G06F21/1076

Shared dedicated host resource groups in a provider network

Techniques for host resource group sharing in a provider network are described. A resource share is made of a host resource group made up of dedicated hosts in the provider network. The share provides access to the host resource group of a primary account with one or more other principalse.g., user accounts, an organization, or a group of users. The other principals can launch compute instances into the host resource group, which may cause the automatic provisioning of new hosts into the host resource group, of the primary account, as needed.

SYSTEMS AND METHODS FOR MANAGING SECURE SHARING OF ONLINE DATA
20200259819 · 2020-08-13 · ·

Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary data from a data consumer, the request including a data consumer identifier; retrieving, from a database of proprietary data, proprietary data based on the request; determining, by the server, whether the retrieved proprietary data is at least one of: designated to be processed and designated to have privileges set; processing, by the server, the proprietary data when the server determines the proprietary data is designated to be processed; setting one or more privileges to the proprietary data using the certificate associated with the data consumer identifier when the server determines the proprietary data is designated to have privileges set; encrypting the proprietary data using the certificate associated with the data consumer identifier; and transmitting the encrypted proprietary data to the data consumer.

BUILDING RESILIENT MODELS TO ADDRESS DYNAMIC CUSTOMER DATA USE RIGHTS
20200242216 · 2020-07-30 ·

A system and method for constructing an improved computing model that preserves use rights for data utilized by the model. A first dataset is accessed to build a computing model. The first data set is subject to terminable usage rights provisions. A portion of the first dataset is sampled to generate a second dataset. Vectors present in the first dataset and the second dataset are discretized. In response to determine that the usage rights associated with the primary dataset have been terminated, a coverage depletion for the second dataset is computed based on the usage rights termination associated with the first dataset. An estimated mean time to coverage failure for the first model based on the depletion coverage is determined for the second dataset. One or more data points are removed from the first dataset due to the termination of usage rights.

DIGITAL RIGHTS MANAGEMENT

Embodiments include method, systems and computer program products for digital rights management. Aspects include receiving, by a processor, a request to access media content from a requestor, wherein the media content is protected by a digital rights management (DRM) system that requires a license, obtaining context data associated with the requestor, analyzing the context data to determine a validity score for the request, and transmitting a license or access key to the requestor based on determining that the validity score exceeds a threshold.

Systems and methods for managing secure sharing of online data

Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary data from a data consumer, the request including a data consumer identifier; retrieving, from a database of proprietary data, proprietary data based on the request; determining, by the server, whether the retrieved proprietary data is at least one of: designated to be processed and designated to have privileges set; processing, by the server, the proprietary data when the server determines the proprietary data is designated to be processed; setting one or more privileges to the proprietary data using the certificate associated with the data consumer identifier when the server determines the proprietary data is designated to have privileges set; encrypting the proprietary data using the certificate associated with the data consumer identifier; and transmitting the encrypted proprietary data to the data consumer.

Threat-monitoring systems and related methods

Disclosed herein are methods, devices, systems and computer-executable instructions for managing software in threat-monitoring systems. One such method comprises receiving a plurality of licence identifiers identifying respective licences available for assignment to a threat monitoring system. The method further comprises receiving a selection of at least one of the licence identifiers. The method also comprises uploading, to the threat monitoring system, an activation tool for activating at least one operational function of the threat monitoring system, the at least one operational function corresponding to the selected at least one licence identifier.

SYSTEM AND METHOD FOR SECURELY RETRIEVING AND PLAYING DIGITAL MEDIA USING PEER-TO-PEER DISTRIBUTION
20200042674 · 2020-02-06 ·

A system for securely streaming/downloading and playing coherent digital content such as music and preventing its play by unauthorized users. The system may include mass server/storage devices for receiving and storing digital content having predetermined gaps; and client devices communicating with the server/storage devices, and providing authorization to proceed. During playing of the digital content by the client devices, the removed components may be reinserted into the missing gaps at the appropriate places, to allow the play or cloning of the coherent digital content.

Ride sharing accessory device and system

A method of authorizing access and operation for vehicle sharing via a portable device. A request reservation is generated to reserve a vehicle via a portable device carried by a user. The reservation includes a portable device identifier and reservation details. Authentication keys are transmitted to the portable device and a plug-in device coupled to the vehicle in response to a successful authorization. The plug-in device is used to perform vehicle access and vehicle operations of the vehicle. The authentication keys enable the portable device and the plug-in device to be paired for enabling vehicle access and operations. An authorization is executed between the portable device carried by a user and a plug-in device coupled to the vehicle. Access to the vehicle operations are enabled in response to a successful authorization.

Consistent snapshots and clones in an asymmetric virtual distributed file system
10515192 · 2019-12-24 · ·

Processing in an asymmetrically distributed file system may include storing first data representative of the content of the files in a file system volume among a plurality of storage nodes. Second data representative of attributes of the files in the file system volume may be stored in only one of the storage nodes. Time-limited leases allow clients direct access to the plurality of storage node in order to access portions of the file system volume. The time-limited leases may be provided to client lessors. Snapshots of the file system volume may be generated after sending a revocation to the client lessors to revoke time-limited leases provided to the client lessors and having received the acknowledgements of the revocations or after the leases have expired for non-responding lessors, to ensure that changes are not made to the file system volume during snapshot processing.

Systems and methods for managing secure sharing of online data

Systems and methods are disclosed for managing online advertising data secure sharing. One method includes receiving, at a server, a request for proprietary data from a data consumer, the request including a data consumer identifier; retrieving, from a database of proprietary data, proprietary data based on the request; determining, by the server, whether the retrieved proprietary data is at least one of: designated to be processed and designated to have privileges set; processing, by the server, the proprietary data when the server determines the proprietary data is designated to be processed; setting one or more privileges to the proprietary data using the certificate associated with the data consumer identifier when the server determines the proprietary data is designated to have privileges set; encrypting the proprietary data using the certificate associated with the data consumer identifier; and transmitting the encrypted proprietary data to the data consumer.