UNINTERRUPTED DATA AVAILABILITY DURING FAILURE IN REDUNDANT MICRO-CONTROLLER SYSTEM

    公开(公告)号:US20180032413A1

    公开(公告)日:2018-02-01

    申请号:US15662961

    申请日:2017-07-28

    Abstract: Technical solutions are described for providing a redundant processor. An example processing unit includes a source processor coupled with a system communication bus via a first communication line; a backup processor coupled with the system communication bus via a second communication line; and an inter-microprocessor communication channel for communication between the source processor and the backup processor. The backup processor monitors for a failure of the source processor by monitoring the first communication line for communication messages being transmitted by the source processor. The backup processor determines a failure of the source processor in response to an absence of the communication messages on the first communication line for a predetermined duration. The backup processor, in response to a failure of the source processor, takes over control of communication of the processing unit by sending a status update on the inter-microprocessor communication channel.

    Controlling client access to a server application

    公开(公告)号:US09854067B2

    公开(公告)日:2017-12-26

    申请号:US14319218

    申请日:2014-06-30

    Abstract: An approach is provided for controlling a rate at which requests from a client computer will be received by a server application executed on a server computer. Requests are received by the server computer at different times from the client computer and time intervals between different pairs of successive requests are measured. Based on the time intervals, (1) a historical rate of requests from the client computer is determined and a limit on a rate for the server application to receive subsequent requests from the client computer is determined and enforced based on the historical rate of requests, or (2) a range of the time intervals is determined to be within a predefined range of time intervals and based on the range being within the predefined range, a denial of service attack or an overload of requests from the client computer is determined and blocked.

Patent Agency Ranking