Class / Patent application number | Description | Number of patent applications / Date published |
709237000 | Computer-to-computer handshaking | 41 |
20080244085 | System and Method of Delaying Connection Acceptance to Support Connection Request Processing at Layer-7 - Techniques for suspending a TCP three-way handshake, offering the partial connection to an L-7 application or module at a proxy to perform further processing, and then allowing the L-7 application or module to instruct the proxy's network kernel to perform various actions are described. In various embodiments these actions may include: silently dropping the connection, verbosely rejecting the connection, accepting and processing the connection locally, or forwarding the connection to another proxy or the original destination. This additional functionality is provided, in one particular embodiment, via extensions to the POSIX socket API. | 10-02-2008 |
20080263221 | SYSTEM AND METHOD FOR STORE-AND-FORWARD FOR HIGHLY AVAILABLE MESSAGE PRODUCTION - The present invention enables a store-and-forward service that provides higher availability for application residing or connecting to a server to reliably deliver messages and allows an application to send messages to a destination on another server even when the destination is not available at the moment the messages are sent because of network problems or system failures. The messages will be stored durably and temporarily on a local server, and then be efficiently forwarded to the destination once it becomes available. | 10-23-2008 |
20080313347 | Optimizations for TCP connection setup and teardown - In one embodiment, a first network device receives a control message in a first protocol from a client, the control message in the first protocol being addressed to a second network device. The first network device identifies an existing connection in a second protocol that is associated with the second network device. The first network device establishes a connection in the first protocol with the client according to a status of the existing connection in the second protocol that is associated with the second network device. | 12-18-2008 |
20090024758 | Detecting neighbor discovery denial of service attacks against a router - In one embodiment, a method comprises initiating neighbor discovery in response to detecting an absence of an IP destination address of a received data packet within a neighbor cache, including outputting a neighbor solicitation message targeting the IP destination address into a network served by the router, generating a hash index value based on the IP destination address combined with a randomized token stored in the router, and storing the data packet in a selected one of a plurality of pending message queues in the router based on the corresponding hash index value, each pending message queue configured for storing stored data packets having the corresponding hash index value and awaiting respective solicited neighbor advertisement messages from the network; and detecting whether the router is encountering a neighbor discovery denial of service attack based on a determined distribution of the stored data packets among the pending message queues. | 01-22-2009 |
20090043910 | Query Execution and Optimization Utilizing a Combining Network in a Parallel Computer System - An apparatus and method for a database query optimizer utilizes a combining network to optimize a portion of a query in a parallel computer system with multiple nodes. The efficiency of the parallel computer system is increased by offloading collective operations on node data to the global combining network. The global combining network performs collective operations such as minimum, maximum, sum, and logical functions such as OR and XOR. | 02-12-2009 |
20090077258 | Negotiated wireless peripheral systems - Methods, apparatus, and business techniques are disclosed for use in mobile network communication systems. A mobile unit such as a smart phone is preferably equipped with a wireless local area network connection and a wireless wide area network connection. The local area network connection is used to establish a position-dependent ecommerce network connection with a wireless product or service access device supplied by a vendor. A negotiation sequence is carried out to electronically contract the services of the negotiated wireless peripheral from the vendor using a prepaid ecommerce protocol. The negotiated wireless peripheral is a general product or service vending device and the mobile unit acts as a digital authentication and payment device with digital pre-paid payment capabilities. The techniques are useful in many applications to include ticketing and admission systems to events and other types of services that involve ticketing. | 03-19-2009 |
20090077259 | Method and Device for Transmitting Data to Several Receivers Using Arq - The present invention concerns a method and a device for transmitting data between a sender, and at least two receivers, in a network where a data between a sender and a receiver is carried on a connection and where a unicast connection enables a sender to send the data and a receiver to acknowledge a reception of the data. The method comprises the steps of opening a unique unicast connection identified with a connection identifier; and indicating the connection identifier to the sender and the receivers, so that the sender sends the data on the unicast connection, and the receivers receive the data on the unicast connection. | 03-19-2009 |
