This page is updated frequently with new Timeout-related patent applications.
|Systems and methods for scalable network buffer management|
The disclosed computer-implemented method for scalable network buffer management may include (1) receiving, via a connection to a client, data to be transmitted to a cloud service, (2) buffering the data in at least one data buffer, (3) determining that the data will not be transmitted to the cloud service within a timeout period for the client connection, (4) delaying reception of additional data from the client connection for a portion of the timeout period, and (5) before the timeout period has elapsed, buffering data from the client connection in at least one secondary data buffer, wherein the secondary data buffer is smaller in size than the data buffer. Various other methods, systems, and computer-readable media are also disclosed..
|System and universal timeout in a distributed computing environment in a distributed computing environment|
A system and method for supporting universal timeout in a distributed computing environment. The universal timeout feature can enforce a defined timeout for a block (or group of blocks) or code executing on a thread regardless of the number of network hops required to effectuate the code.
Oracle International Corporation
|Data transmission method, sender device, and receiver device|
Embodiments of the present invention provide a data transmission method, a sender device, and a receiver device. The method includes: sending, by a sender device, to-be-transmitted data to a receiver device according to a transmission policy; and receiving, by the sender device, feedback information sent by the receiver device.
Huawei Technologies Co., Ltd.
|Secured networks and endpoints applying internet protocol security|
A method of managing secure communications states in an endpoint within a secure network is disclosed. The method includes, in a disconnected state, transmitting from a first endpoint to a second endpoint a first message including an authorization token.
|System and detecting network neighbor reachability|
The disclosed system may include (1) a cache module, stored in memory, that stores a neighbor cache entry that specifies whether a neighbor of a network node is reachable according to a detection mechanism, (2) a timeout module, stored in memory, that specifies a timing interval in which to select a reachable time threshold, (3) a reception module, stored in memory, that receives event information about whether the neighbor is active, (4) a biasing module, stored in memory, that biases, based on the received event information about whether the neighbor is active, a selection of the reachable time threshold within the timing interval, and (5) a determination module, stored in memory, that determines whether the neighbor is reachable based at least in part on a determination of whether the selected reachable time threshold has been satisfied. Various other systems and methods are also disclosed..
Juniper Networks, Inc.
|Rtu serial communication mechanism|
A method includes receiving inputs including a serial communication protocol specification and serial port settings associated with a serial communication channel. The method includes determining a transmission speed, a request size, and a response size of the serial communication channel based on the inputs.
Honeywell International, Inc.
|Connection-oriented messaging and signaling in mobile heath networks|
Systems and methods can support connection-oriented messaging and signaling. Connection-oriented messaging channels may be established between wireless mobile computing devices within a local-area wireless network.
|Method for detecting a fraudulent terminal by using a cryptogram, corresponding device and program|
A method is provided for detecting a fraudulent electronic payment terminal. The method includes an act, implemented by a mobile terminal independently and prior to a transaction phase, of generating an alarm indicating that the electronic payment terminal is fraudulent.
|Multiple processor core interrupt priority levels|
A processor system includes at least two processor cores and an interrupt controller including interrupt priority registers configured for registering interrupt priorities of the respective processor cores. The processor system further includes at least two task timers associated with respective processor cores.
Freescale Semiconductor, Inc.
|Maintaining network connections for background applications|
In order to reduce latency associated with an application executed by an electronic device, when the application transitions from a runnable mode to a suspended state, the electronic device may receive a request from the application to maintain a connection, which is used by the application to communicate with another electronic device, while the application is in the suspended state. Then, the electronic device may provide an instruction to an interface circuit in the electronic device to maintain the connection for a time interval while the application is in the suspended state.
System and managing pairing information associated with peer-to-peer device pairings
Systems and methods of managing pairing information associated with peer-to-peer device pairings are disclosed herein. The pairing information can include link keys or other configuration data associated with the peer-to-peer device pairing.
Recognition method communication mode
A method for a communication mode, comprises: detecting the type of the communication mode; if the communication mode is a usb interface communication mode, turning off a timer; when an instruction is received, conducting a corresponding operation according to the usb interface communication protocol supported by the device; if the communication mode is not set, then when the timeout identifier is set, setting the communication mode as a serial port communication mode, turning off the timer, resetting the timeout identifier, and executing step s6; if the communication mode is a serial port communication mode, turning off the timer, and executing step s6; step s6: when the instruction is received, conducting a corresponding operation according to the serial port protocol.. .
