Abuse detection using distributed cache

Electrical computers and digital processing systems: memory – Storage accessing and control – Hierarchical memories

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

Reexamination Certificate

active

07991957

ABSTRACT:
Abuse of a content-sharing service is detected by an arrangement in which an in-memory cache is distributed among a plurality of nodes, such as front-end web servers, and which caches each item accessed by users of the service as a single instance in the distributed cache. Associated with each cached item is a unit of metadata which functions as a counter that is automatically incremented each time the item is served from the distributed cache. Because abusive items often tend to become quickly popular for downloading, when the counter exceeds a predetermined threshold over a given time interval, it is indicative of an access rate that makes the item a candidate for being deemed abusive. A reference to the item and its access count are responsively written to a persistent store such as a log file or database.

REFERENCES:
patent: 6895402 (2005-05-01), Emens et al.
patent: 6970904 (2005-11-01), Rode
patent: 7260639 (2007-08-01), Afergan et al.
patent: 7574587 (2009-08-01), DeWitt et al.
patent: 2004/0117654 (2004-06-01), Feldman et al.
patent: 2004/0243843 (2004-12-01), Kadobayashi et al.
patent: 2007/089943 (2007-08-01), None
Wirken, “Bandwidth Robbery Through Hotlinking”, Jul. 29, 2006. Webpage Available at http://www.selfseo.com/story-18470.php.
“Hotlinking issues—protecting your copyright, images and bandwidth”, Webpage Available at http://www.tamingthebeast.net/articles6/hotlinking-protection.htm.
Andrew, “How can I protect my images from hotlinkers?” Oct. 19, 2004. Webpage available at http://support.agcc.net/index.php?—a=knowledgebase&—i=questiondetails&—i=15&nav2=General%20support.
“How to Block Hotlinkers” Webmaster Tips ‘n’ Tutorials. Webpage Available at http://www.chauy.com/2006/09/how-to-block-hotlinkers/.
Heng, “How to Protect Your Images from Bandwidth Thieves”, Webpage available at http://www.thesitewizard.com/archive/protectimages.shtml.
“Image Protection Rocket Prevent Image Copying & Stop Bandwidth Leeching”, Webpage Available at http://www.marketingrocket.com/prodipr.php.
“How do I stop Hotlinking and Bandwidth Theft?”, Webpage Available at http://altlab.com/htaccess—tutorial.html.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Abuse detection using distributed cache does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Abuse detection using distributed cache, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Abuse detection using distributed cache will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-2652308

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.