20090106448 | DATA DISTRIBUTION MANAGEMENT DEVICE AND DATA DISTRIBUTION MANAGEMENT METHOD - A data distribution management device ( | 04-23-2009 |
20090132723 | Generic network protocol scripting - Some embodiments of generic network protocol scripting have been presented. In one embodiment, a script is received from a user. The script is associated with a set of connection oriented network transport based network protocols. The script may be executed to emulate a network transaction according to one of the set of connection oriented network transport based network protocols within a network. | 05-21-2009 |
20090150561 | Modulator timing for quantum key distribution - Methods for establishing modulator timing for a QKD system ( | 06-11-2009 |
20090177794 | SUBSCRIBER DRIVEN MEDIA AGNOSTIC CONTENT DELIVERY ACROSS NETWORKS - A system and method is provided to facilitate subscriber driven media agnostic content delivery across same or different networks. The method includes receiving preferences from a sending client and a receiving client and receiving content of a first media type over a network. The method further includes sending the content or a reference to the content to the receiving client in a preferred media type and to a preferred device in accordance with at least one preference of the receiving client. The method also includes notifying at least the receiving client that the content is to be received by the preferred device. | 07-09-2009 |
20090210554 | Non intrusive control process for an XDSL type transmission line - The invention concerns a non intrusive control process of an xDSL transmission line from signals and messages exchanged between at least one emitter ( | 08-20-2009 |
20090216901 | Three-way communication protocol - Some embodiments of a three-way communication protocol have been presented. In one embodiment, a message receiver receives a message from a message transmitter. The message may include an idempotent identification (ID). The message receiver records the idempotent ID, and sends a first acknowledgement of the message to the message transmitter in response to receipt of the message. In response to receipt of a second acknowledgement from the message transmitter acknowledging the message transmitter's receipt of the first acknowledgement, the message receiver discards the idempotent ID. | 08-27-2009 |
20090222574 | Trust Information Delivery Scheme for Certificate Validation - A unique TIO based trust information delivery scheme is disclosed that allows clients to verify received certificates and to control Java and Javascript access efficiently. This scheme fits into the certificate verification process in SSL to provide a secure connection between a client and a Web server. In particular, the scheme is well suited for incorporation into consumer devices that have a limited footprint, such as set-top boxes, cell phones, and handheld computers. Furthermore, the TIO update scheme disclosed herein allows clients to update certificates securely and dynamically. | 09-03-2009 |
20090276537 | Mechanisms for role negotiation in the establishment of secure communication channels in peer-to-peer environments - A method of establishing secure communication channels in peer-to-peer environments is provided, that includes eliminating a role conflict between at least first peer and a second peer, determining which the peer will act as a client and which the peer will act as a server in a secure connection handshake, and when the first peer or the second peer detects a role conflict an attribute of the handshake message is used as a tiebreaker to determine a wait period, where the first peer or the second peer cancels its own requests, drops an incoming request or denies an incoming request and waits a random amount of time before resending the connection request, where a random time interval used by the peers can be different to reduce a chance for role conflict. | 11-05-2009 |
20090282166 | System and method for data exchange in multiprocessor computer systems - A system for data exchange in multiprocessor computer system is disclosed. The system includes at least one processing module adapted to communicate with at least one of a plurality of routing modules or a plurality of buffer modules or both and at least one communicating interfaces to facilitate data exchange in multiprocessor computer system. | 11-12-2009 |
20090300212 | HEURISTICS PROCESSING - The invention provides a mechanism for a transaction coordinator to indicate to a transaction participant that it supports a heuristic outcome, where a course of action has occurred which means that the transaction participant is unable to honor a transactional prior commitment to the transaction coordinator. The mechanism is such that a transaction participant that is incapable of communicating a heuristic outcome may ignore any such indication. A transaction participant may be incapable because it does not understand the concept of a heuristic outcome at all or because it does not have the ability to inform the transaction coordinator that a heuristic outcome has occurred. | 12-03-2009 |
