-
公开(公告)号:US09876645B1
公开(公告)日:2018-01-23
申请号:US14624480
申请日:2015-02-17
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Jesper Mikael Johansson , Jon Arron McClintock
CPC classification number: H04L9/3247 , G06F21/44 , G06F21/57 , G06F21/645 , G06F2221/034
Abstract: A manufacturer of computing equipment may generate a signature for computing equipment by measuring various attributes of the computing equipment, such as the impedance across circuits included in the computing equipment. Verification equipment may be provided to a recipient of the computing equipment. The verification equipment may be configured to generate a signature of the computing equipment over a physical connection between the verification equipment and the computing equipment. A determination may be made whether the computing equipment has been tamper with based at least in part on the signature generated by the manufacturer and the signature generated by the recipient.
-
公开(公告)号:US09866393B1
公开(公告)日:2018-01-09
申请号:US14580111
申请日:2014-12-22
Applicant: Amazon Technologies, Inc.
Inventor: Dylan Harris Rush , Darren Ernest Canavor , Daniel Wade Hitchcock , Jesper Mikael Johansson , Jon Arron McClintock
CPC classification number: H04L9/3247 , H04L9/3231 , H04L9/3234 , H04L9/3236
Abstract: A system and method for generating a signature for a document using an identity verification token. The identity verification token receives a request that includes a set of credential data from a signatory, obtains a document identifier that identifies the document to a service provider, and obtains a token identifier that identifies the identity verification token to the service provider. The identity verification token generates the signature based at least in part on the obtained document identifier, the received set of credential data, and obtained the token identifier, and provides the signature.
-
公开(公告)号:US09864852B2
公开(公告)日:2018-01-09
申请号:US14809762
申请日:2015-07-27
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Darren Ernest Canavor , Daniel Wade Hitchcock , Bharath Kumar Bhimanaik
CPC classification number: G06F21/31 , G06F21/33 , G06F21/44 , H04L63/0838 , H04L63/0884 , H04L2463/082
Abstract: Disclosed are various embodiments for providing multi-factor authentication credentials. For example, a first application may send an authentication request to a first authentication service, where the request specifies a first authentication factor. A second application may generate a user interface upon a display, where the user interface facilitates entry of a user approval. In response to receiving the user approval, the second application may send a second authentication factor to a second authentication service that acts as a proxy for the first authentication service. In some embodiments, an application may be configured to automatically transfer a one-time password or other authentication factor to a recipient in response to receiving a user approval.
-
公开(公告)号:US09824207B1
公开(公告)日:2017-11-21
申请号:US14571254
申请日:2014-12-15
Applicant: Amazon Technologies, Inc.
CPC classification number: G06F21/46
Abstract: Techniques for maintaining and updating authentication information for a plurality of accounts may be provided. In an example a first set of authentication information for the plurality of accounts may be maintained. A second set of authentication information that has been marked as potentially compromised may be received. A third set of authentication information may be generated based on the overlap between the first set of authentication information and the second set of authentication information. The first set of authentication information may be updated based at least in part on one or more security authentication protocols and the third set of authentication information.
-
公开(公告)号:US09805215B1
公开(公告)日:2017-10-31
申请号:US14828276
申请日:2015-08-17
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Dominique Imjya Brezinski , Darren Ernest Canavor , Darin Keith McAdams , Jon Arron McClintock , Brandon William Porter
CPC classification number: G06F21/6245 , G06F21/6227 , H04L67/42
Abstract: A technology is described for making a decision based on identifying without disclosing the identifying information. The method may include receiving a mapping value that represents identifying information that has been converted into a mapping value. A request for data associated with the identifying information may be made by providing the mapping value as a proxy for the identifying information whereby the data associated with the identifying information may be located using the mapping value and returned to a requesting client or service.
-
公开(公告)号:US20170228266A1
公开(公告)日:2017-08-10
申请号:US15495640
申请日:2017-04-24
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Heidi Lynn Daigler , Andrew Jay Roths
IPC: G06F9/54 , G06F21/53 , G06F3/0482 , G06F21/62
CPC classification number: G06F9/543 , G06F3/0482 , G06F21/53 , G06F21/606 , G06F21/6218 , G06F2221/033
Abstract: An application may provide an export file type definition indicating data objects that may be shared with another application. Sharing data object between applications may include obtaining the export file type definition from the application and displaying a graphical user interface based at least in part on the export file type definition. Data objects may be selected through the graphical user interface and provided to another application based at least in part on the selection.
