-
公开(公告)号:US09633209B1
公开(公告)日:2017-04-25
申请号:US14186351
申请日:2014-02-21
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Darren Ernest Canavor , Daniel Wade Hitchcock , Bharath Kumar Bhimanaik , Jon Arron McClintock
CPC classification number: H04L63/08 , G06F21/10 , G06F21/602 , H04L9/08 , H04L9/14 , H04L29/06639 , H04L29/06646 , H04L63/0407 , H04L63/0414 , H04L63/0421 , H04L63/0428 , H04L67/306 , H04L2209/38
Abstract: Disclosed are various embodiments for creating and manipulating chained entity identifiers that include multiple use case-specific entity identifiers. Each of the use case-specific entity identifiers may identify a single entity but may differ, as they are use case-specific. Further, each of the use case-specific entity identifiers may be encrypted and/or signed using different use case-specific keys. The use case-specific entity identifiers may be nested or appended within a chained entity identifier.
-
公开(公告)号:US09602540B1
公开(公告)日:2017-03-21
申请号:US13917143
申请日:2013-06-13
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Darren Ernest Canavor , Jon Arron McClintock
CPC classification number: H04L63/0281 , H04L63/08 , H04L63/10 , H04L63/20
Abstract: Disclosed are various embodiments for management of third-party accounts for users in an organization. Network traffic between a client and a third-party network site under management is inspected. The client is associated with a user in an organization. It is determined whether the network traffic corresponds to a managed account with the third-party network site. It is determined whether the network traffic complies with a rule established by the organization. An action is implemented in response to determining that the network traffic does not comply with the rule.
-
公开(公告)号:US20170064555A1
公开(公告)日:2017-03-02
申请号:US15349874
申请日:2016-11-11
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Phivos Costas Aristides , Darren Ernest Canavor , Arnaud Marie Froment , Scott Donald Gregory , Cory Adam Johnson , Chelsea Celest Krueger , Jon Arron McClintock , Vijay Rangarajan , Andrew Jay Roths
CPC classification number: H04W12/06 , H04L63/08 , H04L63/083 , H04L63/0876 , H04L63/107 , H04M1/67 , H04M1/72522 , H04M1/72572 , H04M1/72577
Abstract: An access control application for mobile devices is provided. The access control application may be configured to generate a set of security tasks based at least in part on information corresponding to a user's interactions with the mobile device. An unlock screen of the mobile device may be triggered and a security tasks from the generated set of security tasks may be displayed through a user interface of the mobile device. The user's response to the security tasks may be obtained and a confidence score may be calculated, based at least in part on the response. The access control application may then determine, based at least in part on the score and one or more attributes of the environment, whether to unlock the mobile device or prompt the user to provide an additional response to another security task.
Abstract translation: 提供了用于移动设备的访问控制应用。 访问控制应用可以被配置为至少部分地基于与用户与移动设备的交互相对应的信息来生成一组安全任务。 可以触发移动设备的解锁屏幕,并且可以通过移动设备的用户界面显示来自生成的一组安全任务的安全任务。 可以至少部分地基于响应来获得用户对安全任务的响应并且可以计算可信度得分。 访问控制应用程序可以至少部分地基于环境的得分和一个或多个属性来确定是解锁移动设备还是提示用户向另一个安全任务提供额外的响应。
-
公开(公告)号:US09575979B1
公开(公告)日:2017-02-21
申请号:US14107950
申请日:2013-12-16
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Jon Arron McClintock , Shailendra Batra , Thibault Candebat , Scott Gerard Carmack , Sachin Purushottam Joglekar , Alun Mark Jones , William Frederick Kruse , Narasimha Rao Lakkakula , Sunu Aby Mathew
CPC classification number: G06F17/30109 , G06F21/604 , G06F21/6218 , G06F2221/034
Abstract: Techniques are described for automatically determining application composition and application ownership of an application that may include a plurality of files deployed to a plurality of host devices. The determination of application composition may be based on analyzing various types of metadata that may provide evidence of associations between deployed files, such as metadata describing the deployment of files to host devices, metadata describing the files tracked within a source control system, or other types of metadata. The determination of application ownership may also be based on analyzing the various types of metadata that provide evidence of associations between files and individuals or groups of individuals within an organization.
