Heuristic-Based Rejection of Computing Resource Requests
First Claim
Patent Images
1. A computing system, comprising:
- a processing unit; and
system memory encoding instructions that, when executed by the processing unit, create;
an authentication layer, the authentication layer being programmed to receive a request for resources of the computing system and to authenticate an identity of a user requesting the resources; and
a command layer, the command layer being programmed to execute one or more commands from the request for resources;
wherein the command layer logs characteristics associated with one or more of the commands;
wherein the computing system monitors each logged command to determine when a threshold is met; and
wherein the computing system blocks a subsequent request for resources from the user when the threshold is met.
3 Assignments
0 Petitions
Accused Products
Abstract
A computing system includes an authentication layer, the authentication layer being programmed to receive a request for resources of the computing system and to authenticate an identity of a user requesting the resources, and a command layer, the command layer being programmed to execute one or more commands from the request for resources, wherein the command layer logs characteristics associated with one or more of the commands, wherein the computing system monitors each logged command to determine when a threshold is met, and wherein the computing system blocks a subsequent request for resources from the user when the threshold is met.
28 Citations
20 Claims
-
1. A computing system, comprising:
-
a processing unit; and system memory encoding instructions that, when executed by the processing unit, create; an authentication layer, the authentication layer being programmed to receive a request for resources of the computing system and to authenticate an identity of a user requesting the resources; and a command layer, the command layer being programmed to execute one or more commands from the request for resources; wherein the command layer logs characteristics associated with one or more of the commands; wherein the computing system monitors each logged command to determine when a threshold is met; and wherein the computing system blocks a subsequent request for resources from the user when the threshold is met. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A method for throttling requests for resources, the method comprising:
-
receiving, by a computing device, a request for resources of a computing system; processing, by the computing device, the request to identify a characteristic of the request for resources; comparing the characteristic to a list; when the characteristic is found on the list, blocking the request; and when the characteristic is absent from the list, passing the request on for further processing. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A physical computer-readable storage medium encoding instructions that, when executed by a processing unit, cause the processing unit to perform steps including:
-
receiving, by a computing device, a request for resources of a computing system; processing the request to identify a characteristic of the request for resources; comparing the characteristic to a list; when the characteristic is not found on the list; authenticating an identity of a user making the request for resources; authorizing the user for access to the resources; providing access to the requested resources; logging a failure while authorizing or providing access to the requested resources; and creating the list to include one or more characteristics associated with the failure, the characteristics including a user identification of the user; and when the characteristic is found on the list, blocking the request, the request being blocked prior to authentication or authorization of the user making the request. - View Dependent Claims (20)
-
Specification