Methods and systems for regulating database activity
First Claim
1. A method of regulating access to a database by a server coupled to the database, the method comprising:
- receiving, by the server, one or more requests for an activity;
determining, by the server, a number of requests for the activity received from a source of the one or more requests during a monitoring period, wherein determining the number of requests comprises;
generating a cache key based at least in part on the activity, the source, and the monitoring period; and
accessing a cache coupled to the server to obtain a counted number of requests for the activity associated with an entry in the cache matching the cache key;
automatically initiating, by the server, the activity with respect to the database when the number is less than an allowed number of requests for the activity for the monitoring period; and
providing, by the server to the source, a human verification test when the number of requests exceeds the allowed number of requests for the activity for the monitoring period, wherein the server continues servicing the one or more requests for the activity with respect to the database in response to receiving a satisfactory response to the human verification test from the source.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems are provided for regulating access to a database by a server. One exemplary method involves the server receiving one or more requests for an activity with respect to the database and determining an attempted usage for the activity over a monitoring period by a source of the requests. When the attempted usage exceeds an allowed usage of the activity for the monitoring period, the server provides a human verification test to the source and thereafter initiates the activity with respect to the database in response to receiving a satisfactory human verification response to the human verification test from the source.
130 Citations
18 Claims
-
1. A method of regulating access to a database by a server coupled to the database, the method comprising:
-
receiving, by the server, one or more requests for an activity; determining, by the server, a number of requests for the activity received from a source of the one or more requests during a monitoring period, wherein determining the number of requests comprises; generating a cache key based at least in part on the activity, the source, and the monitoring period; and accessing a cache coupled to the server to obtain a counted number of requests for the activity associated with an entry in the cache matching the cache key; automatically initiating, by the server, the activity with respect to the database when the number is less than an allowed number of requests for the activity for the monitoring period; and providing, by the server to the source, a human verification test when the number of requests exceeds the allowed number of requests for the activity for the monitoring period, wherein the server continues servicing the one or more requests for the activity with respect to the database in response to receiving a satisfactory response to the human verification test from the source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A computing system comprising:
-
a database; a server coupled to the database to receive, from a source via a network, one or more requests for an activity, determine a counted number of requests by the source for the activity over a preceding time interval equal to a monitoring period exceeds an allowed number of requests for the activity for the monitoring period, and when the counted number of requests exceeds the allowed number of requests for the activity for the monitoring period, initiate the activity with respect to the database in response to receiving human verification from the source; and a cache coupled to the server via the network, the server generating a cache key for an entry in the cache based at least in part on the activity, the source, and the monitoring period and the server accessing the cache utilizing the cache key to obtain the counted number of requests associated with the entry, the entry maintaining an association between the source and the counted number of requests for the activity by the source over the preceding time interval equal to the monitoring period. - View Dependent Claims (15, 16)
-
-
17. A computer-readable medium comprising computer-executable instructions that, when executed by a processing system, cause the processing system to:
-
determine a number of requests for an activity with respect to a database received from a source during a monitoring period in response to receiving one or more requests for the activity from the source by; generating a cache key based at least in part on the activity, the source, and the monitoring period; and accessing a cache to obtain a counted number of requests for the activity associated with an entry in the cache matching the cache key; automatically initiate the activity with respect to the database when the number is less than an allowed number of requests for the activity for the monitoring period; and initiate the activity with respect to the database in response to receiving human verification from the source when the number of request exceeds the allowed number of requests for the activity for the monitoring period. - View Dependent Claims (18)
-
Specification