-
公开(公告)号:US10212570B1
公开(公告)日:2019-02-19
申请号:US14673783
申请日:2015-03-30
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Harsha Ramalingam
Abstract: Described are techniques for providing event messages to mobile devices and other types of user devices. User communications and sensor data from the user devices may be used to determine an emergency condition. User data associated with a user device may be used to determine the content contained in an event message generated for receipt by that user device. Communications from users, responsive to the event message, may be curated, provided to other users, or responded to.
-
公开(公告)号:US10133775B1
公开(公告)日:2018-11-20
申请号:US14219802
申请日:2014-03-19
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Harsha Ramalingam , Ramanathan Muthiah
IPC: G06F17/30
Abstract: Techniques are described for modeling data query execution time based on a cost of data queries, where the cost provides a measure of the processing resources used by the data query while executing. Using regression analysis or other statistical methods, a model may be generated that enables the prediction of the query execution time based on the query cost. In some cases, the model may be generated based on a linear regression analysis of previously measured execution times and previously determined data query costs. The model may be stored and employed prior to, or during, the subsequent execution of a data query, to predict the execution time of the data query. Data queries that execute substantially longer than the predicted execution time may be terminated.
-
公开(公告)号:US10043152B1
公开(公告)日:2018-08-07
申请号:US13911800
申请日:2013-06-06
Applicant: Amazon Technologies, Inc.
Inventor: Ruth Landon Chin , Harsha Ramalingam , Bhavnish H. Lathia , Austin E. Wilson
Abstract: Disclosed are various embodiments for facilitating the return of lost items and maintaining an inventory registry of items which are all associated with a user who participates in an item protection program. A user may update an inventory registry to include items that are associated with the user. Therefore, the user may be able to manage his or her items in one place and determine the overall value associated with the items. Additionally, a unique identifier code may be assigned to each user participating in a user protection program. The unique identifier code may be embedded on an item or item label so that it may be scanned to identify the owner of the item. Therefore, if the item were lost, the finder may scan the unique identifier code using an item protection application to initiate the return of the lost item to the owner.
-
公开(公告)号:US09973495B2
公开(公告)日:2018-05-15
申请号:US15423980
申请日:2017-02-03
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Jesper Mikael Johansson , Bharath Kumar Bhimanaik
IPC: H04L29/06
CPC classification number: H04L63/083 , H04L63/0815 , H04L63/102
Abstract: Disclosed are various embodiments relating to bootstrapping user authentication. A first security credential is received for a user account from a user. A first application is then authenticated with another computing device using the first security credential. After authenticating the first application, a bootstrap request is then sent to the other computing device for a second security credential to authenticate a second application without using the first security credential. The bootstrap request specifies a bootstrap session identifier. The second security credential is then received from the other computing device.
-
公开(公告)号:US09916608B1
公开(公告)日:2018-03-13
申请号:US13725466
申请日:2012-12-21
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Michael Carr , Paul J. Walsh
CPC classification number: G06Q30/0609 , G06Q10/00 , G06Q20/10 , G06Q20/20 , G06Q20/202 , G06Q20/204 , G06Q20/3578 , G06Q20/35785 , G06Q20/3674 , G06Q20/40 , G06Q20/409 , G06Q30/00 , G06Q30/0201 , G06Q30/0205 , G06Q30/0222 , G06Q30/0239 , G06Q30/0241 , G06Q30/0253 , G06Q30/0256 , G06Q30/0259 , G06Q30/0261 , G06Q30/0267 , G06Q30/0273 , G06Q30/0275 , G06Q30/0601 , G06Q30/0639 , G06Q30/0641 , H04L63/08 , H04L63/0861 , H04L63/107 , H04L67/306 , H04M1/72569 , H04M1/72577 , H04M2203/6054 , H04W4/021 , H04W4/029 , H04W12/00 , H04W12/02 , H04W12/06 , H04W12/08 , H04W48/04
Abstract: Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user's location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.
-
公开(公告)号:US09361457B1
公开(公告)日:2016-06-07
申请号:US14616143
申请日:2015-02-06
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Timothy Mark Edward Bollefer , Dominique I. Brezinkski , Jesper M. Johansson , James C. Petts
CPC classification number: G06F21/56 , G06F17/30864 , G06F21/55 , G06F2221/034 , H04L63/1416 , H04L63/1491
Abstract: Disclosed are various embodiments for identifying a table of non-decoy data matching a set of criteria. Decoy data is inserted into the table of non-decoy data. The decoy data is detected in a result comprising the decoy data, the result generated in response to an access of the data store. An alarm is generated based at least upon the result.
