new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)


Amazon Technologies Inc patents

Bulk PDF Downloads
Recent patent applications related to Amazon Technologies Inc. Amazon Technologies Inc is listed as an Agent/Assignee. Note: Amazon Technologies Inc may have other listings under different names/spellings. We're not affiliated with Amazon Technologies Inc, we're just tracking patents.

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Amazon Technologies Inc-related inventors

Date Amazon Technologies Inc patents (updated weekly) - BOOKMARK this page
10/20/16 new patent  Network control protocol
10/20/16 new patent  Latency measurement in resource requests
10/20/16 new patent  Shelf-mounted modular computing unit
10/13/16Methods and controlling movement of receptacles
10/13/16Managing operational parameters for electronic resources
10/13/16Endpoint management system and virtual compute system
10/13/16Efficient highly connected deployment units
10/13/16Queued workload service in a multi tenant environment
10/13/16Distributed passcode verification system
10/13/16Endpoint management system providing an application programming interface proxy service
10/13/16Method of efficiently implementing a mpeg-4 avc deblocking filter on an array of parallel processors
10/13/16Building level dehumidification and cooling
10/06/16Modular lidar system
10/06/16Power distribution system with rack power distribution unit
10/06/16Cryptographically attested resources for hosting virtual machines
10/06/16Dynamic replica failure detection and healing
10/06/16Data collection for creating apparel size distributions
10/06/16Collaborative electronic commerce
10/06/16Blended reality systems and methods
10/06/16Managing communications between computing nodes
10/06/16Bootstrapping user authentication on devices
10/06/16Networking flow logs for multi-tenant environments
10/06/16Service request management
09/29/16Influencing acceptance of messages in unmanned vehicles
09/29/16Unmanned vehicle rollback
09/29/16Electrowetting device with multi layer support plate
09/29/16Electronic device stack assembly
09/29/16Dynamic configuration of data volumes
09/29/16Executing threads of an application across multiple computing devices in a distributed virtual machine environment
09/29/16Virtual machine state replication using dma write records
09/29/16Data security with a security module
09/29/16Gaze assisted object recognition
09/29/16Intentional monitoring
09/29/16Multiple authority data security and access
09/29/16System and data replication using a single master failover protocol
09/29/16Event-driven framework for filtering and processing network flows
09/29/16Virtual network interface objects
09/29/16Establishing secure remote access to private computer networks
09/29/16Accessing a secure network using a streaming device
09/29/16Authentication manager
09/29/16Unmanned vehicle message exchange
09/29/16Authenticated messages between unmanned vehicles
09/29/16Determining initial bit rate for adaptive bit rate video playback
09/29/16Using multiple protocols in a virtual desktop infrastructure
09/29/16Optical transmittal storage networks
09/22/16Systems and methods to facilitate human/robot interaction
09/22/16Adjustable landing gear assembly for unmanned aerial vehicles
09/22/16Gps error correction via network of fixed point ground stations
09/22/16Systems and methods to facilitate human/robot interaction
09/22/16Executing commands within virtual machine instances
09/22/16System and method to facilitate conversion between voice calls and text communications
09/22/16Logical switches
09/22/16Token based automated agent detection
09/22/16Content deployment, scaling, and telemetry
09/22/16Content deployment, scaling, and telemetry
09/22/16Content deployment, scaling, and telemetry
09/22/16Uninterrupted playback of video streams using lower quality cached files
09/15/16Item retrieval using a robotic drive unit
09/15/16Providing content via multiple display devices
09/15/16Resource allocation for staged execution pipelining
09/15/16Service manifests
09/15/16Monitoring web site content
09/15/16System and configuration management service
09/15/16Opportunistic resource migration to optimize resource placement
09/15/16Location service for user authentication
09/15/16Broadcast-based trust establishment
09/15/16Template representation of security resources
09/08/16Landing of unmanned aerial vehicles on transportation vehicles for transport
09/08/16Integrated near field sensor for display devices
09/08/16Techniques for predicting user input on touch screen devices
09/08/16Model-based replacement part system
09/08/16Cryptographic key escrow
09/08/16Managing committed processing rates for shared resources
09/08/16Detecting malware in content items
09/08/16Transferring cookie data to another domain
09/08/16System with movable computing devices
09/01/16Interface elements for managing gesture control
09/01/16Fast-booting application image
09/01/16Attributing causality to program execution capacity modifications
09/01/16Ranked navigation element
09/01/16Global query hint specification
09/01/16Provisioning and managing replicated data instances
