Portable access to auditing information
First Claim
1. A computer-implemented method of providing a secure audit log for usage of a set of network-based computing resources accessible through an application programming interface (API) or other interface, comprising:
- under control of one or more computer systems configured with executable instructions,receiving, over a network, a first indication that a computing device has interacted with a portable physical object that includes a storage medium having stored thereon a set of credentials;
receiving the set of credentials as a result of interaction between the computing device and the portable physical object;
authenticating the portable physical object using the set of credentials;
upon authenticating the portable physical object, enabling usage of the set of network-based computing resources of a service provider when the portable physical object is communicatively coupled with the computing device, wherein the portable physical object is communicatively coupled with the computing device when a signal is received upon the portable physical object being within a threshold distance with the user computer device;
tracking user interaction with respect to the usage of the set of network-based computing resources;
storing data recording the user interaction with respect to the set of network-based computing resources into a data store on the portable physical object in the secure audit log, the data stored in a tamper-evident data store, and the data being stored locally with the portable physical object such that the data may not be altered by an administrator of the set of network-based computing resources when the portable physical object is communicatively coupled with the computing device; and
enabling access to the data recording the user interaction in the data store.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods provide a storage media on a portable physical object associated with a set of credentials that enables access to a set of computing resources associated with a set of Web services. In some embodiments, information including a set of credentials is prepackaged onto the storage media of the portable physical object. A pre-activated subscription to the set of Web services in a distributed system is provisioned. Access to the set of Web services is enabled when the portable physical object is coupled with a computing device and the set of credentials is authenticated. In some embodiments, the portable physical object is purchased by a user on a prepaid basis without requiring the user to register an account with the set of Web services, allowing the user to remain anonymous with respect to interaction with the set of Web services.
-
Citations
25 Claims
-
1. A computer-implemented method of providing a secure audit log for usage of a set of network-based computing resources accessible through an application programming interface (API) or other interface, comprising:
-
under control of one or more computer systems configured with executable instructions, receiving, over a network, a first indication that a computing device has interacted with a portable physical object that includes a storage medium having stored thereon a set of credentials; receiving the set of credentials as a result of interaction between the computing device and the portable physical object; authenticating the portable physical object using the set of credentials; upon authenticating the portable physical object, enabling usage of the set of network-based computing resources of a service provider when the portable physical object is communicatively coupled with the computing device, wherein the portable physical object is communicatively coupled with the computing device when a signal is received upon the portable physical object being within a threshold distance with the user computer device; tracking user interaction with respect to the usage of the set of network-based computing resources; storing data recording the user interaction with respect to the set of network-based computing resources into a data store on the portable physical object in the secure audit log, the data stored in a tamper-evident data store, and the data being stored locally with the portable physical object such that the data may not be altered by an administrator of the set of network-based computing resources when the portable physical object is communicatively coupled with the computing device; and enabling access to the data recording the user interaction in the data store. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer-implemented method of storing a secure audit log of user interaction with respect to a set of network-based computing resources, comprising:
-
under control of one or more computer systems configured with executable instructions, enabling usage of the set of network-based computing resources of a service provider when a portable physical object is communicatively coupled with a computing device; tracking user interaction with respect to the usage of the set of network-based computing resources; storing the data recording the user interaction with respect to the set of network-based computing resources into a data store on the portable physical object in the secure audit log, the secure audit log stored in a tamper-evident data store; and sending a portion of the data to a separate data store among the set of network-based computing resources, the portion of the data including user interaction recorded beyond a threshold period of time prior to a current time such that user interaction recorded within a recent period of time is kept locally on the portable physical object, wherein the set of network-based computing resources is accessible across a network through an application programming interface (API) or other interface. - View Dependent Claims (9, 10, 11, 12)
-
-
13. A non-transitory computer-readable storage medium including instructions for storing a secure audit log of user interaction with respect to usage of a set of network-based computing resources, the instructions when executed by a processor of a computing device causing the computing device to:
-
provide a first indication that a computing device is communicatively coupled with a portable physical object that includes a storage medium having stored thereon a set of credentials; obtain access to use the set of network-based computing resources of a service provider when the portable physical object is authenticated using the set of credentials; perform user interaction with respect to the usage of the set of network-based computing resources, the portable physical object configured to track the usage; store data recording the user interaction with respect to the usage of the set of network-based computing resources into a data store on the portable physical object in the secure audit log, the data being stored locally with the portable physical object such that the data may not be altered by an administrator of the set of network-based computing resources when the portable physical object is communicatively coupled with the computing device, wherein the set of network-based computing resources is accessible across a network through an application programming interface (API) or other interface; and send a portion of the data to a separate data store among the set of network-based computing resources, the portion of the data including the user interaction recorded beyond a threshold period of time prior to a current time such that user interaction recorded within a recent period of time is kept locally on the portable physical object. - View Dependent Claims (14, 15, 16, 17, 18)
-
-
19. A portable physical device, comprising:
-
a processor; a memory device including instructions that, when executed by the processor, cause the portable physical device to; provide a set of credentials from the memory device to enable authentication of the portable physical device associated with a prepaid subscription; upon authentication of the portable physical device, enable usage of a set of network-based computing resources of a service provider in accordance with the prepaid subscription when the portable physical device is communicatively coupled with the set of network-based computing resources, the set of network-based computing resources accessible across a network through an application programming interface (API) or other interface and the prepaid subscription indicating one or more usage limits with respect to the usage of the set of network-based computing resources; track user interaction with respect to the usage of the set of network-based computing resources; store the data recording the user interaction with respect to the usage of the set of network-based computing resources into a data store on the portable physical object, the data being stored locally with the portable physical object such that the data may not be altered by an administrator of the set of network-based computing resources; provide access to the data recording the user interaction in the data store; and cease access with the portable physical object such that the portable physical object is no longer communicatively coupled to the set of network-based computing resources. - View Dependent Claims (20, 21, 22, 23, 24, 25)
-
Specification