-
公开(公告)号:US20170180928A1
公开(公告)日:2017-06-22
申请号:US14976688
申请日:2015-12-21
Applicant: Amazon Technologies, Inc.
Inventor: Keerat Singh Sharma , Guthrie Chipman Collin , Chesley Bernard Coughlin , Timothy John Craycroft , Gerard Gjonej , Pramod Raghavendran
Abstract: Various approaches discussed herein enable techniques for managing privacy with respect to location-based operations, for example by receiving point of interest (POI) data corresponding to location data such as global positioning service (GPS) data at a computing device along with various location-based rules, which when satisfied, result in attribution events being generated that indicate various characteristics associated with POIs in the POI data. The attribution events are then sent to a server without compromising the location privacy of the computing device, because the location of the computing device is not included with the attribution events.
-
公开(公告)号:US09712964B2
公开(公告)日:2017-07-18
申请号:US14976688
申请日:2015-12-21
Applicant: Amazon Technologies, Inc.
Inventor: Keerat Singh Sharma , Guthrie Chipman Collin , Chesley Bernard Coughlin , Timothy John Craycroft , Gerard Gjonej , Pramod Raghavendran
Abstract: Various approaches discussed herein enable techniques for managing privacy with respect to location-based operations, for example by receiving point of interest (POI) data corresponding to location data such as global positioning service (GPS) data at a computing device along with various location-based rules, which when satisfied, result in attribution events being generated that indicate various characteristics associated with POIs in the POI data. The attribution events are then sent to a server without compromising the location privacy of the computing device, because the location of the computing device is not included with the attribution events.
-
公开(公告)号:US20170332197A1
公开(公告)日:2017-11-16
申请号:US15651536
申请日:2017-07-17
Applicant: Amazon Technologies, Inc.
Inventor: Keerat Singh Sharma , Guthrie Chipman Collin , Chesley Bernard Coughlin , Timothy John Craycroft , Gerard Gjonej , Pramod Raghavendran
CPC classification number: H04W4/021 , H04W4/025 , H04W4/029 , H04W12/00502 , H04W12/00503 , H04W12/02
Abstract: Various approaches discussed herein enable techniques for managing privacy with respect to location-based operations, for example by receiving point of interest (POI) data corresponding to location data such as global positioning service (GPS) data at a computing device along with various location-based rules, which when satisfied, result in attribution events being generated that indicate various characteristics associated with POIs in the POI data. The attribution events are then sent to a server without compromising the location privacy of the computing device, because the location of the computing device is not included with the attribution events.
-
公开(公告)号:US11997209B1
公开(公告)日:2024-05-28
申请号:US17208881
申请日:2021-03-22
Applicant: Amazon Technologies, Inc.
Inventor: Rahul Chopra , Maurice Lin , Pramod Raghavendran , Keerat Singh Sharma
CPC classification number: H04L9/3236 , H04L9/50
Abstract: Devices, systems, and methods are provided for rotating cryptography secrets in data hashing. A method may include generating, based on a hashing technique, first obfuscated data using first data and a first version of a secret, and generating first metadata associated with the first obfuscated data, the first metadata indicative of the first version of the secret. The method may include determining a second version of the secret based on the first metadata. The method may include generating, based on the hashing technique, second obfuscated data using the first obfuscated data and the second version of the secret, and generating second metadata associated with the second obfuscated data, the second metadata indicative of the second version of the secret.
-
公开(公告)号:US10484429B1
公开(公告)日:2019-11-19
申请号:US15335175
申请日:2016-10-26
Applicant: Amazon Technologies, Inc.
Inventor: John Kenneth Fawcett , Joe Jony Jeyaratnam , Pramod Raghavendran , Martin Christopher Hare Robertson , Keerat Singh Sharma
IPC: H04L29/06
Abstract: Systems, methods, and computer-readable media are disclosed for automated sensitive information and data storage compliance verification. In one embodiment, an example method may include determining a software application stored at a database, determining software code of the software application, and determining that the software code includes a function that accesses critical user information. Example methods may include determining a risk score for the software application based at least in part on the function, and determining a compliance level for the software application based at least in part on the function.
-
-
-
-