Real Time Touch

new TOP 200 Companies filing patents this week

new Companies with the Most Patent Filings (2010+)

Real Time Touch

Filing Names

Amazon Technologies Inc
Amazon Technologies Inc_20131212

Amazon Technologies Inc patents (2016 archive)

Recent patent applications related to Amazon Technologies Inc. Amazon Technologies Inc is listed as an Agent/Assignee. Note: Amazon Technologies Inc may have other listings under different names/spellings. We're not affiliated with Amazon Technologies Inc, we're just tracking patents.

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009 | Company Directory "A" | Amazon Technologies Inc-related inventors

Date Amazon Technologies Inc patents (2016 archive) (updated weekly) - BOOKMARK this page
12/29/16Omnidirectional pinion wheel
12/29/16Tilting platform for stability control
12/29/16Omnidirectional vehicle transport
12/29/16Unmanned aerial vehicle with a tri-wing configuration
12/29/16Collective unmanned aerial vehicle configurations
12/29/16Remotely emulating computing devices
12/29/16Managing virtual machine migration
12/29/16Virtual machine instance migration using a triangle approach
12/29/16Preserving state during virtual machine instance migration
12/29/16Automatic scaling of computing resources using aggregated metrics
12/29/16Retrieval of authoritative measurement data from in-memory datastores
12/29/16Dynamic adjustment of rendering parameters to optimize reading speed
12/29/16Datastore for aggregated measurements for metrics
12/29/16Aggregation of metrics data with fine granularity
12/29/16System and method for implementing a scalable data storage service
12/29/16Policy enforcement delays
12/29/16Dynamic resource allocation and scheduling
12/29/16Detection and interpretation of visual indicators
12/29/16Presenting opportunities for instant transactions
12/29/16System and method for driving electrowetting display device
12/29/16System and method for driving electrowetting display device
12/29/16Language model speech endpointing
12/29/16Input speech quality matching
12/29/16Relay architecture for transferring from redundant power sources
12/29/16Robot mitigation
12/29/16Architecture for metrics aggregation without service partitioning
12/29/16Controlling user access to command execution
12/29/16Multiple instance types serving a single workload or application
12/29/16Predictive caching for content
12/29/16Content-based zooming and panning for video curation
12/29/16Broadcaster tools for interactive shopping interfaces
12/22/16Navigation approaches for multi-dimensional input
12/22/16Managing sensory information of a user device
12/22/16Anomaly detection service
12/22/16Content testing during image production
12/22/16Configuration of voice controlled assistant
12/22/16Low capacity, low area-specific resistance battery cell for electronic devices
12/22/16Connection redistribution in load-balanced systems
12/22/16Managing dynamic ip address assignments
12/22/16Load balancing with handshake offload
12/22/16Handshake offload
12/22/16Threat detection and mitigation through run-time introspection and instrumentation
12/22/16Steganographic depth images
12/22/16Inflatable data center
12/15/16Variable notification alerts
12/15/16Data locker synchronization
12/15/16Sending application input commands over a network
12/08/16Palletizing mobile drive units
12/08/16View port resolution independent network pages
12/08/16Automatic rotation and storage of security credentials
12/08/16Translation of destination identifiers
12/08/16Reset and recovery of managed security credentials
12/08/16Providing devices as a service
12/08/16Inactive non-blocking automated agent detection
12/08/16Managing communications between computing nodes
12/08/16Access control using impersonization
12/08/16Feedback optimized video coding parameters
12/08/16Cooling air stack for computer equipment
12/01/16Spawning new timelines during game session replay
12/01/16Method and apparatus for multi-destination item selection using motes
12/01/16Expandable data center with movable wall
12/01/16Modular mass storage system
12/01/16Determining delay for language translation in video communication
12/01/16Courier management
12/01/16Assisted shopping
12/01/16Offline creation of marketplace listings
12/01/16Dynamic network device configuration
12/01/16Mixture model approach for network forecasting
12/01/16Token-based secure data management
12/01/16Delegated permissions in a distributed electronic environment