-
公开(公告)号:US09292336B1
公开(公告)日:2016-03-22
申请号:US14161412
申请日:2014-01-22
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Harsha Ramalingam , Manoj Bhagwan Jadhav , Srinivasa Susheel Kumar Mannepalli , Scott Cameron Webster
CPC classification number: G06Q10/04
Abstract: Service fleets made up of many pieces of computer hardware may perform computational tasks. Described herein are systems and methods for optimizing costs associated with the computer hardware. In one example, an optimization system indicates an amount of hardware needed such that the service fleet operates at an optimal cost. The amount of hardware may be determined based on hardware cost metric data generated for a service fleet.
Abstract translation: 由许多计算机硬件组成的服务队伍可以执行计算任务。 这里描述了用于优化与计算机硬件相关联的成本的系统和方法。 在一个示例中,优化系统指示需要的硬件量,使得服务机构以最佳成本运行。 可以基于为服务车队生成的硬件成本度量数据来确定硬件量。
-
公开(公告)号:US09152808B1
公开(公告)日:2015-10-06
申请号:US13849772
申请日:2013-03-25
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Jesper Mikael Johansson , James Connelly Petts , Dominique Imjya Brezinski
CPC classification number: G06F21/62 , H04L63/1416 , H04L63/1441 , H04L63/1491 , H04L63/30
Abstract: Disclosed are various embodiments for obtaining policy data specifying decoy data eligible to be inserted within a response to an access of a data store. The decoy data is detected in the response among a plurality of non-decoy data based at least upon the policy data. An action associated with the decoy data is initiated in response to the access of the data store meeting a configurable threshold.
Abstract translation: 公开了用于获得策略数据的各种实施例,该策略数据指定在对数据存储的访问的响应中有资格插入的诱饵数据。 至少基于策略数据,在多个非诱饵数据之间的响应中检测诱饵数据。 响应于满足可配置阈值的数据存储的访问,启动与诱饵数据相关联的动作。
-
公开(公告)号:US12086786B2
公开(公告)日:2024-09-10
申请号:US15438633
申请日:2017-02-21
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Paul J. Walsh , Michael Carr
IPC: G06Q20/34 , G06Q10/00 , G06Q20/10 , G06Q20/20 , G06Q20/22 , G06Q20/32 , G06Q20/36 , G06Q20/40 , G06Q30/00 , G06Q30/0204 , G06Q30/0207 , G06Q30/0241 , G06Q30/0251 , G06Q30/0273 , G06Q30/0601 , H04L9/40 , H04L67/306 , H04M1/72454 , H04M1/72463 , H04W4/02 , H04W4/021 , H04W4/029 , H04W12/00 , H04W12/02 , H04W12/06 , H04W12/08 , H04W48/04 , G06Q30/0201
CPC classification number: G06Q20/34 , G06Q10/00 , G06Q20/10 , G06Q20/20 , G06Q20/202 , G06Q20/204 , G06Q20/229 , G06Q20/2295 , G06Q20/325 , G06Q20/3674 , G06Q20/40 , G06Q20/409 , G06Q30/00 , G06Q30/0205 , G06Q30/0207 , G06Q30/0222 , G06Q30/0239 , G06Q30/0241 , G06Q30/0255 , G06Q30/0256 , G06Q30/0259 , G06Q30/0261 , G06Q30/0267 , G06Q30/0269 , G06Q30/0273 , G06Q30/0275 , G06Q30/0601 , G06Q30/0609 , G06Q30/0639 , G06Q30/0641 , H04L63/08 , H04L63/0861 , H04L63/107 , H04L67/306 , H04M1/72454 , H04M1/724631 , H04W4/02 , H04W4/021 , H04W4/029 , H04W12/00 , H04W12/02 , H04W12/06 , H04W12/08 , H04W48/04 , G06Q30/0201 , G06Q30/0253 , H04M2203/6054
Abstract: Techniques for providing friction-free transactions using geolocation and user identifiers are described herein. These techniques may ascertain a user's location based on a location of a mobile device. A transaction between the user and a merchant may be completed with zero or minimal input from the user based on the geolocation of the mobile device and the user identifiers. In some implementations, a transaction initiated earlier is completed when the mobile device arrives at the merchant. Additionally, a parent-child or similar relationship may be established between multiple devices. Security on the mobile device based may be provided by biometric identification and calculation of variance from regular movement patterns. Advertisements may be sent to the mobile device based on bids from merchants near to the mobile device. Promotions may be sent to the mobile device when more than a threshold number of mobile devices are located at the same merchant.
-
公开(公告)号:US10560344B1
公开(公告)日:2020-02-11
申请号:US15688748
申请日:2017-08-28
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Christopher Philip Worland
Abstract: A method for optimizing resource prefetch criteria may include identifying a prefetch criteria for a selectable item, the first prefetch criteria being associated with the selectable item. The first prefetch criteria may be modified to a second prefetch criteria different from the first prefetch criteria, where the modification includes a change of shape of a prefetch area from a first shape to a second shape different from the first shape. The first prefetch criteria may be replaced with the second prefetch criteria.
-
-
-
-
-
-
-
-
-