Secure execution and transformation techniques for computing executables

    公开(公告)号:US10262161B1

    公开(公告)日:2019-04-16

    申请号:US14580023

    申请日:2014-12-22

    Abstract: Techniques described and suggested herein include the use of transformation parameters, such as mathematical and/or cryptographic operations, to permute various aspects of executables so as to control executable code authorized to run on one or more hosts. For example, a set of transformation parameters, such as a mathematical operation and a specified value upon which the mathematical operation may operate, are associated with a host or group of hosts. The set of transformation parameters may be applied to one or more runtime-related numerical locations associated with an executable that is intended to run on the specified hosts. At runtime, appropriately encoded executables are decoded by the specified hosts and operate normally, while differently encoded or unencoded executables are inoperable by the specified hosts.

    Modular autonomous ground vehicles
    62.
    发明授权

    公开(公告)号:US10245993B1

    公开(公告)日:2019-04-02

    申请号:US15280504

    申请日:2016-09-29

    Abstract: Autonomous ground vehicles (“AGVs”) are utilized to transport items to delivery locations and may be modular in that a storage compartment portion (e.g., which may hold an ordered item) may be removable (i.e., separable) from a propulsion portion. In various implementations, the storage compartment portion may be securely attached to the propulsion portion during transport (e.g., requiring an access code to remove and/or open), and the storage compartment portion may similarly be securely attached to the delivery location (e.g., at a docking station) when delivered. In various implementations, the storage compartment portion may be refrigerated, heated, etc., and may include various sensors on the inside and outside of the storage compartment portion (e.g., temperature sensors, motion sensors, image sensors to determine the presence and condition of items and/or to assist with navigation and other operations of the propulsion portion, etc.).

    Compromised authentication information clearing house

    公开(公告)号:US10223524B1

    公开(公告)日:2019-03-05

    申请号:US15833410

    申请日:2017-12-06

    Abstract: Techniques for maintaining potentially compromised authentication information for a plurality of accounts may be provided. An individual piece of authentication information may be associated with one or more tags that indicate access rights with respect to requestors that also provide and maintain other potentially compromised authentication information. A subset of the potentially compromised authentication information may be determined based on the one or more tags in response to a request from a requestor for the potentially compromised authentication information. In an embodiment, the subset of the potentially compromised authentication information may be provided to the requestor.

    Modular, multi-function robotic positioning system

    公开(公告)号:US10138060B1

    公开(公告)日:2018-11-27

    申请号:US15189239

    申请日:2016-06-22

    Abstract: A system to select and reposition inventory items on one or more shelving units is disclosed. The system can include a robotic positioning system (RPS) to move inventory items on a shelf to the front of the shelf, or off the shelf, to facilitate selection, delivery, and restocking of the inventory item. The RPS can include a movement system to enable it to position itself behind a particular inventory item on a shelf. The RPS can also include a positioner to enable the RPS to move the inventory item backward and forward on the shelf. The RPS can be mounted on a free-standing frame to enable movement in two axes and repositioning of inventory items in a third axis. The RPS can also be centrally mounted in a shelving unit and can move vertically and rotate about a single axis to reposition inventory items radially.

    Social networking behavior-based identity system

    公开(公告)号:US10122727B2

    公开(公告)日:2018-11-06

    申请号:US14882881

    申请日:2015-10-14

    Abstract: Disclosed are various embodiments for a social networking behavior-based identity system that employs social networking data that a user has elected to share through an opt-in procedure. First social networking data is stored in association with a user identity. An assertion of the user identity is received from a client after the first social networking data is stored. Second social networking data is received in response to receiving the assertion of the user identity. An identity confidence level as to whether the user identity belongs to a user at the client is generated based at least in part on a comparison of the second social networking data with the first social networking data.

    Network authentication beacon
    66.
    发明授权

    公开(公告)号:US10063592B1

    公开(公告)日:2018-08-28

    申请号:US14298855

    申请日:2014-06-06

    CPC classification number: H04L63/20 H04L63/0869

    Abstract: A variety of different mobile computing devices, such as a laptop, tablet or smartphone, may be used in a mixed set of computing environments. At least some of the computing environments may be hostile computing environments where users of the mobile computing devices may be exposed to unknown risks. Furthermore, the mobile computing devices may be unable to determine if a network in a particular computing environment is in fact the network the mobile device determines it to be. A beacon device may be attached to a network and provide mutual authentication for mobile devices in the computing environment. The beacon device may be paired with the mobile devices in order to generate secret information useable in mutual authentication of the mobile device and the beacon device.

Patent Agency Ranking