-
公开(公告)号:US20140189499A1
公开(公告)日:2014-07-03
申请号:US14201705
申请日:2014-03-07
Applicant: AMAZON TECHNOLOGIES, INC.
Inventor: Samuel S. Gigliotti , Ryan J. Snodgrass , Charles P. Vaughn , Noah L. Callaway
IPC: G06F17/22
CPC classification number: G06F17/2247 , G06F17/227 , G06F21/84 , G06F2221/032
Abstract: A user device receives a content item and a script associated with the content item. The user device stores an obfuscated version of the content item and an associated style sheet in memory. The user device dynamically updates the style sheet stored in the memory using the script to remove the obfuscation from the obfuscated version of the content item when the content item is presented in a web browser running on the user device.
Abstract translation: 用户设备接收内容项目和与内容项目相关联的脚本。 用户设备将内容项目的混淆版本和关联的样式表存储在存储器中。 当在用户设备上运行的网络浏览器中呈现内容项时,用户设备使用脚本来动态地更新存储在存储器中的样式表,以从内容项的混淆版本去除混淆。
-
公开(公告)号:US08850185B1
公开(公告)日:2014-09-30
申请号:US13931013
申请日:2013-06-28
Applicant: Amazon Technologies, Inc.
Inventor: Charles P. Vaughn
CPC classification number: H04L63/1466 , G06F21/33 , H04L9/3268 , H04L63/0823 , H04L63/1441 , H04L63/1483
Abstract: Technologies are described herein for post attack man-in-the-middle detection. A first computer receives and stores public key certificates when connections are established. The first computer also uploads the stored public key certificates associated with a domain to a second computer each time a connection is established with the domain. The second computer receives the public key certificates from the first computer. The second computer then determines whether any of the public key certificates provided by the first computer are fraudulent certificates by comparing the received certificates to known valid certificates. If the second computer determines that the first computer has received one or more fraudulent certificates, the second computer may cause action to be taken with regard to the fraudulent certificates.
Abstract translation: 本文描述了技术,用于后攻击中间人检测。 建立连接时,第一台计算机接收并存储公钥证书。 每当与域建立连接时,第一台计算机也将与域关联的存储的公钥证书上传到第二台计算机。 第二台计算机从第一台计算机接收公钥证书。 然后,第二计算机通过将接收到的证书与已知有效证书进行比较来确定由第一计算机提供的任何公钥证书是否是欺诈证书。 如果第二计算机确定第一台计算机已经接收到一个或多个欺诈证书,则第二台计算机可能会对欺诈性证书采取行动。
-
公开(公告)号:US09912847B1
公开(公告)日:2018-03-06
申请号:US13626596
申请日:2012-09-25
Applicant: Amazon Technologies, Inc.
Inventor: Chang Yuan , Leo B. Baldwin , Geoffrey Scott Heller , Daniel Bibireata , Louis L. LeGrand, III , Christopher S. A. MacGregor , Charles P. Vaughn , Francislav P. Penov
CPC classification number: H04N5/225 , H04N5/23222 , H04N5/2351
Abstract: A user can capture an image of an object, using a computing device, to obtain information about that object. If a specular highlight (or other saturated region) is detected, the device can attempt to determine a location of a light source associated with the highlight. The device can then provide instructions as to a direction to move in order to reduce the presence of the specular highlight in subsequent images. Multiple images of the object can be captured and analyzed to generate a three-dimensional reconstruction of the environment, whereby a position of the light source can be determined. In other embodiments, movement of the specular reflections in response to movement of the device is used to determine a direction of the light source. In other embodiments, an image of the user is captured to determine the position of the light source based on shadows or reflections on the user.
-
-