Follow us on Twitter
twitter icon@FreshPatents


Timeout patents

      

This page is updated frequently with new Timeout-related patent applications.




 Method to configure monitoring thresholds using output of load or resource loadings patent thumbnailMethod to configure monitoring thresholds using output of load or resource loadings
The technology disclosed enables the automatic definition of monitoring alerts for a web page across a plurality of variables such as server response time, server cpu load, network bandwidth utilization, response time from a measured client, network latency, server memory utilization, and the number of simultaneous sessions, amongst others. This is accomplished through the combination of load or resource loading and performance snapshots, where performance correlations allow for the alignment of operating variables.
Spirent Communications, Inc.


 Systems and methods for dynamic thermal excursion timeout determination and predictive failure notification based on airflow escape detection patent thumbnailSystems and methods for dynamic thermal excursion timeout determination and predictive failure notification based on airflow escape detection
In accordance with embodiments of the present disclosure, an information handling system may include a plurality of information handling resources and a controller communicatively coupled to the plurality of information handling resources. The controller may be configured to monitor for the presence of a thermal escape event of the information handling system.
Dell Products L.p.


 Passive detection of live systems during controller failover in distributed environments patent thumbnailPassive detection of live systems during controller failover in distributed environments
For passive detection of live systems during controller failover in a distributed environment, a set of member systems is sorted according to heartbeat periods used by members in the set of member systems. An amount of elapsed time since a failure of a first controller system in the distributed environment is determined.
International Business Machines Corporation


 Method and system for path monitoring in a software-defined networking (sdn) system patent thumbnailMethod and system for path monitoring in a software-defined networking (sdn) system
A method for path monitoring is disclosed. The method includes receiving, at the network device, a packet from a sdn controller to monitor a path for a service between the network device and another network device.
Telefonaktiebolaget L M Ericsson (publ)


 Diagnostic port protection to body control module patent thumbnailDiagnostic port protection to body control module
A body controller may monitor a vehicle bus for diagnostic requests received from a scan device connected to a diagnostic port when a vehicle perimeter alarm of a body controller is armed. The body controller may reset a predetermined lockout timeout responsive to receipt of a session request from the scan device.
Ford Global Technologies, Llc


 Method and  reducing the length of a packet storm in a wireless mesh network patent thumbnailMethod and reducing the length of a packet storm in a wireless mesh network
A broadcast transmission will generate a packet storm in a mesh network, which will last for a very long time and block the network for other traffic. There is a parameter in a broadcast control mechanism named radius which controls the duration of the packet storm.
Philips Lighting Holding B.v.


 Prioritization of network traffic in a distributed processing system patent thumbnailPrioritization of network traffic in a distributed processing system
Described herein are techniques enabling the prioritization of network traffic in a distributed processing system. Information may be received regarding a plurality of flows, each flow configured to travel from one node to another node in the distributed processing system.
Hewlett Packard Enterprise Development Lp


 Application timeout aware tcp loss recovery patent thumbnailApplication timeout aware tcp loss recovery
The sack scoreboard is used in slow recovery and the sack scoreboard and an application programmed timeout are used to determine the initial cwnd in slow recovery. The cwnd is calculated so that all packets will be recovered before the application times out.
Brocade Communications Systems, Inc.


 Automated system for lighting control patent thumbnailAutomated system for lighting control
In some embodiments, a method includes receiving a signal indicating that a timeout timer associated with a space has been has crossed a threshold in a space. If a motion sensor is disposed within the space, the method includes sending a signal to a connector operatively coupled to a light source such that the connector reverts to a default state.
Powercast Corporation


 Common internet file system proxy authentication of multiple servers patent thumbnailCommon internet file system proxy authentication of multiple servers
Techniques are described for a proxy system to provide a client device with transparent access to multiple network file servers. The proxy system may appear to the client device as a single network file server.
Cisco Technology, Inc.


Management of access sessions

Disclosed are examples of managing access sessions for a computing device. In some examples, a computing device obtains a key and timeout data from secured storage.
Airwatch Llc

Warning system for detecting infant seat buckle securement

A child seat-vehicle safety system for a passenger vehicle, including at least one child seat buckle signaling device with a buckling detector for signaling the buckle status, and a portable controller device that attaches to the on-board diagnostic ii (obd-ii) port of the vehicle, for detecting the status of the vehicle ignition system, receiving the buckle status signal, and generating an alarm signal in response to a predetermined condition of the ignition status and the buckle status signal. The system provides a method of warning a vehicle operator that a child has been left buckled in a vehicle after the vehicle's ignition system has been turned off, by generating an alarm signal when the ignition status is ‘off’ and the buckle status signal is ‘buckled’ beyond a predetermined grace or timeout period..