Feitian Technologies Co., Ltd
Tracking object across processes
Systems and methods are disclosed for tracking the lifecycle of an object across processes and for tracking the lifecycle of processes that are processing the object. A first process, p1 can generate an action object representing work to be performed by another process, pn.
Transfer costs and lock timeouts in a resource transfer system
Systems and techniques are provided for a resource transfer system. An instruction to transfer a first quantity of a resource from a first resource pool to a second resource pool may be received.
402 Technologies S.a.
Determining adjustments of storage device timeout values based on synchronous or asynchronous remote copy state
A determination is made as to whether a plurality of storage volumes controlled by a processor complex are secondary storage volumes that are in an asynchronous copy relationship with a plurality of primary storage volumes. A storage device timeout value for a storage device that stores the plurality of storage volumes is changed from a predetermined low value to a predetermined high value, wherein the predetermined high value is indicative of a greater duration of time than the predetermined low value, in response to determining that each of the plurality of storage volumes controlled by the processor complex and stored in the storage device are secondary storage volumes that are in the asynchronous copy relationship with the plurality of primary storage volumes..
International Business Machines Corporation
Preventing sleep mode for devices based on sensor inputs
A data processing device may receive, from an application running on the data processing device, an indication that one or more sensors may be associated with a user input for the application. Based on sensing information collected from the one or more sensors, a characteristic of the user input may be determined by the data processing device.
System and determining trust for sip messages
A method for performing initial registration is provided. The method includes receiving a server timeout message, the server timeout message including at least a field set to a value equal to a value received during a first registration.
Multiple master modules are connected to a bus, each having bus communication logic for initiating a transaction over the bus. The bus communication logic is able to detect when the bus is busy (or apparently busy), and in response will wait before initiating a transaction of its own.
Philips Lighting Holding B.v.
Implicit power management mode and state transitions
A station (sta) of a wireless local area network (wlan) transitions implicitly between power management (pm) modes or pm states, without providing an explicit indication of the pm mode/state change to an access point (ap) of the wlan. Transitions include changes between an active mode and a power save (ps) mode, or between an awake state and a doze state of the ps mode.
System and obtaining and sharing media content
A device initialization method includes generating a license request for a personal media device. A timeout indicator may be obtained for a subscription associated with the personal media device.
Method and system for withdrawing programmed routes in network devices
A method for withdrawing programmed routes in network devices. The method includes receiving instructions to withdraw at least one route of a set of programmed routes, where the set of programmed routes is stored in a forwarding information base (fib), removing the at least one route from a set of routes stored in a routing information base (rib), notifying at least one peer network device of a set of peer network devices about the at least one route to be withdrawn, initializing a timer with a timeout value and starting the timer, before the time expires, processing a packet that uses the at least one route to be withdrawn, and after the timer expires, removing the at least one route from the fib..
Arista Networks, Inc.
Dynamic priority queue
The present disclosure relates to dynamic queue placement. In one embodiment, a method includes receiving a plurality of items for processing by a computing device, wherein each item received by the computing device is associated with a priority type.
Hisense International Co., Ltd.
Determining inactivity timeout using distributed coordination function
Methods, systems, and devices are described for power management in wireless devices. Power saving for a device of a wireless network may be improved by appropriately setting an inactivity timeout (ito), and thus the amount of time, after a last transmission or reception of data traffic, that the device remains in an awake mode listening for more data traffic before the device enters a sleep mode.
Wireless communication apparatus, recording medium, and wireless communication method
A wireless communication apparatus according to an embodiment includes: a communicating unit that performs one selected from between a first download process that downloads data through a wireless communication by dividing the data into sections while using a plurality of threads and a second download process that downloads the data while using a single thread; a measuring unit that measures communication quality of the wireless communication; a judging unit that, when a deterioration in the communication quality is measured during the first download process, judges whether or not it is possible to complete the download in all of the plurality of threads before a timeout; and a controlling unit that, when it is determined to be impossible to complete the download in all of the plurality of threads before the timeout, switches the first download process into the second download process.. .
Transmitting packet from device after timeout in network communications utilizing virtual network connection
A method of providing network communications includes spawning a virtual machine that virtualizes network capabilities of the device such that a virtual network connection is provided; using the virtual network connection, transmitting a packet to a first node using a first routing protocol for communication to a destination device; setting a timer, the timer having a value corresponding to an amount of time greater than an average response time of the destination device; and, upon expiration of the timer, transmitting the packet to a second node using a second routing protocol for communication to the destination device.. .
