-
公开(公告)号:US11380203B1
公开(公告)日:2022-07-05
申请号:US16796149
申请日:2020-02-20
Applicant: Amazon Technologies, Inc.
Abstract: Recent location and control information received from “lead” vehicles that traveled over a segment of land, sea, or air is captured to inform, via aggregated data, subsequent “trailing” vehicles that travel over that same segment of land, sea, or air. The aggregated data may provide the trailing vehicles with annotated road information that identifies obstacles. In some embodiments, at least some sensor control data may be provided to the subsequent vehicles to assist those vehicles in identifying the obstacles and/or performing other tasks. Besides, obstacles, the location and control information may enable determining areas traveled by vehicles that are not included in conventional maps, as well as vehicle actions associated with particular locations, such as places where vehicles park or make other maneuvers.
-
公开(公告)号:US11235929B1
公开(公告)日:2022-02-01
申请号:US16737853
申请日:2020-01-08
Applicant: Amazon Technologies, Inc.
Inventor: Tye Michael Brady , Darren Ernest Canavor , Ethan Zane Evans , Pragyana K. Mishra , Hilliard Bruce Siegel
Abstract: Autonomous vehicles may be deployed to areas where an item is in demand, and configured to fulfill orders for the item received from the areas. The autonomous vehicles are loaded with the item and dispatched to the area under their own power or in a carrier. When an order for the item is received, an autonomous vehicle delivers the item to a location in the area. Autonomous vehicles may also be equipped with a 3D printer or other equipment and loaded with materials for manufacturing the item. When an order for the item is received, the autonomous vehicle manufactures the item from such materials, and delivers the item. Autonomous vehicles may be configured for collaboration, such as to deliver or manufacture items in multiple stages and to transfer the items between vehicles. Autonomous vehicles may also be configured to automatically access locations in the area, e.g., using wireless access codes.
-
公开(公告)号:US10979415B2
公开(公告)日:2021-04-13
申请号:US15912431
申请日:2018-03-05
Applicant: Amazon Technologies, Inc.
Inventor: Darren Ernest Canavor , Varadarajan Gopalakrishnan , Jesper Mikael Johansson , Jon Arron McClintock , Brandon William Porter , Andrew Jay Roths
IPC: H04L29/06 , B64C39/02 , H04W4/12 , H04W12/06 , H04W12/10 , H04L29/12 , G07C5/00 , H04B7/185 , G05D1/00 , G08G5/00
Abstract: Two unmanned vehicles come within communication range of one another. The unmanned vehicles exchange logs of messages each has received. Each of the unmanned vehicles analyzes the messages that it received from the other unmanned vehicle to determine whether any of the received messages warrants changing a set of tasks it was planning to perform. When a message indicates that a task should be changed, the task is updated accordingly.
-
公开(公告)号:US10440007B1
公开(公告)日:2019-10-08
申请号:US14869864
申请日:2015-09-29
Applicant: Amazon Technologies, Inc.
Inventor: Harsha Ramalingam , Zachary Damen Wolfe , Darren Ernest Canavor , Brian Dang , Max Funderburk , Jesper Mikael Johansson , Bharath Kumar Bhimanaik , Jon Arron McClintock , Jason Christopher Rudmann
IPC: H04L29/06 , G06F21/45 , G06F3/0484 , G06F16/84
Abstract: User input into a user interface is symbolically represented to increase security. User input received into a user interface and a mapping is applied to the user input. A result of the mapping is provided. The user interface may be updated to include the result of the mapping and/or may be provided to another device, such as over a short range communication channel. A person who views or otherwise has access to the user interface does not obtain the user input, but the result of the mapping indicates whether the user input was provided correctly.
-
公开(公告)号:US20190268339A1
公开(公告)日:2019-08-29
申请号:US16384690
申请日:2019-04-15
Applicant: Amazon Technologies, Inc.
Abstract: Systems, methods, and computer-readable media are described for a network address block treatment server. The network address block treatment server identifies blocks of network addresses, associates them with treatments, and generates compact representations of the network address blocks. Blocks may be identified based on network activity data or on the treatment of individual network addresses, and treatments may be associated with address blocks based on address-level and/or block-level criteria. Treatments may include, for example, denying service requests, throttling, queueing, issuing a challenge-response, or limiting the number or scope of services. The network address block treatment server may review treatments periodically or upon receipt of additional network activity data. The server may implement treatments in connection with firewall or routing services, or may transmit address block representations and associated treatments to network service providers for implementation.
