Identity token for accessing computing resources

    公开(公告)号:US12192358B1

    公开(公告)日:2025-01-07

    申请号:US17478499

    申请日:2021-09-17

    Inventor: Rameez Loladia

    Abstract: A technology is described for device communication with computing regions. An example method may include receiving at a first computing region a request for a computing resource. In response to receiving the request, a device associated with the request may be authenticated using authentication credentials for the device. An identity token that indicates permission for the device to access the computing resource in a second computing region may be generated and the identity token and instructions to connect to the second computing region may be provided to the device. The device may present the identity token to the second computing region in order to access the computing resource in the second computing region.

    Speaker recognition adaptation
    104.
    发明授权

    公开(公告)号:US12190883B2

    公开(公告)日:2025-01-07

    申请号:US18329635

    申请日:2023-06-06

    Inventor: Zeya Chen

    Abstract: Techniques for generating, from first speaker recognition data corresponding to at least a first word, second speaker recognition data corresponding to at least a second word are described. During a speaker recognition enrollment process, a device receives audio data corresponding to one or more prompted spoken inputs comprising the at least first word. Using the prompted spoken input(s), the first speaker recognition data (specific to that least first word) is generated. Sometime thereafter, a user may indicate that speaker recognition processing is to be performed using at least a second word. Rather than have the user go through the speaker recognition enrollment process a second time, the device (or a system) may apply a transformation model to the first speaker recognition data to generate second speaker recognition data specific to the at least second word.

    Wakeword detection using a secondary microphone

    公开(公告)号:US12190865B2

    公开(公告)日:2025-01-07

    申请号:US17323488

    申请日:2021-05-18

    Abstract: Techniques for capturing spoken user inputs while a device is prevented from capturing such spoken user inputs are described. When a first device becomes incapable of capturing spoken user inputs intended for a system, a second device, for capturing such spoken user inputs, may be identified. The second device may be identified based on the second device being connected to a same vehicle computing system as the first device. The second device may be enabled to capture spoken user inputs, intended for the system, until the first device is again able to capture such spoken user inputs.

    Point-in-time restore with delayed instantiation

    公开(公告)号:US12189656B1

    公开(公告)日:2025-01-07

    申请号:US16201774

    申请日:2018-11-27

    Abstract: A system responds to a request to enable a restoration capability for a first database instance of a first operating environment. The system stores, in the first operating environment, transaction data for the first database instance and data indicative of aspects of the configuration of the first operating environment on which the first database instance is dependent. The transaction data and configuration data are replicated to a second environment. In response to a request to restore the first database instance, a second operating environment is configured according to the replicated configuration data, and the data is restored to a second database instance, in the second operating environment, based on the replicated transaction data.

    DYNAMIC SECURITY POLICY MANAGEMENT
    108.
    发明申请

    公开(公告)号:US20250007959A1

    公开(公告)日:2025-01-02

    申请号:US18882354

    申请日:2024-09-11

    Abstract: Security policies can be dynamically updated in response to changes in endpoints associated with those policies. A user can indicate one or more regions or networks from which access is to be granted under a specific security policy. The user can subscribe to receive notifications upon a change relating to those endpoints, such as the addition or removal of one or more endpoints. When a change is detected, new policy information can be generated automatically and published for subscribed policies, which can then have the updates applied automatically or provided for manual review and application. Such a process enables access determinations to be made based upon up-to-date endpoint information.

    SERVICE DISCOVERY AND RENAMING
    109.
    发明申请

    公开(公告)号:US20250007877A1

    公开(公告)日:2025-01-02

    申请号:US18884021

    申请日:2024-09-12

    Inventor: Alireza Farhangi

    Abstract: A provider network implements service discovery and renaming. A provider network includes a domain name service (DNS) and a renaming tool. The DNS receives queries for service names and sends query logs to a data store. Each query log indicates the queried name and a network address (e.g., IP address). A user may request that the service be renamed to a new name. In response, the renaming tool adds a new entry to for the new name to the DNS. The renaming tool retrieves data from the query logs and identifies clients of the service. The renaming tool sends a notification to the identified clients that the name has changed to the new name. The renaming manger retrieves additional data from the query logs to identify how many of the clients have switched to using the new name. After enough clients have switched, the old name may be decommissioned.

    ELECTRONIC DEVICE FOR AUTOMATED USER IDENTIFICATION

    公开(公告)号:US20250005957A1

    公开(公告)日:2025-01-02

    申请号:US18766347

    申请日:2024-07-08

    Abstract: This disclosure describes techniques for providing instructions when receiving biometric data associated with a user. For instance, an electronic device may detect a portion of a user, such as a hand. The electronic device may then determine locations of the portion of the user relative to the electronic device. Based on the locations, the electronic device may cause a visual indicator to provide instructions to the user for placing the portion of the user at a target location relative to the electronic device. For example, the visual indicator may emit light indicating that the portion of the user is off-centered, angled, too low, and/or too high. After providing the instructions and determining that the portion of the user is at the target location, the electronic device may capture at least an image of the portion of the user and use the image to identify an account.

Patent Agency Ranking