At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Mobile IP registration supporting port identification
Methods and apparatus for registering with a Home Agent are disclosed. The network device sends a registration request having a home address field including an...
Method and apparatus for constructing a backup route in a data
A method is disclosed for constructing a backup route from a source node around an adjacent component. The source node derives a first set of nodes reachable...
Methods and apparatus for protecting against overload conditions on nodes
of a distributed network
Methods and apparatus for protecting against and/or responding to an overload condition at a node ("victim") in a distributed network divert traffic otherwise...
Methods and apparatus for transmitting information in a network
Embodiments of this invention can establish a communications path through a network device in a network for a stream of data served by a server. A host can...
Remote configuration and management via electronic mail
A network device and a method of configuring a network device are provided. The method includes: receiving an e-mail message at the network device; parsing the...
Method and system for validating a CLI/configlet on a given image
A method and system for validating a Command Line Interface (CLI) configlet on an image is provided. The method includes creating a parse graph using a plurality...
System and method for displaying users in a visual conference between
A method for displaying a visual conference includes receiving a plurality of video signals from at least two cameras located at one or more remote sites. The...
Proxy for application server
An application server system is provided having a core engine connecting one or more protocol providers to one or more applications, preferably including an SCCP...
Client-side java content transformation
A method, apparatus and computer program product for performing client-side Java content transformation is presented. A first client request is received at a...
System and method for detecting locations of a customer premises equipment
A system and method are provided for detecting locations of a customer premises equipment in a wireless communication system with one or more base transceiver...
Delivery of time-sensitive data in a wireless network
Embodiments of the invention include a method and software for pre-allocating bandwidth for time-sensitive data such as voice data, for allocating some of the...
Integrated mobile communication and broadcast program reproduction device
A method for controlling operation of an integrated mobile communication and broadcast program reproduction device and of operating the device includes...
Low loss, noise filtering multiplexer/demultiplexer for reconfigurable
Agile OADM structures having a range of tradeoffs between costs and flexibility are disclosed. In certain implementations, cyclic AWGs (arrayed waveguide...
Method and system for communicating with an automatic call distributor
A method for communicating with an automatic call distributor system agent includes communicating through a communications link with a first agent of a plurality...
Fast 2-key scheduler
A scheduler utilizes a data structure in the form of an augmented, pruned, radix tree to implement 2-key scheduling.
Approaches for switching transport protocol connection keys
Approaches are disclosed for switching transport protocol connection keys. A first node sends a keychange request message to a second node, causing the second...
Domain based routing for managing devices operating behind a network
A domain based tunneling scheme allows a Network Management System (NMS) to manage devices in a private network operating behind a NAT boundary. A device in the...
Virtual network device clusters
A virtual network device cluster includes several different virtual network device sub-units, which collectively operate as a single logical network device. The...
System and method for converting packet payload size
An apparatus is provided for enabling communication between telephony devices. The apparatus includes a queue operable to receive incoming media packets from the...
Wireless local area network context control protocol
A Wireless LAN Context Control Protocol (WLCCP) is used to establish and manage a wireless network topology and securely manages the "operational context" for...
Method and system for communicating media based on location of media
A method for communicating media based on location of media source includes receiving communications from a plurality of endpoints. Each communication comprises...
Processing an incoming packet of unknown protocol by encapsulating the
packet and sending it to another processor
One or more network routers include data path processors and a control path processor. A number of network protocols that are not installed on the data path...
Approach for implementing IPsec in performance enhancing proxy (PEP)
An approach is provided for implementing IPsec in PEP environments. The approach generally involves preserving TCP header data contained in packets prior to...
In one embodiment, methods and systems for port pooling are described. An interface may communicate with at least one physical server. The at least one physical...
Upstream bandwidth estimation
A technique for estimating the upstream bandwidth for a modem is provided. Various-sized packets are sent on roundtrip journeys through the modem. The roundtrip...
Route dependency selective route download
A method of selecting routing tables to include in a network line card consists of determining dependencies of local routes on remote routes using a reference...