20100115126 | AUTOMATED CONVERSION OF VERSIONED DATA COLLECTIONS - Various computing components (such as devices, operating environments, and processes) may communicate by exchanging instances of a data collection, such as a class or data structure. However, the definition of the data collection may evolve to specify different numbers, types, properties, and orderings of the items in the data collection, and it may be difficult to verify the structure and contents of an instance received from another component and possibly of a different version. This difficulty may be mitigated by exchanging versioning information about the instance (e.g., as part of the communications wire protocol) and by allocating the converting such that the sender may downconvert to earlier versions requested by a recipient, while the recipient may upconvert to later versions than a version provided by a sender. These techniques may promote the accuracy and consistency of information exchange among many components that operate on different versions of the data collection. | 05-06-2010 |
20100138557 | Method and Apparatus For Implementing Alerts on a Browser Running on a Portable Handheld Device - A method and apparatus for implementing alerts on a browser running on a portable handheld device is disclosed. The method generates an asynchronous notification action from the server and in response transmits an alert containing a message indicating availability of HTML pages that describe the nature of the alert. The alert is received at a node on a network and translated into the original message. An alert receipt acknowledgment is transmitted to the server. Access to the alert HTML page is provided through a URL containing the appropriate query strings necessary to present the appropriate HTML page. The invention also discloses a wireless local area network (WLAN) adapter associated with a wireless network that receives paging signals from a server on the network and returns an acknowledgment signal back to the server. The invention also discloses a client/server based method of delivering messages initiated by a client. After a connection is established between a client and server, the client requests a message from the server. In response, the server retrieves and returns the message back to the client. | 06-03-2010 |
20100146146 | Media Content Management - System, computer implemented process and computer program product for managing media content among a plurality of devices which includes the exchange of device status data among two or more devices. The exchanged device status data includes individual device capabilities and indicia of available media content stored within each of the devices. Each device determines from the exchanged device status data whether any differences exist in available media content stored among the plurality of devices and also whether any of the determined differences in media content will require transcoding to compatible data formats. Once the determinations have been completed, synchronizing and optionally transcoding of the available media content is performed based on the determinations made from the exchanged device status data. Any required transcoding may be performed either before or after media content synchronizing. | 06-10-2010 |
20100205321 | NEGOTIABLE AND ADAPTABLE PERIODIC LINK STATUS MONITORING - A method and system for negotiating and updating a periodicity for link status notification messages between a host and at least one client in a digital communication system. The periodicity is negotiated during an association handshake protocol. This allows the periodicity to be updated during the association to adapt to changing conditions in the data link. | 08-12-2010 |
20100217889 | ACCELERATED BLOCK OPTION FOR TRIVIAL FILE TRANSFER PROTOCOL (TFTP) - Systems and methods for improved data transfers are provided. In one embodiment, a computer readable data storage device having computer executable code for a method for an accelerated file transfer protocol is provided. The method comprises: determining a number (N) of data blocks for accelerating a sending device ahead of a receiving device; transmitting an initial data block plus N additional data blocks to the receiving device without waiting for an acknowledgement (ACK) message from the receiving device; checking for receipt of an ACK message; when a correct ACK message is received, transmitting a next data block; and when a final data block is transmitted, verifying receipt of an ACK message for each of a last N transmitted data blocks. | 08-26-2010 |
