Follow us on Twitter
twitter icon@FreshPatents


Timeout patents

      

This page is updated frequently with new Timeout-related patent applications.




 Control  frequency band switching and wireless communication apparatus patent thumbnailControl frequency band switching and wireless communication apparatus
In a frequency band switching by fast session transfer (fst), a timeout value (link loss timeout: llt) is determined based on a change in a communication state, a switching setup sequence including a step of transmitting the determined timeout value to a peer wireless station is performed, and frequency switching to the second frequency band is performed when time of the timeout value elapses from when the switching setup sequence is completed. For example, a large timeout value (llt=t1) is set at time of connection establishment, and the llt is changed (llt=t2 to t4) based on, for example, a state of transmission data or a change in a channel state..
Panasonic Corporation


 Adaptive unicast timeout for a wireless network having optimized routing patent thumbnailAdaptive unicast timeout for a wireless network having optimized routing
A system and method for optimizing performance of a network by creating a database of the time that a packet takes to be transmitted from one node to a next adjacent node, and uses that database to calculate a new default unicast timeout period, wherein if an acknowledgement is not received from a destination node within the default unicast timeout period, then the packet may be retransmitted in a period of time that is optimized and not dependent on waiting for a standard unicast timeout period to expire, and wherein a system and method also includes replacing the use of broadcast messages to learn the status of nodes on a network by creating a self-forming and self-correcting dynamic network by compiling a database of all known paths through a network, rating all known paths so that if the best route is blocked, the next best route can be substituted for it to enable a date packet to have the fastest path back to a source.. .

 Evaluation node for reporting status via a secure link patent thumbnailEvaluation node for reporting status via a secure link
An evaluator node may obtain an ip address within a network to be tested, the network having multiple testable addresses other than the ip address. The evaluator node establishes a secure session to the server, where the evaluator node authenticates itself to the server using a predetermined key.
Vidoc Razor, Llc


 Low-power low density parity check decoding patent thumbnailLow-power low density parity check decoding
In an example implementation of this disclosure, a message passing low density parity check (ldpc) decoder may, during decoding of a first group of bits, lock a first variable node upon a bit-value probability of the first variable node reaching a determined threshold, and lock a first check node upon all variable nodes connected to the first check node being locked. The ldpc decoder may cease decoding the first group of bits upon all variable nodes of the ldpc decoder being locked, all check nodes of the ldpc decoder being locked, reaching a maximum number of iterations, or reaching a timeout.
Maxlinear, Inc.


 Handling missing data tuples in a streaming environment patent thumbnailHandling missing data tuples in a streaming environment
An operator graph is established for processing elements configured to perform operations on tuples of streaming data. A first processing element in the operator graph includes a barrier operator that joins output of upstream operators.
International Business Machines Corporation


 Cursor handling in a variable refresh rate environment patent thumbnailCursor handling in a variable refresh rate environment
A method, computer program product, and system for cursor handling in a variable refresh rate environment are disclosed. The method includes the steps of receiving a first image, combining a cursor at a first position with the first image to produce a first combined image, and displaying the combined image on a variable refresh rate display device.
Nvidia Corporation


 Task-crawling system and task-crawling  distributed crawler system patent thumbnailTask-crawling system and task-crawling distributed crawler system
A task-crawling system for a distributed crawler system includes a controlling end, a crawling end, and a task monitoring module. The crawling end acquires a corresponding task, and sends data of the task to the controlling end.
Molbase (shanghai) Biotechnology Co., Ltd .


 Apparatus and  controlling engine stop of hybrid electric vehicle patent thumbnailApparatus and controlling engine stop of hybrid electric vehicle
An apparatus and a method for controlling an engine stop of a hybrid electric vehicle are provided to charge the vehicle by advancing control completion time for the engine stop and using inertial energy of the engine. The method includes determining a sensing speed for executing the engine stop when required and determining a value of control timeout based on the sensing speed.
Kia Motors Corporation


 Processing notifications relating to telecommunication sessions patent thumbnailProcessing notifications relating to telecommunication sessions
Measures, including methods, systems and computer-readable storage mediums, for use in processing notifications relating to telecommunication sessions. A cluster of servers is operable to receive incoming notifications where each server can process any given notification and update a store holding records based on previous notifications.
Metaswitch Networks Ltd.


