-
公开(公告)号:US11150927B1
公开(公告)日:2021-10-19
申请号:US14822388
申请日:2015-08-10
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Nima Sharifi Mehr , Narasimha Rao Lakkakula , Scott Gerard Carmack
IPC: G06F9/455
Abstract: This document describes techniques for placing instances on servers of a service provider environment. In an example embodiment, a system can determine that characteristics of a new virtual machine instance match a co-tenant policy of an existing virtual machine instance on a server and factor that information into a decision to place the virtual machine instance.
-
公开(公告)号:US09847033B1
公开(公告)日:2017-12-19
申请号:US14866745
申请日:2015-09-25
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
CPC classification number: G08G5/0069 , G01S19/215 , G05D1/0088 , G05D1/104 , G06Q10/083 , G06Q10/08355 , G08G5/0008 , G08G5/0013 , G08G5/0021 , G08G5/0026 , G08G5/0039 , G08G5/0052 , G08G5/0056
Abstract: Techniques for determining whether data associated with an autonomous operation of a first unmanned vehicle may be trusted. For example, the first unmanned vehicle may receive an indication related to the data and originating from a second unmanned vehicle over a network. For instance, the indication may indicate that similar data for a similar autonomous operation of the second unmanned vehicle may be untrusted. Based on a level of trust accorded to the indication, the first unmanned vehicle may determine that the data may be untrusted and the autonomous navigation may be directed independently of the data.
-
公开(公告)号:US10331441B2
公开(公告)日:2019-06-25
申请号:US15814064
申请日:2017-11-15
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Daniele Bellucci
Abstract: The present disclosure describes a system and method that identifies locations in source code files that are associated with particular Web requests. The system generates a fingerprint for each Web request based at least in part on the parameters of each HTTP request. By fingerprinting the properties of the source code that generates each HTTP request, Web requests that are generated by executing the fingerprinted code can be traced back to specific source code files, and in some cases an exact line of code. In many examples, a webpage or an action on a webpage can be traced back to a line of source code that is associated with the request. This may allow a developer to find a software defect or security vulnerability by tracing Web requests of a running application and then mapping suspect Web requests back to corresponding lines of code.
-
公开(公告)号:US09849978B1
公开(公告)日:2017-12-26
申请号:US14866706
申请日:2015-09-25
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
CPC classification number: B64C39/024 , B64C2201/024 , B64C2201/145 , G01C21/005 , G01C21/20 , G01S19/015 , G08G5/0008 , G08G5/0013 , G08G5/0056 , G08G5/0069
Abstract: Techniques for determining whether data associated with an autonomous operation of an unmanned vehicle may be trusted. For example, a first set of data may be provided from a source external to the unmanned vehicle. A second set of data may be accessed. This second set may be provided from a source internal to the unmanned vehicle and may be associated with the same autonomous operation. The two sets may be compared to determine whether the first set of data may be trusted or not. If untrusted, the autonomous navigation may be directed based on the second set of data and independently of the first set.
-
公开(公告)号:US09725171B1
公开(公告)日:2017-08-08
申请号:US14866743
申请日:2015-09-25
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
CPC classification number: B64C39/024 , B64C2201/027 , B64C2201/123 , B64C2201/128 , B64C2201/145 , G05D1/102 , G05D3/00
Abstract: Techniques for determining whether data associated with an autonomous operation of an unmanned vehicle may be trusted. For example, the data may be analyzed in light of a capability of the unmanned vehicle. The analysis may indicate an operation of the unmanned vehicle. If the operation is unsupported by the capability, the data may be determined to be untrusted. Accordingly, the autonomous navigation may be directed independently of the untrusted data.
-
公开(公告)号:US10528743B2
公开(公告)日:2020-01-07
申请号:US15651277
申请日:2017-07-17
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Alun Jones , Narasimha Rao Lakkakula
Abstract: Disclosed are various embodiments for identifying characteristics of developers of problematic software. Report data generated by a security analysis tool is received, which is based at least in part on a security analysis of a program or an operational configuration. The report data indicates one or more security issues identified in the program or the operational configuration. A user is identified who is responsible for at least a threshold impact of the security issue(s). Coding or configuration characteristics associated with the user are then determined.
-
公开(公告)号:US20180074818A1
公开(公告)日:2018-03-15
申请号:US15814064
申请日:2017-11-15
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Daniele Bellucci
IPC: G06F9/44
Abstract: The present disclosure describes a system and method that identifies locations in source code files that are associated with particular Web requests. The system generates a fingerprint for each Web request based at least in part on the parameters of each HTTP request. By fingerprinting the properties of the source code that generates each HTTP request, Web requests that are generated by executing the fingerprinted code can be traced back to specific source code files, and in some cases an exact line of code. In many examples, a webpage or an action on a webpage can be traced back to a line of source code that is associated with the request. This may allow a developer to find a software defect or security vulnerability by tracing Web requests of a running application and then mapping suspect Web requests back to corresponding lines of code.
-
公开(公告)号:US09630712B1
公开(公告)日:2017-04-25
申请号:US14863025
申请日:2015-09-23
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
CPC classification number: B64C39/024 , B64C37/02 , B64C39/022 , B64C2201/021 , B64C2201/024 , B64C2201/108 , B64C2201/12 , B64C2201/148 , B64D5/00 , G05D1/0661
Abstract: This disclosure describes systems and processes using multirotor lifter to deploy and/or engage fixed wing aircraft. For example, one or more unmanned multirotor lifters may engage an unmanned fixed wing aircraft, aerially navigate the fixed wing aircraft vertically to a desired altitude, and then release the fixed wing aircraft so that the fixed wing aircraft can initiate a flight plan. In some implementations, multirotor lifter may also be configured to engage fixed wing aircraft while both the multirotor lifters and the fixed wing aircraft are in flight.
-
公开(公告)号:US11663341B2
公开(公告)日:2023-05-30
申请号:US16723479
申请日:2019-12-20
Applicant: Amazon Technologies, Inc.
Inventor: Jon Arron McClintock , Alun Jones , Narasimha Rao Lakkakula
CPC classification number: G06F21/577 , G06F8/71 , G06F8/77 , G06F11/3604
Abstract: Disclosed are various embodiments for tracking developer behavior with respect to software analysis tools. In one embodiment, a security analysis is performed upon a first revision of a program, where the security analysis is based at least in part on a plurality of rules. A first security issue found in the security analysis upon the first revision of the program is identified. The security analysis is performed upon a second revision of the program. A second security issue found in the security analysis upon the second revision of the program is identified. The rules are updated based at least in part on whether the first security issue is corrected in the second revision as determined based at least in part on a comparison of the first security issue to the second security issue.
-
公开(公告)号:US10173777B1
公开(公告)日:2019-01-08
申请号:US15461209
申请日:2017-03-16
Applicant: Amazon Technologies, Inc.
Inventor: Scott Gerard Carmack , Narasimha Rao Lakkakula , Nima Sharifi Mehr
Abstract: This disclosure describes systems and processes using multirotor lifter to deploy and/or engage fixed wing aircraft. For example, one or more unmanned multirotor lifters may engage an unmanned fixed wing aircraft, aerially navigate the fixed wing aircraft vertically to a desired altitude, and then release the fixed wing aircraft so that the fixed wing aircraft can initiate a flight plan. In some implementations, multirotor lifter may also be configured to engage fixed wing aircraft while both the multirotor lifters and the fixed wing aircraft are in flight.
-
-
-
-
-
-
-
-
-