At Patents you can conduct a Patent Search, File a Patent Application, find a Patent Attorney, or search available technology through our Patent Exchange. Patents are available using simple keyword or date criteria. If you are looking to hire a patent attorney, you've come to the right place. Protect your idea and hire a patent lawyer.
Distributed client services based on execution of service attributes and
data attributes by multiple nodes in...
A network provides distributed client services based on participation in respective resource groups by computing nodes, each resource group including a...
System and method for maintaining a speech-recognition grammar
A method for distributing voice-recognition grammars includes receiving match data from a first remote element. The match data includes information associated...
Optical link performance monitoring
Systems and methods for verifying performance at an intermediate point in an optical link are provided by virtue of one embodiment of the present invention. One...
Passive fiber organizer for mesh network node interconnections
A mesh optical network node has switch cards which carry active components, such as wavelength routers to switch the paths of optical signals through the node...
Low loss, noise filtering multiplexer/demultiplexer for reconfigurable
Agile OADM structures having a range of tradeoffs between costs and flexibility are disclosed. In certain implementations, cyclic AWGs (arrayed waveguide...
Methods and apparatus for minimizing requantization error
Techniques and mechanisms for performing error minimizing requantization are provided. Quantized coefficients associated with a bitstream are received. It is...
Method for securely and automatically configuring access points
The present invention is contemplates an automatic, secure AP configuration protocol. Public/private keys and public key (PK) methods are used to automatically...
Method and system for queuing calls based on call time commitment
A method for routing calls of an automatic call distributor system includes receiving a call from a caller requesting connection with an agent and providing the...
Recoverable reference clock architecture for SONET/SDH and ethernet mixed
Systems and methods for employing asynchronous transceivers in synchronous data communications. For example, a 10 Gigabit Ethernet transceiver may be used to...
Communicating packets along a control channel and a media channel
Communicating packets along a control channel and a media channel includes receiving at a network address translator a first message having a first internal...
Method and apparatus for multicast call signaling in packet network
Multicasting and telephony call signaling are combined to perform multicast call signaling. Several IP endpoints in a packetized network subscribe to a multicast...
Method and apparatus for dynamically determining when to use quality of
service reservation in internet media...
A call controller is configured to monitor call signaling for a media call between a first and second endpoint. The call controller dynamically determines when...
Unlicensed mobile access (UMA) communications using decentralized security
Systems and methods are provided to facilitate efficient routing of unlicensed mobile access (UMA) communications. In one implementation, a method of providing a...
Hardware load balancing through a single fabric
The present invention relates to a method and apparatus for balancing loads in a switching fabric. The switching fabric comprises a plurality of data ports...
Computing a diverse path while providing optimal usage of line protected
Methods and apparatus for enabling line-protected links to be included in path-protected segments of a unidirectional path-switched ring are disclosed. According...
Dual hemisphere antenna
A wireless device is disclosed, including an antenna system comprising one or more antenna elements for sending and receiving a wireless signal. One or more...
Mitigating network attacks using automatic signature generation
A computer-implemented method for mitigating attacks of malicious traffic in a computer network includes receiving a set of attack sequences, including first...
Method of improving user interaction with an object management tool
Methods and systems for improving user interaction with an object management tool are described. An objects tracking panel is displayed. The objects tracking...
System and method for a communication terminal to manage memory for
A system and method for a communication terminal to manage memory and maintain a current application version for multiple applications are provided. The system...
Method and system for network time protocol forwarding
A method and system for network time protocol forwarding is disclosed. The disclosed method includes in one embodiment receiving time data from a server...
DHCP over mobile IP
A protocol that enables an 802 mobile host to obtain a "home IP address," and other configuration parameters via DHCP or BOOTP, while attached to either its home...
Method and system for managing wireless bandwidth resources
A method and system for managing wireless bandwidth resources include the capability to receive at a serving node a service request for a mobile unit and to...
System and method for providing a handoff leg associated with a
preexisting leg in a network environment
A method for facilitating communications between wireless networks is provided that includes communicating with a mobile station and transferring a communication...
Techniques for managing keys using a key server in a network segment
The election of a key server is provided. The key server is a single device that broadcasts an encryption key to other devices in a network segment. Also,...
