Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

3183 results about "Timestamping" patented technology

In computing timestamping refers to the use of an electronic timestamp to provide a temporal order among a set of events. Timestamping techniques are used in a variety of computing fields, from network management and computer security to concurrency control. For instance, a heartbeat network uses timestamping to monitor the nodes on a high availability computer cluster.

Method and system for authorizing a client computer to access a server computer

The present invention includes a client computer, a first server computer, and a second server computer. The first server provides an authorization ticket containing a time stamp to the client computer when the client computer is authorized to access the first server. An elapsed time counter is started at the client computer when access is provided to the first server. When a request is received at the client computer to access the second server, the client computer determines the session length based upon the elapsed time counter. The client computer calculates a hash value for the authorization ticket, the session length, and a secret shared with the second server computer. The client computer transmits a login request to the second server including the authorization ticket, the session length, and the hash. The second server decrypts the authorization ticket and retrieves a copy of the shared secret. The second server executes a hash function on the authorization ticket, the session length, and the shared secret. The second server then compares the computed hash to the hash value received from the second client application. If the two hash values are identical, the second server retrieves the time stamp from the authorization ticket and adds the session length to the time stamp. The second server then compares the resulting value to the current time. If the resulting value and the current time are within a preset threshold value, the client computer is provided.
Owner:MICROSOFT TECH LICENSING LLC

Managing backups using virtual machines

One embodiment is a method for providing incremental backups for a source computing machine, the method including: (a) creating a first backup snapshot including a virtual machine (VM) snapshot of an initial copy of a source computing machine volume, wherein said VM snapshot includes a timestamp and a first redo log file; (b) reconfiguring and customizing said first backup snapshot to create a first bootable VM, writing changes associated with said reconfiguring and customizing into said first redo log file, then creating a first bootable snapshot including a VM snapshot of said first bootable VM, wherein said VM snapshot of said first bootable VM includes a timestamp for said first bootable VM and a redo log file; (c) performing an incremental update of said first backup snapshot or a subsequent backup snapshot, then creating a subsequent backup snapshot including a VM snapshot of said incremental update, wherein said VM snapshot of said incremental update includes a timestamp for said incremental update and a redo log file; and (d) reconfiguring and customizing said subsequent backup snapshot to create a subsequent bootable VM, then creating a subsequent bootable snapshot including a VM snapshot of said subsequent bootable VM, wherein said VM snapshot of said subsequent bootable VM includes a timestamp for said subsequent bootable VM and a redo log file.
Owner:VMWARE INC

Time synchronization method applicable to wireless sensor network

The invention requests to protect a time synchronization method applicable to a wireless sensor network and relates to a wireless network communication technology. The time synchronization method comprises the steps: time source equipment generates beacon frames and broadcasts and sends the beacon frames periodically; non-time source equipment obtains time stamps in the transmitting and receiving process of the beacon frames, obtains frequency deviation and time deviation of an equipment clock and a time source equipment clock according to calculation of a plurality of collected time stamps, compensates a local clock and realizes synchronization with a time source; and time synchronization is carried out step by step, and finally the time synchronization of the whole network is realized. Considering the application environment of the equipment and different requirements for time synchronization, a multi-stage and multilevel synchronization mechanism for combining broadcast synchronization, matching synchronization and monitoring synchronization is adopted. The non-time source equipment can apply synchronization of time synchronization command frames according to different requirements, the equipment without applying the time synchronization command frames can monitor and receive the time synchronization command frames similarly and finish synchronization, so that the whole communication overhead and energy consumption of the network are reduced and the normal operation of the network is guaranteed.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Method and system for controlling data delivery and reception based on timestamps of data records

A method and system for controlling data delivery and reception, which alleviate the processing workloads imposed on management systems and reduce the hardware and software resources required in management systems. Each time a status message arrives from network subsystems, a data storage unit in a management system stores the received information, together with a reception timestamp. At regular intervals, or on an on-demand basis, a data requesting unit in a terminal station issues a data delivery request message to the management system, including a reception time specification to qualify the data records to be delivered. In response to the request, a data retrieval unit in the management system searches its local data storage to extract the requested data records whose reception timestamps are not earlier than the given reception time specification. The data records found are then supplied to a data transmission unit. The data transmission unit delivers them to the requesting terminal station, affixing a transmission timestamp. In the requesting terminal station, a timestamp storage unit saves the transmission timestamp received, while a reception processing unit applies a series of processing operations to the received message to make it suitable for the terminal station.
Owner:FUJITSU LTD

Apparatus and method to automatically collect data regarding assets of a business entity

A system to automatically gather attribute data about elements such as networks, network interface cards, operating systems, device types, installed software, processes in execution, financial data, etc. in an organization or a designated subset of the organization. Fingerprint files are used, each fingerprint file corresponding to an element of a specific type and each containing a list of attributes that will be found if that element exists in the system. Each fingerprint contains or points to one or more collection instructions which control a data collector process to attempt to gather attribute data. Each fingerprint contains or points to rules that are used to analyze the attribute data gathered to calculate the probability that the element exists. The rules can be fired sequentially, in if-then-else fashion or can be incorporated in a script in loops and with mathematical manipulations, tests and branching for more sophisticated analysis. Fingerprints can be turned on and off by configuration data and can be used in a logical order to do discovery without any prior knowledge of the systems being analyzed. A refresh schedule and collection calendar control how often the fingerprints are used in some embodiments, and collected data is stored with time stamps to enable analysis of changes in the data over time.
Owner:BNDENA

Method of and apparatus for authenticating control messages in a signaling network

A communication network includes an SS7 Security Gatekeeper that authenticates and validates network control messages within, transiting, entering and leaving an overlying control fabric such as an SS7 network. The SS7 Security Gatekeeper incorporates several levels of checks to ensure that messages are properly authenticated, valid, and consistent with call progress and system status. In addition to message format, message content is checked to ensure that the originating node has the proper authority to send the message and to invoke the related functions. Predefined sets of templates may be used to check the messages, each set of templates being associated with respective originating point codes and/or calling party addresses. The templates may also be associated with various system states such that messages corresponding to a particular template cause a state transition along a particular edge to a next state node at which another set of templates are defined. Thus, system and call state is maintained. The monitor also includes signaling point authentication using digital signatures and timestamps. Timestamps are also used to initiate appropriate timeouts and so that old or improperly sequenced message may be ignored, corrected or otherwise processed appropriately. The SS7 Security Gatekeeper may be located at the edge of a network to be protected so that all messaging to and from the protected network most egress by way of the Gatekeeper. Alternatively, the SS7 Security Gatekeeper may be internal to the protected network and configured as a “pseudo switch” so that ISUP messaging is routed through the Gatekeeper while actual traffic is trunked directly between the associated SSPs, bypassing the Gatekeeper.
Owner:VERIZON PATENT & LICENSING INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products