Methods, systems, and computer program products for sharing information for detecting an idle TCP connection
DC CAFCFirst Claim
1. A computer-implemented method, comprising:
- causing access to be provided to a server computer including;
a non-transitory memory storing a network application, andone or more processors in communication with the non-transitory memory, wherein the one or more processors execute the network application to operate in accordance with a first protocol including a transmission control protocol (TCP);
causing a TCP connection to be established with a client computer, by;
communicating a segment including at least one first synchronize bit,communicating a first acknowledgement of the segment, and at least one second synchronize bit, andcommunicating a second acknowledgement;
causing first data to be communicated from the server computer to the client computer utilizing the TCP connection in accordance with the TCP protocol and a hypertext transfer protocol (HTTP), for being presented to a user of the client computer;
causing the server computer to permit second data, from the user of the client computer, to be received at the server computer from the client computer utilizing the TCP connection in accordance with the TCP protocol and the hypertext transfer protocol (HTTP); and
causing access to be provided, to the client computer, to code that causes the client computer to operate in accordance with a second protocol that is separate from the TCP, in order to establish a second protocol connection with another server computer, by;
receiving a packet,detecting an idle time period parameter field in the packet,identifying metadata in the idle time period parameter field for an idle time period, where, after the idle time period is detected, the second protocol connection is deemed inactive, andcreating or modifying, by the client computer and based on the metadata, a timeout attribute associated with the second protocol connection.
2 Assignments
Litigations
2 Petitions
Accused Products
Abstract
A computer-implemented method is provided, comprising causing access to be provided, to a client computer, to code that causes the client computer to operate in accordance with a protocol that is separate from TCP, in order to establish a protocol connection with another server computer, by: receiving a packet, detecting an idle time period parameter field in the packet, identifying metadata in the idle time period parameter field for an idle time period, where, after the idle time period is detected, the second protocol connection is deemed inactive, and creating or modifying, by the client computer and based on the metadata, a timeout attribute associated with the second protocol connection.
-
Citations
144 Claims
-
1. A computer-implemented method, comprising:
-
causing access to be provided to a server computer including; a non-transitory memory storing a network application, and one or more processors in communication with the non-transitory memory, wherein the one or more processors execute the network application to operate in accordance with a first protocol including a transmission control protocol (TCP); causing a TCP connection to be established with a client computer, by; communicating a segment including at least one first synchronize bit, communicating a first acknowledgement of the segment, and at least one second synchronize bit, and communicating a second acknowledgement; causing first data to be communicated from the server computer to the client computer utilizing the TCP connection in accordance with the TCP protocol and a hypertext transfer protocol (HTTP), for being presented to a user of the client computer; causing the server computer to permit second data, from the user of the client computer, to be received at the server computer from the client computer utilizing the TCP connection in accordance with the TCP protocol and the hypertext transfer protocol (HTTP); and causing access to be provided, to the client computer, to code that causes the client computer to operate in accordance with a second protocol that is separate from the TCP, in order to establish a second protocol connection with another server computer, by; receiving a packet, detecting an idle time period parameter field in the packet, identifying metadata in the idle time period parameter field for an idle time period, where, after the idle time period is detected, the second protocol connection is deemed inactive, and creating or modifying, by the client computer and based on the metadata, a timeout attribute associated with the second protocol connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33)
-
-
34. A computer-implemented method comprising:
-
providing access to a server computer including; a non-transitory memory storing a network application, and one or more processors in communication with the non-transitory memory, wherein the one or more processors execute the network application to operate in accordance with a first protocol including a transmission control protocol (TCP); causing a TCP connection to be established with a client computer, by communicating a segment including at least one first synchronize bit; communicating a first acknowledgement of the segment, and at least one second synchronize bit; and communicating a second acknowledgement; causing first data to be communicated from the server computer to the client computer utilizing the TCP connection in accordance with the TCP protocol and a hypertext transfer protocol (HTTP), for being presented to a user of the client computer; causing the server computer to permit second data, from the user of the client computer, to be received at the server computer from the client computer utilizing the TCP