Abstract translation: 描述了用于自动确定应用程序的应用程序组成和应用程序所有权的技术,其中可能包括部署到多个主机设备的多个文件。 应用程序组合的确定可以基于分析可以提供部署文件之间的关联的各种类型的元数据,例如描述向主机设备部署文件的元数据,描述在源控制系统中跟踪的文件的元数据或其他类型 的元数据。 应用程序所有权的确定也可以基于分析各种类型的元数据,这些元数据提供文件与组织内的个人或个人组之间的关联的证据。
-
75.
公开(公告)号:US09524648B1
公开(公告)日:2016-12-20
申请号:US14543198
申请日:2014-11-17
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Varadarajan Gopalakrishnan , Jesper Mikael Johansson , James Domit Mackraz , Jon Arron McClintock , Brandon William Porter , Andrew Jay Roths
CPC classification number: G08G5/0082 , B64C39/024 , B64C2201/14 , G05D1/0027 , G05D1/0055 , G06F21/554 , G08G5/0008 , G08G5/0056 , G08G5/0069
Abstract: Uncrewed autonomous vehicles (“UAVs”) may navigate from one location to another location. Described herein are systems, devices, and methods providing countermeasures for threats that may compromise the UAVs. A plurality of UAVs may establish a mesh network to distribute information to one another. A first UAV may receive external data from a second UAV using the mesh network. The external data may be used to confirm or cross-check data such as location, heading, altitude, and so forth. Disagreement between data generated by the first UAV with external data from the second UAV may result in the determination that the first UAV is compromised. Remedial actions may be taken, such as the first UAV may be directed to a safe location to land or park, may receive commands from another UAV, and so forth.
Abstract translation: 未开采的自主车辆(“UAV”)可以从一个位置导航到另一个位置。 这里描述了为可能危及无人机的威胁提供对策的系统,设备和方法。 多个UAV可以建立网状网络以将信息彼此分配。 第一UAV可以使用网状网络从第二UAV接收外部数据。 外部数据可用于确认或交叉检查数据,如位置,航向,高度等。 由第一UAV与第二UAV的外部数据产生的数据之间的不一致可能导致第一UAV被确认。 可以采取补救措施,例如可以将第一UAV引导到安全的地点着陆或停放,可以从另一UAV接收命令等等。
-
公开(公告)号:US20160285864A1
公开(公告)日:2016-09-29
申请号:US14671264
申请日:2015-03-27
Applicant: Amazon Technologies, Inc.
Inventor: Darren Ernest Canavor , Varadarajan Gopalakrishnan , Jesper Mikael Johansson , Jon Arron McClintock , Brandon William Porter , Andrew Jay Roths
CPC classification number: H04L63/0823 , B64C39/024 , B64C2201/146 , H04L63/123 , H04W4/12 , H04W12/06 , H04W12/10
Abstract: An unmanned vehicle communicates with other unmanned vehicles. When the unmanned vehicle receives a message from another unmanned vehicle, the unmanned vehicle verifies authenticity of the message. For at least some types of messages, if determined that the message is authentic, the unmanned vehicle updates a set of operations the unmanned vehicle will perform in accordance with information in the message.
Abstract translation: 无人驾驶车辆与其他无人驾驶车辆通讯。 当无人驾驶车辆从另一辆无人驾驶车辆接收到消息时,无人驾驶车辆验证信息的真实性。 对于至少一些类型的消息,如果确定消息是可信的,则无人车辆根据消息中的信息更新无人车辆将执行的一组操作。
-
77.
