Cross-site request forgery protection

    公开(公告)号:US11949714B2

    公开(公告)日:2024-04-02

    申请号:US17160840

    申请日:2021-01-28

    IPC分类号: H04L9/40

    摘要: Digital data processing systems of the type in which a server digital data device (“server”) is coupled to a client digital data device (“client”) over a network, e.g., the Internet, include web server software executing within an application layer on the server that responds to a request from the client by (i) validating a key received from the client with that request, (ii) generating a result code indicative of a success of that validation, (iii) initiating processing of the request, including invoking server resource software executing outside the application layer. The server resource software, which checks the result code upon invocation and before performing a protected operation required for processing the request, responds to a result code indicating that the result did not validate by exiting before executing the protected operation.

    Mechanisms for maintaining chains without locks

    公开(公告)号:US11940994B2

    公开(公告)日:2024-03-26

    申请号:US17515118

    申请日:2021-10-29

    CPC分类号: G06F16/2379 G06F16/24552

    摘要: Techniques are disclosed that relate to manipulating a chain of database objects without locking the chain. A computer system may maintain a chain that orders a set of database objects stored in a cache of the computer system. The computer system may receive a set of requests to perform database transactions. Based on those received set of requests, the computer system may determine to perform a plurality of chain operations that involve modifying the chain. The computer system may perform two or more of the plurality of chain operations at least partially in parallel using a set of atomic operations without acquiring a lock on the chain.

    Mechanisms for handling schema changes

    公开(公告)号:US11940963B2

    公开(公告)日:2024-03-26

    申请号:US17457244

    申请日:2021-12-01

    摘要: Techniques are disclosed relating to database schemas. A computer system may receive a metadata document that describes an updated schema for a database that stores a plurality of records. The computer system may instantiate a set of processes to perform an upgrade routine to upgrade ones of the plurality of records to comply with the updated schema. While the set of processes are upgrading the records, the computer system may receive a request to perform an operation on one of the plurality of records. The computer system may detect that the record corresponds to an earlier schema version than a version of the updated schema of the metadata document and may upgrade the record to comply with that updated schema. After upgrading the record, the computer system may perform the requested operation on the record.

    Anomaly detection mechanism
    17.
    发明授权

    公开(公告)号:US11928090B2

    公开(公告)日:2024-03-12

    申请号:US16261741

    申请日:2019-01-30

    发明人: Amey Ruikar

    摘要: Techniques and structures to facilitate anomaly detection, including receiving performance metric data at a database system having a plurality of data point values, processing the plurality of data point values via an optimized Extreme Studentized Deviate (ESD) test to detect one or more anomalous data point values within the plurality of data point values, including storing a first set of values representing the largest values of the plurality of data point values and a second set of values representing the smallest values of the plurality of data point values, receiving a first of the plurality of data point values, determining whether the first data point value is to be included in the first set of values or the second set of values and determining that the first data point value is not an anomalous data point value upon a determination that the first data point value is not to be inserted into the first set of values or the second set of values and generating an incident alert upon a detection of one or more anomalous data point values within the plurality of data point values.

    Mechanisms for deploying database clusters

    公开(公告)号:US11914580B2

    公开(公告)日:2024-02-27

    申请号:US17491102

    申请日:2021-09-30

    摘要: Techniques are disclosed that pertain to deploying immutable instances of a system. A computer system may maintain an active generation value that indicates an immutable instance of a database system that is permitted to write data to a database. The computer system may deploy a first immutable instance of the database system and update the active generation value to permit the first immutable instance to write data to the database. The computer system may receive a request to deploy a second immutable instance of the database system that includes an update not found in the first immutable instance. The computer system may deploy the second immutable instance and update the active generation value to cause the first immutable instance to cease writing data to the database and to permit the second immutable instance to write data to the database.