At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Video signature creation and matching
In one embodiment, a system includes a processor to retrieve, from a memory, data of a video frame, the data including measurements of luminance, each of the...
Delay tolerant decoder
In one implementation, a network device receives a series of video frames spanning a series time period from a network. The time period may be static of a...
System and method for improving resilience in transmission of data
A system and method packetizes data by fragmenting, with processing circuitry, a data structure into a plurality of data fragments, each data fragment being...
Secure transmission of a session identifier during service authentication
In an embodiment a method is performed by a network access device (NAD). The NAD transfers a first HTTPS request from a client computer (UE) to an identity...
Maintaining named data networking (NDN) flow balance with highly variable
data object sizes
A network device among a plurality of network devices in a Named Data Networking (NDN) network receives an Interest from a consumer including a name and an...
System and architecture to optimize video traffic over internet protocol
Techniques are provided for managing network traffic and alleviating network congestion issues in video conference environments. At a video conference bridge...
Method and apparatus for distributing EtherChannel load based on variance
Techniques are disclosed for determining a preferred hashing algorithm for load balancing physical interface utilization in a network device, such as a switch,...
Ensuring dynamic traffic shaping fairness
In one embodiment, a device in a network receives an indication of a traffic shaping rate adjustment by a node due to a network condition. The device identifies...
Unified congestion control for real-time media support
Various implementations disclosed herein enable congestion control systems and methods that are agnostic of the availability of congestion notification types,...
Rate-limiting samples for ETX computation in computer networks
In one embodiment, a device in a network obtains information regarding a transmission between the device and a neighbor of the device in the network. The device...
Eliminating IPV6 neighbor solicitations in constrained computer networks
In one embodiment, the techniques herein provide that a node may receive a packet from a neighboring node in a low power and lossy network (LLN). The node may...
Scalable performance monitoring using dynamic flow sampling
Techniques for scalable performance monitoring using dynamic flow sampling are described. According to one approach, a method comprises intercepting, at an...
ICM foot-print with UPOE support
Power Over Ethernet (POE)/universal power over Ethernet (UPoE) may be enabled at multigigabit port-channel connections. This may allow for additional speed...
Shared L2 bridging domains for L3 virtual networks
Systems and/or methods that facilitate the segmentation of layer 3 (L3) data to more than one virtual private network (VPN) or virtual network (vNET) are...
Multi-wavelength distributed raman amplification set-up
Techniques are presented herein to set power levels for multiple Raman pump wavelengths in a distributed Raman amplification configuration. A first receive...
Common mode choke and integrated connector module automation optimization
The subject disclosure relates improved common mode choke (CMC) and integrated connector module (ICM) designs for Ethernet applications. Some aspects provide an...
A collaboration server comprising: a switch fabric; and a plurality of processing modules, each processing module including a CPU core; wherein the plurality of...
Correctly identifying potential anomalies in a distributed storage system
A method for assisting evaluation of anomalies in a distributed storage system is disclosed. The method includes a step of monitoring at least one system metric...
Electro-optic modulator termination
Embodiments presented in this disclosure generally relate to an electro-optic device that includes one or more modulator portions and a terminator portion. Each...
Passive alignment of optical components using optical fiber stubs
Embodiments herein include an optical system that passively aligns an optical component (e.g., a fiber array connector, lens array, lens body, etc.) with a...
Molded glass lid for wafer level packaging of opto-electronic assemblies
An opto-electronic assembly is provided comprising a substrate (generally of silicon or glass) for supporting a plurality of interconnected optical and...
Location services for a wireless device
In an example embodiment, a wireless device is operable to advertise a policy on the inclusion of the wireless device in a radio frequency map. For example, the...
Augmenting Wi-Fi localization with auxiliary sensor information
In one implementation, a method of maintaining continuous identity for mobile devices includes: obtaining a first address for a first device; and obtaining,...
Bit indexed explicit replication for professional media networks
Various systems and methods for performing bit indexed explicit replication (BIER). For example, one method involves receiving a first bit string at a node,...
