-
公开(公告)号:US10777029B1
公开(公告)日:2020-09-15
申请号:US16818840
申请日:2020-03-13
Applicant: Amazon Technologies, Inc.
Inventor: Margaret Ren , Unyoung Kim , Kristine Anne Hanson , Priti Marappan , Jenish Shah , Rohit Shrivastava , Tian Yu , Jing Zhu
IPC: G07C9/00 , G06F16/435 , H04L12/28
Abstract: A first user associated with a structure (e.g., a home, a building, etc.) may authorize a second user to access the structure when the first user is not present. The second user may request to access the structure via a text message that includes an access code that was previously provided. The second user may be verified/authenticated based on the telephone number in which the text message was received, the access code, and/or an access schedule that indicates when the second user is authorized to access the structure. The second user may send a second text message indicating a desire to lock/unlock a structure entrance (e.g., a door) to the structure that contains a smart lock. Upon receiving the second text message, a service provider sends an instruction to the smart lock, causing the structure entrance to become locked/unlocked, and allowing the second user to access or secure the structure.
-
公开(公告)号:US11868917B1
公开(公告)日:2024-01-09
申请号:US15927929
申请日:2018-03-21
Applicant: Amazon Technologies, Inc.
Inventor: Priti Marappan , Darren Ernest Canavor , Daniel Wade Hitchcock , Bharath Kumar Bhimanaik , Andrew Jay Roths
CPC classification number: G06N7/01 , E05B15/0205 , E05B41/00 , G06N20/00 , E05B47/0001 , E05B2047/002 , E05B2047/0016 , E05B2047/0058 , E05B2047/0068 , E05B2047/0069 , E05B2047/0081 , E05B2047/0088
Abstract: A method of implementing a network-enabled secure door lock, comprising obtaining measurements of an environment associated with a door from a variety of sensor types; generating, based at least in part on the measurements, a set of inputs to a machine-learning model; inputting the set of inputs into the machine learning model to determine a status of the door; generating a message that indicates the status of the door; and transmitting the message to a user device.
-
公开(公告)号:US10911224B1
公开(公告)日:2021-02-02
申请号:US15927915
申请日:2018-03-21
Applicant: Amazon Technologies, Inc.
Inventor: Priti Marappan , Darren Ernest Canavor , Daniel Wade Hitchcock , Bharath Kumar Bhimanaik , Andrew Jay Roths
Abstract: A method of implementing a network-enabled secure door lock, comprising determining, at a first component of the lock, a nonce; wirelessly transmitting the nonce to a second component of the door lock, the first component and second component selectively mechanically engagable with one another to prevent relative movement between the first component and second component to prevent opening of a door; receiving, at the first component, a first message; using a cryptographic key associated with the second component and the nonce to validate the first message; and as a result of determining that the message is valid, transmitting a second message indicating that the first component and second component have become mechanically engaged with one another.
-
公开(公告)号:US11494499B1
公开(公告)日:2022-11-08
申请号:US17182930
申请日:2021-02-23
Applicant: Amazon Technologies, Inc.
Inventor: Cristi Ursachi , Amanda Gray , Priti Marappan , Dan Mutescu
Abstract: Disclosed are various embodiments for searching encrypted data stores. A first computing device can send a message authentication code (MAC) to a second computing device the MAC representing a tuple of a name of a data table, an identifier of a column of the data table, and a valid value for the column. Then, an encrypted bitmap can be received from the second computing device and decrypted to generate a decrypted bitmap. Bitwise operations can be performed on the decrypted bitmap to identify a plurality of encrypted rows of the data table containing a cell that comprises the valid value. Then, at least the plurality of at least partially encrypted rows of the data table can be requested from the second computing device and decrypted to generate a respective plurality of decrypted rows.
-
公开(公告)号:US10121301B1
公开(公告)日:2018-11-06
申请号:US15628237
申请日:2017-06-20
Applicant: Amazon Technologies, Inc.
Inventor: Margaret Ren , Unyoung Kim , Kristine Anne Hanson , Priti Marappan , Jenish Shah , Rohit Shrivastava , Tian Yu , Jing Zhu
Abstract: A first user associated with a structure (e.g., a home, a building, etc.) may authorize a second user to access the structure when the first user is not present. The second user may request to access the structure via a website associated with a URL that was previously provided. The second user may be verified/authenticated based on an access code input via the web site, a proximity of a device to the structure, and/or times in which the second user is authorized to access the structure. The second user may indicate, via the website, a desire to lock/unlock a structure entrance (e.g., a door) to the structure that contains a smart lock. Upon receiving a selection to lock/unlock the structure entrance, a service provider sends an instruction to the smart lock, causing the structure entrance to become locked/unlocked, and allowing the second user to access or secure the structure.
-
公开(公告)号:US11003783B1
公开(公告)日:2021-05-11
申请号:US16137987
申请日:2018-09-21
Applicant: Amazon Technologies, Inc.
Inventor: Cristi Ursachi , Amanda Gray , Priti Marappan , Dan Mutescu
Abstract: Disclosed are various embodiments for searchable encrypted data stores. A plurality of rows in a data table that have a cell in a column of the row that matches a value are identified. A bitmap that represents the plurality of rows is generated. The bitmap is encrypted. A key is then generated for a key-value pair. The key can be represented by a message authentication code (MAC) based at least in part on a tuple of a name of the data table, an identifier of the column, and the value. The key-value pair with the key and the encrypted bitmap is then sent to a remote computing device for storage.
-
公开(公告)号:US10134212B1
公开(公告)日:2018-11-20
申请号:US15628120
申请日:2017-06-20
Applicant: Amazon Technologies, Inc.
Inventor: Margaret Ren , Unyoung Kim , Kristine Anne Hanson , Priti Marappan , Jenish Shah , Rohit Shrivastava , Tian Yu , Jing Zhu
Abstract: A first user associated with a structure (e.g., a home, a building, etc.) may authorize a second user to access the structure when the first user is not present. The second user may request to access the structure via a text message that includes an access code that was previously provided. The second user may be verified/authenticated based on the telephone number in which the text message was received, the access code, and/or an access schedule that indicates when the second user is authorized to access the structure. The second user may send a second text message indicating a desire to lock/unlock a structure entrance (e.g., a door) to the structure that contains a smart lock. Upon receiving the second text message, a service provider sends an instruction to the smart lock, causing the structure entrance to become locked/unlocked, and allowing the second user to access or secure the structure.
-
-
-
-
-
-