Systems and methods for scalable network buffer management

The disclosed computer-implemented method for scalable network buffer management may include (1) receiving, via a connection to a client, data to be transmitted to a cloud service, (2) buffering the data in at least one data buffer, (3) determining that the data will not be transmitted to the cloud service within a timeout period for the client connection, (4) delaying reception of additional data from the client connection for a portion of the timeout period, and (5) before the timeout period has elapsed, buffering data from the client connection in at least one secondary data buffer, wherein the secondary data buffer is smaller in size than the data buffer. Various other methods, systems, and computer-readable media are also disclosed..
Symantec Corporation

System and universal timeout in a distributed computing environment in a distributed computing environment

A system and method for supporting universal timeout in a distributed computing environment. The universal timeout feature can enforce a defined timeout for a block (or group of blocks) or code executing on a thread regardless of the number of network hops required to effectuate the code.
Oracle International Corporation

Data transmission method, sender device, and receiver device

Embodiments of the present invention provide a data transmission method, a sender device, and a receiver device. The method includes: sending, by a sender device, to-be-transmitted data to a receiver device according to a transmission policy; and receiving, by the sender device, feedback information sent by the receiver device.
Huawei Technologies Co., Ltd.

Secured networks and endpoints applying internet protocol security

A method of managing secure communications states in an endpoint within a secure network is disclosed. The method includes, in a disconnected state, transmitting from a first endpoint to a second endpoint a first message including an authorization token.
Unisys Corporation

System and detecting network neighbor reachability

The disclosed system may include (1) a cache module, stored in memory, that stores a neighbor cache entry that specifies whether a neighbor of a network node is reachable according to a detection mechanism, (2) a timeout module, stored in memory, that specifies a timing interval in which to select a reachable time threshold, (3) a reception module, stored in memory, that receives event information about whether the neighbor is active, (4) a biasing module, stored in memory, that biases, based on the received event information about whether the neighbor is active, a selection of the reachable time threshold within the timing interval, and (5) a determination module, stored in memory, that determines whether the neighbor is reachable based at least in part on a determination of whether the selected reachable time threshold has been satisfied. Various other systems and methods are also disclosed..
Juniper Networks, Inc.

Rtu serial communication mechanism

A method includes receiving inputs including a serial communication protocol specification and serial port settings associated with a serial communication channel. The method includes determining a transmission speed, a request size, and a response size of the serial communication channel based on the inputs.
Honeywell International, Inc.

Connection-oriented messaging and signaling in mobile heath networks

Systems and methods can support connection-oriented messaging and signaling. Connection-oriented messaging channels may be established between wireless mobile computing devices within a local-area wireless network.
Voalte, Inc.

Method for detecting a fraudulent terminal by using a cryptogram, corresponding device and program

A method is provided for detecting a fraudulent electronic payment terminal. The method includes an act, implemented by a mobile terminal independently and prior to a transaction phase, of generating an alarm indicating that the electronic payment terminal is fraudulent.
Ingenico Group

Multiple processor core interrupt priority levels

A processor system includes at least two processor cores and an interrupt controller including interrupt priority registers configured for registering interrupt priorities of the respective processor cores. The processor system further includes at least two task timers associated with respective processor cores.
Freescale Semiconductor, Inc.

Maintaining network connections for background applications

In order to reduce latency associated with an application executed by an electronic device, when the application transitions from a runnable mode to a suspended state, the electronic device may receive a request from the application to maintain a connection, which is used by the application to communicate with another electronic device, while the application is in the suspended state. Then, the electronic device may provide an instruction to an interface circuit in the electronic device to maintain the connection for a time interval while the application is in the suspended state.
Apple Inc.

System and managing pairing information associated with peer-to-peer device pairings

Systems and methods of managing pairing information associated with peer-to-peer device pairings are disclosed herein. The pairing information can include link keys or other configuration data associated with the peer-to-peer device pairing.
Blackberry Limited

Recognition method communication mode

A method for a communication mode, comprises: detecting the type of the communication mode; if the communication mode is a usb interface communication mode, turning off a timer; when an instruction is received, conducting a corresponding operation according to the usb interface communication protocol supported by the device; if the communication mode is not set, then when the timeout identifier is set, setting the communication mode as a serial port communication mode, turning off the timer, resetting the timeout identifier, and executing step s6; if the communication mode is a serial port communication mode, turning off the timer, and executing step s6; step s6: when the instruction is received, conducting a corresponding operation according to the serial port protocol.. .
Feitian Technologies Co., Ltd

Tracking object across processes

Systems and methods are disclosed for tracking the lifecycle of an object across processes and for tracking the lifecycle of processes that are processing the object. A first process, p1 can generate an action object representing work to be performed by another process, pn.
Apple Inc.

