-
公开(公告)号:US09787939B1
公开(公告)日:2017-10-10
申请号:US14547892
申请日:2014-11-19
Applicant: Amazon Technologies, Inc.
Inventor: Julien George Beguin , Eric Alan Breitbard , Robert Steven Murdock , Meng Li , Michael Douglas McQueen
IPC: H04N7/14
Abstract: Video conferencing is performed using near-end and far-end devices at near-end and far-end sites, respectively. Each device has a display surface and a video camera. The view of the far-end scene displayed by the near-end device is selected as a function of the position of the near-end user relative to the near-end device. As the near-end user moves toward the left, the view pans toward the right of the far-end scene. As the near-end user moves toward the right, the view pans toward the left of the far-end scene.
-
12.
公开(公告)号:US12132735B1
公开(公告)日:2024-10-29
申请号:US17855302
申请日:2022-06-30
Applicant: Amazon Technologies, Inc.
Inventor: Niloofar Razavi , Oksana Tkachuk , Zhixing Xu , Saeed Nejati , Meng Li
CPC classification number: H04L63/10 , G06F16/334 , G06F16/367 , H04L63/1433 , H04L63/20
Abstract: Techniques are described for a domain-specific language and associated framework for implementing analyses of security, operational, or functional properties involving computing resources. The specification language enables users to readily define the semantics of a set of cross-resource relations of interest using a human-readable language. For example, the language enables users to express properties over computing resources based on a user-defined set of cross-resource relations. The specification language is human-readable, allowing users to easily add new cross-resource relations or to modify existing relations and properties, thereby enabling users to readily modify existing analyses or to create new ones entirely. The specification language is also machine-readable such that a compiler and other tools can automatically generate an ontology model based on local resource configurations, augment the graph with the cross-resource relations defined in the specifications, and perform graph reachability analyses based on defined properties of interest.
-
公开(公告)号:US10803859B1
公开(公告)日:2020-10-13
申请号:US15695777
申请日:2017-09-05
Applicant: Amazon Technologies, Inc.
Inventor: Robert Williams , Miriam Karthika Daniel , Eric Alan Breitbard , Sean Robert Ryan , Meng Li
IPC: G10L15/22 , G10L15/30 , G10L17/06 , G10L17/22 , G10L13/08 , G10L13/04 , G10L15/18 , G10L15/14 , G10L15/08
Abstract: A speech-processing system capable of receiving spoken commands from a public or semi-public voice controlled device and determine a user who spoke the command for purposes of both command execution and output data routing. Identity of the user may be determined by various techniques such as facial identification, voice identification and the like. Identification techniques may be biased in view of users nearby to a voice controlled device. Private data resulting from the spoken command may be routed to a personal device of the user where non-private data may be output by the public voice controlled device.
-
公开(公告)号:US10671639B1
公开(公告)日:2020-06-02
申请号:US15475031
申请日:2017-03-30
Applicant: Amazon Technologies, Inc.
Inventor: Alazel Acheson , Christopher Ryan Baker , Mahendra Manshi Chheda , James Robert Englert , Meng Li , Srikanth Mandadi , Slavka Praus , Colin Watson
Abstract: Updates to a hierarchical data structure may be selectively replicated to other replicas of the hierarchical data structure. An update for a hierarchical data structure may be received and committed to the hierarchical data structure. A determination as to whether any other replicas of the hierarchical data structure have permission to receive the update may be made. For those replicas of the hierarchical data structure with permission to receive the update, the update may be provided to the replicas and committed to the replicas. Different types of replication techniques may be implemented, such as pull-based replication techniques or push-based replication techniques. Replication permissions for objects of the hierarchical data structure may be individually defined, in some embodiments.
-
公开(公告)号:US09911398B1
公开(公告)日:2018-03-06
申请号:US14453456
申请日:2014-08-06
Applicant: Amazon Technologies, Inc.
Inventor: Michael Douglas McQueen , Meng Li , Eric Alan Breitbard , Robert Steven Murdock , Julien George Beguin , Gregory Michael Hart , Scott Ian Blanksteen
CPC classification number: G09G5/373 , G06F3/005 , G09G2340/04 , G09G2354/00
Abstract: A video display hub is mounted in a common household area such as a kitchen or family room. The display hub is configured to display various types of information for users in the area, such as weather, traffic updates, schedules, notes, messages, lists, news, etc. When the user is at a distance from the display hub, information is presented at a relatively low density, with a low level of granularity and detail in conjunction with large fonts, graphics, and icons. When the user is close to the display hub, information is presented at a relatively high density, with a high level of granularity and detail in conjunction with small fonts, graphics, and icons.
-
公开(公告)号:US09794511B1
公开(公告)日:2017-10-17
申请号:US14453465
申请日:2014-08-06
Applicant: Amazon Technologies, Inc.
