At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Bounded cache searches
Cache lines of a data cache may be assigned to a specific page type or color. In addition, the computing system may monitor when a cache line assigned to the...
Optimized assignments and/or generation virtual machine for reducer tasks
The present disclosure relates to assignment or generation of reducer virtual machines after the "map" phase is substantially complete in MapReduce. Instead of...
Detection of disassembly of multi-die chip assemblies
A multi-die chip assembly is described, the multi-die chip assembly including at least one detection apparatus which detects manipulations of the multi-die chip...
Closed-loop optimization of a wireless network using an autonomous vehicle
Embodiments herein use a real-time closed-loop system to optimize a wireless network. The system includes a drone controlled by a self-organizing network (SON)...
Distributed wireless security system
A low-cost security management system for a wireless network utilizes client software having one component that runs on trusted access points and another that...
Techniques for determining communication state using accelerometer data
Techniques for communicating with a user on a network include receiving acceleration data that indicates acceleration of a mobile network node associated with a...
Obtaining replay of audio during a conference session
Presented herein are techniques for receiving media at a participant device for a conference session. The media may be transmitted to the participant device...
Configurable call recording policy
In one embodiment, a communication is established between two endpoints. The communication session may be a video call or an audio call. The communication...
Reducing virtual IP-address (VIP) failure detection time
Methods and systems are provided for global server load balancing in a communication network using a global site selector and an application control engine in...
Sampled deterministic finite automata for deep packet inspection
In one embodiment, a method includes sampling text in a received packet at a network device and analyzing the sampled text using a sampled deterministic finite...
External indexing and search for a secure cloud collaboration system
An end-to-end secure cloud-hosted collaboration service is provided with a hybrid cloud/on-premise index and search capability. This approach includes...
Multicast source in group address mapping
The present disclosure provides a source specific multicast service that maps multicast group addresses to corresponding source addresses. A boundary routing...
Connecting layer-2 domains over layer-3 networks
In one embodiment, a method includes building an address resolution cache for a layer-3 router in a first layer-2 datacenter, where the address resolution cache...
Apparatus, system, and method for resequencing packets
A method is provided in one example and includes receiving a plurality of packets; identifying whether a particular packet, of the plurality of packets, is part...
Private virtual local area network isolation
In one embodiment, a method includes obtaining addresses of end hosts at a switch, the switch configured with a primary virtual local area network and a...
Network address translation offload to network infrastructure for service
chains in a network environment
An example method for network address translation (NAT) offload to network infrastructure for service chains in a network environment is provided and includes...
Source routing convergence in constrained computer networks
In one embodiment, a source routing device (e.g., root device) pre-computes diverse source-routed paths to one or more nodes in a computer network. Upon...
System for utilizing identity based on pairing of wireless devices
In one embodiment, an apparatus may include a memory and a processor. The processor may be operable to create a wireless connection to a wireless device. The...
Downlink OFDMA for service sets with mixed client types
Techniques are provided herein to allow a wireless network access point (AP) to more fully use its bandwidth in order to leverage the different bandwidth...
Communication network topology management based on an associated electric
In one embodiment, a computer determines a grid topology of an electric grid based on one or more electric grid configuration description files, and also...
Addressing cache coherence in updates to a shared database in a network
Example embodiments are provided that may include receiving a request to update a particular object based on a modified object, where the particular object is...
Electro-optical modulators with folded gate layers
An optical modulator may include a lower waveguide, an upper waveguide, and a dielectric layer disposed therebetween. In one embodiment, the lower waveguide may...
This disclosure relates to systems and methods for paging devices in a communication network. A network device providing mobility management through control...
Probe response suppression using angle-of-arrival in a high density
A first wireless device (e.g., an access point) receives a message from a second wireless device (e.g., a client device). The first device determines an...
Wireless network flow monitoring
Techniques are presented herein for enabling performance monitoring of flows within a management and provisioning tunnel used for communicating packets between...