09/01/16Selecting supplemental content for inclusion in a search results page
09/01/16Landing page selection for linked advertising
09/01/16Distributed routing architecture
09/01/16Managing replication of computing nodes for provided computer networks
08/25/16Vehicle configuration with motors that rotate between a lifting position and a thrusting position
08/25/16Cart for moving items
08/25/16Virtual machine morphing for heterogeneous migration environments
08/25/16Performing automatically authorized programmatic transactions
08/25/16Commercial and general aircraft avoidance using acoustic pattern recognition
08/25/16Commercial and general aircraft avoidance using multi-spectral wave detection
08/25/16Cryptographically verified repeatable virtualized computing
08/25/16Complete forward access sessions
08/25/16Overlay networks for application groups
08/25/16Hybrid native networked applications
08/25/16Depth determination using camera focus
08/18/16Modular, multi-function smart storage containers
08/18/16Context sensitive framework for providing data from relevant applications
08/18/16Programmatic event detection and message generation for requests to execute program code
08/18/16Context sensitive framework for providing data from relevant applications
08/18/16System on a chip comprising an i/o steering engine
08/18/16Multi-mode system on a chip
08/18/16Context sensitive framework for providing data from relevant applications
08/18/16Context sensitive framework for providing data from relevant applications
08/18/16Dynamic security policy generation
08/18/16Modular air delivery
08/18/16Configuration service for configuring instances
08/18/16Automated profiling of resource usage
08/18/16Locality based content distribution
08/11/16Unmanned aerial vehicle protective frame configuration
08/11/16Data visualization through use of linked charts
08/11/16Remote access to mobile communication devices
08/11/16System and filling an order
08/11/16Delegation of authority for users of sign-on service
08/11/16Sign-on service and client service information exchange interactions
08/11/16Dynamically modifying a cluster of computing nodes used for distributed execution of a program
08/04/16Monitoring and real-time adjustment of power consumption settings
08/04/16Security protocols for low latency execution of program code
08/04/16Mapping stored client data to requested data using metadata
08/04/16Security protocols for low latency execution of program code
08/04/16Universal business procurement
07/28/16Resin-encapsulated portable media device
07/28/16Using gestures to deliver content to predefined destinations
07/28/16System and providing flexible storage and retrieval of snapshot archives
07/28/16Managing update deployment
07/28/16Data security using request-supplied keys
07/28/16Hosted voice recognition system for wireless devices
07/28/16Policy approval layer
07/21/16Approaches for displaying alternate views of information
07/21/16Failover and recovery for replicated data instances
07/21/16Data set capture management with forecasting
07/21/16Visual task feedback for workstations in materials handling facilities
07/21/16Provisioning digital certificates in a network environment
07/21/16Network service request throttling system
07/21/16Interacting with cloud-based applications using unrelated devices
07/14/16Adaptive service timeouts
07/14/16Managing network computing components utilizing request routing
07/14/16Techniques for data security in a multi-tenant environment
07/14/16Shadowing storage gateway
07/07/16Energy reclamation from fluid-moving systems
07/07/16Virtual service provider zones
07/07/16Determining a size of an item based on comparisons of dimensional and stretch data
07/07/16Ground effect based surface sensing in automated aerial vehicles
07/07/16Hardware secret usage limits
06/30/16System and managing shipment release from a storage area of a material handling facility
06/30/16Request processing techniques
06/30/16Archiving and querying data updates associated with an electronic catalog system
06/30/16Deal based communications via multiple channel options
06/30/16User interface and methods for recommending items to users
06/30/16Reducing visual artifacts and reducing power consumption in electrowetting displays
06/30/16Probabilistic key rotation
06/30/16Distributed public key revocation
06/30/16Managing use of alternative intermediate destination computing nodes for provided computer networks
06/30/16Automated desktop placement
06/30/16Source identification for unauthorized copies of content
06/23/16Consolidated pick and pack for outbound fulfillment
06/23/16Electrowetting display device with stable display states
06/23/16Electrowetting display device with stable display states
06/23/16Electrowetting display device with stable display states
06/23/16Electrowetting display device with shaped colour filter
06/23/16Electrowetting display device with shaped colour filter
06/23/16Distribution of applications with a saved state
06/23/16Congestion control in storage systems
06/23/16System on a chip comprising reconfigurable resources for multiple compute sub-systems