Inventor: Michael Douglas McQueen , Meng Li , Eric Alan Breitbard , Robert Steven Murdock , Julien George Beguin , Gregory Michael Hart , David A. Limp , Scott Ian Blanksteen
CPC classification number: H04N7/142 , H04M3/42365 , H04M3/567 , H04N7/147 , H04N7/15
Abstract: A video display hub is mounted in a common household area such as a kitchen or family room. During times that have been designated as being available for communications, devices in first and second households exchange and display blurred video, allowing users in each household to see vague shapes and movements of the other household. Upon noticing activity, a user in the first household may initiate a video conversation, causing the video from the first household to be unblurred and causing unobscured voice to be transmitted to the second household. A user in the second household may respond by allowing the video conversation to be fully enabled, allowing the video from the second household to be unblurred and unobscured voice to be transmitted back to the first household.
-
17.
公开(公告)号:US09286910B1
公开(公告)日:2016-03-15
申请号:US14208700
申请日:2014-03-13
Applicant: Amazon Technologies, Inc.
Inventor: Meng Li , Duncan Joseph Reynolds , William Tunstall-Pedoe , Petra Elisabeth Holmes , Robert Peter Stacey , David Spike Palfrey , Andrew Graham Fenn , Mark Rafn , Graham John French
IPC: G10L25/48
CPC classification number: G10L25/48 , G06F17/30654 , G06F17/30699 , G10L15/26
Abstract: A system for resolving a user's question regarding media at the user's location where the question includes ambiguity as to the context of the question. Context information is acquired from a device or devices at the user's location, and if multiple possible contexts are identified, the system may attempt to resolve the question for more than one of the possible contexts. The system for answering questions and the source of the media may be different and independent.
Abstract translation: 用于在用户位置处解决用户关于媒体的问题的系统,其中问题包括关于问题的上下文的模糊性。 从用户位置的设备或设备获取上下文信息,并且如果识别出多个可能的上下文,则系统可以尝试解决多个可能上下文中的问题。 回答问题的系统和媒体的来源可能是不同的和独立的。
-
公开(公告)号:US12164652B1
公开(公告)日:2024-12-10
申请号:US17546494
申请日:2021-12-09
Applicant: Amazon Technologies, Inc.
Inventor: Meng Li , Vishal Gori , Zhixing Xu , Niloofar Razavi , Oksana Tkachuk
Abstract: Techniques are described for analyzing privilege escalation risks within the accounts, roles, and policies that comprise an organization's cloud provider environment. Privilege escalation refers broadly to scenarios in which a principal (e.g., a person or application) is able to gain access to resources or actions in a cloud provider environment that exceed a level intended for that principal. In the context of cloud provider environments, for example, such privilege escalation risks can result from the misconfiguration of policies and permissions attached to identities (e.g., users, groups of users, or roles) within an organization's environment. A multi-layer reasoning framework is used to build an ontology model of an organization's identities and relations among the identities, including defined access relationships, permission mutation relationships, and credential mutation relationships. The framework is further used to query the ontology model to identify particular identities associated with one or more specific types of privilege escalation risks.
-
公开(公告)号:US11860895B2
公开(公告)日:2024-01-02
申请号:US17723369
申请日:2022-04-18
Applicant: Amazon Technologies, Inc.
Inventor: Alazel Acheson , Christopher Ryan Baker , Mahendra Manshi Chheda , James Robert Englert , Meng Li , Srikanth Mandadi , Slavka Praus , Colin Watson
CPC classification number: G06F16/273 , G06F16/2246 , G06F16/2379
Abstract: Updates to a hierarchical data structure may be selectively replicated to other replicas of the hierarchical data structure. An update for a hierarchical data structure may be received and committed to the hierarchical data structure. A determination as to whether any other replicas of the hierarchical data structure have permission to receive the update may be made. For those replicas of the hierarchical data structure with permission to receive the update, the update may be provided to the replicas and committed to the replicas. Different types of replication techniques may be implemented, such as pull-based replication techniques or push-based replication techniques. Replication permissions for objects of the hierarchical data structure may be individually defined, in some embodiments.
-
公开(公告)号:US20220245171A1
公开(公告)日:2022-08-04
申请号:US17723369
申请日:2022-04-18
Applicant: Amazon Technologies, Inc.
Inventor: Alazel Acheson , Christopher Ryan Baker , Mahendra Manshi Chheda , James Robert Englert , Meng Li , Srikanth Mandadi , Slavka Praus , Colin Watson
Abstract: Updates to a hierarchical data structure may be selectively replicated to other replicas of the hierarchical data structure. An update for a hierarchical data structure may be received and committed to the hierarchical data structure. A determination as to whether any other replicas of the hierarchical data structure have permission to receive the update may be made. For those replicas of the hierarchical data structure with permission to receive the update, the update may be provided to the replicas and committed to the replicas. Different types of replication techniques may be implemented, such as pull-based replication techniques or push-based replication techniques. Replication permissions for objects of the hierarchical data structure may be individually defined, in some embodiments.
-
-
-
-
-
-
-
-
-