-
公开(公告)号:US10387825B1
公开(公告)日:2019-08-20
申请号:US14745193
申请日:2015-06-19
Applicant: Amazon Technologies, Inc.
Inventor: Darren Ernest Canavor , Jon Arron McClintock , Brandon William Porter
Abstract: An unmanned vehicle obtains first location information associated with a customer order, which causes the unmanned vehicle to travel to a first location. While at the first location, the unmanned vehicle receives, from another device, second location information. The unmanned vehicle uses the second location information to travel to a second location where the other device is located. Once at the second location, the unmanned vehicle performs one or more operations involved with fulfillment of the order.
-
公开(公告)号:US10372905B1
公开(公告)日:2019-08-06
申请号:US14569265
申请日:2014-12-12
Applicant: AMAZON TECHNOLOGIES, INC.
IPC: G06F21/56
Abstract: Techniques are described for preventing a software module from executing in an unauthorized environment. A software module may be configured to collect context information that describes an environment in which the software module is executing. If the context information indicates that the environment is unauthorized for executing the software module, the software module may alter its behavior(s) or its binary signature to simulate a threat. Threat detection module(s), such as anti-virus software, anti-malware software, and so forth, may then identify the software module as a threat and disable its execution or perform other actions. In some cases, the analysis of the context information may be performed on server device(s), which may send a signal to cause the software module to alter its behavior(s) or its binary signature.
-
公开(公告)号:US10333937B2
公开(公告)日:2019-06-25
申请号:US15612067
申请日:2017-06-02
Applicant: Amazon Technologies, Inc.
Abstract: A resource owner or administrator submits a request to a permissions management service to create a permissions grant which may include a listing of actions a user may perform on a resource. Accordingly, the permissions management service may create the permissions grant and use a private cryptographic key to digitally sign the created permissions grant. The permissions management service may transmit this digitally signed permissions grant, as well as a digital certificate comprising a public cryptographic key for validating the permissions grant, to a target resource. The target resource may use the public cryptographic key to validate the digital signature of the permissions grant and determine whether a user is authorized to perform one or more actions based at least in part on a request from the user to perform these one or more actions on the resource.
-
公开(公告)号:US10310500B1
公开(公告)日:2019-06-04
申请号:US15390009
申请日:2016-12-23
Applicant: Amazon Technologies, Inc.
Inventor: Tye Michael Brady , Darren Ernest Canavor , Ethan Zane Evans , Pragyana K. Mishra , Hilliard Bruce Siegel
Abstract: Autonomous vehicles may be deployed to areas where an item is in demand, and configured to fulfill orders for the item received from the areas. The autonomous vehicles are loaded with the item and dispatched to the area under their own power or in a carrier. When an order for the item is received, an autonomous vehicle delivers the item to a location in the area. Autonomous vehicles may also be equipped with a 3D printer or other equipment and loaded with materials for manufacturing the item. When an order for the item is received, the autonomous vehicle manufactures the item from such materials, and delivers the item. Autonomous vehicles may be configured for collaboration, such as to deliver or manufacture items in multiple stages and to transfer the items between vehicles. Autonomous vehicles may also be configured to automatically access locations in the area, e.g., using wireless access codes.
-
公开(公告)号:US10233021B1
公开(公告)日:2019-03-19
申请号:US15341925
申请日:2016-11-02
Applicant: Amazon Technologies, Inc.
Inventor: Tye Michael Brady , Darren Ernest Canavor , Ethan Zane Evans
Abstract: The present disclosure is directed to autonomous vehicles, such as autonomous ground vehicles (“AGVs”) that may be utilized to transport items to specified locations (e.g., residences, dormitory rooms, etc.), operate as a safety escort for a human moving from one location to another (e.g., from a campus library to a dormitory room), form ad-hoc wireless networks with other autonomous vehicles, and/or to operate as a mobile security station that can provide direct connection between a person at the location of the autonomous vehicle and security, rescue, and/or other personnel.
-
-
-
-
-
-
-
-
-