 Determining adjustments of storage device timeout values based on synchronous or asynchronous remote copy state patent thumbnailDetermining adjustments of storage device timeout values based on synchronous or asynchronous remote copy state
A determination is made as to whether a plurality of storage volumes controlled by a processor complex are secondary storage volumes that are in an asynchronous copy relationship with a plurality of primary storage volumes. A storage device timeout value for a storage device that stores the plurality of storage volumes is changed from a predetermined low value to a predetermined high value, wherein the predetermined high value is indicative of a greater duration of time than the predetermined low value, in response to determining that each of the plurality of storage volumes controlled by the processor complex and stored in the storage device are secondary storage volumes that are in the asynchronous copy relationship with the plurality of primary storage volumes..
International Business Machines Corporation


Method to configure monitoring thresholds using output of load or resource loadings

The technology disclosed enables the automatic definition of monitoring alerts for a web page across a plurality of variables such as server response time, server cpu load, network bandwidth utilization, response time from a measured client, network latency, server memory utilization, and the number of simultaneous sessions, amongst others. This is accomplished through the combination of load or resource loading and performance snapshots, where performance correlations allow for the alignment of operating variables.
Spirent Communications, Inc.

Systems and methods for dynamic thermal excursion timeout determination and predictive failure notification based on airflow escape detection

In accordance with embodiments of the present disclosure, an information handling system may include a plurality of information handling resources and a controller communicatively coupled to the plurality of information handling resources. The controller may be configured to monitor for the presence of a thermal escape event of the information handling system.
Dell Products L.p.

Passive detection of live systems during controller failover in distributed environments

For passive detection of live systems during controller failover in a distributed environment, a set of member systems is sorted according to heartbeat periods used by members in the set of member systems. An amount of elapsed time since a failure of a first controller system in the distributed environment is determined.
International Business Machines Corporation

Method and system for path monitoring in a software-defined networking (sdn) system

A method for path monitoring is disclosed. The method includes receiving, at the network device, a packet from a sdn controller to monitor a path for a service between the network device and another network device.
Telefonaktiebolaget L M Ericsson (publ)

Diagnostic port protection to body control module

A body controller may monitor a vehicle bus for diagnostic requests received from a scan device connected to a diagnostic port when a vehicle perimeter alarm of a body controller is armed. The body controller may reset a predetermined lockout timeout responsive to receipt of a session request from the scan device.
Ford Global Technologies, Llc

Method and reducing the length of a packet storm in a wireless mesh network

A broadcast transmission will generate a packet storm in a mesh network, which will last for a very long time and block the network for other traffic. There is a parameter in a broadcast control mechanism named radius which controls the duration of the packet storm.
Philips Lighting Holding B.v.

Prioritization of network traffic in a distributed processing system

Described herein are techniques enabling the prioritization of network traffic in a distributed processing system. Information may be received regarding a plurality of flows, each flow configured to travel from one node to another node in the distributed processing system.
Hewlett Packard Enterprise Development Lp

Application timeout aware tcp loss recovery

The sack scoreboard is used in slow recovery and the sack scoreboard and an application programmed timeout are used to determine the initial cwnd in slow recovery. The cwnd is calculated so that all packets will be recovered before the application times out.
Brocade Communications Systems, Inc.

Automated system for lighting control

In some embodiments, a method includes receiving a signal indicating that a timeout timer associated with a space has been has crossed a threshold in a space. If a motion sensor is disposed within the space, the method includes sending a signal to a connector operatively coupled to a light source such that the connector reverts to a default state.
Powercast Corporation

Common internet file system proxy authentication of multiple servers

Techniques are described for a proxy system to provide a client device with transparent access to multiple network file servers. The proxy system may appear to the client device as a single network file server.
Cisco Technology, Inc.

