At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Facilitating automatic neighbor relation in a wireless telecommunication
An example method for facilitating automatic neighbor relation in a wireless telecommunication network environment is provided and includes initiating a fake...
Detection of false vehicle-to-vehicle emergency brake light messages
The trustworthiness of vehicle-to-vehicle (V2V) messages received from one or more associated vehicles in the vicinity of a subject vehicle is determined...
Method and system for visualizing social connections in a video meeting
A method implemented on a computing device for conducting a video conference includes identifying at least some attendees of the video conference, acquiring a...
Social-driven precaching of accessible objects
A precaching system identifies an object, such as a media file, that a user accesses and then analyzes a social graph of the user to identify social graph...
Techniques for event based queuing, ordering and time slot computation of
multi-modal meeting presentations
A scheduling request to schedule an online meeting is received. The online meeting involves a plurality of participants during which multiple participants may...
Detection of malicious network connections
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including...
Label-switched path aggregation
Techniques are disclosed for aggregating label-switched paths (LPSs). One method for aggregating LSPs may include a first node comparing forwarding equivalence...
Handling unacceptable asymmetrical communication paths in computer
In one embodiment, a plurality of communication paths in a second direction in a communication network is determined, based on reversing communication paths...
Virtual service topologies in virtual private networks
In one embodiment, a method includes storing a service topology route at a network device interconnecting at least two zones comprising a plurality of hosts,...
Portable system for monitoring network flow attributes and associated
A method for monitoring flow attributes at a network node comprises detecting first information indicative of transmission of a packet through the network node....
Service node originated service chains in a network environment
An example method for service node originated service chains in a network environment is provided and includes receiving a packet at a service node in a network...
Dominating set identification for path computation based on directed
acyclic graph membership
In one embodiment, a method comprises a path computation device receiving device information from member network devices, each member network device belonging...
Wafer scale packaging platform for transceivers
A wafer scale implementation of an opto-electronic transceiver assembly process utilizes a silicon wafer as an optical reference plane and platform upon which...
Universal microcode image
Systems and methods for creating universal microcode images and for reconstructing a microcode image from a universal microcode image are described in the...
Displaying regions of user interest in sharing sessions
A meeting server facilitates an online conference session among a presenter device and a plurality of attendee devices, including a display of shared image data...
Scene change detection and handling for preprocessing video with
overlapped 3D transforms
In one method embodiment, for each of a number the plural blocks to be matched, displaying whether an indication of closeness in match between the each of the...
Spherical lens redirected imaging
Wide angled image generation may be facilitated by directing light rays of a field of view through a partial spherical ball lens along an original axis. The...
Thermal conduction system
A cage within a communication module may have a plurality of receptacles. A cover may cover at least a portion of the cage. A thermal conduction system may...
Vent structures for encapsulated components on an SOI-based photonics
An silicon-on-insulator (SOI)-based photonics platform is formed to including a venting structure for encapsulating the active and passive optical components...
Video conference system endpoint
Video conference system endpoint
Slot-based transmission synchronization mechanism in wireless mesh
Methods, apparatuses and systems directed to synchronizing transmissions among parent and child routing nodes in a hierarchical wireless mesh network. In one...
Quality of service determination based on upstream content source
Systems and methods for providing trigger based dynamic changes to a packet flow in a communication network are described. The trigger based dynamic changes can...
Determination, display, and adjustment of best sound source placement
region relative to microphone
A video conference endpoint determines a position of a best audio pick-up region for placement of a sound source relative to a microphone having a receive...
Video compression using multiple variable length coding methods for
multiple types of transform coefficient blocks
Classifying a series of quantized transform coefficients of a block of image data into one of a pre-defined plurality of classes for entropy coding, and entropy...
Scrambled digital data item
A method of decrypting a scrambled digital data item at a client is disclosed, the method including: receiving actual control messages at the client, wherein...