06/23/16Volume-level redundancy coding techniques for sequential transfer optimized storage devices
06/23/16Methods and controlling snapshot exports
06/23/16System and providing high availability data
06/23/16Efficient determination of join paths via cardinality estimation
06/23/16Identifying join relationships based on transactional access patterns
06/23/16Rights and capability-inclusive content selection and delivery
06/23/16Updating processor microcode
06/23/16Image-based complementary item selection
06/23/16Personalized landing pages
06/23/16Item preview image generation
06/23/16Application focus in speech-based systems
06/23/16System on a chip comprising multiple compute sub-systems
06/23/16Data security operations with expectations
06/23/16Multi-faceted compute instance identity
06/16/16Robotic grasping of items in inventory system
06/16/16Generating robotic grasping instructions for inventory items
06/16/16Mobile configurable conveyor component
06/16/16Electrowetting display device
06/16/16Electronic device stack assembly
06/16/16Systems and methods for loading a virtual machine monitor during a boot process
06/16/16Network policy implementation with multiple interfaces
06/16/16Managing virtual machine instances utilizing a virtual offload device
06/16/16Managing virtual machine instances utilizing an offload device
06/16/16Cached volumes at storage gateways
06/16/16Storage device authentication
06/16/16Efficient query processing using histograms in a columnar database
06/16/16Commercial and general aircraft avoidance using light pattern detection
06/16/16Secured communication in network environments
06/16/16Short-duration digital certificate issuance based on long-duration digital certificate validation
06/16/16Fault tolerant folded clos networks
06/16/16System and controlling access to web services resources
06/16/16System and recognizing malicious credential guessing attacks
06/16/16Adaptive client-aware session security
06/16/16Predictive rendering of current content versions
06/16/16Prioritized content transmission
06/09/16System for managing and scheduling containers
06/09/16Disaster recovery service
06/09/16Promotion determination based on aggregated code coverage metrics
06/09/16Application development via a multi-unit device
06/09/16Intelligent browser-based display tiling
06/09/16Automatic application dependent anonymization
06/09/16Application recommendations based on application and lifestyle fingerprinting
06/09/16Vertical scaling of computing instances
06/09/16Automatic management of resource sizing
06/09/16Automatic determination of resource sizing
06/09/16Two factor authentication with authentication objects
06/09/16Proxy server-based network site account management
06/09/16Detection of and responses to network attacks
06/09/16Quality-based phone routing
06/09/16Automated aerial vehicle wireless communication and networks
06/02/16Backup of volatile memory to persistent storage
06/02/16Redundant key management
06/02/16Mutual authentication with symmetric secrets and signatures
06/02/16Proxy captive portal traffic for input-limited devices
06/02/16Managing interaction with hosted services
06/02/16Collaborative image capturing
05/26/16Inventory system with efficient operator handling of inventory items
05/26/16Inventory system with efficient operator handling of inventory items
05/26/16Hypervisor assisted virtual memory obfuscation
05/26/16Providing virtual networking functionality for managed computer networks
05/26/16Trusted peripheral device for a host in a shared electronic environment
05/26/16Efficiently caching data at a client device
05/19/16Determining device locations using movement, signal strength
05/19/16Authenticity label for items
05/19/16Tracking and verifying authenticity of items
05/19/16Managing communications between computing nodes
05/19/16Managing content delivery network service providers
05/12/16Unmanned aerial vehicle configuration for extended flight
05/12/16Palletizing mobile drive units
05/12/16Application delivery agents on virtual desktop instances
05/12/16Dynamic reconstruction of application state upon application re-launch
05/12/16Cancel and rollback update stack requests
05/12/16Remote configuration management of applications
05/12/16Deploying updates to an application during periods of off-peak demand
05/12/16Managing virtual computing nodes using isolation and migration techniques
05/12/16Constraints and constraint sharing in a catalog service platform
05/12/16Catalog service platform for deploying applications and services
05/12/16Portfolios and portfolio sharing in a catalog service platform
05/12/16Forward-based resource delivery network management techniques
05/12/16Desktop application fulfillment platform with multiple authentication mechanisms
05/12/16Secure execution environment services
05/12/16Techniques for network replication
05/05/16Multi-scale fiducials
05/05/16Facilitating device driver interactions

ARCHIVE: New 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Amazon Technologies Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Amazon Technologies Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by