Management of access sessions

Disclosed are examples of managing access sessions for a computing device. In some examples, a computing device obtains a key and timeout data from secured storage.
Airwatch Llc

Warning system for detecting infant seat buckle securement

A child seat-vehicle safety system for a passenger vehicle, including at least one child seat buckle signaling device with a buckling detector for signaling the buckle status, and a portable controller device that attaches to the on-board diagnostic ii (obd-ii) port of the vehicle, for detecting the status of the vehicle ignition system, receiving the buckle status signal, and generating an alarm signal in response to a predetermined condition of the ignition status and the buckle status signal. The system provides a method of warning a vehicle operator that a child has been left buckled in a vehicle after the vehicle's ignition system has been turned off, by generating an alarm signal when the ignition status is ‘off’ and the buckle status signal is ‘buckled’ beyond a predetermined grace or timeout period..

Systems and methods for scalable network buffer management

The disclosed computer-implemented method for scalable network buffer management may include (1) receiving, via a connection to a client, data to be transmitted to a cloud service, (2) buffering the data in at least one data buffer, (3) determining that the data will not be transmitted to the cloud service within a timeout period for the client connection, (4) delaying reception of additional data from the client connection for a portion of the timeout period, and (5) before the timeout period has elapsed, buffering data from the client connection in at least one secondary data buffer, wherein the secondary data buffer is smaller in size than the data buffer. Various other methods, systems, and computer-readable media are also disclosed..
Symantec Corporation

System and universal timeout in a distributed computing environment in a distributed computing environment

A system and method for supporting universal timeout in a distributed computing environment. The universal timeout feature can enforce a defined timeout for a block (or group of blocks) or code executing on a thread regardless of the number of network hops required to effectuate the code.
Oracle International Corporation

Data transmission method, sender device, and receiver device

Embodiments of the present invention provide a data transmission method, a sender device, and a receiver device. The method includes: sending, by a sender device, to-be-transmitted data to a receiver device according to a transmission policy; and receiving, by the sender device, feedback information sent by the receiver device.
Huawei Technologies Co., Ltd.

Secured networks and endpoints applying internet protocol security

A method of managing secure communications states in an endpoint within a secure network is disclosed. The method includes, in a disconnected state, transmitting from a first endpoint to a second endpoint a first message including an authorization token.
Unisys Corporation

System and detecting network neighbor reachability

The disclosed system may include (1) a cache module, stored in memory, that stores a neighbor cache entry that specifies whether a neighbor of a network node is reachable according to a detection mechanism, (2) a timeout module, stored in memory, that specifies a timing interval in which to select a reachable time threshold, (3) a reception module, stored in memory, that receives event information about whether the neighbor is active, (4) a biasing module, stored in memory, that biases, based on the received event information about whether the neighbor is active, a selection of the reachable time threshold within the timing interval, and (5) a determination module, stored in memory, that determines whether the neighbor is reachable based at least in part on a determination of whether the selected reachable time threshold has been satisfied. Various other systems and methods are also disclosed..
Juniper Networks, Inc.

Rtu serial communication mechanism

A method includes receiving inputs including a serial communication protocol specification and serial port settings associated with a serial communication channel. The method includes determining a transmission speed, a request size, and a response size of the serial communication channel based on the inputs.
Honeywell International, Inc.

Connection-oriented messaging and signaling in mobile heath networks

Systems and methods can support connection-oriented messaging and signaling. Connection-oriented messaging channels may be established between wireless mobile computing devices within a local-area wireless network.
Voalte, Inc.

Method for detecting a fraudulent terminal by using a cryptogram, corresponding device and program

A method is provided for detecting a fraudulent electronic payment terminal. The method includes an act, implemented by a mobile terminal independently and prior to a transaction phase, of generating an alarm indicating that the electronic payment terminal is fraudulent.
Ingenico Group

Multiple processor core interrupt priority levels

A processor system includes at least two processor cores and an interrupt controller including interrupt priority registers configured for registering interrupt priorities of the respective processor cores. The processor system further includes at least two task timers associated with respective processor cores.
Freescale Semiconductor, Inc.

