At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Set-top box initiated contact center interaction
In one embodiment, a method can include: (i) receiving a contact center interaction request via a device coupled to a display screen; (ii) accessing information...
Method and apparatus for verifying revocation status of a digital
Verifying revocation status of a digital certificate is provided in part by a receiver verifying a security certificate for a sender. In an embodiment, an...
Optimizing cached access to stack storage
A processing device employs a stack memory in a region of an external memory. The processing device has a stack pointer register to store a current top address...
Facilitating application synchronization with a reservation protocol at a
sender without application receiver...
A technique that facilitates application synchronization with a reservation protocol at a sender without application receiver participation in a computer...
Method and system for managing communication sessions between a text-based
and a voice-based client
A system and method for communicating messages includes receiving, from a first client associated with a calling party, a request for connection with a second...
Techniques for automatically creating an iBGP mesh
Techniques for automatically creating a BGP mesh, and more specifically, an iBGP mesh, are provided. Peering information is flooded to routers within a network...
System and method for testing network protocols
A system that tests a network protocol. This test system allows a user to modify a protocol in the protocol stack of the network while the test is being...
Providing enterprise information
Separate executable agents each perform tasks on associated information that is changing over time, to produce current information, Inputs and outputs are...
Role-based access control enforced by filesystem of an operating system
A method and system for role-based access control enforced by an Operating System filesystem are provided. A file representing a resource is created and stored...
Techniques for passing data across the human-machine interface
Techniques for presenting a key to a human across a human-machine interface include receiving key data that indicates a key to be input to a target process. The...
Spread spectrum in-band utility communication channel
Utility data modulation is superimposed on a payload data modulator optical signal by exploiting spread spectrum techniques by virtue of one embodiment of the...
Processing a subscriber call in a telecommunications network
A method for processing subscriber calls is disclosed. A call agent receives signals associated with a first call from a first subscriber of a first point of...
Method and apparatus for activating and managing VoIP phone with RFID
An apparatus equipped with Radio Frequency Identity (RFID) reader and LAN/WAN access reads an RFID tag attached to a Video and Voice Over Internet Protocol...
System and method for providing a compatibility feature in a session
initiation protocol (SIP) environment
According to an embodiment of the present invention, an apparatus for addressing compatibility in a session protocol environment is provided that includes a...
Resource reservation and admission control for IP network
A resource reservation and admission control scheme uses pseudowires to reserve bandwidth over a layer-2 and/or layer-3 network. The pseudowires are associated...
System and method for switching high priority traffic with low latency
An apparatus including a first buffer, a second buffer and a priority switch circuit. The first buffer is configured to store data of a first data stream having...
Inter-domain point-to-multipoint path computation in a computer network
In one embodiment, distributed path computation elements (PCEs) collaboratively build local portions of an inter-domain P2MP path to each path destination or to...
Advanced multicast support for cable
Embodiments may comprise a cable network that shifts control plane functionality for multicast sessions to a cable modem termination system allowing multicast...
System and method for performing signaling on behalf of a stateless client
A system for, and method for, performing state-based signaling on behalf of a stateless client. In one embodiment, the system includes a controller, couplable to...
System and method for concurrently utilizing multiple system identifiers
System and method for providing access to multiple wireless service providers (WSPs) on a shared network infrastructure. The system includes a plurality of...
System and method for determining the mergeability of spanning tree
A system and method provide for reducing a number of topology instances in a network portion implementing a multiple instance topology. Various embodiments...
OSPF unidirectional link support for unidirectional return paths
A method of supporting a unidirectional link from a first router to a second router, the first and second routers existing in an area of a communication network,...
Method and system for PHY loop detection
A method, system and apparatus are provided for detecting a loop-back in a physical layer on an Ethernet link. In the physical layer, a device sends a base page...
Forwarding data in a data communications network
An apparatus is described for forwarding data in a data communications network having as components nodes and links therebetween in which nodes obtain a...
Convergence processor for media streams
Multicast groups provide a mechanism to deliver simultaneous media content to a plurality of users. In streaming media systems, such as audio and video systems,...
