Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

917 results about "Timeout" patented technology

In telecommunication and related engineering, the term timeout or time-out has several meanings, including: A network parameter related to an enforced event designed to occur at the conclusion of a predetermined elapsed time. A specified period of time that will be allowed to elapse in a system before a specified event is to take place, unless another specified event occurs first; in either case, the period is terminated when either event takes place. Note: A timeout condition can be canceled by the receipt of an appropriate time-out cancellation signal. An event that occurs at the end of a predetermined period of time that began at the occurrence of another specified event. The timeout can be prevented by an appropriate signal. Timeout allows a more efficient usage of limited resources without requiring additional interaction from the agent interested in the goods that cause the consumption of these resources. The basic idea is that in situations where a system must wait for something to happen, rather than waiting indefinitely, the waiting will be aborted after the timeout period has elapsed.

System and method for automatically verifying storage of redundant contents into communication equipments, by data comparison

A method is intended for verifying storage of contents into communication equipments connected to at least one communication network. This method consists, when a first communication equipment stores a content and wants to verify that this content is still stored into a second communication equipment: i) in transmitting a first request, comprising at least an identifier of this content and first data representative of this content and requiring verification of the storage of this content into the second communication equipment, to an auxiliary communication equipment acting as an interface between the communication network and the second communication equipment, ii) in transmitting a second request, comprising at least the content identifier, to the second communication equipment, to require transmission of second data representative of the content to the auxiliary communication equipment, and in triggering a timeout having a chosen duration, and iii) if the auxiliary communication equipment has received the second data before expiration of this timeout, in comparing these received second data, possibly after having processed them, to the received first data, and in transmitting a message representative of the result of this comparison to the first communication equipment.
Owner:THOMSON LICENSING SA

Method of and apparatus for authenticating control messages in a signaling network

A communication network includes an SS7 Security Gatekeeper that authenticates and validates network control messages within, transiting, entering and leaving an overlying control fabric such as an SS7 network. The SS7 Security Gatekeeper incorporates several levels of checks to ensure that messages are properly authenticated, valid, and consistent with call progress and system status. In addition to message format, message content is checked to ensure that the originating node has the proper authority to send the message and to invoke the related functions. Predefined sets of templates may be used to check the messages, each set of templates being associated with respective originating point codes and/or calling party addresses. The templates may also be associated with various system states such that messages corresponding to a particular template cause a state transition along a particular edge to a next state node at which another set of templates are defined. Thus, system and call state is maintained. The monitor also includes signaling point authentication using digital signatures and timestamps. Timestamps are also used to initiate appropriate timeouts and so that old or improperly sequenced message may be ignored, corrected or otherwise processed appropriately. The SS7 Security Gatekeeper may be located at the edge of a network to be protected so that all messaging to and from the protected network most egress by way of the Gatekeeper. Alternatively, the SS7 Security Gatekeeper may be internal to the protected network and configured as a “pseudo switch” so that ISUP messaging is routed through the Gatekeeper while actual traffic is trunked directly between the associated SSPs, bypassing the Gatekeeper.
Owner:VERIZON PATENT & LICENSING INC

Fault-tolerant timeout communication protocol with sensor integration

A fault-tolerant timeout protocol for distributed sensor arrays and networks in which each sensor has a plurality of backup nodes, each of which is operable to send priority information which includes the product of the time needed for the backup node to transmit sensor information to a base station and the number of tasks offered to the backup node. In another embodiment, the base station stores the two values and calculates their product. In both cases, the lowest resulting value is used by the base station to select the backup node, which then sends backup sensor information. Another aspect of the present invention is a fault-tolerant sensor integration algorithm. The algorithm creates an abstract sensor defined as an interval having values above and below the reading of an associated physical sensor, and finds a range of values common to more than half of the abstract sensors. The algorithm obtains an output value based on the common range of values, and identifies the correct sensors, possibly faulty sensors, and faulty sensors by identifying the abstract sensors that include, respectively, (a) all of the common range, (b) part of the common range, and (c) none of the common range. A further aspect of the invention is a multi-hop information forwarding method for a wireless network. According to this method, a data source node transmits a signal to neighboring nodes among a plurality of distributed nodes, and each neighboring node which receives the signal from the source node transmits a reply signal which includes a weighted sum of factors including an energy factor and a distance factor for the neighboring node, the energy factor being indicative of the neighboring node's energy level and the distance factor being indicative of its distance from the source node. A forwarding node is selected on the basis of the weighted sums, and the source node transmits a data packet to the selected forwarding node, where the data packet is received and retransmitted either to a data sink node, e.g., a base station, or to another forwarding node.
Owner:PURDUE RES FOUND INC