Transfer costs and lock timeouts in a resource transfer system

Systems and techniques are provided for a resource transfer system. An instruction to transfer a first quantity of a resource from a first resource pool to a second resource pool may be received.
402 Technologies S.a.

Determining adjustments of storage device timeout values based on synchronous or asynchronous remote copy state

A determination is made as to whether a plurality of storage volumes controlled by a processor complex are secondary storage volumes that are in an asynchronous copy relationship with a plurality of primary storage volumes. A storage device timeout value for a storage device that stores the plurality of storage volumes is changed from a predetermined low value to a predetermined high value, wherein the predetermined high value is indicative of a greater duration of time than the predetermined low value, in response to determining that each of the plurality of storage volumes controlled by the processor complex and stored in the storage device are secondary storage volumes that are in the asynchronous copy relationship with the plurality of primary storage volumes..
International Business Machines Corporation

Preventing sleep mode for devices based on sensor inputs

A data processing device may receive, from an application running on the data processing device, an indication that one or more sensors may be associated with a user input for the application. Based on sensing information collected from the one or more sensors, a characteristic of the user input may be determined by the data processing device.
Google Inc.

System and determining trust for sip messages

A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration.
Blackberry Limited

Multi-master bus

Multiple master modules are connected to a bus, each having bus communication logic for initiating a transaction over the bus. The bus communication logic is able to detect when the bus is busy (or apparently busy), and in response will wait before initiating a transaction of its own.
Philips Lighting Holding B.v.

Implicit power management mode and state transitions

A station (sta) of a wireless local area network (wlan) transitions implicitly between power management (pm) modes or pm states, without providing an explicit indication of the pm mode/state change to an access point (ap) of the wlan. Transitions include changes between an active mode and a power save (ps) mode, or between an awake state and a doze state of the ps mode.
Apple Inc.

System and obtaining and sharing media content

A device initialization method includes generating a license request for a personal media device. A timeout indicator may be obtained for a subscription associated with the personal media device.
Intel Corporation

Method and system for withdrawing programmed routes in network devices

A method for withdrawing programmed routes in network devices. The method includes receiving instructions to withdraw at least one route of a set of programmed routes, where the set of programmed routes is stored in a forwarding information base (fib), removing the at least one route from a set of routes stored in a routing information base (rib), notifying at least one peer network device of a set of peer network devices about the at least one route to be withdrawn, initializing a timer with a timeout value and starting the timer, before the time expires, processing a packet that uses the at least one route to be withdrawn, and after the timer expires, removing the at least one route from the fib..
Arista Networks, Inc.

Dynamic priority queue

The present disclosure relates to dynamic queue placement. In one embodiment, a method includes receiving a plurality of items for processing by a computing device, wherein each item received by the computing device is associated with a priority type.
Hisense International Co., Ltd.

Determining inactivity timeout using distributed coordination function

Methods, systems, and devices are described for power management in wireless devices. Power saving for a device of a wireless network may be improved by appropriately setting an inactivity timeout (ito), and thus the amount of time, after a last transmission or reception of data traffic, that the device remains in an awake mode listening for more data traffic before the device enters a sleep mode.
Qualcomm Incorporated

Wireless communication apparatus, recording medium, and wireless communication method

A wireless communication apparatus according to an embodiment includes: a communicating unit that performs one selected from between a first download process that downloads data through a wireless communication by dividing the data into sections while using a plurality of threads and a second download process that downloads the data while using a single thread; a measuring unit that measures communication quality of the wireless communication; a judging unit that, when a deterioration in the communication quality is measured during the first download process, judges whether or not it is possible to complete the download in all of the plurality of threads before a timeout; and a controlling unit that, when it is determined to be impossible to complete the download in all of the plurality of threads before the timeout, switches the first download process into the second download process.. .
Fujitsu Limited

Transmitting packet from device after timeout in network communications utilizing virtual network connection

A method of providing network communications includes spawning a virtual machine that virtualizes network capabilities of the device such that a virtual network connection is provided; using the virtual network connection, transmitting a packet to a first node using a first routing protocol for communication to a destination device; setting a timer, the timer having a value corresponding to an amount of time greater than an average response time of the destination device; and, upon expiration of the timer, transmitting the packet to a second node using a second routing protocol for communication to the destination device.. .
Dispersive Networks, Inc.

Method and device, system and software product for managing a call

A method for managing a call, including steps of recognizing a call request of a calling party to establish a call with a called party, and extending a timeout being a time period between recognizing the call request and automatically rejecting the call by the called party before the call is established or rejected. The method provides a ringing time extension which gives the called party more time to answer or establish an incoming call..
Unify Gmbh & Co. Kg

Information processing apparatus, information processing method, and non-transitory computer readable medium

An information processing apparatus includes a request obtaining unit, a request memory, a timeout value obtaining unit, a determining unit, and a discarding unit. The request obtaining unit sequentially obtains requests from plural external apparatuses.
Fuji Xerox Co., Ltd.

