Methods, systems, and computer program products for sharing information for detecting an idle TCP connection
DC CAFCFirst Claim
1. A computer-implemented method, comprising:
- at a server node;
causing data to be sent to a client node; and
providing access, to the client node, to code that, in response to being used by the client node, causes the client node to;
receive, by the client node, a transmission control protocol (TCP)-variant packet,detect an idle time period parameter field in the TCP-variant packet,identify metadata in the idle time period parameter field for an idle time period, during which, no packet is communicated in a TCP-variant connection to keep the TCP-variant connection active, anddetermine, based on the metadata, a timeout attribute associated with the TCP-variant connection.
2 Assignments
Litigations
1 Petition
Accused Products
Abstract
A computer-implemented method is provided, comprising causing access to be provided, to a client computer, to code that causes the client computer to operate in accordance with a protocol that is separate from TCP, in order to establish a protocol connection with another server computer, by: receiving a packet, detecting an idle time period parameter field in the packet, identifying metadata in the idle time period parameter field for an idle time period, where, after the idle time period is detected, the second protocol connection is deemed inactive, and creating or modifying, by the client computer and based on the metadata, a timeout attribute associated with the second protocol connection.
-
Citations
39 Claims
-
1. A computer-implemented method, comprising:
at a server node; causing data to be sent to a client node; and providing access, to the client node, to code that, in response to being used by the client node, causes the client node to; receive, by the client node, a transmission control protocol (TCP)-variant packet, detect an idle time period parameter field in the TCP-variant packet, identify metadata in the idle time period parameter field for an idle time period, during which, no packet is communicated in a TCP-variant connection to keep the TCP-variant connection active, and determine, based on the metadata, a timeout attribute associated with the TCP-variant connection. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
-
20. A computer-implemented method comprising:
at a server computer including a non-transitory memory storing a network application, and one or more processors in communication with the non-transitory memory for executing the network application to operate in accordance with a first protocol including a transmission control protocol (TCP); causing a TCP connection to be established with a client computer; causing first data to be communicated from the server computer to the client computer utilizing the TCP connection in accordance with the TCP protocol and a hypertext transfer protocol (HTTP), for being presented to a user of the client computer; receiving second data, from the user of the client computer, utilizing the TCP connection in accordance with the TCP protocol and the HTTP protocol; and permitting access to code that, based on use by the client computer, results in the client computer operating in accordance with a second protocol that is separate from the TCP, in order to establish a second protocol connection with another server computer, by; identifying idle information for detecting an idle time period, based on which, the second protocol connection is subject to deactivation, generating a second protocol packet including an idle time period parameter field identifying metadata for the idle time period based on the idle information, and sending, from the client computer to the another server computer, the second protocol packet to provide the metadata for the idle time period to the another server computer, for use by the another server computer in creating or modifying, based on the metadata, a timeout attribute associated with the second protocol connection. - View Dependent Claims (21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
31. A computer-implemented method comprising:
at a server computer including a non-transitory memory storing instructions, and one or more processors in communication with the non-transitory memory for executing the instructions such that the server computer operates in accordance with a first protocol including a transmission control protocol (TCP) in order to set up a TCP connection with a client computer; causing first data to be communicated from the server computer to the client computer utilizing the TCP connection in accordance with the TCP protocol and a hypertext transfer protocol (HTTP), for being presented to a user of the client computer; receiving, at the server computer, second data of the user of the client computer, utilizing the TCP connection in accordance with the TCP protocol and the HTTP protocol; and permitting access to code that causes the client computer to operate in accordance with a second protocol that is different from the TCP and that operates above an Internet Protocol (IP) layer and below an HTTP application layer, in order to setup a second protocol connection with another server computer, by; receiving, by the client computer from the another server computer, a packet, identifying metadata, that specifies a number of seconds or minutes, in an idle time period parameter field in the packet for an idle time period during which, no packet is communicated that meets each of the following criteria;
a) communicated via the second protocol connection, and b) causes the second protocol connection to be kept at least partially alive, anddetermining, by the client computer and based on the metadata, a timeout attribute associated with the second protocol connection. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39)
Specification