Maintaining network connections for background applications

In order to reduce latency associated with an application executed by an electronic device, when the application transitions from a runnable mode to a suspended state, the electronic device may receive a request from the application to maintain a connection, which is used by the application to communicate with another electronic device, while the application is in the suspended state. Then, the electronic device may provide an instruction to an interface circuit in the electronic device to maintain the connection for a time interval while the application is in the suspended state.
Apple Inc.

System and managing pairing information associated with peer-to-peer device pairings

Systems and methods of managing pairing information associated with peer-to-peer device pairings are disclosed herein. The pairing information can include link keys or other configuration data associated with the peer-to-peer device pairing.
Blackberry Limited

Recognition method communication mode

A method for a communication mode, comprises: detecting the type of the communication mode; if the communication mode is a usb interface communication mode, turning off a timer; when an instruction is received, conducting a corresponding operation according to the usb interface communication protocol supported by the device; if the communication mode is not set, then when the timeout identifier is set, setting the communication mode as a serial port communication mode, turning off the timer, resetting the timeout identifier, and executing step s6; if the communication mode is a serial port communication mode, turning off the timer, and executing step s6; step s6: when the instruction is received, conducting a corresponding operation according to the serial port protocol.. .
Feitian Technologies Co., Ltd

Tracking object across processes

Systems and methods are disclosed for tracking the lifecycle of an object across processes and for tracking the lifecycle of processes that are processing the object. A first process, p1 can generate an action object representing work to be performed by another process, pn.
Apple Inc.

Transfer costs and lock timeouts in a resource transfer system

Systems and techniques are provided for a resource transfer system. An instruction to transfer a first quantity of a resource from a first resource pool to a second resource pool may be received.
402 Technologies S.a.

Determining adjustments of storage device timeout values based on synchronous or asynchronous remote copy state

A determination is made as to whether a plurality of storage volumes controlled by a processor complex are secondary storage volumes that are in an asynchronous copy relationship with a plurality of primary storage volumes. A storage device timeout value for a storage device that stores the plurality of storage volumes is changed from a predetermined low value to a predetermined high value, wherein the predetermined high value is indicative of a greater duration of time than the predetermined low value, in response to determining that each of the plurality of storage volumes controlled by the processor complex and stored in the storage device are secondary storage volumes that are in the asynchronous copy relationship with the plurality of primary storage volumes..
International Business Machines Corporation

Preventing sleep mode for devices based on sensor inputs

A data processing device may receive, from an application running on the data processing device, an indication that one or more sensors may be associated with a user input for the application. Based on sensing information collected from the one or more sensors, a characteristic of the user input may be determined by the data processing device.
Google Inc.

System and determining trust for sip messages

A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration.
Blackberry Limited

Multi-master bus

Multiple master modules are connected to a bus, each having bus communication logic for initiating a transaction over the bus. The bus communication logic is able to detect when the bus is busy (or apparently busy), and in response will wait before initiating a transaction of its own.
Philips Lighting Holding B.v.

Implicit power management mode and state transitions

A station (sta) of a wireless local area network (wlan) transitions implicitly between power management (pm) modes or pm states, without providing an explicit indication of the pm mode/state change to an access point (ap) of the wlan. Transitions include changes between an active mode and a power save (ps) mode, or between an awake state and a doze state of the ps mode.
Apple Inc.

System and obtaining and sharing media content

A device initialization method includes generating a license request for a personal media device. A timeout indicator may be obtained for a subscription associated with the personal media device.
Intel Corporation

Method and system for withdrawing programmed routes in network devices

A method for withdrawing programmed routes in network devices. The method includes receiving instructions to withdraw at least one route of a set of programmed routes, where the set of programmed routes is stored in a forwarding information base (fib), removing the at least one route from a set of routes stored in a routing information base (rib), notifying at least one peer network device of a set of peer network devices about the at least one route to be withdrawn, initializing a timer with a timeout value and starting the timer, before the time expires, processing a packet that uses the at least one route to be withdrawn, and after the timer expires, removing the at least one route from the fib..
Arista Networks, Inc.