Configuration of liveness check using internet key exchange messages

There is provided mechanisms for configuration of liveness check using internet key exchange messages. A method is performed by a user equipment.
Telefonaktiebolaget L M Ericsson (publ)

System and method to prevent loss of bitcoins due to address errors

Aspects of the invention are related to a method for determining whether a transaction message of a digital currency system is valid. The exemplary method comprises: receiving the transaction message, the transaction message referencing in an input a previous output associated with a timeout value; determining whether a time as specified by the timeout value has passed; determining that the transaction message is valid in response to determining that the time as specified by the timeout value has not passed; and collecting the transaction message into a block of a block chain in response to determining that the transaction message is valid..
Qualcomm Incorporated

Rule-based device timeout and security access

Devices, methods and computer-readable media for controlling a device timeout parameter are disclosed. For example, a device receives a condition for modifying a timeout parameter and a modification.
At&t Intellectual Property I, L.p.

Single wire serial interface

A single wire serial interface for power ics and other devices is provided. To use the interface, a device is configured to include an en/set input pin.
Skyworks Solutions, Inc.

Method for controlling buffering of packets in a communication network

A method for controlling buffering of packets in a communication network includes storing packets of one or more packet flows in a queue of a buffer, to set a threshold on the queue, and determining whether the queue exceeds the threshold. If the queue exceeds the threshold, a congestion notification on a first packet of the queue causing the exceeding of the threshold is provided and a timeout interval is started.
Alcatel Lucent

Message system for avoiding processing-performance decline

This server for distributing messages quickly detects a performance decline in a downstream server by using a method for keeping, for each distribution-destination server, a threshold such as a connection number and a time interval separate from a response timeout, and determining that performance has declined when the threshold is exceeded. In addition, the present invention improves system availability by identifying a server group in which performance has declined on the basis of a correlation pertaining to inter-server cooperative processing, when a distribution server exhibits a decline in performance, and by the distribution server distributing a message to a server not exhibiting a decline in performance..
Hitachi, Ltd.

Secure authentication of remote equipment

An authentication server may use secure messaging with a remote device prior to authorizing non-secure communications between the remote device and a content server, thereby preventing unauthorized access to the content server. The secure messaging uses such security features as encryption, signatures with authentication certificates, a realm, and/or a nonce.
Comcast Cable Communications, Llc

Watchdog timer

A microcontroller may comprise a central processing unit coupled with a plurality of peripheral devices through a system bus; and a watchdog timer unit receiving a clear watchdog signal and being configured to generate a watchdog timeout signal for resetting the microcontroller, wherein the watchdog timer unit is further configured to define a first and a second watchdog timeout period through a first and a second timer, respectively, further having logic to select the first or the second timer, wherein the clear watchdog signal resets the first and second timer.. .
Microchip Technology Incorporated

Smart dumping of network switch forwarding database

Techniques are provided for retrieving entries from a routing table or a forwarding database in a distributed network switch. The forwarding database includes match and mask registers used to compare routing entries and return matching routing entries to a requesting management controller.
International Business Machines Corporation

Method for monitoring a communication system

The invention relates to a method for monitoring a communication system, comprising: acquiring and storing data about timeout events or faulty transfers in connection with at least one signaling process in at least one first communication terminal (1, 2, 3) of the communication system; and creating a collection of such data and transferring (7, 8, 10) said collection to a collection point (4) for said data in the communication system.. .
Unify Gmbh & Co. Kg

Managing single-wire communications

Systems, methods, circuits and computer-readable mediums for managing single-wire communications. In one aspect, a method includes starting a transmission cycle by transmitting a clock pulse to a single-wire bus, sampling a data bit transmitted from a single-wire device through the single-wire bus within the transmission cycle after the transmission of the clock pulse, and determining whether a sampling period of the sampling is smaller than a sampling threshold for the data bit.
Atmel Corporation

Virtual device timeout by memory offlining

A system, methods, and apparatus for virtual device timeout by memory offlining. A hypervisor receives a message from a source virtual machine to be transmitted to a destination machine and reserves a block of memory associated with the message.
Red Hat Israel, Ltd.



Timeout topics:
  • Electronic Device
  • Ip Address
  • Touch Screen
  • Microprocessor
  • Video Memory
  • Short Messages
  • Transceiver
  • Network Device
  • Redundancy
  • Network Redundancy
  • Digital Media
  • Storage Device
  • Communication System
  • Ion Channel
  • Communication Channel


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Timeout for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Timeout with additional patents listed. Browse our RSS directory or Search for other possible listings.


    6.6974

    file didn't exist2190

    478994 - 0 - 51