-
公开(公告)号:US11868917B1
公开(公告)日:2024-01-09
申请号:US15927929
申请日:2018-03-21
Applicant: Amazon Technologies, Inc.
Inventor: Priti Marappan , Darren Ernest Canavor , Daniel Wade Hitchcock , Bharath Kumar Bhimanaik , Andrew Jay Roths
CPC classification number: G06N7/01 , E05B15/0205 , E05B41/00 , G06N20/00 , E05B47/0001 , E05B2047/002 , E05B2047/0016 , E05B2047/0058 , E05B2047/0068 , E05B2047/0069 , E05B2047/0081 , E05B2047/0088
Abstract: A method of implementing a network-enabled secure door lock, comprising obtaining measurements of an environment associated with a door from a variety of sensor types; generating, based at least in part on the measurements, a set of inputs to a machine-learning model; inputting the set of inputs into the machine learning model to determine a status of the door; generating a message that indicates the status of the door; and transmitting the message to a user device.
-
公开(公告)号:US10911224B1
公开(公告)日:2021-02-02
申请号:US15927915
申请日:2018-03-21
Applicant: Amazon Technologies, Inc.
Inventor: Priti Marappan , Darren Ernest Canavor , Daniel Wade Hitchcock , Bharath Kumar Bhimanaik , Andrew Jay Roths
Abstract: A method of implementing a network-enabled secure door lock, comprising determining, at a first component of the lock, a nonce; wirelessly transmitting the nonce to a second component of the door lock, the first component and second component selectively mechanically engagable with one another to prevent relative movement between the first component and second component to prevent opening of a door; receiving, at the first component, a first message; using a cryptographic key associated with the second component and the nonce to validate the first message; and as a result of determining that the message is valid, transmitting a second message indicating that the first component and second component have become mechanically engaged with one another.
-
公开(公告)号:US09801216B1
公开(公告)日:2017-10-24
申请号:US14675207
申请日:2015-03-31
Applicant: Amazon Technologies, Inc.
Inventor: Robert Williams , Charles Louis Ward , Amir Frenkel , Roger Robert Webster , Andrew Jay Roths
CPC classification number: H04W76/14 , H04L63/0428 , H04L63/061 , H04L67/1087 , H04L67/34 , H04W12/04 , H04W12/06 , H04W12/08 , H04W76/11 , H04W84/12
Abstract: In some cases, a provisioned electronic device may receive a request for configuration information from an unprovisioned device. In response, the provisioned device may determine configuration information to send to the unprovisioned device based at least in part on the contents of the request. Examples of configuration information may include network credentials for connecting to a wireless local area network, a registration token that identifies the unprovisioned device to a fulfillment service, and user preferences associated with a user of the provisioned device. Further, the provisioned device may send the configuration information to the unprovisioned device. Upon receipt of the configuration information, the unprovisioned device may utilize the configuration information to order products from the fulfillment service. In some instances, the provisioned device may obtain the configuration information from the fulfillment service.
-
公开(公告)号:US20170228266A1
公开(公告)日:2017-08-10
申请号:US15495640
申请日:2017-04-24
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Heidi Lynn Daigler , Andrew Jay Roths
IPC: G06F9/54 , G06F21/53 , G06F3/0482 , G06F21/62
CPC classification number: G06F9/543 , G06F3/0482 , G06F21/53 , G06F21/606 , G06F21/6218 , G06F2221/033
Abstract: An application may provide an export file type definition indicating data objects that may be shared with another application. Sharing data object between applications may include obtaining the export file type definition from the application and displaying a graphical user interface based at least in part on the export file type definition. Data objects may be selected through the graphical user interface and provided to another application based at least in part on the selection.
-
公开(公告)号:US09727737B1
公开(公告)日:2017-08-08
申请号:US14810275
申请日:2015-07-27
Applicant: Amazon Technologies, Inc.
Inventor: Daniel Wade Hitchcock , Darren Ernest Canavor , Jesper Mikael Johansson , Bharath Kumar Bhimanaik , Andrew Jay Roths
IPC: G06F21/00 , G06F21/57 , G06F3/0484
CPC classification number: G06F21/577 , G06F3/04842 , G06F3/04883 , G06F2221/033
Abstract: Computing devices are disclosed that include functionality for providing a trustworthy indication of software integrity. The computing devices include a hardware trust evaluation device capable of determining the trustworthiness of computer programs executing on the devices. At least one trust indicator is also connected to the hardware trust evaluation device for providing an external indication of the trustworthiness of a computer program. Additional security information regarding the trustworthiness of the computer program may be displayed on the primary display device of the computing device. The display of the security information is triggered by a user of the computing device submitting a request through a secure mechanism, where the request is unobservable and inaccessible to programs executing on the computing device. Additional secure mechanisms, such as a unique user interface for displaying the security information, can be utilized to ensure the authenticity of the displayed security information.
-
公开(公告)号:US09497312B1
公开(公告)日:2016-11-15
申请号:US14624497
申请日:2015-02-17
Applicant: Amazon Technologies, Inc.