11/24/16Capturing snapshots of storage volumes
11/24/16Host identity bootstrapping
11/24/16Secure initialization vector generation
11/24/16Multi-tenant throttling approaches
11/24/16Executing commands on virtual machine instances in a distributed computing environment
11/24/16Custom communication channels for application deployment
11/24/16Portable speaker system
11/17/16Method and system for transporting inventory items
11/17/16Dynamically modifying program execution capacity
11/17/16Image-based color palette generation
11/17/16Automated multi-user system detection
11/17/16Connecting network deployment units
11/17/16Providing multi-factor authentication credentials via device notifications
11/17/16Automated service interface optimization
11/10/16Enhancing user experience by presenting past application usage
11/10/16Media library analyzer
11/10/16Optimized write performance at block-based storage during volume snapshot operations
11/10/16Cached data replication for cache recovery
11/10/16Management of application state data
11/10/16Automatic review excerpt extraction
11/10/16Electronic search interface for identifying artisan sellers
11/10/16Data integrity verification
11/03/16Containerized transportation trailers
11/03/16Encoding text units
11/03/16Web of trust management in a distributed system
11/03/16Capture of web application state
11/03/16System and method for tracking service results
11/03/16Managing load balancers associated with auto-scaling groups
11/03/16Managing state for updates to load balancers of an auto scaling group
11/03/16Background processes in update load balancers of an auto scaling group
11/03/16Content delivery network video content invalidation through adaptive bitrate manifest manipulation
11/03/16Automatic scaling of resource instance groups within compute clusters
11/03/16Visualization of user behavior
11/03/16Application-specific mobile data allocation
10/27/16Live updates for virtual machine monitor
10/27/16Efficient data compression and analysis as a service
10/27/16Access control for a document management and collaboration system
10/20/16Network control protocol
10/20/16Latency measurement in resource requests
10/20/16Shelf-mounted modular computing unit
10/13/16Methods and apparatus for controlling movement of receptacles
10/13/16Managing operational parameters for electronic resources
10/13/16Endpoint management system and virtual compute system
10/13/16Efficient highly connected deployment units
10/13/16Queued workload service in a multi tenant environment
10/13/16Distributed passcode verification system
10/13/16Endpoint management system providing an application programming interface proxy service
10/13/16Method of efficiently implementing a mpeg-4 avc deblocking filter on an array of parallel processors
10/13/16Building level dehumidification and cooling
10/06/16Modular lidar system
10/06/16Power distribution system with rack power distribution unit
10/06/16Cryptographically attested resources for hosting virtual machines
10/06/16Dynamic replica failure detection and healing
10/06/16Data collection for creating apparel size distributions
10/06/16Collaborative electronic commerce
10/06/16Blended reality systems and methods
10/06/16Managing communications between computing nodes
10/06/16Bootstrapping user authentication on devices
10/06/16Networking flow logs for multi-tenant environments
10/06/16Service request management
09/29/16Influencing acceptance of messages in unmanned vehicles
09/29/16Unmanned vehicle rollback
09/29/16Electrowetting device with multi layer support plate
09/29/16Electronic device stack assembly
09/29/16Dynamic configuration of data volumes
09/29/16Executing threads of an application across multiple computing devices in a distributed virtual machine environment
09/29/16Virtual machine state replication using dma write records
09/29/16Data security with a security module
09/29/16Gaze assisted object recognition
09/29/16Intentional monitoring
09/29/16Multiple authority data security and access
09/29/16System and method for data replication using a single master failover protocol
09/29/16Event-driven framework for filtering and processing network flows
09/29/16Virtual network interface objects
09/29/16Establishing secure remote access to private computer networks
09/29/16Accessing a secure network using a streaming device
09/29/16Authentication manager
09/29/16Unmanned vehicle message exchange
09/29/16Authenticated messages between unmanned vehicles
09/29/16Determining initial bit rate for adaptive bit rate video playback