20100299449 | SYSTEMS AND METHODS FOR ADJUSTING SIGNALING PROPERTIES BASED ON CABLE ATTRIBUTES - This is generally directed to adjusting signaling properties based on cable attributes. In some embodiments, the cable attributes can include information such as the length of a cable, the diameter of a cable, the type of plug on a cable, the type of or presence of shielding on a cable, or any combination of the above. This information can then be used to determine the appropriate signaling properties for that cable (e.g., with respect to an EMC standard). The appropriate signaling properties may, for example, optimize the signal that is used to drive the cable while still allowing the cable to generate emissions that are within acceptable EMC standards. In some embodiments, the appropriate signaling properties can include factors such as the drive strength of the signal, the slew rate of the signal, the maximum voltage of the signal, the frequency of the signal, or any combination of the above. | 11-25-2010 |
20110047289 | Methods and Apparatuses for IP Address Allocation - A method for IP address allocation is presented. In one embodiment, the method includes receiving DHCP (Dynamic Host Configuration Protocol) information by a driver module operable on a mobile station prior to the mobile station sending a DHCP discovery message. The method includes storing, by the driver module, the DHCP information and redirecting the DHCP discovery message from an operating system DHCP process to the driver module. The method also includes performing DHCP hand-shaking in response to the DHCP discovery message. | 02-24-2011 |
20110072153 | APPARATUS, SYSTEM, AND METHOD FOR DEVICE LEVEL ENABLEMENT OF A COMMUNICATIONS PROTOCOL - An apparatus, system, and method are disclosed for device level enablement of a communications protocol. An adapter compatibility module determines an adapter compatibility status for a plurality of host adapters. A positive adapter compatibility status indicates that each host adapter in the plurality of host adapters is compatible with a communications protocol. A processor compatibility module determines a processor compatibility status for one or more processors. The one or more processors coordinate data transfers to and from the plurality of host adapters. A positive processor compatibility status indicates that each of the one or more processors is compatible with the communications protocol. A compatibility summary module determines a compatibility summary for the plurality of host adapters and the one or more processors. The compatibility summary indicates a positive compatibility relative to the communications protocol in response to a positive processor compatibility status and a positive adapter compatibility status. | 03-24-2011 |
20110131341 | SELECTIVE CONTENT PRE-CACHING - A selective pre-caching system reduces the amount of content cached at cache proxies by limiting the cached content to that content that a particular cache proxy is responsible for caching. This can substantially reduce the content stored on each cache proxy and reduces the amount of resources consumed for pre-caching in preparation for a particular event. The cache proxy receives a list of content items that and an indication of the topology of the cache network. The cache proxy uses the received topology to determine the content items in the received list of content items that the cache proxy is responsible for caching. The cache proxy then retrieves the determined content items so that they are available in the cache before client requests are received. | 06-02-2011 |
20110161518 | ASYNCHRONOUS INVOCATION MECHANISM IN SESSION INITIATION PROTOCOL (SIP) SERVER CLUSTERS - Providing SIP application server interoperability, including detecting at a first SIP application server an event necessitating that work be performed in relation to a SIP application session that is managed by a second SIP application server, creating a SIP message object carrying a set of instructions representing the work, and sending the SIP message object for delivery to the second SIP application server and performance of the instructions at the second SIP application server in relation to the SIP application session. | 06-30-2011 |
20110231572 | PERSONAL MEDIA DEVICE - A personal media device includes a housing assembly, a display panel located on the housing assembly, and a control assembly located on the housing assembly. The control assembly includes a slider assembly, a first switch assembly positioned proximate a first side of the slider assembly, and a second switch assembly positioned proximate a second side of the slider assembly. The control assembly is configured to extend across substantially an entire width of the housing assembly. | 09-22-2011 |
20110246667 | PROCESSING UNIT, CHIP, COMPUTING DEVICE AND METHOD FOR ACCELERATING DATA TRANSMISSION - A processing unit coupled to a bus for accelerating data transmission and a method for accelerating data transmission. The present invention provides a streaming data transmission mode in which a plurality of data blocks are transmitted via one handshake. The present invention employs handshake save policy, when a processing unit sends a request comprising a plurality of data blocks on a bus, a cache or memory will perform address matching to judge whether there is any hit data block. If there is any hit data block, the cache or memory only needs to reply once and then start to continuously transmit the hit data blocks it possesses. Thus, a separate handshake for each data block is no longer needed. | 10-06-2011 |
