Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

3255 results about "Timestamping" patented technology

In computing timestamping refers to the use of an electronic timestamp to provide a temporal order among a set of events. Timestamping techniques are used in a variety of computing fields, from network management and computer security to concurrency control. For instance, a heartbeat network uses timestamping to monitor the nodes on a high availability computer cluster.

Methods and systems of handling patent claims

There is disclosed a computer-implemented method of handling a text expressed in a natural language comprising creating a second text or patent claim sentence from a first text or patent claim sentence and timestamping said second text or patent claim sentence. Developments comprise the creation of a plurality of texts or patent claim sentences, the use of trusted and / or trustless timestamping, the use of grammatical texts, the use of a parser and / or of a tagger, modification operations such as addition, insertion and deletion, injection of definitions of words, the use of a thesaurus (synonym, hyponym, hyperonym, holonym, antonym of a word, etc), the use of a unique and optionally persistent web address, making the second text or patent claim available to the public (or not), the use of lexical directions such as a patent classification indication and the use of crowdsourcing techniques.
Owner:LEPELTIER MARIE THERESE

Method and system for authorizing a client computer to access a server computer

The present invention includes a client computer, a first server computer, and a second server computer. The first server provides an authorization ticket containing a time stamp to the client computer when the client computer is authorized to access the first server. An elapsed time counter is started at the client computer when access is provided to the first server. When a request is received at the client computer to access the second server, the client computer determines the session length based upon the elapsed time counter. The client computer calculates a hash value for the authorization ticket, the session length, and a secret shared with the second server computer. The client computer transmits a login request to the second server including the authorization ticket, the session length, and the hash. The second server decrypts the authorization ticket and retrieves a copy of the shared secret. The second server executes a hash function on the authorization ticket, the session length, and the shared secret. The second server then compares the computed hash to the hash value received from the second client application. If the two hash values are identical, the second server retrieves the time stamp from the authorization ticket and adds the session length to the time stamp. The second server then compares the resulting value to the current time. If the resulting value and the current time are within a preset threshold value, the client computer is provided.
Owner:MICROSOFT TECH LICENSING LLC

Managing backups using virtual machines

One embodiment is a method for providing incremental backups for a source computing machine, the method including: (a) creating a first backup snapshot including a virtual machine (VM) snapshot of an initial copy of a source computing machine volume, wherein said VM snapshot includes a timestamp and a first redo log file; (b) reconfiguring and customizing said first backup snapshot to create a first bootable VM, writing changes associated with said reconfiguring and customizing into said first redo log file, then creating a first bootable snapshot including a VM snapshot of said first bootable VM, wherein said VM snapshot of said first bootable VM includes a timestamp for said first bootable VM and a redo log file; (c) performing an incremental update of said first backup snapshot or a subsequent backup snapshot, then creating a subsequent backup snapshot including a VM snapshot of said incremental update, wherein said VM snapshot of said incremental update includes a timestamp for said incremental update and a redo log file; and (d) reconfiguring and customizing said subsequent backup snapshot to create a subsequent bootable VM, then creating a subsequent bootable snapshot including a VM snapshot of said subsequent bootable VM, wherein said VM snapshot of said subsequent bootable VM includes a timestamp for said subsequent bootable VM and a redo log file.
Owner:VMWARE INC

Remote synchronization in packet-switched networks

Remote frequency synchronization is achieved between two or more nodes in a packet-switched network using differential timestamps. A line is fit to multiple differential time values using a minimum delay principle. Frequency synchronization and / or absolute time synchronization between the two nodes may be achieved using one or both of uplink and downlink differential time values and fitting one or both of first and second lines to differential time values by different means of the minimum delay principle.
Owner:TELEFON AB LM ERICSSON (PUBL)

Measurement and adjustment of real-time values according to residence time in networking equipment without access to real time

A system and method of synchronizing clocks in a distributed network is disclosed. A simple 1-pulse-per-second timing pulse is routed to time-stamping units in each network device and utilized to measure traffic-dependent synchronization packet residence delays within network elements. Synchronization messages are updated to reflect the measured residence times, thus creating transparent clocks that can readily be synchronized across the network. The simple timing pulse architecture allows the method to be applied readily both to new designs and to retrofit existing hardware.
Owner:SEMTECH CORP

Methods and apparatus for non-intrusive measurement of delay variation of data traffic on communication networks

A technique for measuring delay variation (jitter) of data traffic (protocol data units (PDUs)) traversing a communication network involves: generating first PDU identifiers of PDUs observed at a first point and corresponding first timestamps indicating observation times of the PDUs at the first point; generating second PDU identifiers of PDUs observed at a second point and corresponding second timestamps indicating observation times of the PDUs at the second point; and computing, from first and second timestamps having matching PDU identifiers, a measure of variation indicating a delay variation of PDUs between the first and second points. The computation can include computing first time differences between observation times of the PDUs at the first point from the first timestamps, computing second time differences between observation times of the PDUs at the second point from the second timestamps, and computing differences between corresponding first and second time differences having matching PDU identifiers.
Owner:VISUAL NETWORKS OPERATIONS