09/29/16Using multiple protocols in a virtual desktop infrastructure
09/29/16Optical transmittal storage networks
09/22/16Systems and methods to facilitate human/robot interaction
09/22/16Adjustable landing gear assembly for unmanned aerial vehicles
09/22/16Gps error correction via network of fixed point ground stations
09/22/16Systems and methods to facilitate human/robot interaction
09/22/16Executing commands within virtual machine instances
09/22/16System and method to facilitate conversion between voice calls and text communications
09/22/16Logical switches
09/22/16Token based automated agent detection
09/22/16Content deployment, scaling, and telemetry
09/22/16Content deployment, scaling, and telemetry
09/22/16Content deployment, scaling, and telemetry
09/22/16Uninterrupted playback of video streams using lower quality cached files
09/15/16Item retrieval using a robotic drive unit
09/15/16Providing content via multiple display devices
09/15/16Resource allocation for staged execution pipelining
09/15/16Service manifests
09/15/16Monitoring web site content
09/15/16System and method for configuration management service
09/15/16Opportunistic resource migration to optimize resource placement
09/15/16Location service for user authentication
09/15/16Broadcast-based trust establishment
09/15/16Template representation of security resources
09/08/16Landing of unmanned aerial vehicles on transportation vehicles for transport
09/08/16Integrated near field sensor for display devices
09/08/16Techniques for predicting user input on touch screen devices
09/08/16Model-based replacement part system
09/08/16Cryptographic key escrow
09/08/16Managing committed processing rates for shared resources
09/08/16Detecting malware in content items
09/08/16Transferring cookie data to another domain
09/08/16System with movable computing devices
09/01/16Interface elements for managing gesture control
09/01/16Fast-booting application image
09/01/16Attributing causality to program execution capacity modifications
09/01/16Ranked navigation element
09/01/16Global query hint specification
09/01/16Provisioning and managing replicated data instances
09/01/16Selecting supplemental content for inclusion in a search results page
09/01/16Landing page selection for linked advertising
09/01/16Distributed routing architecture
09/01/16Managing replication of computing nodes for provided computer networks
08/25/16Vehicle configuration with motors that rotate between a lifting position and a thrusting position
08/25/16Cart for moving items
08/25/16Virtual machine morphing for heterogeneous migration environments
08/25/16Performing automatically authorized programmatic transactions
08/25/16Commercial and general aircraft avoidance using acoustic pattern recognition
08/25/16Commercial and general aircraft avoidance using multi-spectral wave detection
08/25/16Cryptographically verified repeatable virtualized computing
08/25/16Complete forward access sessions
08/25/16Overlay networks for application groups
08/25/16Hybrid native networked applications
08/25/16Depth determination using camera focus
08/18/16Modular, multi-function smart storage containers
08/18/16Context sensitive framework for providing data from relevant applications
08/18/16Programmatic event detection and message generation for requests to execute program code
08/18/16Context sensitive framework for providing data from relevant applications
08/18/16System on a chip comprising an i/o steering engine
08/18/16Multi-mode system on a chip
08/18/16Context sensitive framework for providing data from relevant applications
08/18/16Context sensitive framework for providing data from relevant applications
08/18/16Dynamic security policy generation
08/18/16Modular air delivery
08/18/16Configuration service for configuring instances
08/18/16Automated profiling of resource usage
08/18/16Locality based content distribution
08/11/16Unmanned aerial vehicle protective frame configuration
08/11/16Data visualization through use of linked charts
08/11/16Remote access to mobile communication devices
08/11/16System and method for filling an order
08/11/16Delegation of authority for users of sign-on service
08/11/16Sign-on service and client service information exchange interactions
08/11/16Dynamically modifying a cluster of computing nodes used for distributed execution of a program
08/04/16Monitoring and real-time adjustment of power consumption settings
08/04/16Security protocols for low latency execution of program code
