-
公开(公告)号:US09294587B1
公开(公告)日:2016-03-22
申请号:US13793598
申请日:2013-03-11
Applicant: Amazon Technologies, Inc.
Inventor: Abraham Martin Passaglia , Jason George McHugh
CPC classification number: H04L67/145 , H04L69/16
Abstract: A routing device can maintain a long-lived, bidirectional connection with a network server. The routing device can establish a TCP connection with each of multiple computing devices. One or more computing devices can make (e.g., HTTP) requests for network resources. The routing device can receive the requests and decide to direct the requests to the network server via the long-lived, bidirectional connection. Based on the requests, the network server can make requests to other servers for the resources and send modified (e.g., assembled, filtered, optimized, etc.) responses back to the routing device, which can transmit the responses to the computing devices. This process can be transparent to the computing devices. In some embodiments, the routing device can optionally establish a long-lived TCP connection with a computing device capable of the long-lived TCP connection option. The routing device can maintain the long-lived connection with the network server for the computing device.
Abstract translation: 路由设备可以与网络服务器保持长时间的双向连接。 路由设备可以与多个计算设备中的每一个建立TCP连接。 一个或多个计算设备可以对网络资源进行(例如HTTP)请求。 路由设备可以接收请求并决定通过长时间的双向连接将请求定向到网络服务器。 基于这些请求,网络服务器可以向其他服务器请求资源,并将经修改(例如,组合,过滤,优化等)响应发送回路由设备,路由设备可将响应发送到计算设备。 该过程对于计算设备可以是透明的。 在一些实施例中,路由设备可以可选地与能够长寿命的TCP连接选项的计算设备建立长时间的TCP连接。 路由设备可以维护与计算设备的网络服务器的长期连接。
-
公开(公告)号:US12262204B1
公开(公告)日:2025-03-25
申请号:US18424204
申请日:2024-01-26
Applicant: Amazon Technologies, Inc.
Inventor: Quentin N Robinson , Abraham Martin Passaglia , Rashmesh Radhakrishnan , Andrew Roths
IPC: H04W12/08 , H04B17/318 , H04W4/029 , H04W76/10 , H04W84/12
Abstract: Techniques for establishing a data connection are described. In an example, a computer system receives, from a second device of a computer network, first data associated with a first device and second data associated with the second device. The first device is not connected to the computer network. The computer system determines third data generated by one or more devices other than the first device and the second device and associated with at least one of: the first device, the second device, a user account, or the computer network. The computer system generates, based on the first data, the second data, and the third data, a confidence score indicating a likelihood of a user authorization to connect the first device to the computer network. The computer system sends, to the second device based on the confidence score, instructions associated with connecting the first device to the computer network.
-
公开(公告)号:US11924640B1
公开(公告)日:2024-03-05
申请号:US18118597
申请日:2023-03-07
Applicant: Amazon Technologies, Inc.
Inventor: Quentin N Robinson , Abraham Martin Passaglia , Rashmesh Radhakrishnan , Andrew Roths
IPC: H04W12/08 , H04B17/318 , H04W4/029 , H04W76/10 , H04W84/12
CPC classification number: H04W12/08 , H04B17/318 , H04W4/029 , H04W76/10 , H04W84/12
Abstract: Techniques for establishing a data connection are described. In an example, a computer system receives, from a second device of a computer network, first data associated with a first device and second data associated with the second device. The first device is not connected to the computer network. The computer system determines third data generated by one or more devices other than the first device and the second device and associated with at least one of: the first device, the second device, a user account, or the computer network. The computer system generates, based on the first data, the second data, and the third data, a confidence score indicating a likelihood of a user authorization to connect the first device to the computer network. The computer system sends, to the second device based on the confidence score, instructions associated with connecting the first device to the computer network.
-
公开(公告)号:US11871471B1
公开(公告)日:2024-01-09
申请号:US17842616
申请日:2022-06-16
Applicant: Amazon Technologies, Inc.
Abstract: Techniques for a server-based reconnection of disconnected devices in a network are described. In an example, a computer system receives, from a second device, first data of a first device. The first data indicates that the first device has disconnected from the network due a change in the password of the network. The computer system determines that the first device is authorized to connect to the network. Based on the first device being authorized, the computer system transmits a request for a token. The computer system compares the token to a token stored by the computer system. In response to the tokens matching, the computer system transmits second data to the first device via the second device. The second data includes an updated password of the network. The first device uses the second data to reestablish a connection with the network.
-
公开(公告)号:US11102195B1
公开(公告)日:2021-08-24
申请号:US16265670
申请日:2019-02-01
Applicant: Amazon Technologies, Inc.
Inventor: Akshaya Vishnu Kudlu Shanbhogue , Venkatesh Krishnamoorthy , Abraham Martin Passaglia , Tao Wu
Abstract: Systems and methods for secure information exchange are disclosed. During setup of an accessory device in association with a voice-enabled device, token data may be generated and signed using a private encryption key by the accessory device. An accessory-device system associated with the accessory device may send a request for account identification including the token data to a remote system associated with the voice-enabled device. The remote system may determine if an application associated with the accessory-device system is enabled, and if enabled, may send the account identification in an encrypted format to the accessory-device system.
-
公开(公告)号:US09608974B2
公开(公告)日:2017-03-28
申请号:US14629372
申请日:2015-02-23
Applicant: Amazon Technologies, Inc.
Inventor: Maximilian Francis Barrows , Paul Francis Dean Ferraro , Jason George McHugh , Abraham Martin Passaglia , Andrew Jay Roths , Eric Allan Shell
CPC classification number: H04L63/08 , H04L63/0846
Abstract: Approaches are described for automatically generating new security credentials, such as security tokens, which can involve automatically re-authenticating a user (or client device) using a previous security token issued to that user (or device). The re-authentication can happen without any knowledge and/or action on the part of the user. The re-authentication mechanism can invalidate and/or keep track of the previous security token, such that when a subsequent request is received that includes the previous security token, the new security token can be invalidated, and the user caused to re-authenticate, as receiving more than one request with the previous security token can be indicative that the user's token might have been stolen.
-
-
-
-
-