-
公开(公告)号:US11953905B1
公开(公告)日:2024-04-09
申请号:US16792867
申请日:2020-02-17
Applicant: Amazon Technologies, Inc.
Inventor: Bhavnish H. Lathia , Varadarajan Gopalakrishnan , Jesper Mikael Johansson , James Domit Mackraz , Brandon William Porter , Andrew Jay Roths
IPC: G05B19/042 , G05D1/00 , G06Q10/0835
CPC classification number: G05D1/021 , G05D1/0202 , G05D1/0206 , G06Q10/08355
Abstract: This disclosure describes a distributed automated mobile vehicle (“automated mobile vehicle”) system for autonomously delivering orders of items to various delivery locations and/or autonomously returning items to a return location. In some implementations, each user may own or be assigned their own automated mobile vehicle that is associated with the user and an automated mobile vehicle control system maintained by the user. When the user orders an item, the user owned or controlled automated mobile vehicle navigates to a materials handling facility, retrieves the ordered item and delivers it to the user.
-
公开(公告)号:US10547613B1
公开(公告)日:2020-01-28
申请号:US15597632
申请日:2017-05-17
Applicant: Amazon Technologies, Inc.
Inventor: Andrew Jay Roths , Omar Abdul Baki , Lior Shapira , Sudharsan Sampath , Kadirvel Chockalingam Vanniarajan
Abstract: A device provisioning service (DPS) fields requests from unprovisioned devices so that those unprovisioned devices can obtain network credentials or other data used in provisioning the unprovisioned device. The DPS can identify the device securely and associate with a known user account, or the user provisioning the device can supply network credentials over a side channel after supplying a provision code indicative of possession of the unprovisioned device. The provision code can be unique to the unprovisioned device or a short-sequence code that is not necessarily unique, but that is sufficiently uncommon that a specific short-sequence code would not likely be used more than once at a time. In order to communicate with the DPS, a provisioning device might connect the unprovisioned device and the DPS. If the provisioning device is a trusted device, it can perform some of the steps otherwise required by the DPS.
-
公开(公告)号:US10354075B1
公开(公告)日:2019-07-16
申请号:US15638867
申请日:2017-06-30
Applicant: Amazon Technologies, Inc.
Inventor: Daniel Wade Hitchcock , Darren Ernest Canavor , Jesper Mikael Johansson , Bharath Kumar Bhimanaik , Andrew Jay Roths
IPC: G06F21/00 , G06F21/57 , G06F3/0484
Abstract: Computing devices are disclosed that include functionality for providing a trustworthy indication of software integrity. The computing devices include a hardware trust evaluation device capable of determining the trustworthiness of computer programs executing on the devices. At least one trust indicator is also connected to the hardware trust evaluation device for providing an external indication of the trustworthiness of a computer program. Additional security information regarding the trustworthiness of the computer program may be displayed on the primary display device of the computing device. The display of the security information is triggered by a user of the computing device submitting a request through a secure mechanism, where the request is unobservable and inaccessible to programs executing on the computing device. Additional secure mechanisms, such as a unique user interface for displaying the security information, can be utilized to ensure the authenticity of the displayed security information.
-
公开(公告)号:US10313882B2
公开(公告)日:2019-06-04
申请号:US15804886
申请日:2017-11-06
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Phivos Costas Aristides , Darren Ernest Canavor , Arnaud Marie Froment , Scott Donald Gregory , Cory Adam Johnson , Chelsea Celest Krueger , Jon Arron McClintock , Vijay Rangarajan , Andrew Jay Roths
Abstract: An access control application for mobile devices is provided. The access control application may be configured to generate a set of security tasks based at least in part on information corresponding to a user's interactions with the mobile device. An unlock screen of the mobile device may be triggered and security tasks from the generated set of security tasks may be displayed through a user interface of the mobile device. The user's response to the security tasks may be obtained and a confidence score may be calculated, based at least in part on the response. The access control application may then determine, based at least in part on the score and one or more attributes of the environment, whether to unlock the mobile device or prompt the user to provide an additional response to another security task.
-
公开(公告)号:US10129228B1
公开(公告)日:2018-11-13
申请号:US15085777
申请日:2016-03-30
Applicant: Amazon Technologies, Inc.
Inventor: Jason Anthony Mobarak , Rajasimman Madhivanan , Andrew Jay Roths
Abstract: Various examples are directed to systems and methods for establishing a secure, authenticated connection between devices utilizing a password authenticated key exchange. A client may send an encrypted connection request message to a server via a first communication medium. The server may send the client first data token data via a first communication medium. The client may encrypt the first data token with a password-authenticated key, for example, obtained in a password authenticated key exchange with the server. The client may encrypt the first token data based at least in part on the password-authenticated key to generate a message authentication code (MAC). The client may send the MAC to the server.
-
公开(公告)号:US09813908B2
公开(公告)日:2017-11-07
申请号:US15349874
申请日:2016-11-11
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Phivos Costas Aristides , Darren Ernest Canavor , Arnaud Marie Froment , Scott Donald Gregory , Cory Adam Johnson , Chelsea Celest Krueger , Jon Arron McClintock , Vijay Rangarajan , Andrew Jay Roths
CPC classification number: H04W12/06 , H04L63/08 , H04L63/083 , H04L63/0876 , H04L63/107 , H04M1/67 , H04M1/72522 , H04M1/72572 , H04M1/72577
Abstract: An access control application for mobile devices is provided. The access control application may be configured to generate a set of security tasks based at least in part on information corresponding to a user's interactions with the mobile device. An unlock screen of the mobile device may be triggered and a security tasks from the generated set of security tasks may be displayed through a user interface of the mobile device. The user's response to the security tasks may be obtained and a confidence score may be calculated, based at least in part on the response. The access control application may then determine, based at least in part on the score and one or more attributes of the environment, whether to unlock the mobile device or prompt the user to provide an additional response to another security task.