08/04/16Mapping stored client data to requested data using metadata
08/04/16Security protocols for low latency execution of program code
08/04/16Universal business procurement
07/28/16Resin-encapsulated portable media device
07/28/16Using gestures to deliver content to predefined destinations
07/28/16System and method for providing flexible storage and retrieval of snapshot archives
07/28/16Managing update deployment
07/28/16Data security using request-supplied keys
07/28/16Hosted voice recognition system for wireless devices
07/28/16Policy approval layer
07/21/16Approaches for displaying alternate views of information
07/21/16Failover and recovery for replicated data instances
07/21/16Data set capture management with forecasting
07/21/16Visual task feedback for workstations in materials handling facilities
07/21/16Provisioning digital certificates in a network environment
07/21/16Network service request throttling system
07/21/16Interacting with cloud-based applications using unrelated devices
07/14/16Adaptive service timeouts
07/14/16Managing network computing components utilizing request routing
07/14/16Techniques for data security in a multi-tenant environment
07/14/16Shadowing storage gateway
07/07/16Energy reclamation from fluid-moving systems
07/07/16Virtual service provider zones
07/07/16Determining a size of an item based on comparisons of dimensional and stretch data
07/07/16Ground effect based surface sensing in automated aerial vehicles
07/07/16Hardware secret usage limits
07/07/16Energy reclamation from fluid-moving systems
07/07/16Virtual service provider zones
07/07/16Determining a size of an item based on comparisons of dimensional and stretch data
07/07/16Ground effect based surface sensing in automated aerial vehicles
07/07/16Hardware secret usage limits
06/30/16System and method for managing shipment release from a storage area of a material handling facility
06/30/16Request processing techniques
06/30/16Archiving and querying data updates associated with an electronic catalog system
06/30/16Deal based communications via multiple channel options
06/30/16User interface and methods for recommending items to users
06/30/16Reducing visual artifacts and reducing power consumption in electrowetting displays
06/30/16Probabilistic key rotation
06/30/16Distributed public key revocation
06/30/16Managing use of alternative intermediate destination computing nodes for provided computer networks
06/30/16Automated desktop placement
06/30/16Source identification for unauthorized copies of content
06/23/16Consolidated pick and pack for outbound fulfillment
06/23/16Electrowetting display device with stable display states
06/23/16Electrowetting display device with stable display states
06/23/16Electrowetting display device with stable display states
06/23/16Electrowetting display device with shaped colour filter
06/23/16Electrowetting display device with shaped colour filter
06/23/16Distribution of applications with a saved state
06/23/16Congestion control in storage systems
06/23/16System on a chip comprising reconfigurable resources for multiple compute sub-systems
06/23/16Volume-level redundancy coding techniques for sequential transfer optimized storage devices
06/23/16Methods and apparatus for controlling snapshot exports
06/23/16System and method for providing high availability data
06/23/16Efficient determination of join paths via cardinality estimation
06/23/16Identifying join relationships based on transactional access patterns
06/23/16Rights and capability-inclusive content selection and delivery
06/23/16Updating processor microcode
06/23/16Image-based complementary item selection
06/23/16Personalized landing pages
06/23/16Item preview image generation
06/23/16Application focus in speech-based systems
06/23/16System on a chip comprising multiple compute sub-systems
06/23/16Data security operations with expectations
06/23/16Multi-faceted compute instance identity
06/16/16Robotic grasping of items in inventory system
06/16/16Generating robotic grasping instructions for inventory items
06/16/16Mobile configurable conveyor component
06/16/16Electrowetting display device
06/16/16Electronic device stack assembly
06/16/16Systems and methods for loading a virtual machine monitor during a boot process
06/16/16Network policy implementation with multiple interfaces
06/16/16Managing virtual machine instances utilizing a virtual offload device
06/16/16Managing virtual machine instances utilizing an offload device
