摘要:
A method and system for managing the transfer of data in parallel through multiple sockets. The present invention facilitates the use of multiple sockets and avoid monopolization of a socket by releasing the socket as soon as data from a client request has been sent to a server application. The present invention also includes a novel socket assignment technique that assigns only available sockets. This novel socket assignment technique avoids bottlenecking and delays due to socket contention and increases efficiency. The socket assignment technique of the present invention can assign sockets using a round robin technique, which assigns a server application to a first available socket, a random technique, which assigns a server application randomly to an available socket, or a user-defined technique, which assigns a thread to an available socket as determined by a user.
摘要:
A file server receives a request from a client to mount an encrypted file system. The file server informs the client that the requested file system is encrypted and, in turn, receives a session ticket from the client that includes a security protocol mounting selection. The file server decrypts the client's user's encrypted private key, and then decrypts the requested encrypted file system using the private key. In turn, the file server sends the decrypted file system to the client over a secure channel, which is based upon the security protocol mounting selection. In one embodiment, a key distribution center server receives a request from the client for the client's user to access the encrypted file system at the file server. The key distribution center server retrieves an intermediate key; includes the intermediate key in a session ticket; and sends the session ticket to the client.
摘要:
Systems and methods for authentication in a data management system are provided. In one embodiment, the method comprises identifying a plurality of data ciphers based on a pre-defined set of properties associated with a plurality of data sources; and generating an authentication response having at least a subset of the identified plurality of data ciphers, wherein the authentication response authenticates access to at least some data sources from among the plurality of data sources.
摘要:
Network attacks, such as a denial of service (DoS) attack, attempt to exhaust server resources and can cause a network to be unavailable for significant periods of time. Although a firewall can be utilized to defend a system from network attacks, the number of incoming connections created can be controlled to defend the system against network attacks. An operating system creates connections, known as sockets, on one or more logical ports. Incoming connections are connections whose creation requests originate from a source outside the operating system. Functionality to control socket creation can be implemented within the operating system, thus allowing a system to be placed directly on a network without a firewall. Implementing defense against network attacks within an operating system reduces the additional cost of having firewall products, and can lead to more efficient network configurations.
摘要:
A method, system, and computer program product for providing products to a user via an automated product dispensing machine is provided. In once embodiment, an automatic product dispensing machine in a micronetwork of proximally located diverse automatic product dispensing machines receives a request for an item. Responsive to a determination that the item is unavailable at a current automatic product dispensing machine, the automatic product dispensing machine provides a user with an alternative redemption product, such as, for example, a coupon that may be redeemed at another automatic product dispensing machine or at a nearby store.
摘要:
The present invention provides a method and apparatus for handling reordered data packets. A method comprises receiving a data packet and determining if the data packet is received out of order. The method further comprises delaying transmission of an acknowledgement indicating that a data packet is missing in response to determining that the data packet is received out of order.
摘要:
In a method of reducing network congestion between a source computer and a destination computer, a receiving router receives a source quench message and determines whether originator of the source quench message is the destination computer or an intermediate router. If the receiving router determines the originator to be the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines the originator to be an intermediate router, the receiving computer determines if there is an alternative route from the receiving router to the destination computer. If the receiving router determines there is no alternative route from the receiving router to the destination computer, the receiving router forwards the source quench message to the source computer. If the receiving router determines there is an alternative route to the destination computer, the receiving router does not forward the source quench message to the source computer, and, going forward, routes packets to the destination computer by the alternative route.
摘要:
A memory registration abstraction layer includes decision logic for dynamic, efficient determination of memory copy versus registration. The exemplary embodiments apply to direct memory access environments. The memory registration abstraction layer also includes tracking logic for monitoring the usage history for certain ranges of memory registration requests. The registration logic chooses to copy memory or map memory based on training and observation of application behavior, taking the more efficient performance path without requiring changes to the application.
摘要:
Disclosed is a virtual world server receives an update signal corresponding to an RFID tag. The virtual world server determines an RFID tag identifier, an RFID reader identifier, and an associated asset name from the update. The virtual world server looks up a virtual area associated with the RFID reader identifier. The virtual world server teleports a virtual asset associated with the RFID tag identifier to a virtual area in the virtual world. The virtual world server renders a model of the asset in a virtual world based on an avatar perspective.
摘要:
Managing subscriber access to online subscription services providing online subscribers or potential new subscribers access to a subscription or trial subscription content at a normal level of service during the subscription period but, after the subscription has expired, providing a decreased level of service during a post-expiration period. The level of service may be decreased incrementally by reducing the content available to a subscriber, downloading the subscription content at a slower than normal rate, delivering certain features in black and white instead of color, deleting sound files, disabling any inter-active features, or any combination of these features. A subscription server manages the various databases and downloads subscription content to the online subscribers. The databases contain information about the subscribers and instructions for the subscription server to follow in granting normal or reduced access to the subscription content.