摘要:
One embodiment of the present invention provides a system that facilitates serving data from a cache server. The system operates upon receiving a request for the data at the cache server. The system first determines if the request requires access control, and also if the data is available in the cache. If the request requires access control and if the data is available in the cache, the system sends an authorization request to an origin server. Upon receiving a response from the origin server, the system determines if the response is an authorization. If so, the system sends the data to the requester.
摘要:
One embodiment of the present invention provides a system that facilitates serving data from a cache server. The system operates upon receiving a request for the data at the cache server. The system first determines if the request requires access control, and also if the data is available in the cache. If the request requires access control and if the data is available in the cache, the system sends an authorization request to an origin server. Upon receiving a response from the origin server, the system determines if the response is an authorization. If so, the system sends the data to the requester.
摘要:
A system and method for detecting and managing user session meta-data at a reverse proxy server. The reverse proxy server is logically located between one or more origin servers and any number of users. The reverse proxy server detects the establishment and tearing down of a user session, and any expiration associated with the user session. The reverse proxy server identifies the creation of a session from the pattern and/or content of communications between a user and an origin server, and associates the user (e.g., by username or user ID) with the session (e.g., session ID or cookie). A user session table may be populated with an entry for each observed session. Tear down of a session may be detected by identifying an explicit user logout or a session termination by the origin server.
摘要:
In a multi-tier data server system, data from the first tier is cached in a mid-tier cache of the middle tier. Access control information from the first tier for the data is also cached within the mid-tier cache. Caching the security information in the middle tier allows the middle tier to make access control decisions regarding requests for data made by clients in the outer tier.
摘要:
A system and method for managing security meta-data in a reverse proxy server. The reverse proxy caches data served by an origin server, and also stores security meta-data for authenticating a user and/or authorizing access to cached data. The security meta-data may include an ACL (Access Control List), access control token or descriptor, other access control information, user credentials, user privileges or roles, group membership, user aliases, etc. The reverse proxy may automatically receive access control information from the origin server when a request for data is forwarded to the origin server, or may explicitly request the information from the origin server or a security server. The reverse proxy receives and applies invalidation messages to invalidate stored security meta-data. Also, the reverse proxy acts in a stateful manner, with knowledge of the correlation between a given user and that user's session with the origin server.
摘要:
A system and method for managing security meta-data in a reverse proxy server. The reverse proxy caches data served by an origin server, and also stores security meta-data for authenticating a user and/or authorizing access to cached data. The security meta-data may include an ACL (Access Control List), access control token or descriptor, other access control information, user credentials, user privileges or roles, group membership, user aliases, etc. The reverse proxy may automatically receive access control information from the origin server when a request for data is forwarded to the origin server, or may explicitly request the information from the origin server or a security server. The reverse proxy receives and applies invalidation messages to invalidate stored security meta-data. Also, the reverse proxy acts in a stateful manner, with knowledge of the correlation between a given user and that user's session with the origin server.
摘要:
A system and method for sharing images and collaborating in the selection of images likely to be interest to a user. Images (e.g., photos) are shared within a community of users, by allowing user to access any unrestricted community image, recommend an image to another user, assemble compilations of any images the user can access, etc. Various metrics regarding user activity are tracked, such as how often an image was viewed, downloaded, recommended, included in a compilation, printed, edited, etc. The metric values may be normalized, and then weighted and combined to produce, for each image, a ranking or rating personalized to an individual user. Ratings of images for a user may be used to order them for electronic presentation, assemble a set of images for an electronic compilation (e.g., an online album) or physical compilation (e.g., a photo book, a yearbook) or for some other purpose.
摘要:
A lossy dielectric device dissipates, absorbs, and/or dampens electric fields. The lossy dielectric device may be used with any transmission path, such as a transmission line or resistor in a probe head. The lossy dielectric device preferably includes a lossy dielectric material contained within a container. The container is positionable and securable substantially adjacent the transmission path to improve the curve of a frequency response. Preferably, the container is insulative, puncture resistant, and thin. In some preferred embodiments, a temporary or permanent connection mechanism is also included.
摘要:
A test probe tip constructed substantially from resistive material. The resistive material is made of resistive conducting material substantially enclosed in and dispersed throughout encapsulating material. The test probe has a probing end for probing electronic circuitry and a connection end for interfacing with a probing head. The resistive conducting material forms at least one path through the encapsulating material from the probing end to the connection end. The resistive conducting material may be a plurality of longitudinally extending resistive/conductive members or a plurality of particulate resistive/conductive members.
摘要:
A system and methods are provided for enabling a cache system, operating on behalf of a data server (e.g., web server, application server, database server), to cache and customize one set of data (e.g., a web page) in different ways for different requests (e.g., to include a client's name, account information, a special logo). An application that generates or produces the data on the data server embeds or includes special tags or markers in customizable data, to identify where custom data should be inserted or substituted. The custom data may be included in client requests or retrieved from the cache system, data server or elsewhere. When the cache system receives a new request for cached data that is customizable, the data is retrieved from cache, the custom data is retrieved and inserted at the corresponding tags and the customized data is served.