Cross-site request forgery protection

    公开(公告)号:US11949714B2

    公开(公告)日:2024-04-02

    申请号:US17160840

    申请日:2021-01-28

    Abstract: Digital data processing systems of the type in which a server digital data device (“server”) is coupled to a client digital data device (“client”) over a network, e.g., the Internet, include web server software executing within an application layer on the server that responds to a request from the client by (i) validating a key received from the client with that request, (ii) generating a result code indicative of a success of that validation, (iii) initiating processing of the request, including invoking server resource software executing outside the application layer. The server resource software, which checks the result code upon invocation and before performing a protected operation required for processing the request, responds to a result code indicating that the result did not validate by exiting before executing the protected operation.

    Mechanisms for maintaining chains without locks

    公开(公告)号:US11940994B2

    公开(公告)日:2024-03-26

    申请号:US17515118

    申请日:2021-10-29

    CPC classification number: G06F16/2379 G06F16/24552

    Abstract: Techniques are disclosed that relate to manipulating a chain of database objects without locking the chain. A computer system may maintain a chain that orders a set of database objects stored in a cache of the computer system. The computer system may receive a set of requests to perform database transactions. Based on those received set of requests, the computer system may determine to perform a plurality of chain operations that involve modifying the chain. The computer system may perform two or more of the plurality of chain operations at least partially in parallel using a set of atomic operations without acquiring a lock on the chain.

    Mechanisms for handling schema changes

    公开(公告)号:US11940963B2

    公开(公告)日:2024-03-26

    申请号:US17457244

    申请日:2021-12-01

    CPC classification number: G06F16/213 G06F16/2282 G06F16/2358 G06F16/24552

    Abstract: Techniques are disclosed relating to database schemas. A computer system may receive a metadata document that describes an updated schema for a database that stores a plurality of records. The computer system may instantiate a set of processes to perform an upgrade routine to upgrade ones of the plurality of records to comply with the updated schema. While the set of processes are upgrading the records, the computer system may receive a request to perform an operation on one of the plurality of records. The computer system may detect that the record corresponds to an earlier schema version than a version of the updated schema of the metadata document and may upgrade the record to comply with that updated schema. After upgrading the record, the computer system may perform the requested operation on the record.

    Anomaly detection mechanism
    28.
    发明授权

    公开(公告)号:US11928090B2

    公开(公告)日:2024-03-12

    申请号:US16261741

    申请日:2019-01-30

    Inventor: Amey Ruikar

    CPC classification number: G06F16/215 G06F16/25 G06Q30/01

    Abstract: Techniques and structures to facilitate anomaly detection, including receiving performance metric data at a database system having a plurality of data point values, processing the plurality of data point values via an optimized Extreme Studentized Deviate (ESD) test to detect one or more anomalous data point values within the plurality of data point values, including storing a first set of values representing the largest values of the plurality of data point values and a second set of values representing the smallest values of the plurality of data point values, receiving a first of the plurality of data point values, determining whether the first data point value is to be included in the first set of values or the second set of values and determining that the first data point value is not an anomalous data point value upon a determination that the first data point value is not to be inserted into the first set of values or the second set of values and generating an incident alert upon a detection of one or more anomalous data point values within the plurality of data point values.

Patent Agency Ranking