At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Providing an announcement for a multiparty communication session
Providing an announcement for a multiparty communication session involves establishing a communication session between at least two endpoints. A request to add...
Inter-domain service function chaining
In one embodiment, a method includes receiving a packet in a service function chain at a network device located at a border of a first administrative domain,...
Unique subscriber states for adaptive stream management
Consistent with embodiments of the present invention, a system may be provided to provide per-subscriber stream management comprising: a client capable of...
Detection of shared content viewed by attendees in online meetings
Techniques are presented herein for improving experiences in online meetings that include a plurality of attendee devices, where an attendee device is...
Management of security policies across multiple security products
A management entity discovers security devices connected to a network. Each security device controls access to resources by devices associated with the security...
System and method for providing error handling in an untrusted network
An example method is provided and may include receiving a DIAMETER-based error over an SWm interface by a first evolved packet data gateway (ePDG) for a user...
Detection of malicious network connections
In one embodiment a method, system and apparatus is described for detecting a malicious network connection, the method system and apparatus including...
Service enabled network
In one embodiment, a service enabled network (SEN) controller receives, from a control plane of a network service device, service instructions for corresponding...
Extending virtual station interface discovery protocol (VDP) and VDP-like
protocols for dual-homed deployments...
Techniques are provided for provisioning network resources for virtual machines. At a first switch device, a configuration request message is received from a...
Delay budget based forwarding in communication networks
In one embodiment, certain nodes in a computer network maintain a plurality of routing topologies, each associated with a different corresponding delay (e.g.,...
Selecting a remote path using forwarding path preferences
Selecting remote path using forwarding path preferences is disclosed. In an embodiment, a message of a first network node identifying one or more forwarding...
Automating monitoring using configuration event triggers in a network
An example method for automating monitoring using configuration event triggers in a network environment is provided and includes receiving a change request for...
Single hop overlay architecture for line rate performance in campus
Methods and systems are provided for detecting overlay end points which are a single physical hop away and employing a simplified overlay header instead of a...
Dynamically configurable power-over-ethernet apparatus and method
One or more dual-role Power-over-Ethernet (PoE) port units are each selectively configurable to operate as either (i) a PoE Power Source Equipment (PSE) port...
Data center thermal model
A system for managing a data center including a plurality of electronic components, each of which are configured to generate varying levels of heat loads under...
Method of seamless roaming between wireless local area networks and
cellular carrier networks
A scheme that enables seamless roaming between the WLAN and the cellular carrier network by enabling a user that originates a call in the WLAN and happens to go...
Method, system, and logic for in-band exchange of meta-information
In an embodiment, a method is provided for enabling in-band data exchange between networks. The method can comprise receiving, by a first enveloping proxy...
Automatic assignment of internet protocol addresses in a ring network
In one embodiment, a negotiation is performed between each adjacent pair of a plurality of packet switching devices in a ring network to determine an Internet...
Scalable edge node protection using segment routing
In one embodiment, a method comprises generating, by a first provider edge router associated with a first segment identifier, a primary label for reaching a...
Distributed predictive routing using delay predictability measurements
In one embodiment, a method is disclosed in which a device receives delay information for a communication segment in a network. The device determines a...
Proactive M2M framework using device-level vCard for inventory, identity,
and network management
A network device may connect to a smart-enabled network. Once connected, the network device may receive a network address for a network management server (NMS)....
Modular connectors with electromagnetic interference suppression
Presented herein is a modular connector with electromagnetic interference suppression. The modular connector includes a substrate, at least one set of spring...
Systems and methods for implementing reflective EPS bearers to ensure
uplink quality of service
The present disclosure is directed at systems, methods and media for providing QoS differentiation between IP data flows by sorting data packets into bearers....
Techniques to create, update, disseminate, and use dynamic subset backhaul
channel lists in a mesh network
A mesh network includes a controller, root access points (APs), and mesh APs assigned to different groups of APs. The controller creates for each group a...
System and method for small cell gateway core network selection in a
multi-operator core network environment
An example method is provided in one example embodiment and includes receiving a first communication from a user equipment (UE) for a subscriber associated with...
