会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 2. 发明授权
    • Pre-processing system for minimizing application-level denial-of-service in a multi-tenant system
    • 用于在多租户系统中最小化应用程序级拒绝服务的预处理系统
    • US09444838B2
    • 2016-09-13
    • US14336865
    • 2014-07-21
    • International Business Machines Corporation
    • Mark McGloinJohn Douglas CurtisPeter Otto MierswaRussell L. HoldenOlgierd S. Pieczul
    • H04L29/00H04L29/06G06F17/30G06F9/50
    • H04L63/1458G06F9/505G06F17/30153H04L63/1416H04L63/1425H04L2463/141
    • Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for tenant applications or application classes, preferably along with actions to be taken in the event a request to execute an application is anticipated to exceed defined workflow limits. A set of application profiles are generated. Typically, a profile comprises information, such as a request defined by one or more request variables, one or more “constraints,” one or more “request mappings,” and one or more “actions.” A constraint is a maximum permitted workload for the application. A request mapping maps a request variable to the constraint, either directly or indirectly. The profile information defines how a request is mapped to a workload to determine whether the request is in policy or, if not, what action to take.
    • 拒绝服务攻击在云计算环境(如多租户协同SaaS系统)中被阻止或缓解。 这通过提供一种机制来实现,对于租户应用程序或应用程序类定义“合法”行为的表征,最好连同在执行应用程序的请求超过定义的工作流程限制的情况下采取的动作一起实现。 生成一组应用程序配置文件。 通常,简档包括诸如由一个或多个请求变量定义的请求,一个或多个“约束”,一个或多个“请求映射”和一个或多个“动作”的信息。约束是用于 应用程序。 请求映射将请求变量直接或间接映射到约束。 配置文件信息定义请求如何映射到工作负载以确定请求是否在策略中,如果不是,则执行什么操作。
    • 5. 发明申请
    • Pre-processing system for minimizing application-level denial-of-service in a multi-tenant system
    • 用于在多租户系统中最小化应用程序级拒绝服务的预处理系统
    • US20170078325A1
    • 2017-03-16
    • US15359088
    • 2016-11-22
    • International Business Machines Corporation
    • Mark McGloinJohn Douglas CurtisPeter Otto MierswaRussell L. HoldenOlgierd Stanislaw Pieczul
    • H04L29/06
    • H04L63/1458G06F9/505G06F16/1744H04L63/1416H04L63/1425H04L2463/141
    • Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for tenant applications or application classes, preferably along with actions to be taken in the event a request to execute an application is anticipated to exceed defined workflow limits. A set of application profiles are generated. Typically, a profile comprises information, such as a request defined by one or more request variables, one or more “constraints,” one or more “request mappings,” and one or more “actions.” A constraint is a maximum permitted workload for the application. A request mapping maps a request variable to the constraint, either directly or indirectly. The profile information defines how a request is mapped to a workload to determine whether the request is in policy or, if not, what action to take.
    • 拒绝服务攻击在云计算环境(如多租户协同SaaS系统)中被阻止或缓解。 这通过提供一种机制来实现,对于租户应用程序或应用程序类定义“合法”行为的表征,最好连同在执行应用程序的请求超过定义的工作流程限制的情况下采取的动作一起实现。 生成一组应用程序配置文件。 通常,简档包括诸如由一个或多个请求变量定义的请求,一个或多个“约束”,一个或多个“请求映射”和一个或多个“动作”的信息。约束是用于 应用程序。 请求映射将请求变量直接或间接映射到约束。 配置文件信息定义请求如何映射到工作负载以确定请求是否在策略中,如果不是,则执行什么操作。
    • 10. 发明申请
    • Preventing application-level denial-of-service in a multi-tenant system
    • 防止多租户系统中的应用程序级拒绝服务
    • US20150195303A1
    • 2015-07-09
    • US14148305
    • 2014-01-06
    • International Business Machines Corporation
    • Russell L. HoldenJohn Douglas CurtisPeter Otto Mierswa
    • H04L29/06
    • H04L63/1458G06F9/505G06F17/30153H04L63/1416H04L63/1425H04L2463/141
    • Denial-of-service attacks are prevented or mitigated in a cloud compute environment, such as a multi-tenant, collaborative SaaS system. This is achieved by providing a mechanism by which characterization of “legitimate” behavior is defined for accessor classes, preferably along with actions to be taken in the event an accessor exceeds those limits. A set of accessor “usage profiles” are generated. Typically, a profile comprises information, such as a “request time window,” one or more “constraints,” and one or more “actions.” A request time window defines a time period over which request usage is accumulated and over which constraints are applied. A constraint may be of various types (e.g., number of transactions, defined resource usage limits, etc.) to be applied for the usage monitoring An action defines how the system will respond if a particular constraint is triggered. By applying the constraints to accessor requests, over-utilization of compute resources is enabled.
    • 拒绝服务攻击在云计算环境(如多租户协同SaaS系统)中被阻止或缓解。 这是通过提供一种机制,通过这种机制,为访问者类定义“合法”行为的表征,最好连同在访问者超过这些限制的情况下采取的行为。 生成一组访问者“使用情况配置文件”。 通常,简档包括诸如“请求时间窗口”,一个或多个“约束”和一个或多个“动作”的信息。请求时间窗口定义累积了哪个请求使用的时间周期, 应用。 约束可以是用于使用监视的各种类型(例如,事务数量,定义的资源使用限制等)。动作定义如果触发特定约束,系统将如何响应。 通过对访问者请求应用约束,启用计算资源的过度利用。