Methods and systems for transforming an AND/OR command tree into a command
Methods and systems of transforming an AND/OR command tree into a command data model are described. An unsimplified command data model is generated from the...
System and method for displaying sticky notes on a phone
A system and method for displaying sticky notes on a phone are provided. The system for displaying sticky notes on a phone includes a processing system and a...
Stateless online web page editing system and method
A system and a method of editing Web page online wherein the original web page is converted into block version web page by creating a server based application...
Inline power policing
In a wired data telecommunication network power sourcing equipment coupled to a powered device performs policing of power drawn by the powered device. In one...
Method and system for detection of aliases in a network
The invention provides a method and system of detecting aliases in a network. The network comprises at least one device and at least one Network management...
Methods and apparatus to support routing of information
A first network node maintains separate routing policy information to forward network traffic depending on a direction of the network traffic. Upstream routing...
Application layer message-based server failover management by a network
A method is disclosed for application layer message-based network element management of server failures. According to one aspect, a network element such as a...
Management of LAN devices behind firewalls via dual mode mobile device
Methods and systems are provided for enabling a service provider to manage a service node that is separated from the service provider by a firewall. A dual-mode...
Determining effective carrier-to-interference plus noise ratio in OFDMA
Techniques are provided to determine a more realistic measure of a physical carrier-to-interference plus noise radio (pCINR) associated with a wireless channel...
Method and system for automatic modem bandwidth detection in a router
A method and system for automatic modem bandwidth detection. The method includes the step of transmitting a plurality of probe packets from a router to an...
Load balancing of broadband subscriber sessions
We describe an example system that includes a plurality of aggregation nodes. Each aggregation node is configured to generate a node utilization data. A pool...
Virtual private LAN service networks with mixed mode network devices
In one embodiment, a method generally includes identifying at a local Virtual Private LAN Service Provider Edge (VPLS PE) device whether remote VPLS PE devices...
Fabric channel control apparatus and method
A method for receiving packet data at a communication channel and transmitting the packet data over serial links of the communication channel. The packet data is...
Method and system for determining path maximum transfer unit for IP
A method and system for determining path maximum transfer unit (PMTU) in an Internet Protocol (IP) multicast is described. If a packet of a size greater than the...
Techniques for decreasing queries to discover routes in an interior
Techniques for recovering lost routes include receiving reported costs for transmitting data to a destination from neighboring nodes; and determining total costs...
Method for improving the performance of a wireless communications network
by using beamformed virtual antennas
The present invention discloses a method for wireless communications network performance in transmitting a message. The method comprises creating a first...
Method of determining transit costs across autonomous systems
A method for determining a cumulative network layer reachability cost of traversing one or more autonomous network routing systems comprises receiving first...
Method and system for bypassing a core network in establishing a call
between endpoints on different media gateways
A method and system for establishing a call between two endpoints residing on different media gateways in a decomposed voice over packet architecture. Cluster...
Managing the bandwidths of virtual circuits when the aggregate bandwidth
to an adjacent device changes
The bandwidth of a virtual circuit is changed when the aggregate bandwidth available on path(s) to an adjacent ATM device (through which the VC is provided)...
Prevention of protocol imitation in peer-to-peer systems
A method for allocating a resource in a computer network includes accepting from a peer a request to download a data item using a P2P protocol via the computer...
Constructing a repair path in the event of non-availability of a routing
In one embodiment, an apparatus and method are described for constructing a repair path in the event of non-availability of a routing domain component of a...
Powered communications interface with DC current imbalance compensation
A communications interface circuit includes data signal transformers for transmitting and receiving interface data signals. Each data signal transformer has a...
Server preventing attacks by generating a challenge having a computational
request and a secure cookie for...
A server is configured for preventing flood attacks by a client having sent a request, by dynamically generating a challenge to be performed by the client before...
System and method for applet caching
The invention involves a method for an Applet to be stored on a hard drive attached or available to a computer, such that the Applet is available to other...