At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
System and method for supporting web authentication
A method is provided in one example embodiment and includes receiving a discover message over a network; determining that the discover message is associated...
Adapting extensible authentication protocol for layer 3 mesh networks
Techniques are provided for adaptive routing of authentication packets in a network, such as a wireless mesh network. At an authenticated device in the network,...
Zone-based firewall policy model for a virtualized data center
Techniques are provided for implementing a zone-based firewall policy. At a virtual network device, information is defined and stored that represents a security...
Optimizing application specific integrated circuit pinouts for high
density interconnect printed circuit boards
Techniques for optimizing application specific integrated circuit (ASIC) and other IC pin assignment corresponding to a high density interconnect (HDI) printed...
Method and systems to perform a rolling stack upgrade
Stackable Layer 2 switches may be upgraded through a stateless upgrade procedure that minimizes software upgrade complexity while leveraging the intrinsic...
Virtual machine memory compartmentalization in multi-core architectures
Techniques for memory compartmentalization for trusted execution of a virtual machine (VM) on a multi-core processing architecture are described. Memory...
Interface bundles in virtual network devices
A virtual network device includes several different virtual network device sub-units, which collectively operate as a single logical network device. An...
Controlling access to managed objects in networked devices
Controlling access to managed objects associated with a networked device. A method comprises receiving a request from a principal for access to a managed object...
Remote monitoring and controlling of network utilization
A non-transitory computer-readable storage medium storing instructions which, when executed by processors, cause the processors to perform: at a management...
System and method for utilizing instant messaging to schedule conference
In one embodiment, a method includes engaging in real-time communications using a first application, and dynamically granting permissions that enable a second...
In-network middlebox compositor for distributed virtualized applications
Techniques are provided for using a middlebox to composite displays from multiple hosted virtualized applications (HVAs) for transmission to a client endpoint...
Peer-to-peer network image distribution hierarchy
In one embodiment, network devices such as IP phones may be upgraded with a set of files. A master network device in the set of network devices is identified....
Apparatus, systems, and methods for client transparent video readdressing
Network operators are striving to find ways to provide stable video services amid a rapid increase in video traffic. In order to provide stable video services...
System and method for generating personal vocabulary from network data
A method is provided in one example and includes receiving data propagating in a network environment, and identifying selected words within the data based on a...
System and method for applications management in a networked vehicular
A method in one example embodiment includes identifying a power state and a battery level of a vehicle. The method also includes allocating power to critical...
Method and apparatus for testing using a transceiver module
An apparatus in one embodiment includes a transceiver housing operable to be inserted into a port of a host system, the port comprising at least a first channel...
Distribution of storage area network encryption keys across data centers
Efficient mechanisms are provided for transferring key objects associated with disk logical unit numbers and tape cartridges from one data center to another...
Video encoder/decoder, method and computer program product
A video encoder/decoder device, method, and computer program product combine to enhance entropy encoding by using different calculation approaches for assessing...
System and method for discovering and verifying a hybrid fiber-coaxial
topology in a cable network environment
A method in an example embodiment can include polling a first cable modem in a cable network and receiving a first response message from the first cable modem...
Scaling IPv4 in data center networks employing ECMP to reach hosts in a
directly connected subnet
Systems and methods are provided for scaling IPv4 networks for large data centers to reach hosts in a directly connected subnet. ToRs may be dynamically...
Preventing leaks among private virtual local area network ports due to
configuration changes in a headless mode
Techniques are provided for hosting a first virtual switch and one or more virtual machines (VMs) configured to be part of a virtual LAN (VLAN). The first...
System and method for virtual portchannel load balancing in a trill
An example method includes storing a portion of virtual PortChannel (vPC) information in a TRansparent Interconnect of Lots of Links network environment,...
Designated forwarder election for VPLS with BGP-based MAC learning
In one embodiment, a network device may participate in an election process to elect one of two or more Provider Edge devices of a Redundancy Group to be a...
