H04L41/5083

Scheme for managing last-modified information
09792108 · 2017-10-17 · ·

Methods, systems, computer-readable media, and apparatuses for providing a scheme for managing Last-Modified information for resource requests are described herein. In some embodiments, a computing device may determine whether to round up or down an update time of a resource respectively based on whether a request from a client device for the resource is received within a window. In some embodiments, a computing device may receive, from a client device, a first validation request for a resource and a second validation request for the resource. In response to determining that the first validation request was received within a window, the computing device may round down an update time of the resource. In response to determining that the second validation request was received outside of the window, the computing device may determine whether to round up the update time of the resource.

Managing domain name abuse

A method for providing an abuse sentry service for responding to domain name abuse is described. The method comprises the following steps. A plurality of disparate abuse feeds is received, each comprising data relating to a subset of potential domain name abuse. Filters are applied to the data to create a custom abuse feed. Data from the custom abuse feed is grouped based on priority levels. For each of the groups, one or more corresponding workflows are executed as a response to the potential domain name abuse. A computer readable medium including instructions for implementing the method is also described.

MANAGING USER PRIVILEGES FOR COMPUTER RESOURCES IN A NETWORKED COMPUTING ENVIRONMENT

Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed. The user profile may include information pertaining to a skill level of the prospective user with respect to the set of computer resources. Based on the information contained in the user profile, an expertise level of the prospective user with respect to the set of computer resources may be determined, and a corresponding score may be calculated. Based on the score, a level of user privileges for the set of computer resources may be provided.

AVOIDING WEB REQUEST FAILURES BEFORE THEY OCCUR BY COMPONENT ANALYSIS
20170149631 · 2017-05-25 ·

Disclosed herein is a method for predicting and avoiding request failures. The method includes receiving a request for access to at least one web service and analyzing the request to identify at least one probabilistic resource tree for handling the request. The method further includes detecting a problem preventing a usage of a resource in the at least one probabilistic resource tree. The problem causes the request to fail upon implementation of the request. Furthermore, the method includes performing an action to avoid the implementation of the request.

Managing user privileges for computer resources in a networked computing environment

Approaches for automatically managing user privileges for computer resources based on determined levels of expertise in a networked computing environment (e.g., a cloud computing environment) are provided. In a typical approach, a user profile associated with a prospective user of a set of computer resources in the networked computing environment may be accessed. The user profile may include information pertaining to a skill level of the prospective user with respect to the set of computer resources. Based on the information contained in the user profile, an expertise level of the prospective user with respect to the set of computer resources may be determined, and a corresponding score may be calculated. Based on the score, a level of user privileges for the set of computer resources may be provided.

CLOUD-SE-BASED CLOUD-SE SYSTEM, MOBILE TERMINAL, AND MOBILE PAYMENT METHOD THEREOF
20170132629 · 2017-05-11 ·

Provided are a cloud-SE-based could SE system, a mobile terminal, and mobile payment method thereof. The mobile payment method, according to one embodiment of the present invention, comprises: measuring the quality of service of servers on which mobile card information has been saved and selecting same; and performing a mobile payment by obtaining mobile card information from the selected server. As a result, the mobile card information is obtained from a server providing the optimal QoS and used in the mobile payment, thereby increasing the probability of providing the mobile card information within a time required by standards, rules, policies, and recommendations, and ultimately increasing the probability of a successful mobile payment.

SYSTEMS AND METHODS FOR ENHANCING PERFORMANCE OF RESOURCE STATE POLLING
20170093951 · 2017-03-30 ·

Systems and methods for enhancing the performance of resource state polling are disclosed. According to an aspect, a method includes using at least one processor and memory for transmitting a request and a baseline timestamp for an updated resource state based on a current resource state, wherein the baseline timestamp defines a time period for the updated resource state. The method also includes determining the updated resource state based on the baseline timestamp and the current resource state. The method also includes providing the determined updated resource state and current timestamp of the determined updated resource state. Additionally, the method includes setting a current baseline resource state based on a current timestamp of the determined updated resource state.

LOAD RESPONSE PERFORMANCE COUNTERS
20170093669 · 2017-03-30 · ·

The current document is directed to a new class of performance-monitoring tools referred as load response performance counters (LRPCs). Load response performance counters are implemented to periodically run a task within a computer system in order to apply a specific load to a particular subsystem or component of the computer system and to measure, at intervals, a response time for completing the task. By monitoring the response times, various types of problems, anomalies, and bottlenecks associated with the subsystem or component can be identified and characterized. The design and implementation of particular LRPCs can be precisely tailored to particular components and subsystems at any of many different hierarchical levels, granularities, and temporal ranges in order to monitor system operation and function

Evaluation of use of a service and/or function provided or called by a web service

A method for evaluating use of a service and/or function provided by an automation component. To implement an evaluation of a use of the service and/or functions of the automation component with little hardware complexity, a web service is called by a web service call, the web service call or a function call generated by the web service is recognized by means of a recognition module implemented in the automation component, service and/or function information that regards the called service and/or function and that is contained in the web service call or the function call is read out by means of the recognition module, the web service is executed after release, service- and/or function-specific data are detected by means of a detection module during the execution of the web service, and the service and/or function provided by the automation component is evaluated.

SERVER RESERVATION METHOD, RESERVATION CONTROL APPARATUS AND PROGRAM STORAGE MEDIUM

An information processing device including a communication interface that exchanges data with a first device and a second device; and a processor that performs authentication of the first device; receives content data from the first device via the communication interface; and controls the communication interface to send the content data in real time to the second device based on an access control setting, which indicates a restriction on sending the content data.