-
公开(公告)号:US09823922B1
公开(公告)日:2017-11-21
申请号:US14579184
申请日:2014-12-22
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Daniele Bellucci
IPC: G06F9/44
Abstract: The subject technology provides embodiments for providing an index of source code repositories isolated to HTTP request parameters. By fingerprinting specific actions involving HTTP requests, such actions can be traced to specific source code files, and in some cases an exact line of code. The end result is that a webpage and any action on that webpage can be traced back to the exact line of source code that is accepting that request. This will allow the ability to find a software defect or security vulnerability while looking at a running application and then map it back directly to the line of code that needs to be modified.
-
公开(公告)号:US09689686B1
公开(公告)日:2017-06-27
申请号:US14866719
申请日:2015-09-25
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
CPC classification number: G01C21/20 , B64C39/024 , B64C2201/027 , B64C2201/123 , B64C2201/128 , B64C2201/145 , G01S13/86 , G01S19/00 , G01S19/215 , G01S19/48 , G05D1/0022 , G05D1/0038 , G06F21/64 , G06F2221/2111 , H04L63/0869 , H04L63/123 , H04W4/02 , H04W12/06 , H04W12/10
Abstract: Techniques for determining whether data associated with an autonomous navigation of an unmanned vehicle may be trusted. For example, navigation-related data may be provided from a source external to the unmanned vehicle. Image data associated with the autonomous navigation may be generated. The navigation-related data and the image data may be compared to determine whether the navigation data may be trusted or not. If untrusted, the autonomous navigation may be directed independently of the navigation data.
-
公开(公告)号:US12034740B1
公开(公告)日:2024-07-09
申请号:US15083098
申请日:2016-03-28
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
CPC classification number: H04L63/1416 , H04L63/1458
Abstract: In response to a process being triggered, at least in part by receipt of information regarding communication directed to a first application by a second application, a threat level is computed based at least in part on the information. As a result of the threat level being of a first severity, the second application is migrated to a destination zone that allows for improved communications with the first application. As a result of the threat level being of a second severity, migration of the second application to the destination zone is delayed. As a result of the threat level being of a third severity, a mitigation action is performed.
-
公开(公告)号:US10466700B1
公开(公告)日:2019-11-05
申请号:US15714860
申请日:2017-09-25
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Nima Sharifi Mehr , Narasimha Rao Lakkakula
Abstract: Techniques for determining whether data associated with an autonomous/non-autonomous operation of a manned/unmanned vehicle may be trusted. For example, a first set of data may be provided from a source external to a manned/unmanned vehicle. A second set of data may be accessed. This second set may be provided from a source internal or external to the manned/unmanned vehicle and may be associated with the same autonomous/non-autonomous operation. The two sets may be compared to determine whether the first set of data may be trusted or not. If untrusted, a corrective action may be performed.
-
公开(公告)号:US10417272B1
公开(公告)日:2019-09-17
申请号:US14860508
申请日:2015-09-21
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
IPC: G06F17/30 , G06F16/44 , G06F16/955
Abstract: Described are techniques for outputting or suppressing output of network content to a user device based on content previously accessed by the user device. Correspondence between network content accessed by the user device and spoiler data determined from media content may indicate that the network content is associated with the media content. Content consumption data associated with the user device may indicate whether the user device has previously accessed the media content. The network content may be suppressed from output if the user device has not previously accessed the media content. The network content may be output to the user device if the media content has been accessed.
-
公开(公告)号:US10104185B1
公开(公告)日:2018-10-16
申请号:US14822453
申请日:2015-08-10
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Nima Sharifi Mehr , Scott Gerard Carmack , Narasimha Rao Lakkakula
Abstract: A non-transitory computer-readable storage device stores instructions that, when executed on a computing system, cause the computing system to receive a request for creating a new software container and determine that characteristics of the new software container match a co-tenant policy of an existing software container on a server. The instructions further cause the computing system to determine that characteristics of the existing software container match a co-tenant policy of the new software container as well as cause the new software container to be created on the server.
-
公开(公告)号:US09824232B1
公开(公告)日:2017-11-21
申请号:US14860408
申请日:2015-09-21
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
CPC classification number: G06F21/6218 , G06F17/30867 , G06F21/16
Abstract: Described are techniques for associating messages with a particular portion of media content. A message received from a first device, associated with a portion of media content stored on the first device, may be provided to a second device and stored in association with a corresponding portion of media content on the second device. Content consumption data associated with the second device may indicate whether the second device has previously accessed the portion of the media content. The message may be suppressed from presentation if the second device has not previously accessed the corresponding portion of the media content. The message may be presented to the second device when the corresponding portion of the media content is accessed.
-
公开(公告)号:US09727736B1
公开(公告)日:2017-08-08
申请号:US14517018
申请日:2014-10-17
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Alun Jones , Narasimha Rao Lakkakula
CPC classification number: G06F21/577 , G06F8/71 , G06F8/77 , G06F11/36
Abstract: Disclosed are various embodiments for tracking developer behavior with respect to software analysis tools. In a first embodiment, issues with a first revision of a program are identified with an analysis tool. The configuration of the analysis tool may be updated based at least in part on a status of the issues in the second revision of the program. In a second embodiment, an analysis tool identifies issues with a program. A developer responsible for the issues is identified. A coding characteristic associated with the developer is then determined.
-
公开(公告)号:US09575979B1
公开(公告)日:2017-02-21
申请号:US14107950
申请日:2013-12-16
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Jon Arron McClintock , Shailendra Batra , Thibault Candebat , Scott Gerard Carmack , Sachin Purushottam Joglekar , Alun Mark Jones , William Frederick Kruse , Narasimha Rao Lakkakula , Sunu Aby Mathew
CPC classification number: G06F17/30109 , G06F21/604 , G06F21/6218 , G06F2221/034
Abstract: Techniques are described for automatically determining application composition and application ownership of an application that may include a plurality of files deployed to a plurality of host devices. The determination of application composition may be based on analyzing various types of metadata that may provide evidence of associations between deployed files, such as metadata describing the deployment of files to host devices, metadata describing the files tracked within a source control system, or other types of metadata. The determination of application ownership may also be based on analyzing the various types of metadata that provide evidence of associations between files and individuals or groups of individuals within an organization.
Abstract translation: 描述了用于自动确定应用程序的应用程序组成和应用程序所有权的技术,其中可能包括部署到多个主机设备的多个文件。 应用程序组合的确定可以基于分析可以提供部署文件之间的关联的各种类型的元数据,例如描述向主机设备部署文件的元数据,描述在源控制系统中跟踪的文件的元数据或其他类型 的元数据。 应用程序所有权的确定也可以基于分析各种类型的元数据,这些元数据提供文件与组织内的个人或个人组之间的关联的证据。
-
-
-
-
-
-
-
-