06/16/16Cached volumes at storage gateways
06/16/16Storage device authentication
06/16/16Efficient query processing using histograms in a columnar database
06/16/16Commercial and general aircraft avoidance using light pattern detection
06/16/16Secured communication in network environments
06/16/16Short-duration digital certificate issuance based on long-duration digital certificate validation
06/16/16Fault tolerant folded clos networks
06/16/16System and method for controlling access to web services resources
06/16/16System and method for recognizing malicious credential guessing attacks
06/16/16Adaptive client-aware session security
06/16/16Predictive rendering of current content versions
06/16/16Prioritized content transmission
06/09/16System for managing and scheduling containers
06/09/16Disaster recovery service
06/09/16Promotion determination based on aggregated code coverage metrics
06/09/16Application development via a multi-unit device
06/09/16Intelligent browser-based display tiling
06/09/16Automatic application dependent anonymization
06/09/16Application recommendations based on application and lifestyle fingerprinting
06/09/16Vertical scaling of computing instances
06/09/16Automatic management of resource sizing
06/09/16Automatic determination of resource sizing
06/09/16Two factor authentication with authentication objects
06/09/16Proxy server-based network site account management
06/09/16Detection of and responses to network attacks
06/09/16Quality-based phone routing
06/09/16Automated aerial vehicle wireless communication and networks
06/02/16Backup of volatile memory to persistent storage
06/02/16Redundant key management
06/02/16Mutual authentication with symmetric secrets and signatures
06/02/16Proxy captive portal traffic for input-limited devices
06/02/16Managing interaction with hosted services
06/02/16Collaborative image capturing
05/26/16Inventory system with efficient operator handling of inventory items
05/26/16Inventory system with efficient operator handling of inventory items
05/26/16Hypervisor assisted virtual memory obfuscation
05/26/16Providing virtual networking functionality for managed computer networks
05/26/16Trusted peripheral device for a host in a shared electronic environment
05/26/16Efficiently caching data at a client device
05/19/16Determining device locations using movement, signal strength
05/19/16Authenticity label for items
05/19/16Tracking and verifying authenticity of items
05/19/16Managing communications between computing nodes
05/19/16Managing content delivery network service providers
05/12/16Unmanned aerial vehicle configuration for extended flight
05/12/16Palletizing mobile drive units
05/12/16Application delivery agents on virtual desktop instances
05/12/16Dynamic reconstruction of application state upon application re-launch
05/12/16Cancel and rollback update stack requests
05/12/16Remote configuration management of applications
05/12/16Deploying updates to an application during periods of off-peak demand
05/12/16Managing virtual computing nodes using isolation and migration techniques
05/12/16Constraints and constraint sharing in a catalog service platform
05/12/16Catalog service platform for deploying applications and services
05/12/16Portfolios and portfolio sharing in a catalog service platform
05/12/16Forward-based resource delivery network management techniques
05/12/16Desktop application fulfillment platform with multiple authentication mechanisms
05/12/16Secure execution environment services
05/12/16Techniques for network replication
05/05/16Multi-scale fiducials
05/05/16Facilitating device driver interactions
05/05/16Virtual machine based content processing
05/05/16System and method for logical deletion of stored data objects
05/05/16Rule-based action triggering in a provider network
05/05/16Optimization of packaging sizes
05/05/16Providing feedback-based rate adjustment for electronic communication services
05/05/16Configuring an electronic device for wireless communications
05/05/16Dynamic scaling of storage volumes for storage client file systems
05/05/16Routing handler for rule-based action triggering
05/05/16Distributed policy enforcement with optimizing policy transformations
05/05/16Resource locators with keys
05/05/16Preventing persistent storage of cryptographic information using signaling
05/05/16Method, system, and computer program product for providing location based services
05/05/16Reconfigurable antenna system
04/28/16Pickup location monitoring
04/28/16Dynamic rfid-based input devices