Inventor: Jesper Mikael Johansson , Phivos Costas Aristides , Darren Ernest Canavor , Arnaud Marie Froment , Scott Donald Gregory , Cory Adam Johnson , Chelsea Celest Krueger , Jon Arron McClintock , Vijay Rangarajan , Andrew Jay Roths
CPC classification number: H04W12/06 , H04L63/08 , H04L63/083 , H04L63/0876 , H04L63/107 , H04M1/67 , H04M1/72522 , H04M1/72572 , H04M1/72577
Abstract: An access control application for mobile devices is provided. The access control application may be configured to generate a set of security tasks based at least in part on information corresponding to a user's interactions with the mobile device. An unlock screen of the mobile device may be triggered and a security tasks from the generated set of security tasks may be displayed through a user interface of the mobile device. The user's response to the security tasks may be obtained and a confidence score may be calculated, based at least in part on the response. The access control application may then determine, based at least in part on the score and one or more attributes of the environment, whether to unlock the mobile device or prompt the user to provide an additional response to another security task.
Abstract translation: 提供了用于移动设备的访问控制应用。 访问控制应用可以被配置为至少部分地基于与用户与移动设备的交互相对应的信息来生成一组安全任务。 可以触发移动设备的解锁屏幕,并且可以通过移动设备的用户界面显示来自生成的一组安全任务的安全任务。 可以至少部分地基于响应来获得用户对安全任务的响应并且可以计算可信度得分。 访问控制应用程序可以至少部分地基于环境的得分和一个或多个属性来确定是解锁移动设备还是提示用户向另一个安全任务提供额外的响应。
-
公开(公告)号:US20160285863A1
公开(公告)日:2016-09-29
申请号:US14671161
申请日:2015-03-27
Applicant: Amazon Technologies, Inc.
Inventor: Darren Ernest Canavor , Varadarajan Gopalakrishnan , Jesper Mikael Johansson , Jon Arron McClintock , Brandon William Porter , Andrew Jay Roths
CPC classification number: H04L63/0823 , B64C39/02 , B64C39/024 , B64C2201/146 , G05D1/00 , G05D1/0027 , G07C5/00 , G08G5/00 , G08G5/0034 , G08G5/0039 , H04B7/185 , H04L29/12 , H04L63/123 , H04W4/12 , H04W12/06 , H04W12/10
Abstract: Two unmanned vehicles come within communication range of one another. The unmanned vehicles exchange logs of messages each has received. Each of the unmanned vehicles analyzes the messages that it received from the other unmanned vehicle to determine whether any of the received messages warrants changing a set of tasks it was planning to perform. When a message indicates that a task should be changed, the task is updated accordingly.
Abstract translation: 两辆无人车相互通讯。 无人车交换每个消息的日志。 每个无人驾驶车辆分析从其他无人驾驶车辆接收到的消息,以确定是否有任何接收到的消息需要更改其计划执行的一组任务。 当消息指示应该更改任务时,相应地更新任务。
-
公开(公告)号:US10834051B2
公开(公告)日:2020-11-10
申请号:US15389343
申请日:2016-12-22
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Jesper Mikael Johansson , Andrew Jay Roths
Abstract: Disclosed are various embodiments for malware detection by way of proxy servers. In one embodiment, a proxied request for a network resource from a network site is received from a client device by a proxy server application. The proxied request is analyzed to determine whether the proxied request includes protected information transmitted in an unsecured manner. It is then determined whether the network resource comprises malware based at least in part on an execution of the network resource or whether the proxied request includes the protected information transmitted in the unsecured manner. The proxy server application refrains from sending data generated by the network resource to the client device in response to the proxied request when the network resource is determined to comprise the malware.
-
公开(公告)号:US10524299B1
公开(公告)日:2019-12-31
申请号:US15714046
申请日:2017-09-25
Applicant: Amazon Technologies, Inc.
Inventor: Robert Williams , Charles Louis Ward , Amir Frenkel , Roger Robert Webster , Andrew Jay Roths
Abstract: In some cases, a provisioned electronic device may receive a request for configuration information from an unprovisioned device. In response, the provisioned device may determine configuration information to send to the unprovisioned device based at least in part on the contents of the request. Examples of configuration information may include network credentials for connecting to a wireless local area network, a registration token that identifies the unprovisioned device to a fulfillment service, and user preferences associated with a user of the provisioned device. Further, the provisioned device may send the configuration information to the unprovisioned device. Upon receipt of the configuration information, the unprovisioned device may utilize the configuration information to order products from the fulfillment service. In some instances, the provisioned device may obtain the configuration information from the fulfillment service.
-
公开(公告)号:US10230522B1
公开(公告)日:2019-03-12
申请号:US15079989
申请日:2016-03-24
Applicant: Amazon Technologies, Inc.
Inventor: Andrew Jay Roths , Marc Solsona-Palomar
Abstract: This disclosure describes methods, apparatus, and systems related to controlled access data allocation. A device may receive a first request from a first device to establish a first connection with a wireless network. The device may receive a second request from a second device to establish a second connection with the wireless network. The device may determine a first access data for the first device, wherein the first access data is associated with a first access configuration. The device may determine a second access data for the second device, wherein the second access data is associated with a second access configuration, wherein the second access configuration is different from the first access configuration. The device may send the first access data to the first device. The device may send the second access data to the second device. The device may establish the first connection with the first device, wherein the first connection is at the first access configuration. The device may establish the second connection with the second device, wherein the second connection is at the second access configuration.
-
-
-
-
-
-
-
-
-