20120151089 | DIRECT DATA COMMUNICATION IN A PEER-TO-PEER NETWORK - A direct data communication link can be established for direct data communication between a first network device and a second network device of a peer-to-peer network. On determining to communicate with the second network device, the first network device can determine, based on a beacon message broadcast by a managing network device of the peer-to-peer network, whether the second network device supports a direct data communication protocol. If it is determined that both the first network device and the second network device support the direct data communication protocol, a set of handshake messages associated with the direct data communication protocol can be exchanged to establish the direct data communication link between the first network device and the second network device. Subsequent data messages can be exchanged between the first network device and the second network device via the direct data communication link. | 06-14-2012 |
20120254460 | SYSTEM AND METHOD FOR IMPROVED HANDSHAKE PROTOCOL - In order to enable a dynamic handshake procedure, a client device is configured with a list of handshake contributors. The client device initiates a handshake by determining the handshake contributors and writing properties of the handshake contributors in a client handshake, which is then sent to a server device. The client handshake is processed at the server device by invoking an appropriate handler, which handles the handshake result. The server can also send its contributors and their properties to the client. Once the client receives the properties, the client can call an appropriate handler to handle the properties. Connections may be created based on the exchanged properties. New contributors and contributor handlers may be added to both the client and server devices. | 10-04-2012 |
20120254461 | SYSTEM AND METHOD FOR DYNAMICALLY CONFIGURING A HANDSHAKE PROTOCOL - In order to enable a dynamic handshake procedure, a device may be configured with a list of handshake contributors. Contributors with connection handshake properties may be added to the contributor list. To perform handshake, the contributor list is processed to extract the connection handshake properties of each contributor to the handshake. Handlers for handling the connection handshake properties may also be dynamically added and invoked when a handshake is received. | 10-04-2012 |
20130007299 | METHOD AND APPARATUS FOR A KEEP-ALIVE PUSH AGENT - Various methods for application costing to provide decision making for service provisioning are provided. One example method may comprise connecting to a web based portal environment system. The method may further comprise establishing a hypertext transfer protocol keep-alive connection with the web based portal environment system. The method may further comprise receiving a push command via the hypertext transfer protocol keep-alive connection. The method may additionally comprise executing the push command. Similar and related example methods, example apparatuses, and example computer program products are also provided. | 01-03-2013 |
20130013805 | TRANSPARENT AUTO-DISCOVERY OF NETWORK DEVICES LOGICALLY LOCATED BETWEEN A CLIENT AND SERVER - Discovery of intermediate network devices is performed using a technique that piggybacks upon the existing standard TCP (Transport Control Protocol) “SACK” (Selective Acknowledgment) option in a SYN/ACK packet so that discovery information may be shared between pair-wise-deployed peer intermediate devices when a TCP/IP connection (Transport Control Protocol/Internet Protocol) is first established between network endpoints using a conventional three-way handshake. Use of the SACK option is combined with another technique which comprises modifying the original 16-bit value of the TCP receive window size to a special arbitrary value to mark a SYN packet as being generated by a first peer device. The marked SYN when received by the second peer device triggers that device's discovery information to be piggybacked in the SACK option of the SYN/ACK packet. The first device then piggybacks its discovery information in the SACK option of the ACK packet which completes the three-way handshake. | 01-10-2013 |
20130031268 | REDUCING NETWORK LATENCY - A method of transmitting data for use at a data processing system and network interface device, the data processing system being coupled to a network by the network interface device, the method comprising: forming a message template in accordance with a predetermined set of network protocols, the message template including at least in part one or more protocol headers; forming an application layer message in one or more parts; updating the message template with the parts of the application layer message; processing the message template in accordance with the predetermined set of network protocols so as to complete the protocol headers; and causing the network interface device to transmit the completed message over the network. | 01-31-2013 |