04/28/16Error troubleshooting using a correlated knowledge base
04/28/16Interactivity analyses of web resources based on reload events
04/28/16Techniques for grouping images
04/28/16Selective high-resolution video monitoring in a materials handling facility
04/28/16Altering streaming video encoding based on user attention
04/21/16Secure data destruction in a distributed environment using key protection mechanisms
04/21/16Electrowetting element
04/21/16System and method for providing high availability data
04/21/16Frameworks and interfaces for offload device-based packet processing
04/21/16Managing deletion of data in a data storage system
04/21/16Optimized log storage for asynchronous log updates
04/21/16Credit card reader authenticator
04/21/16Using virtual networking devices to manage routing cost information
04/21/16Token based one-time password security
04/21/16Enhanced security for electronic communications
04/21/16On-demand delivery of applications to virtual desktops
04/14/16Hierarchical modeling for network sites
04/14/16Data storage application programming interface
04/14/16Image-based color palette generation
04/14/16Followup of customer service agents
04/07/16Emulated endpoint configuration
04/07/16Landing page search results
04/07/16Using credentials stored in different directories to access a common endpoint
04/07/16Managing distributed execution of programs
04/07/16System and method for selection and switching of content sources for a streaming content session
03/31/16Automated loading system
03/31/16Electrowetting display device
03/31/16Electrowetting display pixels with patterned electric field
03/31/16Electrowetting element with a layer including silicon and fluorine
03/31/16Kiosk providing high speed data transfer
03/31/16Dynamic code deployment and versioning
03/31/16Programmatic event detection and message generation for requests to execute program code
03/31/16Threading as a service
03/31/16Remote access control for stored data
03/31/16Providing separate views for items
03/31/16Allocation of shared system resources
03/31/16Rfid reader integration with a light source
03/31/16Determining authenticity of information embedded in a resource identifier
03/31/16Virtual world generation engine
03/31/16Evaluating configuration changes based on aggregate activity level
03/31/16Management of application access to directories by a hosted directory service
03/31/16Scheduled virtual desktops
03/31/16User interaction analysis module
03/24/16Vehicle noise control and communication
03/24/16Hover activation based on input device pointer movement
03/24/16Asynchronous processing of mapping information
03/24/16Managing contingency capacity of pooled resources in multiple availability zones
03/24/16Computing environment selection techniques
03/24/16Synchronization of shared folders and files
03/24/16Automated configuration of log-coordinated storage groups
03/24/16Archival data identification
03/24/16Item registration services
03/24/16Local search of network content
03/24/16Lifecycle transitions in log-coordinated data stores
03/24/16Using virtual networking devices to manage network configuration
03/24/16Clustered dispersion of resource use in shared computing environments
03/24/16Private alias endpoints for isolated virtual networks
03/24/16Credential management
03/24/16Virtual desktop migration
03/24/16Brokering for application hosting computing resources of multiple vendor-specific provisioned computing environments
03/24/16Client side cache management
03/17/16Electrowetting element and manufacture method
03/17/16Variable timeslices for processing latency-dependent workloads
03/17/16Resource credit pools for replenishing instance resource credit balances of virtual compute instances
03/17/16Rotating incremental data backup
03/17/16Selectively persisting application program data from system memory to non-volatile data storage
03/17/16Optimized training of linear machine learning models
03/17/16Fulfillment of orders from multiple sources
03/17/16Simulating variances in human writing with digital typography
03/17/16Emulating virtual router device functionality in virtual computer networks
03/17/16Managing virtual computing nodes
03/17/16Adaptive timeouts for security credentials
03/17/16Predictive caching for content
03/17/16Remote browsing session management
03/17/16Instance backed mobile devices
03/17/16Dynamic virtual resource request rate control for utilizing physical resources
03/17/16Stall containment of rack in a data center
