摘要:
Apparatus and method for conducting secured communications with a client device in a network are disclosed. The method includes receiving at the server a request message from the client device, wherein the request message comprises a nonce, a nonce count and an encrypted request, determining whether the client device has permission to access the server using the nonce and the nonce count, forming an encrypted server response message in response to the encrypted request and the client device has permission to access the server, and issuing the encrypted server response message from the server to the client device.
摘要:
Method and apparatus for updating user data from multiple data sources in a data gateway are disclosed. The data gateway includes a persistent job table for centrally storing jobs to be processed by the plurality of servers, a server table for centrally storing statuses of activities of the plurality of servers, and a job engine for processing job requests from the multiple data sources using the persistent job table and the server table. The data gateway includes a server farm having a plurality of servers, and where both the persistent job table and the server table reside outside the plurality of servers. The data gateway further includes a virtual Internet Protocol load balancer for dynamically mapping of jobs to be processed to particular servers according to user identifiers.
摘要:
Two-way digital media devices typically store digital identifying data that identify the user to providers of content and interactive data. In the case of a Web browser of a personal computer, the digital identity is stored in the form of a plurality of cookies that are used by respective web sites to personalize the web site experience for each particular user. When a user is at a different computer, the digital identifying data is not available. In addition, other types of interactive devices, such as CATV settop boxes, cell phones, PDAs and the like, may not have enough non-volatile memory (persistent storage) to store the digital identifying data. In order to provide users with a portable digital identity, a digital identity server is provided as a server node on the Internet, which retrieves digital identifying data and downloads such digital identifying data to any device upon request. In such manner, the user's digital identity is portable and available at any computer or other digital device that is being used. The system digital identity server permits devices without sufficient non-volatile memory storage to download a digital identity for temporary storage in volatile memory, thereby providing a digital identity in devices without non-volatile memory.
摘要:
Many web applications require access to a relational database. The requirements of such web applications are different from conventional applications that access a database. Web applications need to have selective recoverability and need to have support for different transaction structures, other than the flat transaction structure of conventional database applications, including nested and chained transactions. To achieve this, an interface between the application and database has the following functional features: 1) the interface to the database is connection oriented, i.e., the connection is retained across several invocations of the application; 2) the backend of the interface is long living, i.e., it exists across multiple invocations; 3) state information about a session in progress is maintained, and more specifically, it is distributed between the backend of the interface and the hidden fields of the HTML output document.
摘要:
A procedure for translating tuples received from a relational database management system (RDBMS) to object-oriented objects is described. The procedure operates by instantiating one or more application objects, and then setting base attributes of the application objects using information in the tuples. One or more intermediate objects are created using information in the tuples to represent those application objects having relationship attributes requiring dereferencing. Relationship attributes in the application objects are then set by swizzling the intermediate objects (rather than by swizzling the application objects themselves).
摘要:
The processing of object-oriented queries so as to retrieve data from a relational database management system (RDBMS) is described. An object-oriented query and at least one prefetch path are received from an object-oriented source (such as an application or user). The prefetch path identifies one or more objects which are desired to be constructed. The object-oriented query is translated to a translated object query, where the translated object query is a relational database query capable of retrieving from the RDBMS data to initialize base attributes of top-level objects identified by the object-oriented query. A set of relational queries is generated from the translated object query and the prefetch path. These relational queries, which are capable of retrieving from the RDBMS data needed to construct the objects identified by the prefetch path, are processed by the RDBMS.
摘要:
The processing of object-oriented queries so as to retrieve data from a relational database management system (RDBMS) is described. An object-oriented query and at least one prefetch path are received from an object-oriented source (such as an application or user) . The prefetch path identifies one or more objects which are desired to be constructed. The object-oriented query is translated to a translated object query, where the translated object query is a relational database query capable of retrieving from the RDBMS data to initialize base attributes of top-level objects identified by the object-oriented query. A set of relational queries is generated from the translated object query and the prefetch path. These relational queries, which are capable of retrieving from the RDBMS data needed to construct the objects identified by the prefetch path, are processed by the RDBMS.
摘要:
In one aspect, a computerized method for managing tombstones in a node of a Distributed Database Base System (DDBS) includes the step of providing a rule that, for a namespace in a record of the node of the DDBS that allows expiration, mandates that a later generation's expiration time of the namespace never decreases. The computerized method includes the step of determining that an administrator of the DDBS has set an expiration time of the namespace to infinity. The computerized method includes the step of implementing a background process of the DDBS, wherein the background process scans a DDBS node's drive and flags a set of extant tombstones that are no longer covering viable namespaces or viable records. The computerized method includes the step of deleting all the flagged tombstones.
摘要:
In one aspect, a computerized method useful for operating a database management system DMBS DBMS in a strong consistency mode comprising includes the step of implementing an atomic transfer of a master node of the DMBS DBMS. The method includes the step of implementing a master node restriction, wherein the master node restriction guarantees no more than one master node is ever available. The information about a set of nodes participating in a cluster of the set node of the DMBS DBMS is maintained to allow a subset of nodes to determine that the one master node is a master of a subset of data stored in the cluster.
摘要:
In one aspect, a computerized method for managing consistency and availability tradeoffs in a real-time operational database management system (DBMS) includes the step of implementing consistency in an AP mode of the real-time operational DBMS by implementing the following steps. The method adds a set of schemes that enable a real-time operational DBMS to linearize read/write operations in all situations except a first specified situation and a second specified situation. The real-time operational DBMS is in AP mode, at least one master node for every data item is available in the database cluster of the real-time operational DBMS at all times. The method implements a CP mode of operation.