Electrical computers and digital processing systems: memory – Storage accessing and control – Hierarchical memories
Reexamination Certificate
2011-08-02
2011-08-02
Nguyen, Hiep T (Department: 2188)
Electrical computers and digital processing systems: memory
Storage accessing and control
Hierarchical memories
Reexamination Certificate
active
07991957
ABSTRACT:
Abuse of a content-sharing service is detected by an arrangement in which an in-memory cache is distributed among a plurality of nodes, such as front-end web servers, and which caches each item accessed by users of the service as a single instance in the distributed cache. Associated with each cached item is a unit of metadata which functions as a counter that is automatically incremented each time the item is served from the distributed cache. Because abusive items often tend to become quickly popular for downloading, when the counter exceeds a predetermined threshold over a given time interval, it is indicative of an access rate that makes the item a candidate for being deemed abusive. A reference to the item and its access count are responsively written to a persistent store such as a log file or database.
REFERENCES:
patent: 6895402 (2005-05-01), Emens et al.
patent: 6970904 (2005-11-01), Rode
patent: 7260639 (2007-08-01), Afergan et al.
patent: 7574587 (2009-08-01), DeWitt et al.
patent: 2004/0117654 (2004-06-01), Feldman et al.
patent: 2004/0243843 (2004-12-01), Kadobayashi et al.
patent: 2007/089943 (2007-08-01), None
Wirken, “Bandwidth Robbery Through Hotlinking”, Jul. 29, 2006. Webpage Available at http://www.selfseo.com/story-18470.php.
“Hotlinking issues—protecting your copyright, images and bandwidth”, Webpage Available at http://www.tamingthebeast.net/articles6/hotlinking-protection.htm.
Andrew, “How can I protect my images from hotlinkers?” Oct. 19, 2004. Webpage available at http://support.agcc.net/index.php?—a=knowledgebase&—i=questiondetails&—i=15&nav2=General%20support.
“How to Block Hotlinkers” Webmaster Tips ‘n’ Tutorials. Webpage Available at http://www.chauy.com/2006/09/how-to-block-hotlinkers/.
Heng, “How to Protect Your Images from Bandwidth Thieves”, Webpage available at http://www.thesitewizard.com/archive/protectimages.shtml.
“Image Protection Rocket Prevent Image Copying & Stop Bandwidth Leeching”, Webpage Available at http://www.marketingrocket.com/prodipr.php.
“How do I stop Hotlinking and Bandwidth Theft?”, Webpage Available at http://altlab.com/htaccess—tutorial.html.
Microsoft Corporation
Nguyen Hiep T
LandOfFree
Abuse detection using distributed cache does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Abuse detection using distributed cache, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Abuse detection using distributed cache will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-2652308