Dynamic priority queue

The present disclosure relates to dynamic queue placement. In one embodiment, a method includes receiving a plurality of items for processing by a computing device, wherein each item received by the computing device is associated with a priority type.
Hisense International Co., Ltd.

Determining inactivity timeout using distributed coordination function

Methods, systems, and devices are described for power management in wireless devices. Power saving for a device of a wireless network may be improved by appropriately setting an inactivity timeout (ito), and thus the amount of time, after a last transmission or reception of data traffic, that the device remains in an awake mode listening for more data traffic before the device enters a sleep mode.
Qualcomm Incorporated

Wireless communication apparatus, recording medium, and wireless communication method

A wireless communication apparatus according to an embodiment includes: a communicating unit that performs one selected from between a first download process that downloads data through a wireless communication by dividing the data into sections while using a plurality of threads and a second download process that downloads the data while using a single thread; a measuring unit that measures communication quality of the wireless communication; a judging unit that, when a deterioration in the communication quality is measured during the first download process, judges whether or not it is possible to complete the download in all of the plurality of threads before a timeout; and a controlling unit that, when it is determined to be impossible to complete the download in all of the plurality of threads before the timeout, switches the first download process into the second download process.. .
Fujitsu Limited

Transmitting packet from device after timeout in network communications utilizing virtual network connection

A method of providing network communications includes spawning a virtual machine that virtualizes network capabilities of the device such that a virtual network connection is provided; using the virtual network connection, transmitting a packet to a first node using a first routing protocol for communication to a destination device; setting a timer, the timer having a value corresponding to an amount of time greater than an average response time of the destination device; and, upon expiration of the timer, transmitting the packet to a second node using a second routing protocol for communication to the destination device.. .
Dispersive Networks, Inc.

Method and device, system and software product for managing a call

A method for managing a call, including steps of recognizing a call request of a calling party to establish a call with a called party, and extending a timeout being a time period between recognizing the call request and automatically rejecting the call by the called party before the call is established or rejected. The method provides a ringing time extension which gives the called party more time to answer or establish an incoming call..
Unify Gmbh & Co. Kg

Information processing apparatus, information processing method, and non-transitory computer readable medium

An information processing apparatus includes a request obtaining unit, a request memory, a timeout value obtaining unit, a determining unit, and a discarding unit. The request obtaining unit sequentially obtains requests from plural external apparatuses.
Fuji Xerox Co., Ltd.

Configuration of liveness check using internet key exchange messages

There is provided mechanisms for configuration of liveness check using internet key exchange messages. A method is performed by a user equipment.
Telefonaktiebolaget L M Ericsson (publ)

System and method to prevent loss of bitcoins due to address errors

Aspects of the invention are related to a method for determining whether a transaction message of a digital currency system is valid. The exemplary method comprises: receiving the transaction message, the transaction message referencing in an input a previous output associated with a timeout value; determining whether a time as specified by the timeout value has passed; determining that the transaction message is valid in response to determining that the time as specified by the timeout value has not passed; and collecting the transaction message into a block of a block chain in response to determining that the transaction message is valid..
Qualcomm Incorporated



Timeout topics:
  • Electronic Device
  • Ip Address
  • Touch Screen
  • Microprocessor
  • Video Memory
  • Short Messages
  • Transceiver
  • Network Device
  • Redundancy
  • Network Redundancy
  • Digital Media
  • Storage Device
  • Communication System
  • Ion Channel
  • Communication Channel


  • Follow us on Twitter
    twitter icon@FreshPatents

    ###

    This listing is a sample listing of patent applications related to Timeout for is only meant as a recent sample of applications filed, not a comprehensive history. There may be associated servicemarks and trademarks related to these patents. Please check with patent attorney if you need further assistance or plan to use for business purposes. This patent data is also published to the public by the USPTO and available for free on their website. Note that there may be alternative spellings for Timeout with additional patents listed. Browse our RSS directory or Search for other possible listings.


    0.736

    file did exist - file did put2190

    6 - 1 - 51