Dispersive Networks, Inc.
Method and device, system and software product for managing a call
A method for managing a call, including steps of recognizing a call request of a calling party to establish a call with a called party, and extending a timeout being a time period between recognizing the call request and automatically rejecting the call by the called party before the call is established or rejected. The method provides a ringing time extension which gives the called party more time to answer or establish an incoming call..
Unify Gmbh & Co. Kg
Information processing apparatus, information processing method, and non-transitory computer readable medium
An information processing apparatus includes a request obtaining unit, a request memory, a timeout value obtaining unit, a determining unit, and a discarding unit. The request obtaining unit sequentially obtains requests from plural external apparatuses.
Fuji Xerox Co., Ltd.
Configuration of liveness check using internet key exchange messages
There is provided mechanisms for configuration of liveness check using internet key exchange messages. A method is performed by a user equipment.
Telefonaktiebolaget L M Ericsson (publ)
System and method to prevent loss of bitcoins due to address errors
Aspects of the invention are related to a method for determining whether a transaction message of a digital currency system is valid. The exemplary method comprises: receiving the transaction message, the transaction message referencing in an input a previous output associated with a timeout value; determining whether a time as specified by the timeout value has passed; determining that the transaction message is valid in response to determining that the time as specified by the timeout value has not passed; and collecting the transaction message into a block of a block chain in response to determining that the transaction message is valid..
Rule-based device timeout and security access
Devices, methods and computer-readable media for controlling a device timeout parameter are disclosed. For example, a device receives a condition for modifying a timeout parameter and a modification.
At&t Intellectual Property I, L.p.
Single wire serial interface
A single wire serial interface for power ics and other devices is provided. To use the interface, a device is configured to include an en/set input pin.
Skyworks Solutions, Inc.
Method for controlling buffering of packets in a communication network
A method for controlling buffering of packets in a communication network includes storing packets of one or more packet flows in a queue of a buffer, to set a threshold on the queue, and determining whether the queue exceeds the threshold. If the queue exceeds the threshold, a congestion notification on a first packet of the queue causing the exceeding of the threshold is provided and a timeout interval is started.
Message system for avoiding processing-performance decline
This server for distributing messages quickly detects a performance decline in a downstream server by using a method for keeping, for each distribution-destination server, a threshold such as a connection number and a time interval separate from a response timeout, and determining that performance has declined when the threshold is exceeded. In addition, the present invention improves system availability by identifying a server group in which performance has declined on the basis of a correlation pertaining to inter-server cooperative processing, when a distribution server exhibits a decline in performance, and by the distribution server distributing a message to a server not exhibiting a decline in performance..
Secure authentication of remote equipment
An authentication server may use secure messaging with a remote device prior to authorizing non-secure communications between the remote device and a content server, thereby preventing unauthorized access to the content server. The secure messaging uses such security features as encryption, signatures with authentication certificates, a realm, and/or a nonce.
Comcast Cable Communications, Llc
A microcontroller may comprise a central processing unit coupled with a plurality of peripheral devices through a system bus; and a watchdog timer unit receiving a clear watchdog signal and being configured to generate a watchdog timeout signal for resetting the microcontroller, wherein the watchdog timer unit is further configured to define a first and a second watchdog timeout period through a first and a second timer, respectively, further having logic to select the first or the second timer, wherein the clear watchdog signal resets the first and second timer.. .
Microchip Technology Incorporated
Smart dumping of network switch forwarding database
Techniques are provided for retrieving entries from a routing table or a forwarding database in a distributed network switch. The forwarding database includes match and mask registers used to compare routing entries and return matching routing entries to a requesting management controller.
International Business Machines Corporation
Method for monitoring a communication system
The invention relates to a method for monitoring a communication system, comprising: acquiring and storing data about timeout events or faulty transfers in connection with at least one signaling process in at least one first communication terminal (1, 2, 3) of the communication system; and creating a collection of such data and transferring (7, 8, 10) said collection to a collection point (4) for said data in the communication system.. .
Unify Gmbh & Co. Kg
Managing single-wire communications
Systems, methods, circuits and computer-readable mediums for managing single-wire communications. In one aspect, a method includes starting a transmission cycle by transmitting a clock pulse to a single-wire bus, sampling a data bit transmitted from a single-wire device through the single-wire bus within the transmission cycle after the transmission of the clock pulse, and determining whether a sampling period of the sampling is smaller than a sampling threshold for the data bit.
Virtual device timeout by memory offlining
A system, methods, and apparatus for virtual device timeout by memory offlining. A hypervisor receives a message from a source virtual machine to be transmitted to a destination machine and reserves a block of memory associated with the message.
Red Hat Israel, Ltd.
Handling packet reordering at a network adapter
A network adapter for handling packet reordering receives a set of packets. The network adapter is configured to aggregate a subset of in-sequence packets from the set of packets into at least one segment before passing the at least one segment from the network adapter to a next layer in a protocol stack.
International Business Machines Corporation
Adapting timeout values based on input scopes
Systems, methods, and computer-readable storage media are provided for adapting timeout values based on varying input scopes associated with text boxes. An indication that dictation has been initiated in association with a text box is received.
Microsoft Technology Licensing, Llc
Method for detecting a failure of a constituent system in a system-of-systems
A process to detect a failure of a constituent system (110 . .
Fts Computertechnik Gmbh
Use of face and motion detection for best view framing in video conference endpoint
A video conference endpoint detects faces at associated face positions in video frames capturing a scene. The endpoint frames the video frames to a view of the scene encompassing all of the detected faces.
Cisco Technology, Inc.
Systems and methods for digital multimedia capture using haptic control, cloud voice changer, protecting digital multimedia privacy, and advertising and sell products or services via cloud gaming environments
Provided is a method for advertising and retailing products and services in cloud gaming environments. A game provider may configure its cloud gaming environment to display third party advertisement before, during, or after the game.
System and discovering a virtual disk spanned across independent storage controllers
An information handling system includes a first storage controller coupled to a first storage device, a second storage controller coupled to a second storage device where the first storage device and the second storage device comprise a virtual disk and a processor to initiate a first discovery of the first storage device, initiate a first discovery of the virtual disk on the first storage controller, complete the discovery of the first storage device, initiate a first discovery of the second storage device, initiate a second discovery of the virtual disk on the second storage controller, determine that a first timeout for the first discovery of the virtual disk on the first storage controller will expire prior to completing the first discovery of the second storage device, and initiate a second discovery of the first storage device in response to determining that the timeout will expire.. .
Dell Products, Lp
Adaptive service timeouts
Disclosed are various embodiments for a timeout management application. Latency data for executing services is obtained.
Amazon Technologies, Inc.
Low-power low density parity check decoding
In an example implementation of this disclosure, a message passing low density parity check (ldpc) decoder may, during decoding of a first group of bits, lock a first variable node upon a bit-value probability of the first variable node reaching a determined threshold, and lock a first check node upon all variable nodes connected to the first check node being locked. The ldpc decoder may cease decoding the first group of bits upon all variable nodes of the ldpc decoder being locked, all check nodes of the ldpc decoder being locked, reaching a maximum number of iterations, or reaching a timeout.
Method and apparatuses for monitoring system bus
Embodiments of the present invention provide a method and apparatuses for monitoring a system bus. The method includes: when a monitoring apparatus monitors a system bus corresponding to the monitoring apparatus and detects that an exception occurs in the system bus, receiving the exception that occurs in the system bus and an identifier of the system bus that are sent by the monitoring apparatus; if the exception that occurs in the system bus is a timeout exception, sending a switch message to a device that is connected to the system bus, so that the device sends and receives a command or data by using a backup system bus; and if not, increasing the number of exception times of the system bus; and when the number of the exception times exceeds a preset threshold, using the backup system bus to transmit data or command..
Huawei Technologies Co., Ltd.
Milestone based dynamic multiple watchdog timeouts and early failure detection
A dynamic, milestone-based solution for managing computer operations, as may be embodied by various systems, methods, and non-transitory computer-readable storage media, may involve analyzing a computer operation invoked by an invoking module. The solution may involve identifying and classifying discrete steps or phases within the invoked operation and applying context-specific watchdog timers and operational milestones based on the detected phases.
Dell Software Inc.
Method and system for improving barcode scanner performance
A barcode scanner should output one scanned result per scanned item at checkout. Scanners with large scan areas and multiple scan lines may scan an item more than once as it is dragged through the scan area during the checkout process.
Conducting performance snapshots during test and using feedback to control test based on customer experience parameters
The technology disclosed enables understanding the user experience of accessing a web page under high loads. A testing system generates a simulated load by retrieving and loading a single web object.