Intermediate message invalidation
First Claim
Patent Images
1. A method for intermediate message invalidation, the method comprising:
- a computer receiving, in an intermediate message validation service, a message to be forwarded to a device to administer at least one value of an attribute of the device;
the computer determining, by the intermediate message validation service, that the message is invalid, including;
the computer determining differences between the structure of a packet of the message and a predefined proper packet structure, wherein the computer determining the differences between the structure of the packet of the message and the predefined proper packet structure comprises the computer counting the differences between the structure of the packet of the message and the predefined proper packet structure; and
the computer determining that the differences between the structure of the packet of the message and the predefined proper packet structure exceed a threshold similarity requirement, the threshold similarity requirement defining one or more rules that compare a number of bits in the packet of the message to a number of bits in the predefined proper packet structure;
the computer terminating, by the intermediate message validation service, the message including storing the message in a dead message queue; and
the computer notifying a system administrator that the message is invalid, including providing access to the dead message queue to the system administrator.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods, systems, and products are provided for intermediate message invalidation that include receiving, to an intermediate message validation service, a message to be forwarded to a device to administer at least one value of an attribute of the device; determining, by the intermediate message validation service, that the message is invalid; and terminating, by the intermediate message validation service, the invalid message. Embodiments may also include notifying a system administrator that the message is invalid.
-
Citations
9 Claims
-
1. A method for intermediate message invalidation, the method comprising:
-
a computer receiving, in an intermediate message validation service, a message to be forwarded to a device to administer at least one value of an attribute of the device; the computer determining, by the intermediate message validation service, that the message is invalid, including; the computer determining differences between the structure of a packet of the message and a predefined proper packet structure, wherein the computer determining the differences between the structure of the packet of the message and the predefined proper packet structure comprises the computer counting the differences between the structure of the packet of the message and the predefined proper packet structure; and the computer determining that the differences between the structure of the packet of the message and the predefined proper packet structure exceed a threshold similarity requirement, the threshold similarity requirement defining one or more rules that compare a number of bits in the packet of the message to a number of bits in the predefined proper packet structure; the computer terminating, by the intermediate message validation service, the message including storing the message in a dead message queue; and the computer notifying a system administrator that the message is invalid, including providing access to the dead message queue to the system administrator. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer system for intermediate message invalidation, the computer system comprising:
-
a computer processor; a computer readable memory and a computer readable tangible storage device; first program instructions to receive, in an intermediate message validation service, a message to be forwarded to a device to administer at least one value of an attribute of the device; second program instructions to determine, by the intermediate message validation service, that the message is invalid, wherein the second program instructions; determine differences between the structure of a packet of the message and a predefined proper packet structure, wherein determining the differences between the structure of the packet of the message and the predefined proper packet structure comprises counting the differences between the structure of the packet of the message and the predefined proper packet structure; and determine that differences between the structure of the packet of the message and the predefined proper packet structure exceed a threshold similarity requirement, the threshold similarity requirement defining one or more rules that compare a number of bits in the packet of the message to a number of bits in the predefined proper packet structure; third program instructions to terminate, by the intermediate message validation service, the message, wherein the third program instructions store the message in a dead message queue; and fourth program instructions to notify a system administrator that the message is invalid, wherein the fourth program instructions provide access to the dead message queue to the system administrator; wherein, the first, second, third, and fourth program instructions are stored on the computer readable tangible storage device for execution by the processor via the computer readable memory. - View Dependent Claims (7, 8)
-
-
9. A computer program product for intermediate message invalidation, the computer program product comprising:
-
a computer readable tangible storage device; first program instructions to receive, in an intermediate message validation service, a message to be forwarded to a device to administer at least one value of an attribute of the device; second program instructions to determine, by the intermediate message validation service, that the message is invalid, wherein the second program instructions; determine differences between the structure of a packet of the message and a predefined proper packet structure, wherein determining the differences between the structure of the packet of the message and the predefined proper packet structure further comprises counting the differences between the structure of the packet of the message and the predefined proper packet structure; and determine that the differences between the structure of the packet of the message and the predefined proper packet structure exceed a threshold similarity requirement, the threshold similarity requirement defining one or more rules that compare a number of bits in the packet of the message to a number of bits in the predefined proper packet structure; third program instructions to terminate, by the intermediate message validation service, the message, wherein the third program instructions store the message in a dead message queue; and fourth program instructions to notify a system administrator that the message is invalid, wherein the fourth program instructions provide access to the dead message queue to the system administrator; wherein the first, second, third, and fourth program instructions are stored on the computer readable tangible storage device.
-
Specification