Method and apparatus for in context mediating common channel signaling messages between networks

A communication network includes a SS7 Security Gatekeeper that authenticates and validates network control messages within, transiting, entering and leaving an overlying control fabric such as an SS7 network. The SS7 Security Gatekeeper incorporates several levels of checks to ensure that messages are properly authenticated, valid, and consistent with call progress and system status. In addition to message format, message content is checked to ensure that the originating node has the proper authority to send the message and to invoke the related functions. predefined sets of templates may be used to check the messages, each set of templates being associated with respective originating point codes and/or calling party addresses. The templates may also be associated with various system states such that messages corresponding to a particular template cause a state transition along a particular edge to a next state node at which another set of templates are defined. Thus, system and call state is maintained. The monitor also includes signaling point authentication using digital signatures and timestamps. Timestamps are also used to initiate appropriate timeouts and so that old or improperly sequenced message may be ignored, corrected or otherwise processed appropriately. The SS7 Security Gatekeeper may be located at the edge of a network to be protected so that all messaging to and from the protected network most egress by way of the Gatekeeper. Alternatively, the SS7 Security Gatekeeper may be internal to the protected network and configured as a “pseudo switch” so that ISUP messaging is routed through the Gatekeeper while actual traffic is trunked directly between the associated SSPs, bypassing the Gatekeeper.
Owner:VERIZON PATENT & LICENSING INC

Byzantine fault-tolerant consensus method based on distributed key

The invention belongs to the field of security authentication in the network space security discipline, and relates to a Byzantine fault-tolerant consensus method based on a distributed key. The method comprises the steps that super nodes participating in consensus are selected, and system common parameters are generated; generating a system public and private key pair and public and private keysof the candidate nodes in a mutual interaction authentication mode according to the public parameters sent by the system; selecting a main node from the super nodes to initiate a proposal request, andstarting a new round of consensus; the secondary node performs individual verification and aggregation verification on the proposal request, and finally determines whether to agree to send the block;after receiving the block, the common node completes time triggering to continue the consensus of the next round, and in the process, if the auxiliary node waits for the case proposal request timeoutor the case proposal response timeout of the main node, the auxiliary node broadcasts the view change request and replaces the main node; according to the invention, the efficiency of reaching the consensus process can be greatly improved.
Owner:芽米科技(广州)有限公司

Method and system for controlling stable operation of application service program

The invention relates to a method and a system for controlling the stable operation of an application service program. The method for controlling the stable operation of the application service program comprises the following steps of: A, receiving a start monitoring command from an application server, and acquiring the current running time and the timeout time limit from the application server; B, receiving an updating command of the application server, and acquiring the running time of the updating from the application server; C, calculating the time difference between the running time of the updating and the running time of the last time, and comparing the time difference with the timeout time limit; and D, when the time difference is greater than the timeout time limit, generating restoration information, and controlling the restoration of the application server. The method and the system solve the stability problem of an automatic service program in the process of long-time running so that the automatic service program can be restarted automatically when the automatic service program is automatically terminated to ensure that the automatic service program runs incessantly, and the running state of the application program of the application service program is traced and analyzed.
Owner:SHENZHEN LAN YOU TECH

Second-level caching method and two-stage timeout flow table structure

The invention provides a second-level caching method and a two-stage timeout flow table structure, and belongs to the field of information storage and network structures. The second-level caching method comprises the following steps: after a controller receives the data packet cache missing message, allocating a timeout to a corresponding flow rule of the data packet, updating relevant informationof the rule in an information base; then, the controller installing the flow rule into a main storage module of the switch and processing the data packet according to the action domain information ofthe rule, for example, forwarding or discarding, if the rule hits the data packet again before overtime and expiration, the flow rule being still kept in the main storage module, repeating the process until the rule is overtime and expired, storing the rule in the auxiliary storage module and recording the timeout value; if the flow rule hits the data packet in the auxiliary storage module, moving the flow rule to the main storage module, and the timeout value being not changed, otherwise, expelling the flow rule from the switch. The structure has the beneficial effects that the cache hit rate is greatly improved, the rule installation frequency is remarkably reduced, and the energy consumption of TCAM query is reduced.
Owner:PEKING UNIV SHENZHEN GRADUATE SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products