Portable access to auditing information
First Claim
1. A computer-implemented method of storing a secure audit log of user interaction with respect to a set of computing resources, comprising:
- enabling, via usage of a computer comprising a first memory, a user to access the set of computing resources;
collecting user interaction data based at least in part on tracking the user interaction with respect to the user accessing the set of computing resources;
storing the user interaction data with respect to the set of computing resources onto a portable physical object comprising a second memory, the portable physical object comprising a signing module stored in the second memory for generating a security credential to be stored in the second memory, the security credential for accessing the set of computing resources, and the portable physical object comprising a processor for executing the signing module to generate the security credential;
enabling the user of the portable physical object to recover account information associated with the portable physical object by using the security credential; and
sending a portion of the user interaction data to a separate data store among the set of computing resources, the portion of the user interaction data comprising first user interaction recorded beyond a threshold period of time prior to a current time such that second user interaction recorded within a recent period of time is kept locally on the portable physical object,wherein the set of computing resources is accessible across a network through an application programming interface (API) or other interface.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods provide a storage media on a portable physical object associated with a set of credentials that enables access to a set of computing resources associated with a set of Web services. In some embodiments, information including a set of credentials is prepackaged onto the storage media of the portable physical object. A pre-activated subscription to the set of Web services in a distributed system is provisioned. Access to the set of Web services is enabled when the portable physical object is coupled with a computing device and the set of credentials is authenticated. In some embodiments, the portable physical object is purchased by a user on a prepaid basis without requiring the user to register an account with the set of Web services, allowing the user to remain anonymous with respect to interaction with the set of Web services.
-
Citations
20 Claims
-
1. A computer-implemented method of storing a secure audit log of user interaction with respect to a set of computing resources, comprising:
-
enabling, via usage of a computer comprising a first memory, a user to access the set of computing resources; collecting user interaction data based at least in part on tracking the user interaction with respect to the user accessing the set of computing resources; storing the user interaction data with respect to the set of computing resources onto a portable physical object comprising a second memory, the portable physical object comprising a signing module stored in the second memory for generating a security credential to be stored in the second memory, the security credential for accessing the set of computing resources, and the portable physical object comprising a processor for executing the signing module to generate the security credential; enabling the user of the portable physical object to recover account information associated with the portable physical object by using the security credential; and sending a portion of the user interaction data to a separate data store among the set of computing resources, the portion of the user interaction data comprising first user interaction recorded beyond a threshold period of time prior to a current time such that second user interaction recorded within a recent period of time is kept locally on the portable physical object, wherein the set of computing resources is accessible across a network through an application programming interface (API) or other interface. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A non-transitory computer-readable storage medium including instructions for storing a secure audit log of user interaction data with respect to a set of computing resources, the instructions when executed by a processor of a computing device cause the computing device to:
-
enable, via usage of a computer comprising a first memory, a user to access the set of computing resources; obtain access to the set of network-based computing resources when a portable physical object comprising a second memory is authenticated using a set of credentials that are stored in the second memory on the portable physical object, the portable physical object comprising security credential for accessing the set of network-based computing resources, portable physical object comprising a processor that executes a signing module to generate the security credential; enable the user of the portable physical object to recover account information associated with the portable physical object by using the security credential; perform a user interaction with respect to the set of computing resources, the portable physical object configured to track the user interaction; and store the user interaction data recording the user interaction with respect to the set of computing resources into the second memory on the portable physical object, wherein the set of computing resources is accessible across a network through an application programming interface (API) or other interface. - View Dependent Claims (10, 11, 12, 13, 14)
-
-
15. A portable physical device, comprising:
-
a processor; and a memory device comprising a first memory that comprises instructions that, when executed by the processor, cause the portable physical device to; provide a set of credentials from the first memory of the memory device to enable authentication of the portable physical device associated with a prepaid subscription; upon authentication of the portable physical device, enable access to a set of computing resources in accordance with the prepaid subscription via usage of a computer comprising a second memory, the portable physical device comprising a security credential stored in the first memory for accessing the set of computing resources, and the portable physical device comprising a processor that executes a signing module to generate the security credential; enable a user of the portable physical device to recover account information associated with the portable physical device by using the security credential, the set of computing resources accessible across a network through an application programming interface (API) or other interface and the prepaid subscription indicating one or more usage limits with respect to the set of computing resources; collect user interaction data based at least in part on tracking a user interaction with respect to the user accessing the set of computing resources; store the user interaction data recording the user interaction with respect to the set of computing resources into the first memory on the portable physical device; and provide access to the user interaction data recording the user interaction in the first memory. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification