At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for adjusting power used in reception in a wireless
A system and method allows devices to send and receive packets while using power to do so in a manner that responds to events, such as receipt or other...
Reconferencing capability for networked phones
In one embodiment, a method comprises storing information associated with a conference call that has previously been terminated. The method also comprises...
System and method for multiple address of record deregistration using a
single SIP request
One embodiment of the present invention is a method for deregistering multiple addresses of record. The method comprises receiving a session initiation protocol...
Method and apparatus to scale authenticated firewall traversal using
trusted routing point
A Trusted Routing Point (TROP) generates a signaling message that includes an authorization token used to authorize a firewall to open a pinhole. The signaling...
Establishing a bidirectional forwarding detection (BFD) asynchronous mode
session without knowing a Prior...
In one embodiment, a Bidirectional Forwarding Detection (BFD) asynchronous mode session is established between two packet switching devices interconnected by...
Computer system communication channel diagnostics
A method provided in one example includes inserting a first common-mode signal into a first communication channel from a communication node, monitoring...
Packet switching label assignment across multiple packet switching
In one embodiment, a packet switching device assigns a same particular packet switching label to each particular route of a plurality of particular routes...
Avoiding micro-loops in a ring topology of a network
In one embodiment, micro-loops are avoided in ring topologies of packet switching devices by changing the order of propagation of link state information...
Prioritization and preemption of data frames over a switching fabric
Network switching and/or routing devices can use multiple priority data streams and queues to support prioritized serial transmission of data from line cards...
Diverse path forwarding through trial and error
In one embodiment, a node determines an intention to transmit a diversely forwarded packet through a computer network, and as such, transmits a first version of...
Probe packet discovery of entropy values causing specific paths to be
taken through a network
In one embodiment, probe-packet discovery of entropy values causing specific paths to be taken through a network is performed. One embodiment sends, from a...
Measuring latency within a networking device
Presented herein are techniques to measure latency associated with packets that are processed within a network device. A packet is received at a component of a...
System and method for providing a topology path
A method, apparatus, computer readable medium, and system that includes receiving a request for a topology path for a designated device, the request comprising...
Packet routing and switching device
A network device routes data packets by storing the packets in a switching memory as a function of a destination address of the packet. The switching memory...
Acknowledged multicast convergence
In one embodiment, a device connected to a network as part of a multicast tree receives a revised unicast routing and distributes the revised unicast routing...
Predictive caching and tunneling for time-sensitive data delivery to
roaming client devices
Techniques are provided for delivering data to a wireless client device in a wireless network via a plurality of access points as the wireless client device...
Spoon shaped electromagnetic interference fingers
An integrated connector may be provided. The integrated connector may comprise a top portion, a front portion, and a side portion. The top portion may comprise...
A method including determining a position of each glyph in an image of a text document, identifying word boundaries in the document thereby implying the...
Display screen with a graphical user interface
Remote control unit
Remote control for video management
Method of reducing solder wicking on a substrate
This invention relates to a substrate with via and pad structure(s) to reduce solder wicking. Each via and pad structure connects a component to conductive...
Interleaving low transmission power and medium transmission power channels
in computer networks
In a multiple interface, low power and lossy network comprising a plurality of nodes, a low transmission power and medium transmission power topology are...
System and method for collaboration revelation and participant stacking in
a network environment
A method is provided in one example embodiment and includes receiving video data associated with a meeting in a video conferencing environment; and displaying a...
Scalable system and method for DSL subscriber traffic over an Ethernet
A system and method for identifying and forwarding traffic to/from Digital Subscriber Line Access Multiplexer (DSLAM) devices and feature servers without...
Intelligent overload control for contact center
Particular embodiments provide intelligent overload control for contact centers. In one embodiment, an overload condition at a contact center is determined....
Handling incoming video calls with hunt list
In an example embodiment, when an incoming video call associated with a hunt list is received, the call is first routed to recipients in the hunt list who are...
Quality of service based on logical port identifier for broadband
A provider edge (PE) device provides subscribers with access to an Internet Service Provider (ISP) network. The subscribers are connected to the PE device via a...
Throttling and limiting the scope of neighbor solicitation (NS) traffic
In one embodiment, a switch in a computer network may receive a neighbor solicitation (NS) message for a target node for which no neighbor authentication (NA)...
Method and apparatus for detecting malicious software through contextual
convictions, generic signatures and...
Novel methods, components, and systems that enhance traditional techniques for detecting malicious software are presented. More specifically, methods,...
System and method for implementing a session initiation protocol feature
A method for implementing a SIP feature includes, in particular embodiments, establishing a communication session via a communications platform between a first...
System and method for non-disruptive management of servers in a network
An example method includes disengaging a target node from a cluster, where the disengaging comprises: selecting an inheritor; migrating flows from the target...
Maximizing bottleneck link utilization under constraint of minimizing
queuing delay for targeted...
In one embodiment, a system and method include determining bandwidth of a link that connects a local modem to a remote router. A first percentage of the...
Stitching multicast trees
Techniques for stitching multicast trees in a multiple data center environment. According to one embodiment, a technique for stitching multicast trees is...
Generating a loop-free routing topology using routing arcs
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a...
Method and apparatus for preventing loops in a network by controlling
Methods and apparatus for eliminating loops associated with interconnects between clusters are disclosed. According to one aspect of the present invention, a...
System and method for optimizing maintenance of geographically distributed
A system and method are provided for optimizing maintenance of a geographically distributed data processing system. The method comprises selecting a primary...
Using Ethernet ring protection switching with computer networks
In one embodiment, a first routing device establishes a virtual channel with a remote routing device in a G.8032 protocol Ethernet network ring. The first...
Authentication of cache DNS server responses
A response to a Domain Name System (DNS) query can be protected with authentication information to be used by a host that originated the query. In one example,...
Power save mode for lightpaths
A method for communicating optically between nodes of an optical network, including forming, between a first node and a second node of the network, a set of...
Adaptive control of power grid operations based on energy profiles
In one embodiment, an energy manager determines respective energy profiles of one or more local end-devices for which the energy manager is responsible. Through...
Real time strain sensing solution
Strain sensing may be provided. First, a strain threshold for a circuit board may be determined. Then a strain capacitor may be selected that will fail when the...
Two-dimensional barcode system
An end-user device, including a processor to prepare barcode-input data including (a) at least one of an identification of a user of the end-user device, and an...
Echo mitigation in a conference call
In an example embodiment, an example method is provided for echo mitigation in a conference call. In this method, a test audio signal is transmitted to a...
Method for cloud-based access control policy management
A Web-based management server includes an ACP manager to manage access control rules (ACRs) and access control policies (ACPs). The ACRs and ACPs are configured...
Mitigating threats in a network
Mitigating threats in a network includes receiving a message at a network device. The message includes device-independent parameters generated in response to a...
Virtual internet protocol migration and load balancing
A system for virtual internet protocol (VIP) address migration. The system comprises serving one or more clients connected via a switch router over a network to...
System and method for multipoint label distribution protocol node
protection using a targeted session in a...
A method is provided in one example and includes receiving first address information from a protected node over a first label switched path having a first...
System and method for distributed netflow exporter with a single IP
endpoint in a network environment
An example method for a distributed NetFlow exporter with a single IP endpoint in a network environment is provided and includes configuring a network protocol...
Method to transport bidir PIM over a multiprotocol label switched network
A method, system and an apparatus to transport bidir PIM over a multiprotocol label switched network are provided. The method may comprise receiving a multicast...