Method of replicating data between computing devices

InactiveUS20050021571A1Minimizes bandwidth requirementSave considerable memory spaceEnergy efficient ICTDatabase distribution/replicationWireless computingElectronic mail
Resource constrained wireless computing devices (e.g. mobile telephones) are given a replication capability for database records (e.g. to enable backing up contacts, e-mails, photographs etc. onto a remote server). This operates without undue processing burden, using low bandwidth unreliable wireless connections. This is achieved by not including a time stamp in each database record, but instead time stamping only a change log record; this approach saves considerable memory space on the wireless device since there is no need to time stamp every database record, as is usually done in the prior art. The change log defines what data is to be replicated; it alone has to be sent to a main server which hosts a master copy of the database and hence has to be kept up to date. Because the change log is compact, far less data has to be sent for data replication purposes—typically only the field which has changed, how it was be changed and when it was changed on the wireless computing device. Prior art systems typically send an entire record, even though that will contain data that has not changed.
Owner:COGNIMA

Method and apparatus for partitioning a database upon a timestamp, support values for phrases and generating a history of frequently occurring phrases

A method and apparatus for mining text databases, employing sequential pattern phrase identification and shape queries, to discover trends. The method passes over a desired database using a dynamically generated shape query. Documents within the database are selected based on specific classifications and user defined partitions. Once a partition is specified, transaction IDs are assigned to the words in the text documents depending on their placement within each document. The transaction IDs encode both the position of each word within the document as well as representing sentence, paragraph, and section breaks, and are represented in one embodiment as long integers with the sentence boundaries. A maximum and minimum gap between words in the phrases and the minimum support all phrases must meet for the selected time period may be specified. A generalized sequential pattern method is used to generate those phrases in each partition that meet the minimum support threshold. The shape query engine takes the set of phrases for the partition of interest and selects those that match a given shape query. A query may take the form of requesting a trend such as "recent upwards trend", "recent spikes in usage", "downward trends", and "resurgence of usage". Once the phrases matching the shape query are found, they are presented to the user.
Owner:GLOBALFOUNDRIES INC

Method and apparatus for packet scheduling using virtual time stamp for high capacity combined input and output queued switching system

A method and apparatus for packet scheduling using a virtual time stamp for a high capacity combined input and output queued switching system. A network employs a virtual time reference system (VTRS) to generate packet virtual time stamps associated with each packet traversing the network. The VTRS includes edge conditioners located at the edge of the network that receive unregulated packet traffic and generate regulated packet traffic for a given flow. The edge conditioners also add a packet virtual time stamp to each incoming packet. Core routers within a network core reference the packet virtual time stamps to schedule packet flow. The core routers also update the packet virtual time stamps using virtual delays. The packet virtual time stamps are removed from the packets when the packets leave the network core through an edge conditioner.
Owner:FUJITSU LTD

Coherency of replicas for a distributed file sharing system

A plurality of data objects may be replicated across a plurality of computing nodes coupled to a network. The network may include a first node operable to initiate an update operation to update a plurality of replicas of a first object. If one or more of the replicas are not reachable then the update operation may update a subset (e.g., a quorum) but not all of the replicas. For each node on which one of the replicas was updated in the update operation, the node may add the object to a list of incoherent objects. The list of incoherent objects may subsequently be used to bring the lagging replicas in sync with the replicas that were updated. In another embodiment, a plurality of replicas of an object may be stored on a plurality of nodes, similarly as described above. A first node that stores a replica of the object may store a first timestamp associated with the replica on the first node. The timestamp may be used to ensure that the replica on the first node is coherent with respect to one or more other replicas by periodically communicating with the one or more other replicas when a threshold amount of time has passed without the replica on the first node receiving an update.
Owner:SYMANTEC OPERATING CORP

Methods and apparatus for identifying asset location in communication networks

The location of unmodified wireless assets in a wireless communication network may be identified using time differences of arrivals of a communication sequence at different network receivers. Time-stamping devices may include correlator circuits in parallel with signal decoders to time-stamp communication sequences. Cellular wireless networks may be frequency-multiplexed to increase spatial time-stamping density. Tags may be attached to passive assets to provide location identification information to network devices. Locations of assets broadcasting standard 802.11 radio frequency structures may be identified. Noise inherent in correlating a communication sequence may be reduced by using a selected correlation function.
Owner:EXTREME NETWORKS INC

Methods and systems for real-time seeking during real-time playback of a presentation layer protocol data stream

A method for real-time seeking during real-time playback of presentation layer protocol data streams includes the step of receiving, by a foreground protocol engine, a request for rendering the contents of a packet in a presentation layer protocol data stream comprising a first plurality of packets already received and a second plurality of packets yet to be received. The foreground protocol engine identifies a state-snapshot having an associated timestamp previous to that of the requested packet. The foreground protocol engine displays during transmission of the presentation layer protocol data stream from a first device to a second device, the requested packet responsive to the identified state-snapshot.
Owner:CITRIX SYST INC