-
公开(公告)号:US09727737B1
公开(公告)日:2017-08-08
申请号:US14810275
申请日:2015-07-27
Applicant: Amazon Technologies, Inc.
Inventor: Daniel Wade Hitchcock , Darren Ernest Canavor , Jesper Mikael Johansson , Bharath Kumar Bhimanaik , Andrew Jay Roths
IPC: G06F21/00 , G06F21/57 , G06F3/0484
CPC classification number: G06F21/577 , G06F3/04842 , G06F3/04883 , G06F2221/033
Abstract: Computing devices are disclosed that include functionality for providing a trustworthy indication of software integrity. The computing devices include a hardware trust evaluation device capable of determining the trustworthiness of computer programs executing on the devices. At least one trust indicator is also connected to the hardware trust evaluation device for providing an external indication of the trustworthiness of a computer program. Additional security information regarding the trustworthiness of the computer program may be displayed on the primary display device of the computing device. The display of the security information is triggered by a user of the computing device submitting a request through a secure mechanism, where the request is unobservable and inaccessible to programs executing on the computing device. Additional secure mechanisms, such as a unique user interface for displaying the security information, can be utilized to ensure the authenticity of the displayed security information.
-
公开(公告)号:US09710368B1
公开(公告)日:2017-07-18
申请号:US14268801
申请日:2014-05-02
Applicant: Amazon Technologies, Inc.
Inventor: Pavan Gundeti , Jesper Mikael Johansson , Daniel Wade Hitchcock
IPC: G06F11/36
CPC classification number: G06F11/3688 , G06F11/3692
Abstract: Application developers may develop applications or portions of application that do not have a corresponding user interface. Testing non-user interface elements of an application may require application developers to develop corresponding user interface elements for all or a portion of the executable code included in the application. Developers may test non-user interface elements of an application or library by wrapping the executable code in a sample application managed by a test harness. The test harness may transmit test operations configured to test the non-user interface elements of the application to the sample application over an inter-process communication channel. The sample application may execute the test and return the results of the test to the test harness using inter-process communication methods.
-
公开(公告)号:US20170187702A1
公开(公告)日:2017-06-29
申请号:US15455169
申请日:2017-03-10
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Darren Ernest Canavor , Daniel Wade Hitchcock , Bharath Kumar Bhimanaik , Jon Arron McClintock
CPC classification number: H04L63/08 , G06F21/10 , G06F21/602 , H04L9/08 , H04L9/14 , H04L29/06639 , H04L29/06646 , H04L63/0407 , H04L63/0414 , H04L63/0421 , H04L63/0428 , H04L67/306 , H04L2209/38
Abstract: Disclosed are various embodiments for correlating a first use case-specific entity identifier with a second use case-specific entity identifier. A chained entity identifier corresponds to the first use case-specific entity identifier. The chained entity identifier can include the second use case-specific entity identifier cryptographically wrapped by a use case-specific key. The second use case-specific entity identifier can be received from the chained entity identifier. The second use case-specific entity identifier can be correlated to the first use case-specific entity identifier.
-
公开(公告)号:US09652604B1
公开(公告)日:2017-05-16
申请号:US14225331
申请日:2014-03-25
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Gregory Branchek Roth , David Matthew Platz , Rajendra Kumar Vippagunta
IPC: H04L29/06 , G06F21/36 , G06F3/0484
CPC classification number: G06F21/36 , G06F3/04842 , G06F3/0486 , G06F3/04886 , H04L63/0823 , H04W4/021 , H04W12/06
Abstract: Authentication objects are usable to generate other authentication objects. A user associated with a first authentication object has access to a system. The first authentication object is usable to generate a second authentication object that is usable by a second user for access to the system in accordance with access granted to the second user via the second authentication object. The second authentication object may have various restrictions so that the second user does not obtain all access available to the first user.
-
-
-
-
-
-
-
-
-