System and method for affinity based switching
An example method may include displaying first image data associated with a first participant on a first screen; comparing a first affinity associated with the...
System and method for providing enhanced audio in a video environment
A method is provided in one example and includes receiving audio data at a microphone array that includes a plurality of microphones. The microphone array is...
Multiplexing packets in high speed downlink packet access communications
Processing a received multiplexed data packet on a downlink channel, in a high speed downlink packet access (HSDPA) communication, utilizing protocol layers is...
Multi-interface adaptive bit rate session management
Systems and method are provided that allow an application layer client in a mobile device to manage multiple interfaces in a communication network. The multiple...
Use of metadata for aiding adaptive streaming clients
A method is provided in one example embodiment and includes receiving media from an input; gathering metadata from a plurality of media stream representations...
System and method for determination of an interaction map
An example method is provided and includes receiving recorded meeting information, selecting a meeting participant from the recorded meeting information,...
Common internet file system proxy authentication of multiple servers
Techniques are described for a proxy system to provide a client device with transparent access to multiple network file servers. The proxy system may appear to...
Dynamic queuing and pinning to improve quality of service on uplinks in a
At a network element having a plurality of physical links configured to communicate traffic over a network to or from the network element, an uplink group is...
Hierarchal label distribution and route installation in a loop-free
routing topology using routing arcs at...
In one embodiment, a method comprises creating, in a computing network, a loop-free routing topology comprising a plurality of routing arcs for reaching a...
Distributed fast remote cutover of traffic upon local failure in an
overlay transport visualization network
Techniques are presented herein for optimizing traffic routing in overlay networks. At a first edge device located at a first site in a network, a message is...
Performing offline BGP prefix origin and path validation at route
In one embodiment, an edge router receives an update message from a neighboring EBGP edge router, creates a modified origin validation state extended community,...
Method of routing multicast traffic
A method of routing multicast traffic in a computer network is disclosed. The method comprises associating a plurality of multicast group addresses on a network...
Technique to minimize traffic loss on a router reload/restart
A link state information correction scheme is implemented by the present disclosure. In one embodiment, the correction scheme is implemented by a reload logic...
Predictive learning machine-based approach to detect traffic outside of
service level agreements
In one embodiment, a request to make a prediction regarding one or more service level agreements (SLAs) in a network is received. A network traffic parameter...
Virtual router upgrade via graceful restart
Embodiments herein generally provide techniques for upgrading a virtual router (VR) comprising first and second physical routers used to route data between...
In one embodiment, methods and systems for port pooling are described. An interface may communicate with at least one physical server. The at least one physical...
Site-to-site 6rd tunneling using collocated border router and customer
In one embodiment, a router gateway in a first Local Area Network (LAN) hosts both an Internet Protocol version 6 (IPv6) Rapid Deployment (6rd) Customer Edge...
Common mode rejection ratio control for coherent optical receivers
An optical signal is received at a coherent optical receiver. The received optical signal is converted to a first electrical signal and a second electrical...
Compact small form-factor pluggable transceiver
An apparatus, in accordance with particular embodiments, includes an interface configured to establish connections within a copper network. The apparatus also...
Multi-chip module with multiple interposers
A Multi-Chip Module is presented herein that comprises a package substrate, at least two integrated circuit devices, each of which is electrically coupled to...
Mitigating just-in-time spraying attacks in a network environment
An example method for mitigating JIT spraying attacks in a network environment is provided and includes protecting an output of a just-in-time (JIT) compiler...
Restricting network and device access based on presence detection
In an example embodiment, a technique that applies a network policy responsive to specified events, or triggers, to a networked device. If a specified event...
Dynamic interface model
An interface device receives at least one access command with at least one corresponding slave address on a bus. The interface device reads a configuration...
Dynamically limiting bios post for effective power management
Presented herein are methods for budgeting power during a power-on self-test (POST) sequence. A determination is made for one or more stages of a...