connection in accordance with the TCP protocol and the hypertext transfer protocol (HTTP); and providing access to code that, after use by the client computer, results in the client computer operating in accordance with a second protocol that is separate from the TCP, in order to establish a second protocol connection with another server computer, by; identifying idle information for detecting an idle time period, after which, the second protocol connection is subject to deactivation, generating a second protocol packet including an idle time period parameter field identifying metadata for the idle time period based on the idle information, and sending, from the client computer to the another server computer, the second protocol packet to provide the metadata for the idle time period to the another server computer, for use by the another server computer in creating or modifying, based on the metadata, a timeout attribute associated with the second protocol connection. - View Dependent Claims (35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71)
-
-
72. A computer-implemented method comprising:
-
providing access to a server computer including; a non-transitory memory storing instructions, and one or more processors in communication with the non-transitory memory, wherein the one or more processors execute the instructions such that a network application operates in accordance with a first protocol including a transmission control protocol (TCP), the server computer, when operating in accordance with the first protocol to set up a TCP connection with a client computer, configured to; communicate a segment including at least one first synchronize bit, communicate a first acknowledgement of the segment, and at least one second synchronize bit, and communicate a second acknowledgement; causing first data to be communicated from the server computer to the client computer utilizing the TCP connection in accordance with the TCP protocol and a hypertext transfer protocol (HTTP), for being presented to a user of the client computer; causing the server computer to permit second data, of the user of the client computer, to be received at the server computer from the client computer utilizing the TCP connection in accordance with the TCP protocol and the hypertext transfer protocol (HTTP); and providing access to code that causes the client computer to operate in accordance with a second protocol that is different from the TCP and that operates above an Internet Protocol (IP) layer and below a hypertext transfer protocol (HTTP) application layer, in order to setup a second protocol connection with another server computer, by; receiving, by the client computer from the another server computer, a packet, identifying metadata, that specifies a number of seconds or minutes, in an idle time period parameter field in the packet for an idle time period during which, no packet is communicated that meets each of the following criteria;
a) communicated via the second protocol connection, and b) causes the second protocol connection to be kept at least partially alive, anddetermining, by the client computer and based on the metadata, a timeout attribute associated with the second protocol connection. - View Dependent Claims (73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103)
-
-
104. A computer-implemented method comprising:
-
providing access to a server computer including; a non-transitory memory storing instructions, and one or more processors in communication with the non-transitory memory, wherein the one or more processors execute the instructions such that a network application operates in accordance with a first protocol including a transmission control protocol (TCP) that operates above an Internet Protocol (IP) layer and below a hypertext transfer protocol (HTTP) application layer, the server computer configured to operate in accordance with the first protocol to set up a TCP connection with a client computer; causing first data to be communicated from the server computer to the client computer utilizing the TCP connection in accordance with the TCP protocol and a hypertext transfer protocol (HTTP), for being presented to a user of the client computer; causing the server computer to permit second data, of the user of the client computer, to be received at the server computer from the client computer utilizing the TCP connection in accordance with the TCP protocol and the hypertext transfer protocol (HTTP); and providing access to structured data that results in the client computer operating in accordance with a second protocol, that is different from the TCP and operates above the IP layer and below the hypertext transfer protocol (HTTP) application layer, in order to setup a second protocol connection with another server computer, and to; receive idle information for use in detecting an idle time period during which no signal is communicated that meets each of the following criteria;
a) communicated in the second protocol connection, and b) results in the second protocol connection being at least partially kept alive,generate, based on the idle information, a second protocol packet including an idle time period parameter field identifying metadata that is specified in a number of seconds or minutes, and send, from the client computer to another server computer and during the set up of the second protocol connection, the second protocol packet to provide the metadata to the another server computer, for use by the another server computer in determining a timeout attribute associated with the second protocol connection. - View Dependent Claims (105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130, 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144)
-
Specification