-
公开(公告)号:US09778653B1
公开(公告)日:2017-10-03
申请号:US14318373
申请日:2014-06-27
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Jon Arron McClintock , Daniel Buchmueller , Varadarajan Gopalakrishnan , Fabian Hensel , Jesper Mikael Johansson , Brandon William Porter , Andrew Jay Roths
CPC classification number: G05D1/00 , B60L11/1816 , B60L11/1822 , B60L11/1827 , B60L11/1837 , B60L11/1838 , B60L11/1846 , B60L2200/10 , B67D7/0401 , B67D7/08 , B67D7/145 , B67D7/348 , B67D2007/0459 , B67D2007/0463 , B67D2007/0465 , B67D2007/0469 , B67D2007/0473 , G05D1/0684 , G06Q10/047 , G06Q10/08
Abstract: Devices such as vehicles, remote sensors, and so forth consume energy during operation. Described herein are systems, devices, and methods for transferring energy from an uncrewed autonomous vehicle to a vehicle such as a car. The uncrewed autonomous vehicle may locate the vehicle at a rendezvous location, and connect with the vehicle while the vehicle moves. Once the uncrewed autonomous vehicle connects to the vehicle, the uncrewed autonomous vehicle may transfer the energy to the vehicle.
-
公开(公告)号:US09663226B2
公开(公告)日:2017-05-30
申请号:US14671203
申请日:2015-03-27
Applicant: Amazon Technologies, Inc.
Inventor: Darren Ernest Canavor , Varadarajan Gopalakrishnan , Jesper Mikael Johansson , Jon Arron McClintock , Brandon William Porter , Andrew Jay Roths
CPC classification number: B64C39/024 , B64C2201/141 , B64C2201/146 , G05D1/104 , G06Q10/00 , H04L63/0823 , H04W12/06
Abstract: An unmanned vehicle receives a message from another unmanned vehicle. The recipient unmanned vehicle uses information included with the message to determine whether a quorum of other unmanned vehicles have vetted information in the message. If a quorum of unmanned vehicles have vetted the message, the unmanned vehicle uses the information in the message to determine how to perform one or more operations.
-
公开(公告)号:US20170064555A1
公开(公告)日:2017-03-02
申请号:US15349874
申请日:2016-11-11
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Phivos Costas Aristides , Darren Ernest Canavor , Arnaud Marie Froment , Scott Donald Gregory , Cory Adam Johnson , Chelsea Celest Krueger , Jon Arron McClintock , Vijay Rangarajan , Andrew Jay Roths
CPC classification number: H04W12/06 , H04L63/08 , H04L63/083 , H04L63/0876 , H04L63/107 , H04M1/67 , H04M1/72522 , H04M1/72572 , H04M1/72577
Abstract: An access control application for mobile devices is provided. The access control application may be configured to generate a set of security tasks based at least in part on information corresponding to a user's interactions with the mobile device. An unlock screen of the mobile device may be triggered and a security tasks from the generated set of security tasks may be displayed through a user interface of the mobile device. The user's response to the security tasks may be obtained and a confidence score may be calculated, based at least in part on the response. The access control application may then determine, based at least in part on the score and one or more attributes of the environment, whether to unlock the mobile device or prompt the user to provide an additional response to another security task.
Abstract translation: 提供了用于移动设备的访问控制应用。 访问控制应用可以被配置为至少部分地基于与用户与移动设备的交互相对应的信息来生成一组安全任务。 可以触发移动设备的解锁屏幕,并且可以通过移动设备的用户界面显示来自生成的一组安全任务的安全任务。 可以至少部分地基于响应来获得用户对安全任务的响应并且可以计算可信度得分。 访问控制应用程序可以至少部分地基于环境的得分和一个或多个属性来确定是解锁移动设备还是提示用户向另一个安全任务提供额外的响应。
-
40.
公开(公告)号:US09524648B1
公开(公告)日:2016-12-20
申请号:US14543198
申请日:2014-11-17
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Varadarajan Gopalakrishnan , Jesper Mikael Johansson , James Domit Mackraz , Jon Arron McClintock , Brandon William Porter , Andrew Jay Roths
CPC classification number: G08G5/0082 , B64C39/024 , B64C2201/14 , G05D1/0027 , G05D1/0055 , G06F21/554 , G08G5/0008 , G08G5/0056 , G08G5/0069
Abstract: Uncrewed autonomous vehicles (“UAVs”) may navigate from one location to another location. Described herein are systems, devices, and methods providing countermeasures for threats that may compromise the UAVs. A plurality of UAVs may establish a mesh network to distribute information to one another. A first UAV may receive external data from a second UAV using the mesh network. The external data may be used to confirm or cross-check data such as location, heading, altitude, and so forth. Disagreement between data generated by the first UAV with external data from the second UAV may result in the determination that the first UAV is compromised. Remedial actions may be taken, such as the first UAV may be directed to a safe location to land or park, may receive commands from another UAV, and so forth.
Abstract translation: 未开采的自主车辆(“UAV”)可以从一个位置导航到另一个位置。 这里描述了为可能危及无人机的威胁提供对策的系统,设备和方法。 多个UAV可以建立网状网络以将信息彼此分配。 第一UAV可以使用网状网络从第二UAV接收外部数据。 外部数据可用于确认或交叉检查数据,如位置,航向,高度等。 由第一UAV与第二UAV的外部数据产生的数据之间的不一致可能导致第一UAV被确认。 可以采取补救措施,例如可以将第一UAV引导到安全的地点着陆或停放,可以从另一UAV接收命令等等。
-
-
-
-
-
-
-
-
-