Apparatus and method for enabling intelligent Fibre-Channel connectivity
The link status of a Fibre-Channel link interconnecting two Fibre-Channel ports may be determined by a third entity distinct from the two Fibre-Channel ports....
Selecting paths in multi-homed transport-layer network associations
A multi-homed network node comprises an interface that is addressable using a primary network address and a secondary network address. Network packets...
Triggering flow analysis at intermediary devices
In one embodiment, a router examines an incoming packet for a flow monitoring request. The router may examine every packet for the flow monitoring request, or...
Multiple device and/or user association
Methods and devices are provided for automating a login process and user/device associations. A user's preferred device settings and/or functions may be...
Set-top box initiated contact center interaction
In one embodiment, a method can include: (i) receiving a contact center interaction request via a device coupled to a display screen; (ii) accessing information...
Method and apparatus for verifying revocation status of a digital
Verifying revocation status of a digital certificate is provided in part by a receiver verifying a security certificate for a sender. In an embodiment, an...
Optimizing cached access to stack storage
A processing device employs a stack memory in a region of an external memory. The processing device has a stack pointer register to store a current top address...
Facilitating application synchronization with a reservation protocol at a
sender without application receiver...
A technique that facilitates application synchronization with a reservation protocol at a sender without application receiver participation in a computer...
Method and system for managing communication sessions between a text-based
and a voice-based client
A system and method for communicating messages includes receiving, from a first client associated with a calling party, a request for connection with a second...
Techniques for automatically creating an iBGP mesh
Techniques for automatically creating a BGP mesh, and more specifically, an iBGP mesh, are provided. Peering information is flooded to routers within a network...
System and method for testing network protocols
A system that tests a network protocol. This test system allows a user to modify a protocol in the protocol stack of the network while the test is being...
Providing enterprise information
Separate executable agents each perform tasks on associated information that is changing over time, to produce current information, Inputs and outputs are...
Role-based access control enforced by filesystem of an operating system
A method and system for role-based access control enforced by an Operating System filesystem are provided. A file representing a resource is created and stored...
Techniques for passing data across the human-machine interface
Techniques for presenting a key to a human across a human-machine interface include receiving key data that indicates a key to be input to a target process. The...
Spread spectrum in-band utility communication channel
Utility data modulation is superimposed on a payload data modulator optical signal by exploiting spread spectrum techniques by virtue of one embodiment of the...
Processing a subscriber call in a telecommunications network
A method for processing subscriber calls is disclosed. A call agent receives signals associated with a first call from a first subscriber of a first point of...
Method and apparatus for activating and managing VoIP phone with RFID
An apparatus equipped with Radio Frequency Identity (RFID) reader and LAN/WAN access reads an RFID tag attached to a Video and Voice Over Internet Protocol...
System and method for providing a compatibility feature in a session
initiation protocol (SIP) environment
According to an embodiment of the present invention, an apparatus for addressing compatibility in a session protocol environment is provided that includes a...
Resource reservation and admission control for IP network
A resource reservation and admission control scheme uses pseudowires to reserve bandwidth over a layer-2 and/or layer-3 network. The pseudowires are associated...
System and method for switching high priority traffic with low latency
An apparatus including a first buffer, a second buffer and a priority switch circuit. The first buffer is configured to store data of a first data stream having...
Inter-domain point-to-multipoint path computation in a computer network
In one embodiment, distributed path computation elements (PCEs) collaboratively build local portions of an inter-domain P2MP path to each path destination or to...
Advanced multicast support for cable
Embodiments may comprise a cable network that shifts control plane functionality for multicast sessions to a cable modem termination system allowing multicast...
System and method for performing signaling on behalf of a stateless client
A system for, and method for, performing state-based signaling on behalf of a stateless client. In one embodiment, the system includes a controller, couplable to...
System and method for concurrently utilizing multiple system identifiers
System and method for providing access to multiple wireless service providers (WSPs) on a shared network infrastructure. The system includes a plurality of...