Redundancy network protocol system
A redundancy network protocol system may include a server to manage one or more virtual internet protocol address (VIP) profiles. Each VIP profile may be shared...
Virtual meeting video sharing
A method is provided in one particular example that includes identifying an attempt by a first communications device to play video data within a virtual meeting...
Creation of security policy templates and security policies based on the
A management entity generates selectable security policy classifications each identifying security policies that share common security rules. Each of the...
Synchronizing a routing-plane and crypto-plane for routers in virtual
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has...
Dynamic re-ordering of scanning modules in security devices
A method and apparatus are provided for preserving bandwidth of a security gateway by dynamically placing a module with a highest ratio of block rate to...
Cross-layer forwarding in a Low-power and Lossy Network
In accordance with techniques presented herein, a packet is received at a forwarding device operating in a multi-service Low-power and Lossy Network (LLN). The...
Metadata augmentation in a service function chain
A method for augmenting metadata of a network service header is disclosed. The method includes receiving, at a first service node, a packet or frame of a...
Path optimization for adaptive streaming
In one implementation, downloading of streaming content using a security as a service (SecaaS) system is more efficient because portions of the streaming...
Service level view of audiovisual conference systems
In an embodiment, a machine-readable volatile or non-volatile storage medium stores one or more sequences of instructions which, when executed by one or more...
Segment routing: PCE driven dynamic setup of forwarding adjacencies and
An apparatus and method for path creation element driven dynamic setup of forwarding adjacencies and explicit path. In one embodiment of the method, a node...
Enabling packet handling information in the clear for MACSEC protected
Techniques are provided to append packet handling information "in the clear" ahead of security related information in a packet to be routed over a network to...
Method and system for homomorphicly randomizing an input
In one embodiment, a method for reducing information leakage in order to counter side channel attacks against a secure execution environment is described, the...
Link adaptation based on neighboring cell transmission information
The present disclosure provides a fine-grained link adaptation mechanism that allows for link adaptation at a resource block granularity. To this end, the...
Burst triggered signal analysis
An apparatus can include a detector configured to detect a burst event for a selected frequency of a digital input signal having a predetermined bandwidth. The...
Providing parameterized actionable communication messages via an
A method, an apparatus and computer readable storage media facilitate initiating an actionable message at a computing device in response to input of a defined...
Label masked addressable memory
A network device receives data packets and derives a key from headers in the packets. A search engine in the device searches, or performs a table lookup, for...
Unified communication audit tool
Providing for dynamic auditing of components of a communication network is provided herein. By way of example, network components can be queried by way of...
Human mobility rule-based device location tracking
Techniques are presented herein to provide human mobility pattern based modeling and tracking of a group of network enabled user devices associated with the...
Localizing a mobile data path in a radio access network under control of a
mobile packet core in a network...
A method is provided in one example embodiment and includes establishing a control channel between a first entity associated with an access network and a second...
Adaptive switching of views for a video conference that involves a
Techniques are provided for dynamically adapting the view from a conference endpoint that includes a presentation apparatus, such as a whiteboard. A first...
Advertisement of adjacency segment identifiers
Various techniques can be used to advertise adjacency segment identifiers (IDs) within a segment routing (SR) network. For example, a method, performed by a...
Cloud-based resource availability calculation of a network environment
An example method for cloud-based resource availability calculation of a network environment is provided and includes receiving a plurality of system error log...
Adaptive intelligent routing in a communication system
This disclosure relates to a system and method for routing data packets adaptively in a communication system. As the proliferation of data rich content and...
Mixed centralized/distributed algorithm for risk mitigation in sparsely
In one embodiment, techniques are shown and described relating to a mixed centralized/distributed algorithm for risk mitigation in sparsely connected networks....
Distributed node migration between routing domains
In one embodiment, a device connected to a network receives at a network interface a first network size indicator for a first network and a second network size...
Implementation of virtual extensible local area network (VXLAN) in
top-of-rack switches in a network environment
An example method for implementation of virtual extensible local area network (VXLAN) in top-of-rack (ToR) switches in a network environment is provided and...