摘要:
In a multi-tier data server system, data from the first tier is cached in a mid-tier cache of the middle tier. Access control information from the first tier for the data is also cached within the mid-tier cache. Caching the security information in the middle tier allows the middle tier to make access control decisions regarding requests for data made by clients in the outer tier.
摘要:
A system and method for detecting and managing user session meta-data at a reverse proxy server. The reverse proxy server is logically located between one or more origin servers and any number of users. The reverse proxy server detects the establishment and tearing down of a user session, and any expiration associated with the user session. The reverse proxy server identifies the creation of a session from the pattern and/or content of communications between a user and an origin server, and associates the user (e.g., by username or user ID) with the session (e.g., session ID or cookie). A user session table may be populated with an entry for each observed session. Tear down of a session may be detected by identifying an explicit user logout or a session termination by the origin server.
摘要:
A system and method for managing security meta-data in a reverse proxy server. The reverse proxy caches data served by an origin server, and also stores security meta-data for authenticating a user and/or authorizing access to cached data. The security meta-data may include an ACL (Access Control List), access control token or descriptor, other access control information, user credentials, user privileges or roles, group membership, user aliases, etc. The reverse proxy may automatically receive access control information from the origin server when a request for data is forwarded to the origin server, or may explicitly request the information from the origin server or a security server. The reverse proxy receives and applies invalidation messages to invalidate stored security meta-data. Also, the reverse proxy acts in a stateful manner, with knowledge of the correlation between a given user and that user's session with the origin server.
摘要:
A system and method for managing security meta-data in a reverse proxy server. The reverse proxy caches data served by an origin server, and also stores security meta-data for authenticating a user and/or authorizing access to cached data. The security meta-data may include an ACL (Access Control List), access control token or descriptor, other access control information, user credentials, user privileges or roles, group membership, user aliases, etc. The reverse proxy may automatically receive access control information from the origin server when a request for data is forwarded to the origin server, or may explicitly request the information from the origin server or a security server. The reverse proxy receives and applies invalidation messages to invalidate stored security meta-data. Also, the reverse proxy acts in a stateful manner, with knowledge of the correlation between a given user and that user's session with the origin server.
摘要:
One embodiment of the present invention provides a system that facilitates serving data from a cache server. The system operates upon receiving a request for the data at the cache server. The system first determines if the request requires access control, and also if the data is available in the cache. If the request requires access control and if the data is available in the cache, the system sends an authorization request to an origin server. Upon receiving a response from the origin server, the system determines if the response is an authorization. If so, the system sends the data to the requester.
摘要:
One embodiment of the present invention provides a system that facilitates serving data from a cache server. The system operates upon receiving a request for the data at the cache server. The system first determines if the request requires access control, and also if the data is available in the cache. If the request requires access control and if the data is available in the cache, the system sends an authorization request to an origin server. Upon receiving a response from the origin server, the system determines if the response is an authorization. If so, the system sends the data to the requester.
摘要:
An apparatus comprising: a first substantially horn shaped structure configured to couple and amplify sound from a first speaker of a further apparatus; and a second substantially horn shaped structure configured to couple and amplify sound from a second speaker of the further apparatus, wherein the first and second substantially horn shaped structure each comprise a mouth portion with a physical separation dimension greater than a physical separation dimension of the first and second speaker acoustic outlet of the further apparatus.
摘要:
Provided are methods and corresponding apparatuses for allocation of resource blocks. A method for allocation of resource blocks comprises receiving, from a base station, information regarding a measurement location at which at least one identified resource block has been measured; and using, based upon a current location of a mobile relay node and the measurement location, the at least one identified resource block for communication between the mobile relay node and at least one user equipment connected therewith, wherein the at least one identified resource block is not used for communication between the base station and at least one user equipment connected therewith at the measurement location and a measurement of the at least one identified resource block is below a predetermined threshold. With the claimed inventions, interference in the high speed railway communication could be ameliorated and the spectrum efficiency would be improved.
摘要:
Embodiments of the disclosure provide a method and apparatus for dynamically adjusting UL-DL configuration. In the method according to embodiments of the present invention, downlink traffic load and uplink traffic load for transmission between a BS and a UE in a TDD system may be obtained, a UL-DL traffic load relation may be determined based on the downlink traffic load and the uplink traffic load and a UL-DL configuration may be selected based on the UL-DL traffic load relation.
摘要:
The present invention provides a method and apparatus for determining a transmission power of a secondary transmitter in a hierarchical spectrum sharing system. The method can comprise steps of obtaining channel quality information on a primary link from at least one primary receiver within a transmission range of the secondary transmitter; and determining the transmission power for the secondary transmitter based on the channel quality information, wherein the transmission power is matched with the channel quality indicated by the channel quality information. According to the embodiments of the present invention, a power control scheme is applied to the secondary transmitter based on the channel quality information on the primary link. In such a way, the secondary transmitter' throughput can be improved with controllable rate loss to the primary receiver and accordingly the spectrum efficiency for the whole system can be further upgraded.