公开(公告)号:US20160280370A1
公开(公告)日:2016-09-29
申请号:US14671203
申请日:2015-03-27
Applicant: Amazon Technologies, Inc.
Inventor: Darren Ernest Canavor , Varadarajan Gopalakrishnan , Jesper Mikael Johansson , Jon Arron McClintock , Brandon William Porter , Andrew Jay Roths
CPC classification number: B64C39/024 , B64C2201/141 , B64C2201/146 , G05D1/104 , G06Q10/00 , H04L63/0823 , H04W12/06
Abstract: An unmanned vehicle receives a message from another unmanned vehicle. The recipient unmanned vehicle uses information included with the message to determine whether a quorum of other unmanned vehicles have vetted information in the message. If a quorum of unmanned vehicles have vetted the message, the unmanned vehicle uses the information in the message to determine how to perform one or more operations.
Abstract translation: 无人驾驶车辆接收来自另一辆无人驾驶车辆的信息。 接收无人车辆使用消息中包含的信息来确定其他无人驾驶车辆的法定人数是否已经在消息中审查了信息。 如果无人驾驶车辆的法定人数已经审查了该消息,无人驾驶车辆将使用消息中的信息来确定如何执行一个或多个操作。
-
公开(公告)号:US09171164B1
公开(公告)日:2015-10-27
申请号:US13974378
申请日:2013-08-23
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock
CPC classification number: G06F21/62 , G06F21/556 , G06F21/57 , G06F2221/034
Abstract: Disclosed are various embodiments for a trust establishment application. Machine instances executed in the same computing environment generate side channel patterns embodying data identifying themselves as trusted machine instances. The side channel patterns are detected to determine which machine instances are trusted. An operational mode of a machine instance is configured as a function of whether a quorum of trusted machine instances are executed in the computing environment.
Abstract translation: 公开了用于信任建立应用的各种实施例。 在相同的计算环境中执行的机器实例生成体现数据的侧面信道模式,将自身标识为可信机器实例。 检测侧信道模式以确定哪些机器实例被信任。 机器实例的操作模式被配置为在计算环境中是否执行可信机器实例的数量。
-
公开(公告)号:US11310251B2
公开(公告)日:2022-04-19
申请号:US16670411
申请日:2019-10-31
Applicant: Amazon Technologies, Inc.
Inventor: Maarten Van Horenbeeck , Christopher Michael Anderson , Katharine Nicole Harrison , Matthew Ryan Jezorek , Jon Arron McClintock , Tushaar Sethi
Abstract: Techniques described and suggested herein include various systems and methods for determining risk levels associated with transiting data, and routing portions of the data in accordance with the determined risk levels. For example, a risk analyzer may apply risk classifiers to transiting data to determine overall risk levels of some or all of the transiting data. A traffic router may route transiting data according to determined risk profiles for the data. A sandbox may be implemented to compare, for a given input, expected and observed outputs for a subset of transiting data, so as to determine risk profiles associated with at least the subset.
-
公开(公告)号:US10979415B2
公开(公告)日:2021-04-13
申请号:US15912431
申请日:2018-03-05
Applicant: Amazon Technologies, Inc.
Inventor: Darren Ernest Canavor , Varadarajan Gopalakrishnan , Jesper Mikael Johansson , Jon Arron McClintock , Brandon William Porter , Andrew Jay Roths
IPC: H04L29/06 , B64C39/02 , H04W4/12 , H04W12/06 , H04W12/10 , H04L29/12 , G07C5/00 , H04B7/185 , G05D1/00 , G08G5/00
Abstract: Two unmanned vehicles come within communication range of one another. The unmanned vehicles exchange logs of messages each has received. Each of the unmanned vehicles analyzes the messages that it received from the other unmanned vehicle to determine whether any of the received messages warrants changing a set of tasks it was planning to perform. When a message indicates that a task should be changed, the task is updated accordingly.
-
-
-
-
-
-
-
-
-