-
公开(公告)号:US09678726B1
公开(公告)日:2017-06-13
申请号:US14671988
申请日:2015-03-27
Applicant: Amazon Technologies, Inc.
Inventor: Daniel Massaguer , Thomas Calogero Cascio , Jonathan Paul Thompson , Dong-Ju Nam , Archana Bhanuprasad Naik , Derek Steven Gebhard , Spencer Lyle Voorheis , Peter Phan Han
CPC classification number: G06F8/35 , G06F8/36 , G06F8/41 , G06F8/54 , G06F9/44526
Abstract: Disclosed are various embodiments for automatic generation of plugins for development tools. A platform-independent model is obtained for software functionality such as an application programming interface (API) to a software development kit (SDK). A platform-specific plugin is generated for a development environment based at least in part on the platform-independent model. The platform-specific plugin provides the software functionality for a particular platform of multiple platforms.
-
公开(公告)号:US09336389B1
公开(公告)日:2016-05-10
申请号:US13970322
申请日:2013-08-19
Applicant: Amazon Technologies, Inc.
Inventor: Mekka Chibuisi Okereke , Peter Phan Han
CPC classification number: G06F21/56 , G06F21/554 , G06F21/563 , G06F2221/033 , H04L63/1441
Abstract: Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an application to a fingerprint stored locally on the first computing device. The first computing device may transmit the source code to a second computing device to determine whether the source code resides in a database comprising approved applications. If the source code does not reside in the database, a thorough scan of the source code may be conducted.
Abstract translation: 公开了用于在很少或没有用户中断的情况下检查恶意软件的各种实施例。 第一计算设备可以将应用的源代码与本地存储在第一计算设备上的指纹进行比较。 第一计算设备可以将源代码发送到第二计算设备,以确定源代码是否驻留在包括已批准应用的数据库中。 如果源代码不在数据库中,则可以对源代码进行彻底的扫描。
-
公开(公告)号:US09953162B2
公开(公告)日:2018-04-24
申请号:US14935666
申请日:2015-11-09
Applicant: Amazon Technologies, Inc.
Inventor: Mekka Chibuisi Okereke , Peter Phan Han
CPC classification number: G06F21/56 , G06F21/554 , G06F21/563 , G06F2221/033 , H04L63/1441
Abstract: Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an application to a fingerprint stored locally on the first computing device. The first computing device may transmit the source code to a second computing device to determine whether the source code resides in a database comprising approved applications. If the source code does not reside in the database, a thorough scan of the source code may be conducted.
-
公开(公告)号:US20160070911A1
公开(公告)日:2016-03-10
申请号:US14935666
申请日:2015-11-09
Applicant: Amazon Technologies, Inc.
Inventor: Mekka Chibuisi Okereke , Peter Phan Han
CPC classification number: G06F21/56 , G06F21/554 , G06F21/563 , G06F2221/033 , H04L63/1441
Abstract: Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an application to a fingerprint stored locally on the first computing device. The first computing device may transmit the source code to a second computing device to determine whether the source code resides in a database comprising approved applications. If the source code does not reside in the database, a thorough scan of the source code may be conducted.
Abstract translation: 公开了用于在很少或没有用户中断的情况下检查恶意软件的各种实施例。 第一计算设备可以将应用的源代码与本地存储在第一计算设备上的指纹进行比较。 第一计算设备可以将源代码发送到第二计算设备,以确定源代码是否驻留在包括已批准应用的数据库中。 如果源代码不在数据库中,则可以对源代码进行彻底的扫描。
-
公开(公告)号:US09183389B1
公开(公告)日:2015-11-10
申请号:US13970322
申请日:2013-08-19
Applicant: Amazon Technologies, Inc.
Inventor: Mekka Chibuisi Okereke , Peter Phan Han
Abstract: Disclosed are various embodiments for inspecting malware with little or no user interruption. A first computing device may compare a source code of an application to a fingerprint stored locally on the first computing device. The first computing device may transmit the source code to a second computing device to determine whether the source code resides in a database comprising approved applications. If the source code does not reside in the database, a thorough scan of the source code may be conducted.
-
-
-
-