Methods and systems for regulating database activity
First Claim
1. A method of regulating access to a database by a server coupled to the database, the method comprising:
- receiving, by the server, one or more requests for an activity;
determining, by the server, an attempted usage for the activity over a monitoring period by a source of the one or more requests, the attempted usage comprising a counted number of requests for the activity received from the source during a preceding time interval equal to the monitoring period; and
creating, by the server, an entry in a cache when the attempted usage exceeds an allowed usage for the activity for the monitoring period, wherein;
the entry includes an identifier associated with the source of the one or more requests; and
the allowed usage comprises an allowed number of requests for the activity for the monitoring period.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are provided for regulating access to a database by a server. One exemplary method involves the server receiving one or more requests for an activity with respect to the database and determining an attempted usage for the activity over a monitoring period by a source of the requests. When the attempted usage exceeds an allowed usage of the activity for the monitoring period, the server creates an entry in a cache that includes an identifier associated with the source of the one or more requests. Thereafter, the requested activity with respect to the database on behalf of the source may be prevented based on the entry in the cache.
157 Citations
20 Claims
-
1. A method of regulating access to a database by a server coupled to the database, the method comprising:
-
receiving, by the server, one or more requests for an activity; determining, by the server, an attempted usage for the activity over a monitoring period by a source of the one or more requests, the attempted usage comprising a counted number of requests for the activity received from the source during a preceding time interval equal to the monitoring period; and creating, by the server, an entry in a cache when the attempted usage exceeds an allowed usage for the activity for the monitoring period, wherein; the entry includes an identifier associated with the source of the one or more requests; and the allowed usage comprises an allowed number of requests for the activity for the monitoring period. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A computing system comprising:
-
a database; a cache; and a server coupled to the database and the cache to receive, from a source via a network, one or more requests for an activity with respect to the database, determine an attempted usage by the source for the activity over a preceding duration of time equal to a monitoring period exceeds an allowed usage for the activity for the monitoring period, and create an entry in the cache when the attempted usage exceeds the allowed usage for the activity for the monitoring period, wherein the entry includes an identifier associated with the source of the one or more requests. - View Dependent Claims (18, 19)
-
-
20. A computer-readable medium comprising computer-executable instructions that, when executed by a processing system, cause the processing system to:
-
determine an attempted usage over a monitoring period for an activity with respect to a database by a source in response to receiving one or more requests for the activity from the source; initiate the activity with respect to the database when the attempted usage does not exceed an allowed usage for the activity for the monitoring period; and create an entry in a cache coupled to the processing system when the attempted usage exceeds the allowed usage for the activity for the monitoring period, wherein the entry includes an identifier associated with the source of the one or more requests.
-
Specification