-
公开(公告)号:US20160140570A1
公开(公告)日:2016-05-19
申请号:US14543285
申请日:2014-11-17
Applicant: Amazon Technologies, Inc.
Inventor: Yair Rivlin , Catalin Mihai Constantin , Samuel Pike Hall, VI , Douglas James Herrington , Huinan Ren
IPC: G06Q30/00
CPC classification number: G06Q30/018
Abstract: Disclosed are various embodiments for tracking and verifying the authenticity of items. Public and private unique identifiers are generated for an item, and an identifier label is printed and affixed to the item. The public identifier is visible, but the private identifier is not visible unless a tamper-evident action is performed. Events involving scans of the public identifier are recorded. The private identifier is scanned by a client, and in response, authenticity information for the item is sent to the client. The authenticity information is determined based at least in part on the events relative to the public identifier.
Abstract translation: 公开了用于跟踪和验证物品的真实性的各种实施例。 为项目生成公共和私有唯一标识符,并打印并附加标识符标签。 公共标识符是可见的,但私有标识符不可见,除非执行防篡改操作。 记录涉及公共标识符扫描的事件。 专用标识符由客户端扫描,作为响应,该项目的真实性信息被发送给客户端。 至少部分地基于相对于公共标识符的事件确定真实性信息。
-
公开(公告)号:US10957313B1
公开(公告)日:2021-03-23
申请号:US15821080
申请日:2017-11-22
Applicant: Amazon Technologies, Inc.
Inventor: Ruhi Sarikaya , Zheng Ma , Simon Peter Reavely , Kerry Hammil , Huinan Ren , Bradford Jason Snow , Jerrin Thomas Elanjikal
IPC: G10L15/22 , G10L15/30 , G10L15/18 , G06F40/117 , G10L13/00
Abstract: Techniques for performing command processing are described. A system receives, from a device, input data corresponding to a command. The input data may originate as audio data, as text data, or as other data. The system determines NLU processing results corresponding to the input data. The NLU processing results may be associated with multiple speechlets. The system also determines NLU confidences for the NLU processing results for each speechlet. The system sends NLU processing results and an indication to provide potential results to a portion of the multiple speechlets, and receives potential results from the portion of the speechlets. The system also receives indications whether the speechlets need to be re-called if the speechlets are selected to execute with respect to the command. The system ranks the portion of the speechlets based at least in part on the NLU processing results as well as the potential results provided by the portion of the speechlets. The system may also rank the portion of the applications using other data. The system causes content provided by the highest ranked speechlet to be output to a user.
-
公开(公告)号:US11934995B1
公开(公告)日:2024-03-19
申请号:US17706198
申请日:2022-03-28
Applicant: Amazon Technologies, Inc.
Inventor: Huinan Ren , Nicole Yoshino , Kristin Quel Lien , Abhishek Shrivastava , Vinit Dinesh Jain , Brian Gleadle , Ruslan Khmeliuk , Michael Allen Swift , Pushkar Naik
IPC: G06Q10/087
CPC classification number: G06Q10/087
Abstract: Techniques for predicting a manufacturer and/or contents of a received package are described herein. Images of a package may be received from cameras. A visual vector for the package in a vector space of package attributes may be generated using the images. Physical attributes of the package may be received. A subset of candidate packages may be determined by comparing the physical attributes of a plurality of historically received packages to the physical attributes of the package. A ranking of the subset of candidate packages may be determined by identifying a distance in the vector space of the package attributes between a vector for the subset of candidate packages and the visual vector for the package. An identifier associated with a particular package of the ranked subset of candidate packages may be obtained. Data for the particular package may be retrieved from a database using the identifier.
-
公开(公告)号:US10102532B2
公开(公告)日:2018-10-16
申请号:US14543285
申请日:2014-11-17
Applicant: Amazon Technologies, Inc.
Inventor: Yair Rivlin , Catalin Mihai Constantin , Samuel Pike Hall, VI , Douglas James Herrington , Huinan Ren
IPC: G06Q30/00
Abstract: Disclosed are various embodiments for tracking and verifying the authenticity of items. Public and private unique identifiers are generated for an item, and an identifier label is printed and affixed to the item. The public identifier is visible, but the private identifier is not visible unless a tamper-evident action is performed. Events involving scans of the public identifier are recorded. The private identifier is scanned by a client, and in response, authenticity information for the item is sent to the client. The authenticity information is determined based at least in part on the events relative to the public identifier.
-
-
-