At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Electronic advertising using distributed demographics
In one embodiment, at least one portion of a request for an electronic advertisement is received. The request includes an indicator indicative of one of a...
Traffic forwarding for virtual machines
In one embodiment, an apparatus configured for communication with a plurality of virtual machines includes a virtual switch in communication with one or more of...
Managing status and access for a variable source content stream
In one embodiment, a method can include: receiving rules in an interoperability server, the rules being related to access control for an endpoint coupled to a...
Method and system for creating an overlay structure for management
A method, a system, and an apparatus are provided for organizing management information bases (MIB) in a network. A table, associated with an overlay MIB...
Technique for preventing routing loops by disseminating BGP attribute
information in an OSPF-configured network
A novel technique is provided for preventing routing loops by disseminating Border Gateway Protocol (BGP) attribute information in an Open Shortest Path First...
Replenishing a user account with more access resources needed for
accessing network services
A network access server (NAS) determines the status of availability (e.g., how much more quota is unused) of an access resource, and sends a notification...
System, method, and apparatus for maintaining call state information for
real-time call sessions
A method for facilitating communication sessions includes establishing a communication session between a first endpoint and a second endpoint, sending a...
System and method for providing a script-based collection for devices in a
A method is provided in one example and includes verifying a storage capacity of a network element coupled to an end device over a network connection. The...
Virtual data center monitoring
Techniques are provided for monitoring the state or status of virtual data centers. In one embodiment, a method includes receiving state information...
Managing public resources
Systems and techniques relating to electronically managing public resources are described. A described technique includes identifying a location of a mobile...
Rich caller ID with communication history
In an example embodiment, there is described a unified communication system that automatically presents a number of communication attempts from a caller since...
Method and system for grouping voice messages
A method for grouping voice messages includes extracting a voice signature from a voice message and tagging the voice message with an identification associated...
Methods and systems for accounting in an access gateway
Methods and systems are disclosed that provide accounting in an access gateway of a communication network. Logic can be implemented in an access gateway to...
Method and apparatus for self-learning of VPNS from combinations of
unidirectional tunnels in MPLS/VPN networks
In one embodiment, a data packet is received at a network device. A layer-2 identification (L2ID) value is identified for the received data packet based on a...
Physical resource to virtual service network mapping in a template based
end-to-end service provisioning
In one embodiment, the system may identify a virtual network, the virtual network including a plurality of virtual entities and connections among the plurality...
Method and apparatus to trigger DAG reoptimization in a sensor network
In one embodiment, a probing technique allows a root node to determine whether to trigger reoptimization of a computer network represented by a directed acyclic...
Returning domain identifications without reconfiguration
In one embodiment, a technique for returning Domain IDs to a Fiber Channel fabric without a full build fabric (BF) phase is provided. A switch in the fabric may...
Monitoring a flow set to detect faults
In certain embodiments, monitoring a flow set to detect faults includes identifying, by a first maintenance end point, a flow set comprising flows that utilize...
Retransmission-based stream repair and stream join
The Real-time Transport Protocol (RTP) and its related standards define a retransmission packet format and a way to give feedback via Negative ACKnowledge...
System and method for intelligent mode switching in a communications
A method is provided in one example embodiment and includes receiving data associated with a plurality of endpoints that are engaged in a video conference, and...
Viewing angle system for backlighted displays
An apparatus to widen the light dispersion pattern of a light source shining through an overlay window from the viewing side of an electrical computer system....
Systems and methods for network inventory management utilizing mobile
A system for streamlining a network management system (NMS) includes scanning, via a mobile device, a code on a hardware or software component; and determining,...
System and method for securing distributed exporting models in a network
A method is provided in one example implementation and includes identifying a plurality of exporters that are authorized to communicate data to a collector on...
Infrastructure-less bootstrapping: trustless bootstrapping to enable
mobility for mobile devices
Methods and apparatus for supporting a session in Mobile IP are disclosed. A Mobile Node sends a first Mobile IP message identifying the Mobile Node to a Home...