Storage system with virtual disks

An administrator provisions a virtual disk in a remote storage platform and defines policies for that virtual disk. A virtual machine writes to and reads from the storage platform using any storage protocol. Virtual disk data within a failed storage pool is migrated to different storage pools while still respecting the policies of each virtual disk. Snapshot and revert commands are given for a virtual disk at a particular point in time and overhead is minimal. A virtual disk is cloned utilizing snapshot information and no data need be copied. Any number of Zookeeper clusters are executing in a coordinated fashion within the storage platform, thus increasing overall throughput. A timestamp is generated that guarantees a monotonically increasing counter, even upon a crash of a virtual machine. Any virtual disk has a “hybrid cloud aware” policy in which one replica of the virtual disk is stored in a public cloud.
Owner:COMMVAULT SYST INC

Time synchronization method applicable to wireless sensor network

The invention requests to protect a time synchronization method applicable to a wireless sensor network and relates to a wireless network communication technology. The time synchronization method comprises the steps: time source equipment generates beacon frames and broadcasts and sends the beacon frames periodically; non-time source equipment obtains time stamps in the transmitting and receiving process of the beacon frames, obtains frequency deviation and time deviation of an equipment clock and a time source equipment clock according to calculation of a plurality of collected time stamps, compensates a local clock and realizes synchronization with a time source; and time synchronization is carried out step by step, and finally the time synchronization of the whole network is realized. Considering the application environment of the equipment and different requirements for time synchronization, a multi-stage and multilevel synchronization mechanism for combining broadcast synchronization, matching synchronization and monitoring synchronization is adopted. The non-time source equipment can apply synchronization of time synchronization command frames according to different requirements, the equipment without applying the time synchronization command frames can monitor and receive the time synchronization command frames similarly and finish synchronization, so that the whole communication overhead and energy consumption of the network are reduced and the normal operation of the network is guaranteed.
Owner:CHONGQING UNIV OF POSTS & TELECOMM

Method and system for controlling data delivery and reception based on timestamps of data records

A method and system for controlling data delivery and reception, which alleviate the processing workloads imposed on management systems and reduce the hardware and software resources required in management systems. Each time a status message arrives from network subsystems, a data storage unit in a management system stores the received information, together with a reception timestamp. At regular intervals, or on an on-demand basis, a data requesting unit in a terminal station issues a data delivery request message to the management system, including a reception time specification to qualify the data records to be delivered. In response to the request, a data retrieval unit in the management system searches its local data storage to extract the requested data records whose reception timestamps are not earlier than the given reception time specification. The data records found are then supplied to a data transmission unit. The data transmission unit delivers them to the requesting terminal station, affixing a transmission timestamp. In the requesting terminal station, a timestamp storage unit saves the transmission timestamp received, while a reception processing unit applies a series of processing operations to the received message to make it suitable for the terminal station.
Owner:FUJITSU LTD

Method and system for real-time seeking during playback of remote presentation protocols

A foreground protocol engine receives a request for rendering the contents of a packet in a recording of a protocol data stream, the protocol data stream comprising a plurality of packets. The foreground protocol engine identifies a state-snapshot having an associated timestamp previous to that of the requested packet. The foreground protocol engine displays the requested packet responsive to the identified state-snapshot.
Owner:CITRIX SYST INC

Systems and methods for simultaneous voice and sound multifactor authentication

A computer-implemented method is described for authenticating an identity of a user requesting execution of a computerized transaction via a first client computing device. The first device and a second client computing device in proximity each execute applications for communicating with a server. The first and second devices contemporaneously capture voice sequences including at least one audible sound vocalized by the user, and a timestamp indicating when the sound is captured. The identity of the user is validated based upon a determination that the user vocalized the pass phrase, and a difference between the first timestamp and the second timestamp is below a predetermined threshold. The first device executes a computerized transaction with the server computing device upon receiving validation of the identity of the user.
Owner:FMR CORP

Time synchronization method and system for wireless sensor network

The invention discloses a time synchronization method for a wireless sensor network. The method comprises the following steps of: generating a synchronous data packet, and marking a transmission timestamp in the synchronous data packet; transmitting the synchronous data packet to a child node; receiving the synchronous data packet, and marking a receiving timestamp in the synchronous data packet; and compensating for the clock drift of the child node according to the transmission timestamp and the receiving timestamp in the synchronous data packet. By the time synchronization method and the time synchronization system for the wireless sensor network, clock drift compensation between a parent node and the child node is realized only by transmitting the synchronous data packet to the child node to realize regional time synchronization in a region formed by the parent node and the child node, and compared with conventional all-network time synchronization, the regional time synchronization reduces network energy consumption and also can avoid the energy consumption caused by crosstalk interference as much as possible.
Owner:SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products