-
公开(公告)号:US12045119B2
公开(公告)日:2024-07-23
申请号:US17465638
申请日:2021-09-02
Applicant: Amazon Technologies, Inc.
Inventor: Nivea Guru Mandavia , Ivan Chen , Yuwei Jiang , Manpreet Arora , Bhavya Gupta , Bharath Shive Gowda , Fnu Himanshi , Cheng Chen
CPC classification number: G06F11/0751 , G06F11/0709 , G06N20/00
Abstract: System and methods are provided for detecting, tracking, and managing outages of transaction processors. An indication is received indicating a potential outage associated with a transaction processor computer configured to process transactions of an online retail website. The indication can be received from a threshold monitoring service and/or from a machine-learning detection system. A computing service can be initiated to confirm and track the outage over time. An outage may include a number of situations in which the transaction processor fails to process transactions according to a set of predefined processing parameters. If the outage spans a particular time period, the service can perform a number of remedial actions (e.g., notifying an administrator of the outage, etc.).
-
292.
公开(公告)号:US12045032B1
公开(公告)日:2024-07-23
申请号:US17039897
申请日:2020-09-30
Applicant: Amazon Technologies, Inc.
Inventor: Thibaut Pierre Grandmougin , Bart Schouwenaars-Harms
IPC: G05B19/4155 , G06F3/06
CPC classification number: G05B19/4155 , G06F3/0604 , G06F3/0655 , G06F3/067 , G05B2219/34038
Abstract: An IoT gateway at a client site uses sensing functions and actuating functions to safely implement actions for equipment. The client provides, to the IoT service, specifications for a sensing function and one or more actuating functions that are to communicate with the sensing function. The functions are deployed to the IoT gateway at the client site. The sensing function may be assigned read only access to the equipment and the actuating function may be assigned write only access to the equipment. The sensing function may collect data from the equipment and determine that a condition has been met (e.g., temperature is above an upper limit). In response, the sensing function provides an indication of an action to the actuating function (e.g., via a unique topic). If the action is a supported action, then the actuating function causes the equipment to perform the action; otherwise, it ignores the indicated action.
-
公开(公告)号:US20240243966A1
公开(公告)日:2024-07-18
申请号:US18407162
申请日:2024-01-08
Applicant: Amazon Technologies, Inc.
Inventor: Daniel Todd Cohn , Eric Jason Brandwine , Andrew J. Doane
IPC: H04L41/0803 , G06F9/455 , G06F9/50 , H04L12/46 , H04L41/0806 , H04L41/0893 , H04L41/12 , H04L45/00 , H04L45/02 , H04L61/10 , H04L67/10 , H04L41/0213
CPC classification number: H04L41/0803 , G06F9/45558 , G06F9/5077 , H04L12/4641 , H04L41/0806 , H04L41/0893 , H04L41/12 , H04L45/00 , H04L45/02 , H04L61/10 , H04L67/10 , G06F2009/45595 , G06F2209/5011 , H04L41/0213
Abstract: Techniques are described for providing logical networking functionality for managed computer networks, such as for virtual computer networks provided on behalf of users or other entities. In some situations, a user may configure or otherwise specify a network topology for a virtual computer network, such as a logical network topology that separates multiple computing nodes of the virtual computer network into multiple logical sub-networks and/or that specifies one or more logical networking devices for the virtual computer network. After a network topology is specified for a virtual computer network, logical networking functionality corresponding to the network topology may be provided in various manners, such as without physically implementing the network topology for the virtual computer network. In some situations, the computing nodes may include virtual machine nodes hosted on one or more physical computing machines or systems, such as by or on behalf of one or more users.
-
公开(公告)号:US20240242714A1
公开(公告)日:2024-07-18
申请号:US18422561
申请日:2024-01-25
Applicant: Amazon Technologies, Inc.
Inventor: Szymon Grzegorz Trapp , Martin Patrick Butler , Manikanta Babu Karanam , Nicholas Jeffrey Anderson , Boya Hu , Zhengyang Wu , FNU Palak , James Marlotte
CPC classification number: G10L15/22 , G10L17/24 , H04W12/06 , H04W12/37 , H04W76/15 , G10L2015/223 , G10L2015/227
Abstract: Systems and methods for account data association with voice interface devices are disclosed. For example, when a host user/primary user and guest user have consented for account data to be associated with the primary user's devices, a request to associate the account data may be received. Voice and device-based authentication may be performed to confirm the identity of the guest user and the guest user's account data may be associated with the primary user's devices. During a guest session, voice recognition may be utilized to determine if a given user utterance is from the guest user or the primary user, and actions may be performed by the voice interface device accordingly.
-
公开(公告)号:US12041094B2
公开(公告)日:2024-07-16
申请号:US16864959
申请日:2020-05-01
Applicant: Amazon Technologies, Inc.
Inventor: Nima Sharifi Mehr
CPC classification number: H04L63/205 , H04L67/12 , G16Y10/75 , G16Y40/50
Abstract: Various embodiments of apparatuses and methods for threat sensor deployment and management in a malware threat intelligence system are described. In some embodiments, the system comprises a plurality of threat sensors, deployed at different network addresses and physically located in different geographic regions in a provider network, which detect interactions from sources. In some embodiments, a threat sensor deployment and management service determines a deployment plan for the plurality of threat sensors, including each threat sensor's associated threat data collectors. The threat data collectors can be of different types such as utilizing different communication protocols or ports, or providing different kinds of responses to inbound communications. The different threat sensors can have different lifetimes. The service deploys the threat sensors based on the plan, collects data from the deployed threat sensors, adjusts the deployment plan based on the collected data and the threat sensor lifetimes, and then performs the adjustments.