03/10/16Distracted browsing modes
03/10/16Scalable log-based transaction management
03/10/16Computing instance placement using estimated launch times
03/10/16Stateless datastore-independent transactions
03/10/16Read descriptors at heterogeneous storage systems
03/10/16Rapid malware inspection of mobile applications
03/10/16Trusted computing host
03/10/16Computing instance launch time
03/10/16Brokering services
03/10/16Image analysis for user authentication
03/10/16Selecting advertising for presentation with digital content
03/10/16Modifying configurations associated with a hosted electronic platform environment
03/10/16Electronic marketplace recommendations
03/10/16Speech model retrieval in distributed speech recognition systems
03/10/16Method and system for establishing a power feed to systems during operation
03/10/16Managing resources in resource cache components
03/10/16Managing network connections for processing network resources
03/10/16Social networking behavior-based identity system
03/10/16Caching of machine images
03/10/16Physical location influenced caching
03/10/16Provisioning multiple network resources
03/03/16Electrowetting display device having banks of different hydrophilicities and method for manufacturing the same
03/03/16Safety compliance for mobile drive units
03/03/16Hierarchical data access techniques
03/03/16Request routing using a popularity identifier at a dns nameserver
03/03/16Determining importance of scenes based upon closed captioning data
03/03/16Context-based alert delivery
02/25/16Article turn conveyor
02/25/16Multi-level architecture for image display
02/25/16Method and apparatus for stress management in a searchable data service
02/25/16Electronic book rentals
02/25/16Optimizing resource configurations
02/25/16Strength-based password expiration
02/18/16Processing electronic mail replies
02/18/16Avoiding radio access network congestion
02/11/16Propeller safety for automated aerial vehicles
02/11/16Providing configurable workflow capabilities
02/11/16Cache optimization
02/11/16Resolving conflicts within saved state data
02/11/16Establishing trust using side channels
02/11/16Method and system for storing inventory holders
02/11/16Incremental high radix network scaling
02/11/16Distributed storage system with web services client interface
02/11/16Remote browsing session management
02/04/16Determining appropriate browsing applications for selected network resources
02/04/16Authentication of virtual machine images using digital certificates
02/04/16Analyzing user searches of verbal media content
02/04/16Managing workflows
02/04/16Passwordless strong authentication using trusted devices
02/04/16Adaptable container mounted cooling solution
01/28/16Machine-learning based tap detection
01/28/16Automated mobile application verification
01/28/16Managing resources using resource expiration data
01/28/16Surfacing local inventory
01/28/16Request routing in a networked environment
01/28/16Mobile soft duct system
01/21/16Display device
01/21/16Secured firmware updates
01/21/16Adapting decoy data present in a network
01/21/16Hosting architecture
01/21/16Quality aware discovery suppression
01/21/16Integrating social networking systems with electronic commerce systems for gift campaigns
01/21/16Monitoring domain allocation performance
01/21/16Detecting adverse network conditions for a third-party network site
01/21/16Parameter based key derivation
01/14/16Navigating media playback using scrollable text
01/14/16System and method for associating keywords with a web page
01/14/16Method for discontinuous reception (drx) in dual connectivity
01/14/16Compute node cooling with air fed through backplane
01/07/16Self-service configuration for data environment
01/07/16Hypervisor enforcement of cryptographic policy
01/07/16Detecting unexpected behavior
01/07/16Color name generation from images and color palettes
01/07/16Providing local secure network access to remote services
01/07/16Remote browsing session management

ARCHIVE: New 2017 2016 2015 2014 2013 2012 2011 2010 2009


This listing is an abstract for educational and research purposes is only meant as a recent sample of applications filed, not a comprehensive history. is not affiliated or associated with Amazon Technologies Inc in any way and there may be associated servicemarks. This data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Amazon Technologies Inc with additional patents listed. Browse our Agent directory for other possible listings. Page by