Distributed-input OFDM angle-of-arrival scheme for location determination
A particular first wireless device having a plurality of antennas and that is part of a group of a plurality of first wireless devices, transmits to a second...
Systems and methods for correlating multiple TCP sessions for a video
User equipments can download a video file by instantiating multiple video requests, each request specifying different parts of the video file. If each video...
Network-based adaptive rate limiting
An apparatus can include a session rate limit calculator and a rate limiter. The session rate limit calculator can be configured to compute a session rate limit...
Generalized security policy user interface
A management entity displays a plurality of icons, each icon representing an actor or a resource in a networking environment. The management entity defines...
Feature aggregation in a computer network
In one embodiment, a device determines that input data to a machine learning model sent from a plurality of source nodes to an aggregation node is causing...
Enhanced fine-grained overlay transport virtualization multi-homing using
per-network authoritative edge device...
In some embodiments, edge devices associated with a network segment are identified. One of the devices is elected as an authoritative device and any previous...
Optical multiplex level and optical channel layer server trails in
wavelength switched optical networks
An optical network packet configured to transmit over an optical communication link from a first optical network having a first control plane to a second...
Methods and apparatus for designing and constructing dual write memory
circuits with voltage assist
Static random access memory (SRAM) circuits are used in most digital integrated circuits to store representations of data bits. To handle multiple concurrent...
Bounded cache searches
Cache lines of a data cache may be assigned to a specific page type or color. In addition, the computing system may monitor when a cache line assigned to the...
System and method for a media access control scheduler for a long term
evolution unlicensed network environment
An example method is provided in one example embodiment and may determining, by a first communication device, whether one or more other communication devices...
Coordinated second-screen advertisement
An application on a second-screen device can receive an advertisement stream and an interactive component. The application can display at least a partial...
Chroma information signaling for video streams
Embodiments of systems and methods for signaling chroma information for a picture in a compressed video stream are provided. One system embodiment, among...
Remote magnification and optimization of shared content in online meeting
Presented herein are techniques to improve content sharing in online conference meetings/sessions. A first request is received from a first attendee device...
Location aware service instance discovery
Network elements provide associated client devices querying for network services with one or more lists of services in accordance with a physical location of...
System and method for providing intelligent chunk duration
A method is provided in one example embodiment and includes receiving analytics information for a video file at a transcoder, the analytics information includes...
Smart virtual private network
In one implementation, a policy server establishes a smart virtual private network between two client devices. The smart virtual private network includes a...
Reduced authentication times in constrained computer networks
In one embodiment, a capable node in a low power and lossy network (LLN) may monitor the authentication time for one or more nodes in the LLN. The capable node...
Techniques for auto-detecting positions in a multi-resource login control
of instant messaging
Techniques are provided for delivering messages to users of client devices in a network. At a server device in a network, location information of each of a...
Intelligent handling of virtual machine mobility in large data center
At a physical device in a network configured to host a virtual switch and one or more virtual machines, a packet is received at the virtual switch from a source...
Distributed fibre channel forwarder
A distributed Fiber Channel over Ethernet (FCoE) Forwarder (FCF) and a distributed Fiber Channel Switch are described. The Distributed FCF is realized by...
Redirection of requests for target addresses
In one embodiment, a first network device may receive a request for an identifier of at least one target to service a client. The first network device may...
Path computation element proxying for deterministic wireless networks
In one embodiment, an agent device discovers a set of path computation elements (PCEs) and corresponding available capabilities and resources, and determines...
Measuring latency within a networking device
Presented herein are techniques to measure latency associated with packets that are processed within a network device. A packet is received at a component of a...
Zero touch deployment of multi-tenant services in a home network
An example method for zero touch deployment of multi-tenant services in a home network environment is provided and includes receiving router configuration...
Efficient use of dynamic host configuration protocol in low power and
In one embodiment, each of a plurality of devices in a computer network is configured to i) transmit a unicasted dynamic host configuration protocol (DHCP)...