Multicast message retransmission
In one implementation, a method of distributing a multicast message in a wireless mesh network includes receiving a multicast message from a parent node of an...
Reducing processing load in proxies for secure communications
In one embodiment, a method for providing secure communications using a proxy is provided. The proxy negotiates with a client and a server to determine a...
Root cause analysis approach with candidate elimination using network
Root cause analysis in a communication network includes eliminating candidate events using a computer-implemented method, comprising creating a virtual network...
Mapping human-meaningful parameters to network-meaningful parameters to
permit user to establish traffic...
A method of describing highly valued traffic in a home network in terms that are meaningful for a human and that are translated to useful network parameters.
Service advertisements for a network
In one example embodiment, a method may include receiving a service advertisement message from an advertising node via a ring-based network, determining a...
Connection recovery in a call center
In one embodiment, a method includes detecting termination of a first connection between a first caller and a first agent during a communication session between...
Unification of rosters in a communication system
In one embodiment, a method for unifying rosters is provided. A client receives an escalation request associated with a first roster and responds to the...
Fax relay tunneling
A system comprising a first network gateway coupled to a circuit-switched network, the first network gateway to initiate a tunnel through the circuit-switched...
Appending a ranging waveform to a frame to maintain communication protocol
A technique is provided to enable a ranging-enhanced communication device that operates according to a legacy communication protocol to transmit a ranging...
De-correlation of sub-bands using cyclic shifts
Techniques are provided to de-correlate sub-bands of a packet to be transmitted. At a communication device, a signal (packet or frame) is generated for...
Providing services to packet flows in a network
A system and method for providing services to packet flows in a communication network. The services include enhanced charging, stateful firewalls, traffic...
Peer-to-peer network including routing protocol enhancement
Methods, apparatuses and systems that enhance the operation of peer-to-peer networks with routing protocols. In a particular implementation, peer nodes of a...
System and method for providing packet proxy services across virtual
A method is provided for proxy services between a public network and a private network. Such a method includes receiving a first packet having a destination...
System and method for facilitating network performance analysis
A system for facilitating network performance analysis. In an illustrative embodiment, the system includes a first module capable of quantifying network...
Detecting and mitigating overload on switches by wireless mobile client
Techniques are provided to load balance point of presence traffic for a group of network devices, such as switches, that are configured to support network...
Inventory devices and methods
In one implementation, a method includes determining first component data by a first aggregation device at a first time, the first aggregation device being...
Computer program controlled security mechanism
An apparatus is provided in one example embodiment and includes a locking member configured to be coupled to a case that contacts an electronic component, the...
Token-based control of permitted sub-sessions for online collaborative
In one embodiment, a client device may send one or more sub-session requests to one or more corresponding session controllers through a computer network to...
Policy control over switched delivery networks
A method is described that includes receiving a program request from a transceiver that includes a program request to receive a video program at the...
Headend modeling of data
A data modeling method for modeling data for an electronic program guide (EPG) at a broadcast headend is described. The method includes grouping receiver types...
Computing disjoint paths for reactive routing mesh networks
In one embodiment, a reactive routing computer network may be partitioned into diverse logical topologies, and a source node may transmit route request (RREQ)...
Adaptive idle timeout for TCP connections in ESTAB state
In various embodiments, a method may be provided comprising: determining a number of established TCP connections to a server; comparing the number of...
Performing an in-service software reload on a network device
A software reload is executed. The hardware associated with the network device continues to forward network traffic during the software reload. Also, a kernel...
Systems and methods of detecting non-colocated subscriber devices
In one embodiment, a method comprises receiving address configuration information for each of a plurality of subscriber devices associated with the same...
Buffering of prior displayed television channels upon accessing a
Systems and methods are provided for managing a time-shift buffer (TSB) that is used for buffering video presentations. One such method includes receiving user...
Position coding for context-based adaptive variable length coding
Particular embodiments include a method, an apparatus, and logic embodied in tangible computer-readable medium that when executed carries out a method of...