Adaptive device-initiated polling
First Claim
Patent Images
1. A system comprising:
- an electronic device; and
a processor to perform operations comprising;
monitoring operation of the electronic device;
detecting an operational condition of the electronic device based on the monitoring;
generating a polling call based on the operational condition;
sending the polling call over a computer network to a server;
receiving a polling schedule from the server in response to the polling call; and
polling the server based on the polling schedule for content relating to the electronic device;
wherein the electronic device and the processor are behind network security, the server is not behind the network security, and the polling call opens a window through the network security that enables the content to pass from the server to the processor.
5 Assignments
0 Petitions
Accused Products
Abstract
A method includes periodically sending a polling call to an enterprise system outside the firewall at a first polling rate during normal operating conditions, monitoring for a fault condition, periodically sending polling calls to the device outside the firewall at a second polling rate when a fault condition is detected, the second polling rate being higher than the first polling rate. The second polling rate is used as result of a fault condition. The method also includes sending a problem report with the polling calls when the fault condition is detected.
9 Citations
31 Claims
-
1. A system comprising:
-
an electronic device; and a processor to perform operations comprising; monitoring operation of the electronic device; detecting an operational condition of the electronic device based on the monitoring; generating a polling call based on the operational condition; sending the polling call over a computer network to a server; receiving a polling schedule from the server in response to the polling call; and polling the server based on the polling schedule for content relating to the electronic device; wherein the electronic device and the processor are behind network security, the server is not behind the network security, and the polling call opens a window through the network security that enables the content to pass from the server to the processor. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A system comprising:
-
non-transitory machine-readable memory storing instructions that are executable; and a processor to execute the instructions to perform operations comprising; receiving a polling call from an embedded processor, the polling call being based on an operational condition of an electronic device monitored by the embedded processor; outputting a polling schedule to the embedded processor based on the polling call; receiving polling calls from the embedded processor at a rate specified in the polling schedule; and outputting content to the embedded processor in response to the polling calls; wherein the embedded processor is behind network security, the system is not behind the network security, and the polling call opens a window through the network security that enables the content to pass from the system to the embedded processor. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19)
-
-
20. Non-transitory machine-readable memory storing instructions that are executable by a processor to perform operations comprising:
-
monitoring operation of an electronic device; detecting an operational condition of the electronic device based on the monitoring; generating a polling call based on the operational condition; sending the polling call over a computer network to a server; receiving a polling schedule from the server in response to the polling call; and polling the server based on the polling schedule for content relating to the electronic device; wherein the electronic device and the processor are behind network security, the server is not behind the network security, and the polling call opens a window through the network security that enables the content to pass from the server to the processor. - View Dependent Claims (21, 22)
-
-
23. Non-transitory machine-readable memory storing instructions that are executable by a system to perform operations comprising:
-
receiving a polling call from an embedded processor, the polling call being based on an operational condition of an electronic device monitored by the embedded processor; outputting a polling schedule to the embedded processor based on the message; receiving polling calls from the embedded processor at a rate specified in the polling schedule; and outputting content to the embedded processor in response to the polling calls; wherein the embedded processor is behind network security, the system is not behind the network security, and the polling call opens a window through the network security that enables the content to pass from the system to the embedded processor. - View Dependent Claims (24, 25)
-
-
26. A method performed by a processor, comprising:
-
monitoring operation of an electronic device; detecting an operational condition of the electronic device based on the monitoring; generating a polling call based on the operational condition; sending the polling call over a computer network to a server; receiving a polling schedule from the server in response to the polling call; and polling the server based on the polling schedule for content relating to the electronic device; wherein the electronic device and the processor are behind network security, the server is not behind the network security, and the polling call opens a window through the network security that enables the content to pass from the server to the processor. - View Dependent Claims (27, 28)
-
-
29. A method performed by a system, comprising:
-
receiving a polling call from an embedded processor, the polling call being based on an operational condition of an electronic device monitored by the embedded processor; outputting a polling schedule to the embedded processor based on the message; receiving polling calls from the embedded processor at a rate specified in the polling schedule; and outputting content to the embedded processor in response to the polling calls; wherein the embedded processor is behind network security, the system is not behind the network security, and the polling call opens a window through the network security that enables the content to pass from the system to the embedded processor. - View Dependent Claims (30, 31)
-
Specification