At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Locating points of interest using references to media frames within a
In one embodiment, a method comprises receiving a stream of transport packets encapsulating media packets, and generating a reference to the point-of-interest...
Home communication systems
Systems and methods are disclosed of a network including a primary device, a plurality of remote devices, and a shared peripheral device. The network allows the...
Dynamic virtual machine consolidation
At a first physical computing machine executing a plurality of virtual machines and connected to a network, one or more virtual machine metrics for each virtual...
Bidirectional inline power port
A method and apparatus for bidirectional provision of inline power over data telecommunications cabling permits power to be received at a local powered device...
Enabling packet handling information in the clear for MACSEC protected
Techniques are provided to append packet handling information "in the clear" ahead of security related information in a packet to be routed over a network to...
Pluggable module subcomponent reset
Techniques are provided for resetting a microprocessor-based subcomponent of a pluggable module. Specifically, a host device connected to the pluggable module...
Technique for dynamically restoring original TE-LSP attributes for
A technique dynamically restores original attributes of a Traffic Engineering Label Switched Path (TE-LSP) that are provided in a source domain for a...
Seamless hand-off of combined unified communications and virtual desktop
A host device receives from a user at a first client device a first login request for hosted virtual desktop (HVD) services. A first virtual desktop...
Supporting proxy discovery
In one embodiment, a method includes receiving an invitation request message at a first outbound proxy. The invitation request message is received from a first...
Network appliance with integrated local area network and storage area
network extension services
Techniques and a network appliance apparatus are provided herein to extend local area networks (LANs) and storage area networks (SANs) beyond a data center...
System and method for providing access in a network environment
A method is provided in one example embodiment and includes evaluating geolocation information associated with a mobile node and using the geolocation...
Timing re-synchronization with reduced communication energy in frequency
hopping communication networks
In one embodiment, a battery-operated communication device "quick-samples" a frequency hopping sequence at a periodic rate corresponding to a substantially low...
Adjacency discovery through multicast and single-hop messaging
A first node of a network may send a multicast discovery message comprising a domain identifier of the first node. The first node may also send a single-hop...
System and method for transporting digital baseband streams in a network
A method is provided in example embodiments that include receiving a radio signal stream and segmenting the radio signal stream into segments. The segments may...
Network accessibility to any network attached device during reboot and
A data communication network (DCN) having a plurality of network devices coupled to the DCN with at least one of the network devices having a "boot once"...
Detecting failures of backup label switched paths in a network environment
A method is provided in one example and includes communicating a first request message to a first network element functioning as a point of local repair for a...
Creating balanced link-disjoint topologies in a computer network
In one embodiment, each node in a computer network determines a shortest looping ring back to the node through each of its neighbors. Each of these rings may...
Dynamic reroute of network traffic
In an example embodiment, a method is provided that receives a broadcast of available bandwidth from a first routing device. A congestion of traffic is detected...
Increasing multi-destination scale in a network environment
An example method for increasing multi-destination scale in a network environment is provided and includes receiving a packet at a pair of switches comprising a...
Air flow system
An apparatus is provided in one example embodiment and includes a faceplate having a plurality of slots arranged on a front portion of the faceplate, a top...
Encoder-supervised imaging for video cameras
A controller controls a camera that produces a sequence of images and that has output coupled to a video encoder. The camera has an operating condition...
System and method for scaling a video presentation based on presentation
complexity and room participants
A method is provided in one example embodiment and includes receiving a first presentation material for a videoconference, wherein the first presentation...
Dual band antenna design
Disclosed in an example embodiment herein is a dual mode patch antenna designed to operate in the TM02 mode. The antenna comprising a circular patch antenna...
Aggregating and routing sensor data at a community sensor-coordinating
In one embodiment, a method includes receiving sensor data from multiple sensors associated with multiple persons; for each of the sensors, identifying the...
Universal test system for testing electrical and optical hosts
According to an example implementation, a universal tester includes a host interface slot connected to a first pluggable host card during an electrical test...
Method and apparatus for supporting a computer chip on a printed circuit
A printed circuit board assembly and method of assembly in which underfill is placed between a chip and substrate to support the chip. A trench is formed in the...
Group key management and authentication schemes for mesh networks
According to one embodiment, techniques are provided to enable secure communication among devices in a mesh network using a group temporal key. An authenticator...
Automatic curation and modification of virtualized computer programs
In an embodiment, a data processing method comprises receiving computer program data at a security unit having one or more processors; implementing one or more...
Unified communication audit tool
Providing for dynamic auditing of components of a communication network is provided herein. By way of example, network components can be queried by way of...
Video trick mode mechanism
A system and method for video trick mode playback is described, the system and method including a user actuated control operative to slide (130) a playback...
The present invention relates to an apparatus, method for adjusting depth characteristics of a three-dimensional image for correcting for errors in perceived...
Efficient multivariate signature generation
A cryptographic method and apparatus, including providing a public key that defines a multivariate polynomial mapping Q( ) over a finite field F, extracting a...
Simultaneous processing of media and redundancy streams for mitigating
In one embodiment, a method comprises receiving a primary stream of encoded frames and a separate stream of redundant frames. The method further comprises...
Method and system for configuring wireless routers and networks
A method and system for configuring a wireless router and a wireless communications network includes establishing connectivity between a wireless router and at...
Frame handling within multi-stage switching fabrics
Various techniques can be used to handle frames within multi-stage switching fabric. For example, in one method, a frame and an associated frame header are...
Systems and methods for selecting serving gateways to service user
Some embodiments provide methods for selecting a serving gateway to service user equipment in communication with a network, including: receiving a message from...
Fabric load balancing
In one implementation, a series of nodes in a network or a fabric communicate congestion values upstream against the flow of data packets. A current node...
Passive network latency monitoring
A method measures a resident delay for each port in a node in a network and a peer delay between each pair of neighbor nodes in the network. From these resident...
Event-based capture of packets from a network flow
An apparatus and method for event-based data capture from network flows are provided. At a network device, a network flow is received that comprises a plurality...
Utilizing a smart camera system for immersive telepresence
Video content is received at a computing device that camera views provided by video cameras that are aligned to capture images of participants within a defined...
Method to preview caller in a video conference session
The concept of caller identification (ID) may be enhanced by taking advantage of video by allowing a call recipient to see who is calling on an incoming video...
Application of an embedded instrumentation interface definition language
A system and method provides a managed resource instrumentation application on a network device to instrument a managed network device component. The managed...
Messaging and presence protocol as a configuration and management bus for
Techniques are provided herein for establishing at a network management server a presence on a network. A presence associated with one or more managed devices...
Intelligent social collaboration unified media
In one embodiment, a method includes receiving information from a user in a collaboration network, the information including a unit of content, a title, an...
Single event-upset controller wrapper that facilitates fault injection
A method that determines the system impact of single event upset (SEU) and a single event upset (SEU) wrapper that controls a SEU controller is disclosed. The...
Resource negotiation for cloud services using a messaging and presence
Techniques are provided for sending from a client in a first network device a first session-initiate message to a second network device that is configured to...
Managing fate-sharing in shared-media communication networks
In one embodiment, a management device receives one or more fate-sharing reports locally generated by one or more corresponding reporting nodes in a...
Method and apparatus to provide cryptographic identity assertion for the
The present application provides an authentication scheme that allows a device to provide additional authentication of a Publicly Switched Telephone Network...
Returning missed phone calls
In one embodiment, a method is provided for returning missed phone calls. In this method, a missed phone call is detected and a phone number associated with the...