20130091302 | SECURE PERSONAL MOBILE-TO-MOBILE INFORMATION EXCHANGE USING INTERLOCKED CAMERA PROTOCOL - Information may be transferred directly between two mobile electronic devices where each device has a display and a camera on the same side. Data may be converted into one or more images using a processor on a first mobile communication device. The images may be displayed on a display on the first mobile communication device. The images are configured to convey information in a form that is detectable by a camera built into a second mobile communication device and interpretable by computer executable instructions running on a processor coupled to the camera that is built into the second mobile communication device. Images displayed on a display of the second device may be detected with a camera on the first device. The images on the second device's display may be interpreted to convert information encoded within those images into electronic data using the processor on the first device. | 04-11-2013 |
20130198408 | IP Parameter Determination and Configuration - An enhanced Internet Protocol (IP) parameter device may aid in configuring and/or determining the IP parameters of a device. The enhanced IP parameter device may first wait for a message requesting a network address from the device. This message may be sent using a variety of communication protocols, including Bootstrap Protocol (BOOTP) and Dynamic Host Configuration Protocol (DHCP). Once this message is received, a handshaking procedure may be completed and the enhanced IP parameter device may then transmit IP parameters to the device. Alternatively, the device may also transmit a message using Address Resolution Protocol (ARP) to allow the enhanced IP parameter device to determine the IP address assigned to the device. Finally, if the device does not transmit any message, the enhanced IP parameter device may search a predetermined range of IP addresses or use Inverse Address Resolution Protocol (IARP) or Reverse Address Resolution Protocol (RARP). | 08-01-2013 |
20130297823 | SECURE DEVICE PAIRING INITIATION VIA WIDE AREA NETWORK - A method of operating a communication device includes, by the communication device, receiving a handshake initiation indication provided to the communication device via a wide area network. Based at least in part on the received handshake initiation indication, causing the communication device to enter a handshake mode. Based on the communication device having entered the handshake mode, autonomously operating the communication device in conjunction with a second device to configure the communication device for secure communication with the second device, wherein the communication device is further configured for routing data between at least a third device and the second device, via the wide area network and via the thus-configured secure communication between the communication device and the second device. | 11-07-2013 |
20140075046 | INFORMATION MANAGEMENT METHOD AND DEVICE - The current invention discloses methods and devices that may be used to maintain continued synchronization during a P2P session when a synchronizing terminal withdraws from synchronizing the operations of one or more participating terminals. A server may temporarily replace the synchronizing terminal and request operating status information from the participating terminals. After calculating data differences between the participating terminals using the operating status information, the server may transmit the data differences to the participating terminals so that each participating terminal is configured to synchronize itself with the other participating terminals. A new synchronizing terminal is selected from the participating terminals so that the new synchronizing terminal is configured to synchronize the operations of the remaining participating terminals. The current invention prevents termination of network applications due to the withdrawal of the synchronizing terminal, maintaining synchronization and improving the quality of the network applications. | 03-13-2014 |
20140281025 | DYNAMIC HOST INTEGRATION - Dynamic host integration techniques are provided. A Transaction-based system integrates heterogeneous hosts to perform various operations associated with the transaction-based system. A command handler implements a specific operation for a host system and a protocol handler implements a specific communication protocol for contacting and having the host system execute the specific operation. For any given transaction within the transaction-based system a command handler and a protocol handler are dynamically acquired and bound to the processing flow to execute a desired operation on a remote and heterogeneous host system. | 09-18-2014 |
20150127850 | COMMUNICATION LAYER STRUCTURE FOR COMPUTING DEVICE COMMUNICATION - This invention discloses a Layer Architecture (LA) and its method of implementation. The Layer Architecture can be used in layered network communications between devices. The structure can be used in a network as one of the network layers within the network structure wherein two or more devices communicate via the network. | 05-07-2015 |