Systems for determining user interfaces to maximize interactions based on website characteristics

    公开(公告)号:US12062083B1

    公开(公告)日:2024-08-13

    申请号:US17447240

    申请日:2021-09-09

    CPC classification number: G06Q30/0641 G06F16/953 G06N20/00

    Abstract: Data from a first website and second website is used to determine a model for presenting a search output in response to a query received by the first website. The data from each website includes parameters of search queries, characteristics of items that were output in response, and an indication of items that were purchased. Characteristics of the first website are used to determine weights that are applied to data from the second website. A relationship between search queries received by each website is used to determine a first weight. A relationship between features or options offered by the second website and those offered by the first website is used to determine a second weight. For example, if the second website offers a service that the first website does not, the availability of this service for particular items may be disregarded when determining the model for the first website.

    Automatic domain join for virtual machine instances

    公开(公告)号:US12061920B2

    公开(公告)日:2024-08-13

    申请号:US16715992

    申请日:2019-12-16

    CPC classification number: G06F9/45558 G06F2009/4557

    Abstract: A customer submits a request to a virtual computer system service to launch a virtual machine instance and to join this instance to a managed directory. The service may obtain, from the customer, a domain name and Internet Protocol addresses for the selected directory, which is then stored within a systems management server. When launched, the instance may initiate an agent, which may communicate with the systems management server to obtain the configuration information. The agent may use this configuration information to establish a communications channel with the managed directory and create a temporary set of computer credentials that may be used to verify that the customer is authorized to join the virtual machine instance to the managed directory. If the credentials are valid, the managed directory may generate a computer account within the managed directory, which may be used to join the virtual machine instance to the managed directory.

    Migrating audio/video recording and communication devices to new networks

    公开(公告)号:US12061687B1

    公开(公告)日:2024-08-13

    申请号:US16040533

    申请日:2018-07-19

    Inventor: James Siminoff

    CPC classification number: G06F21/45 H04N7/186 H04W12/04 H04L63/0876

    Abstract: Migrating audio/video (A/V) recording and communication devices to new networks in accordance with various embodiments of the present disclosure are provided. In one embodiment, a method for an A/V recording and communication device comprises: storing first network access credentials for accessing a first network having first network credentials; connecting to a second network using the first network access credentials, the second network being broadcast by a client device and having second network credentials identical to the first network credentials; in response to connecting to the second network, communicating over the second network, with the client device; in response to communicating with the client device, receiving updated network access credentials for accessing a third network having third network credentials different than the first and the second network credentials; and in response to receiving the updated network access credentials, connecting to the third network using the updated network access credentials.

    Automated ransomware recovery using log-structured storage

    公开(公告)号:US12058169B1

    公开(公告)日:2024-08-06

    申请号:US17548285

    申请日:2021-12-10

    CPC classification number: H04L63/1441

    Abstract: Techniques are described for monitoring and analyzing input/output (I/O) messages for patterns indicative of ransomware attacks affecting computer systems of a cloud provider, and for performing various remediation actions to mitigate data loss once a potential ransomware attack is detected. The monitoring of I/O activity for such patterns is performed at least in part by I/O proxy devices coupled to computer systems of a cloud provider network, where an I/O proxy device is interposed in the I/O path between guest operating systems running on a computer system and storage devices to which I/O messages are destined. An I/O proxy device can analyze I/O messages for patterns indicative of potential ransomware attacks by monitoring for anomalous I/O patterns which may, e.g., be indicative of a malicious process attempting to encrypt or otherwise render in accessible a significant portion of one or more storage volumes as part of a ransomware attack.

Patent Agency Ranking