Automatic magnification of data on display screen based on eye
characteristics of user
In one embodiment, a method includes receiving an image of a user's eye at a device having a screen and a camera operable to input the image, processing the...
Processor with differential power analysis attack protection
A device including a processor to perform an operation yielding a result, the processor including a register including bit storage elements and including a...
Reorganization of virtualized computer programs
In an embodiment, a data processing method comprises obtaining access to computer program code; identifying a plurality of code segments in the computer program...
Reduced authentication times in constrained computer networks
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node...
Automated data center network patching system
In one embodiment, a computer implemented method is provided for generating a network patch plan. The method can include selecting at least two devices to be...
Method and apparatus for signaling post-ring reservations
In one embodiment, a method includes obtaining a request from a first endpoint to establish a session, determining whether a resource reservation may be...
System and method for a service metering framework in a network
A method is provided in one example embodiment and includes causing generation of a metered record associated with a metering event of an application executed...
Network based on demand wireless roaming
In one embodiment, a method includes receiving at a network device, a request from a mobile device to connect to a wireless local area network, inserting mobile...
Private pairwise key management for groups
In an example embodiment, a key generation system (KGS) is used to generate private pairwise keys between peers belonging to a group. Each member of the group...
Fixed generic mapping of client data to optical transport frame
A fixed Generic Mapping Procedure (GMP) apparatus and method are provided to map client data to an optical transport frame. Client data to be mapped into a...
Upstream label allocation on ethernets for MP2MP LSPS
An apparatus or method for upstream label allocation on LANs for multipoint (MP) label switched paths (LSPs). In one embodiment of the method, a first router...
Access point assisted direct client discovery
A wireless access point device configured to serve wireless client devices in a wireless network monitors transmissions sent by direct clients capable of...
Nonlinear power state transitioning
In nonlinear power state transitioning, temporal intervals of inactivity in network traffic traversing a network node are determined from transport control data...
System and method for managing topology changes in a network environment
A method is provided in one example embodiment and includes receiving a spanning tree protocol topology change notification (STP TCN) in a network; removing...
Dynamically troubleshooting voice quality
In an example embodiment, a method for dynamically troubleshooting voice quality. The method comprises generating a request to intercept a predetermined data...
Interoperability of data plane based overlays and control plane based
overlays in a network environment
Technologies are provided in example embodiments for intercepting a packet being multicast from a first tunnel endpoint in a network, determining first address...
Control of rate adaptive endpoints
An apparatus may receive a plurality of data streams for transmission over a network. The apparatus may adjust packet drop rates in proportion to differences...
Remote control unit
Method and apparatus for retroactively detecting malicious or otherwise
A system for retroactively detecting malicious software on an end user system without performing expensive cross-referencing directly on the endpoint device. A...
Configuring host network parameters without powering on a host server
Techniques are provided to adjust network settings for network connectivity resources used by a host server. A network card device, coupled to the host server,...
Tagging content within a networking environment based upon recipients
receiving the content
A networking environment accessible by a plurality of computing devices is established to facilitate communications between participants associated with the...
Device, methods, and user interface for providing optimized entry of
The present invention includes a device, method, and user interface for providing optimized entry of alphanumeric text. In one form, a method for providing...
Customized ring tones for mobile phones based on context information
A method in one embodiment includes receiving, by a mobile client device, an incoming call sent by a caller, a caller ID being associated with the incoming...
Intercepting a communication session in a telecommunication network
Intercepting a secure communication session includes distributing a key from a key distribution point to establish a secure communication session between a...
Dynamically determining hostnames of network devices
Techniques are disclosed for dynamically determining or learning hostnames. According to embodiments described herein, a solicitation message is received at a...
OTV scaling: site virtual MAC address
Techniques for providing an extended layer 2 network. Embodiments receive, at a first network device in a first layer 2 network within the extended layer 2...
High density deployment using transmit or transmit-receive interference
suppression with selective channel...
In a wireless local are network, each of multiple access points, in a high density deployment, are configured to suppress co-channel interference. A first...