摘要:
A method, apparatus, and computer implemented instructions for handling requests in a network data processing system. The network data processing system includes a network and clients connected to the network. A first server is present in which the first server receives a request from a client to access a resource, performs an authentication process with the client, add information to the request in which the information indicates that the request is from a trusted source to form a modified request, and sends the modified request for processing. This modified request is received by a second server. This second server determines whether the first server is a trusted server based on the information, and provides access to the resource in response to a determination that the first server is a trusted server. If the second server receives the request directly from a client, it would process the request by itself instead of basing its trust on any of the known first servers.
摘要:
A method and apparatus for securing hypertext transfer protocol sessions authenticates a user's credentials before creating a session. The present invention then associates the session with the credentials. Subsequent requests are submitted with the session ID and the user credentials to be associated with the session. Therefore, an unauthorized user that has obtained a session ID cannot gain access to sensitive content associated with the session without possessing the valid credentials.
摘要:
A method for securing cached data in an enterprise environment. The method can include processing a request to locate data in a query cache. If the data can be located in the query cache, the data can be retrieved from the query cache. Additionally, at least one encrypted portion of the retrieved data can be decrypted. Finally, the decrypted portion and any remaining unencrypted portion of the retrieved data can be forwarded to a requesting client. By comparison, if the data cannot be located in the query cache, the data can be retrieved from a back-end data source over a computer communications network, and forwarded to the requesting client. Additionally, at least a portion of the retrieved data can be encrypted and both the encrypted portion and any remaining unencrypted portion can be stored in the query cache.
摘要:
Embodiments of the present invention provide a method, system and computer program product for wireless tower caching. In an embodiment of the invention, a method for wireless tower caching in a radio access network (RAN) can include receiving a response to a request from an end user device wirelessly coupled to a base station of the RAN, determining geographic positioning data for the response and identifying a most geographically wireless tower coupled to the RAN relative to the determined geographic positioning data (such as the closest wireless tower to the determined geographic positioning data). Thereafter, the response can be cached at a cache in a base station of the identified wireless tower.
摘要:
The present invention provides inter-tier failure detection using a central aggregation point. A method in accordance with an embodiment of the present invention includes: performing intra-tier failure detection in a first tier of a multi-tier system; providing a failure status to a central aggregation point in the first tier; and communicating the failure status inter-tier to a central aggregation point of a second tier of the multi-tier system.
摘要:
In a Web application testing method which has been configured in accordance with the present invention, a network message from one of several network clients can be intercepted. Session data in the network message can be identified and state information retrieved for the session in the Web application. An operation and corresponding associated parameters can be selected from a Web scenario template based upon the retrieved state information. Finally, operations can be invoked in the Web application, the operations corresponding to the operation and associated operational parameters selected from the Web scenario template.
摘要:
A method, system and program product maintains consistency of data across a hierarchy of caches. Under the present invention, each data entry in the hierarchy of caches is assigned its own dependency identifier as well as the dependency identifiers of any data entries on which it depends. Thus, the present invention allows corresponding data entries to be linked for automatic invalidation.
摘要:
A technique for visually creatins and populating a class with members. A developer is provided with a container window representing a new class when the developer indicates that a new class is to be built. The developer vary populate the new class with members in a number of ways, including dragging visual elements representative of code to the container window and dropping them in the container window. By dropping the visual element into the container, an association between the code the visual element represents and the class represented by the container window is established. This relationship is also displayed to the developer by displaying the visual element within the container window.
摘要:
A technique for converting a software program into an object oriented class for sending across a network. A software program is loaded as instance data into a single object oriented class which is self-extracting. Preferably, each program file from the software program is compressed prior to being loaded as instance data into the class. The class may be a Java class which is sent over the Internet to a Java enabled computer system, where the class is unpackaged and the original software program recreated.
摘要:
A technique for providing enhanced intuitive navigation in a virtual world. User selectable hot spots are provided within a virtual world that users may select to automatically be moved to predetermined move-to coordinates within the virtual world. The user may be transported directly to the move-to coordinates or the user may have its motion controlled by the virtual world to in essence walk the user to the move-to coordinates within the virtual world. The selectable hot spot may become inactive following selection of the hot spot by a user until the user moves off of the move-to coordinates, or a plurality of move-to coordinates may be provided such that the hot spot remains active until all of the move-to coordinates are occupied by users. Additionally, the hot spot may be visually enhanced to make it easier to be seen and selected when the user is more than a predetermined distance from the hot spot within the virtual world.