thereon computer-readable instructions, the computer-readable storage medium comprising instructions that upon execution on one or more computing devices, at least cause the one or more computing devices to:
-
verify an identity of a user of a provider network; verify that the user is authorized to access tagged metadata associated with the computing resources of the provider network, wherein the tagged metadata is access restricted to authorized users and wherein the tagged metadata is computationally bound; allowing the verified user to access the metadata; and applying a revision control and binding mechanism to metadata that is added or modified by the user by maintaining revision control information regarding access to the tagged metadata by verified users. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification