-
公开(公告)号:US10348797B1
公开(公告)日:2019-07-09
申请号:US14970400
申请日:2015-12-15
Applicant: Amazon Technologies, Inc.
Inventor: Joshua Marc Burgin , Kurt Kufeld , Peter Sven Vosshall , Arun Sundaram , Jesper Mikael Johansson , Peter Frank Hill
IPC: H04L29/06 , H04L29/08 , G06F16/957 , G06F16/958
Abstract: Systems, methods, and computer-readable media related to configuration of multiple browser applications to control the functionality of the browser application as at least some content is accessed are provided. The configuration of a server-based browser application and a client-based browser application can be controlled programmatically such that browser configuration can be validated and controlled by at least some content providers. Additionally, the configuration and subsequent processing of content provided by an authenticating content provider can be implemented in a manner to limit content access functionality.
-
公开(公告)号:US10298567B1
公开(公告)日:2019-05-21
申请号:US14572455
申请日:2014-12-16
Applicant: Amazon Technologies, Inc.
Inventor: Yoong Han Chew , Peter Frank Hill , Kurt Kufeld , Sajeeva Lakmal Bandara Pallemulle , Arun Sundaram , Ameet Nirmal Vaswani
Abstract: A system is disclosed that enables a user to access a first piece of content on a first computing device while accessing a related, but different piece of content on a second computing device. In some cases, the different piece of content is a portion of the first piece of content. In some embodiments, the system can automatically identify complementary content and can automatically cause the second computing device to access the complementary content without the user interacting with the second computing device. In some cases, the system may reformat the complementary content for presentation to the user based on characteristics of the second computing device.
-
公开(公告)号:US20190066176A1
公开(公告)日:2019-02-28
申请号:US16173391
申请日:2018-10-29
Applicant: Amazon Technologies, Inc.
Inventor: Leon Robert Warman , Kurt Kufeld , Peter Sven Vosshall , Kyle Bradley Peterson , Peter Frank Hill , Chelsea Celest Krueger , Arun Sundaram
Abstract: A system is configured to receive a network resource request from a user device configured with a browsing application, wherein the request includes identification data associated with the user device. The system transmits, to a network resource provider, a request for the network resource, wherein the request transmitted to the network resource provider excludes identification data included in the request received from the user device. The system receives from the network resource provider a response, including a document comprising a field configured to receive payment information for an item purchase. The system receives from the browsing application an indication that an anonymous payment instrument, associated with a first entity different than the user, is to be used to purchase a first item at a first price. The system causes information regarding the anonymous payment instrument to be provided to the network resource provider.
-
公开(公告)号:US20180196827A1
公开(公告)日:2018-07-12
申请号:US15917165
申请日:2018-03-09
Applicant: Amazon Technologies, Inc.
Inventor: Arun Sundaram , Yun Lin , David Carl Salyers
CPC classification number: G06F16/178 , G06F3/0604 , G06F3/0622 , G06F3/0637 , G06F3/065 , G06F3/067 , G06F16/128 , G06F16/27 , G06F21/6218 , G06F21/78 , H04L29/06 , H04L67/1097
Abstract: Methods, apparatus, and computer-accessible storage media for controlling export of snapshots to external networks in service provider environments. Methods are described that may be used to prevent customers of a service provider from downloading snapshots of volumes, such as boot images created by the service provider or provided by third parties, to which the customer does not have the appropriate rights. A request may be received from a user to access one or more snapshots, for example a request to export the snapshot or a request for a listing of snapshots. For each snapshot, the service provider may determine if the user has rights to the snapshot, for example by checking a manifest for the snapshot to see if entries in the snapshot manifest belong to an account other than the customer's. If the user has rights to the snapshot, the request is granted; otherwise, the request is not granted.
-
-
-