Timing system for modular cable modem termination system
A modular Cable Modem Termination System (CMTS) includes a packet shelf operating a Data Over Cable Service Interface Specifications (DOCSIS) Media Access...
Maintaining secrecy of assigned unique local addresses for IPv6 nodes
within a prescribed site during access of...
A network includes network nodes and a gateway. Each network node has a corresponding unique in-site IPv6 address for communication within a prescribed site,...
System and method to provide node-to-node connectivity in a communications
A system and method to provide node-to-node connectivity in a communications network are disclosed. A virtual connection is established between a source node...
Per user and network routing tables
A gateway routes a packet from a user to a connected network utilizing a per-user routing table. A source address is extracted from the packet; a per-user...
Apparatus and methods for supporting 802.1X in daisy chained devices
Disclosed are apparatus and methods for authenticating a device to access a network through an access control port. In one embodiment, one or more first...
Scalable packet-switched call control signaling
A packet-switched communication system, method for controlling packet-switched calls over such a system, and components of the system are disclosed. In one...
System and method for providing link, node and PG policy based routing in
PNNI based ATM networks
A system and method for providing link, node, and PG policy based routing in PNNI based ATM networks is disclosed. A computer implemented method signals and...
Directed association mechanism in wireless network environments
Methods, apparatuses and systems enabling a directed association mechanism in wireless computer network environments. In certain embodiments, the directed...
Method and apparatus to detect and break loop configuration
In a system having a plurality of nodes such as Ethernet repeaters, coupled by communication links such as cables, systems and protocols are provided for...
System and method for recovering from endpoint failure in a communication
A method for recovering a communication session after failure of an endpoint includes establishing a communication session between a first endpoint and a second...
Interface for compressed video data analysis
The invention described herein provides a video analysis tool to assist a computer programmer working on a program that effects video data. The tool may be...
Programmable in-situ delay fault test clock generator
A system and method for programmable in-situ launch and capture clock generation is provided. The system provides an efficient and improved manner for delay and...
Upper-level protocol authentication
A method for authenticating communication traffic includes receiving a first message, sent over a network from a source address, requesting information from a...
Methods and devices for enabling a mobile network device to select a
Method and devices are provided for enabling a mobile network device to select a foreign agent from among a plurality of foreign agents that are transmitting...
Method for performing tree based ACL lookups
A method for performing a lookup of a packet against an access control list. In one example, the method includes receiving an access control list, partioning...
Methods and apparatus for performing layer 2 authentication and service
selection in SSG based networks
Methods and apparatus are disclosed for performing layer 2 authentication of a Mobile Node supporting Mobile IP in an SSG based network. Layer 2 information...
System and method for implementing traffic management based on network
A method for implementing traffic management is provided that includes communicating a copy of one or more incoming packets and identifying a volume associated...
Auto-generation of configuration and topology models
Systems and methods are provided for generating an Internetworking Operating System (IOS) Command Line Interface (CLI) configuration model and a logical topology...
Supporting communication sessions at a mobile node
Supporting communication sessions at a mobile node includes determining at a mobile node an address for one or more interior network elements of a network...
System and method for volume indication during a communication session
A method for volume indication during a communication session includes detecting analog audio at a telephony device. First communication packets are transmitted...
Method for sharing a transport connection across a multi-processor
platform with limited inter-processor...
A method is disclosed for sharing a transport connection in a host having two or more processors that exchange limited inter-processor communications. Ranges of...
Method and apparatus to process packets in a network
A method and apparatus is described to process packets in a network. The method may comprise receiving the packet and determining a length K of the packet. If...
Battery-efficient generic advertising service for wireless mobile devices
In one embodiment, a method for acquiring service provider information includes querying a wireless network for service provider information, receiving an...
Mobile IP intra-agent mobility
Methods and apparatus for enabling intra-agent mobility by a mobile node are disclosed, thereby permitting a mobile node to register with a Home Agent via a...
Techniques for zero touch provisioning of edge nodes for a virtual private
A method and apparatus for configuring a network interface to support a virtual private network includes storing configuration data at a server on a host...
In a tunnel connecting a source node to a destination node, data transfer for the tunnel is enabled through a first path. The data transfer is enabled by...