-
公开(公告)号:US12039998B1
公开(公告)日:2024-07-16
申请号:US17665129
申请日:2022-02-04
Applicant: Amazon Technologies, Inc.
Inventor: Chieh-Chi Kao , Qingming Tang , Ming Sun , Viktor Rozgic , Spyridon Matsoukas , Chao Wang
Abstract: An acoustic event detection system may employ self-supervised federated learning to update encoder and/or classifier machine learning models. In an example operation, an encoder may be pre-trained to extract audio feature data from an audio signal. A decoder may be pre-trained to predict a subsequent portion of audio data (e.g., a subsequent frame of audio data represented by log filterbank energies). The encoder and decoder may be trained using self-supervised learning to improve the decoder's predictions and, by extension, the quality of the audio feature data generated by the encoder. The system may apply federated learning to share encoder updates across user devices. The system may fine-tune the classifier to improve inferences based on the improved audio feature data. The system may distribute classifier updates to the user device(s) to update the on-device classifier.
-
公开(公告)号:US12039027B1
公开(公告)日:2024-07-16
申请号:US17709262
申请日:2022-03-30
Applicant: Amazon Technologies, Inc.
Inventor: Xiang Xu , Hao Zhou , Jonathan Wu , Joseph P Tighe
IPC: G06F21/32
CPC classification number: G06F21/32
Abstract: A system for evaluating a biometric authorization system is described. The biometric authorization system is configured to apply a facial recognition model to image data to make an authorization determination based on detection of synthesized image data and based on matching a reference image to the image data. The system is also configured to execute one or more synthetic image data attack protocols to evaluate the biometric authorization system. The system also generates, according to one or more synthetic image data generation techniques, an evaluation set of image data comprising synthesized representations of a target and sends one or more authorization requests using the evaluation set of image data to the biometric authorization system. The system generates an evaluation of the biometric authorization system for synthetic image data attack analysis based on respective responses to the one or more authorization requests received from the biometric authorization system.
-
公开(公告)号:US12038946B1
公开(公告)日:2024-07-16
申请号:US18194579
申请日:2023-03-31
Applicant: Amazon Technologies, Inc.
Inventor: Ramesh Shankar , Raman Mittal
CPC classification number: G06F16/27 , G06F16/2329
Abstract: Connection loss may be minimized for performing database query engine changes. A distributed database system may include different instances of the query engine that provide access to a database. When an event to change the version of the query engine is detected, a copy of the database may be created and a new instance of the query engine created. Read-only access to the database may be maintained using the different instances of the query engine while the new instance may be upgraded to the different version of the query engine. Upon successful installation of the different version of the query engine at the new instance, the new instance may be given read-write access to the database using the copy of the database and other database instances may be upgraded to the different version of the query engine.
-
公开(公告)号:US12038878B2
公开(公告)日:2024-07-16
申请号:US15917165
申请日:2018-03-09
Applicant: Amazon Technologies, Inc.
Inventor: Arun Sundaram , Yun Lin , David Carl Salyers
IPC: G06F21/00 , G06F3/06 , G06F16/11 , G06F16/178 , G06F16/27 , G06F21/62 , G06F21/78 , H04L9/40 , H04L67/1097
CPC classification number: G06F16/178 , G06F3/0604 , G06F3/0622 , G06F3/0637 , G06F3/065 , G06F3/067 , G06F16/128 , G06F16/27 , G06F21/6218 , G06F21/78 , H04L9/40 , H04L67/1097
Abstract: Methods, apparatus, and computer-accessible storage media for controlling export of snapshots to external networks in service provider environments. Methods are described that may be used to prevent customers of a service provider from downloading snapshots of volumes, such as boot images created by the service provider or provided by third parties, to which the customer does not have the appropriate rights. A request may be received from a user to access one or more snapshots, for example a request to export the snapshot or a request for a listing of snapshots. For each snapshot, the service provider may determine if the user has rights to the snapshot, for example by checking a manifest for the snapshot to see if entries in the snapshot manifest belong to an account other than the customer's. If the user has rights to the snapshot, the request is granted; otherwise, the request is not granted.
-
300.
公开(公告)号:US20240236345A1
公开(公告)日:2024-07-11
申请号:US18186084
申请日:2023-03-17
Applicant: Amazon Technologies, Inc.
Inventor: Kiran Mukesh Misra , Christopher Andrew Segall , Byeongdoo Choi
IPC: H04N19/42 , H04N19/117 , H04N19/12 , H04N19/136 , H04N19/172 , H04N19/176 , H04N19/60 , H04N19/82
CPC classification number: H04N19/42 , H04N19/117 , H04N19/12 , H04N19/136 , H04N19/172 , H04N19/176 , H04N19/60 , H04N19/82
Abstract: The present disclosure relates to methods, apparatus, systems, and non-transitory computer-readable storage media for training and using a multi-scale machine learning model for the enhancement of compressed video. According to some examples, a computer-implemented method includes receiving a video at a content delivery service; performing an encode on a frame of the video by the content delivery service that coverts the frame from a pixel domain to a transform domain and back to the pixel domain to generate first pixel values and a first residual for a block of the frame at a first resolution; generating a first set of features, by a machine learning model of the content delivery service, for an input, at a first resolution, of the first pixel values and the first residual of the block; generating a second set of features, by the machine learning model of the content delivery service, for an input, at a second lower resolution, of second pixel values and a second residual of the block; upsampling the second set of features to the first resolution to generate an upsampled second set of features; generating a modified version of the frame based on the first set of features and the upsampled second set of features; and transmitting the modified version of the frame to a frame buffer or from the content delivery service to a viewer device.
-
-
-
-
-
-
-
-
-