Video conference virtual endpoints
A method and a device providing one virtual endpoint dedicated to serve one particular real endpoint, and the virtual endpoint is typically installed on a...
Establishing a remotely hosted conference initiated with one button push
A method includes registering with a first remote conference manager operated by a first entity and a request to enable conferencing with a second entity. The...
Load balancing of distributed media agents in a conference system
A load balancer controls a cluster of media agents each configured to perform media packet processing operations in a conference session. The load balancer...
Mechanisms to use network session identifiers for software-as-a-service
Techniques are provided for authenticating a subject of a client device to access a software-as-a-service (SaaS) server. A network access device receives a...
Techniques for scalable and foolproof virtual machine move handling with
virtual port channels
Techniques are provided for managing movements of virtual machines in a network. At a first switch, a virtual machine (VM) is detected. The VM is hosted by a...
MSDC scaling through on-demand path update
In one embodiment, a copy of an original packet of a traffic flow is created at an ingress leaf node of a cloud switch. The ingress leaf node forwards the...
System and method for classifying and managing applications over
compressed or encrypted traffic
System and methods for identifying and managing applications over compressed or encrypted traffic in a network are described. The first and second embodiments,...
Using statistical and historical information of topology metrics in
Statistical and historical values of performance metrics are actively used to influence routing decisions for optimum topologies in a constrained network....
Programmable management engine for networks
A network node may contain a virtual software-defined networking (SDN) switch and a local a management engine (e.g., a software application) for generating...
Redirecting traffic via tunnels to discovered data aggregators
In one embodiment, a data aggregator discovery (DAD) message may be distributed by an associated data aggregator, the DAD message identifying the initiating...
Apparatus and method to hide transit only multi-access networks in OSPF
In one embodiment, a first router determines whether a network coupling the first router to one or more second routers is transit-only, wherein transit-only...
Field aware virtual connection discovery
A method for field aware virtual connection discovery is described. In an embodiment, a set of virtual connection domains and a set of virtual connection...
Reassignment of unused portions of a transmission unit in a network
One embodiment includes signaling, by a first network node to a transmission unit owner node, identifying one or more remaining wireless time slot-frequency...
Detecting active region in collaborative computing sessions using voice
In an example embodiment disclosed herein, there is described methods and a system for sharing of content in collaborative computing sessions. The methods and...
System and method for providing small cell gateway redundancy in a network
An example method is provided in one example embodiment and may include configuring a Home eNode B (HeNB) with plurality of tracking area identities (TAIs),...
Managing the bandwidth of a communication session
A system includes a processor operable to identify each of a plurality of first video packets from a communication session with a first identifier designating...
Distributed web object identification for web caching
In some embodiments, a request for a content object may be received as a data packet. Upon determining that the content object is not cached, an element of the...
Recording a hyper text transfer protocol (HTTP) session for playback
In one embodiment, a method includes recording a sequence of online activities of a first user. The online activities include online consumption of online...
Data stream classification
Systems, methods, and other embodiments associated with data stream classification are described. One example method includes identifying packets associated...
Methods and apparatus for network communications via a transparent
A data security device for providing a network transport connection via a transparent network proxy that employs different encryption security mediums along a...
Synchronizing a routing-plane and crypto-plane for routers in virtual
Techniques are presented herein for optimizing secure communications in a network. A router in a virtual private network determines whether or not it has...
Reliable bulk data dissemination using rateless codes
In one embodiment, an aggregating node receives feedback messages from one or more destination nodes in the network. The destination nodes are designated to...
Performance enhancement and congestion control of multipath protocol
packets in a heterogeneous network...
An example method for performance enhancement in a heterogeneous network environment with multipath transport protocols is provided and includes receiving...
Congestion mitigation and avoidance
In one embodiment, a method is provided for congestion mitigation. In this method, a congestion level of data flows along a path is monitored relative to a...